首页 > 最新文献

2020 3rd International Conference on Advancements in Computational Sciences (ICACS)最新文献

英文 中文
Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for WSNs 基于可靠负载均衡多路径路由的wsn节能聚类
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055957
Alamgir Naushad, G. Abbas, Shehzad Ali Shah, Z. Abbas
Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with minimum hop count. Load-balancing of data traffic over multiple paths is achieved for better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure-recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio, when compared with eminent WSN routing protocols.
与传统网络不同,无线传感器网络(WSNs)由于其固有的特性,如动态网络拓扑、有限的带宽和电池电量,对资源的有效管理尤其具有挑战性。为了保证能量效率,本文提出了一种用于WSNs的路由协议,即Enhanced Hybrid Multipath routing (EHMR),该协议采用分层聚类,根据最大剩余能量度量和最小跳数提出节点间的下一跳选择机制。实现数据流量在多路径上的负载均衡,实现更好的数据包传送率和低延迟率。保证了更高的数据速率和更低的端到端延迟。EHMR还增强了快速故障恢复机制,以恢复故障路径。仿真结果表明,与现有的WSN路由协议相比,EHMR实现了更高的分组分发率、更低的每分组分发能耗、更低的端到端延迟和更小的数据速率对分组分发率的影响。
{"title":"Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for WSNs","authors":"Alamgir Naushad, G. Abbas, Shehzad Ali Shah, Z. Abbas","doi":"10.1109/ICACS47775.2020.9055957","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055957","url":null,"abstract":"Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with minimum hop count. Load-balancing of data traffic over multiple paths is achieved for better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure-recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio, when compared with eminent WSN routing protocols.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128637086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wearable Sensors for Activity Analysis using SMO-based Random Forest over Smart home and Sports Datasets 在智能家居和运动数据集上使用基于smos的随机森林进行活动分析的可穿戴传感器
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055944
Sheikh Badar ud din Tahir, A. Jalal, Mouazma Batool
Human activity recognition using MotionNode sensors is getting prominence effect in our daily life logs. Providing accurate information on human's activities and behaviors is one of the most challenging tasks in ubiquitous computing and human-Computer interaction. In this paper, we proposed an efficient model for having statistical features along SMO-based random forest. Initially, we processed a 1-D Hadamard transform wavelet and 1-D LBP based extraction algorithm to extract valuable features. For activity classification, we used sequential minimal optimization along with Random Forest over two benchmarks USC-HAD dataset and IMSB datasets. Experimental results show that our proposed model can compete with other state-of-the-art methods and can be effectively used to recognize robust human activities in terms of efficiency and accuracy.
利用MotionNode传感器进行人体活动识别在我们的日常生活日志中发挥着越来越突出的作用。提供关于人类活动和行为的准确信息是普适计算和人机交互中最具挑战性的任务之一。本文提出了一种有效的随机森林统计特征模型。首先,我们处理了一维Hadamard变换小波和一维LBP提取算法来提取有价值的特征。对于活动分类,我们在两个基准USC-HAD数据集和IMSB数据集上使用了顺序最小优化和随机森林。实验结果表明,我们提出的模型可以与其他最先进的方法竞争,并且可以在效率和准确性方面有效地用于识别稳健的人类活动。
{"title":"Wearable Sensors for Activity Analysis using SMO-based Random Forest over Smart home and Sports Datasets","authors":"Sheikh Badar ud din Tahir, A. Jalal, Mouazma Batool","doi":"10.1109/ICACS47775.2020.9055944","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055944","url":null,"abstract":"Human activity recognition using MotionNode sensors is getting prominence effect in our daily life logs. Providing accurate information on human's activities and behaviors is one of the most challenging tasks in ubiquitous computing and human-Computer interaction. In this paper, we proposed an efficient model for having statistical features along SMO-based random forest. Initially, we processed a 1-D Hadamard transform wavelet and 1-D LBP based extraction algorithm to extract valuable features. For activity classification, we used sequential minimal optimization along with Random Forest over two benchmarks USC-HAD dataset and IMSB datasets. Experimental results show that our proposed model can compete with other state-of-the-art methods and can be effectively used to recognize robust human activities in terms of efficiency and accuracy.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System 基于机器和深度学习的入侵检测系统混合方法比较分析
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055946
A. Rashid, M. Siddique, S. Ahmed
Intrusion detection is one of the most prominent and challenging problem faced by cybersecurity organizations. Intrusion Detection System (IDS) plays a vital role in identifying network security threats. It protects the network for vulnerable source code, viruses, worms and unauthorized intruders for many intranet/internet applications. Despite many open source APIs and tools for intrusion detection, there are still many network security problems exist. These problems are handled through the proper pre-processing, normalization, feature selection and ranking on benchmark dataset attributes prior to the enforcement of self-learning-based classification algorithms. In this paper, we have performed a comprehensive comparative analysis of the benchmark datasets NSL-KDD and CIDDS-001. For getting optimal results, we have used the hybrid feature selection and ranking methods before applying self-learning (Machine / Deep Learning) classification algorithmic approaches such as SVM, Naïve Bayes, k-NN, Neural Networks, DNN and DAE. We have analyzed the performance of IDS through some prominent performance indicator metrics such as Accuracy, Precision, Recall and F1-Score. The experimental results show that k-NN, SVM, NN and DNN classifiers perform approx. 100% accuracy regarding performance evaluation metrics on the NSL-KDD dataset whereas k-NN and Naïve Bayes classifiers perform approx. 99% accuracy on the CIDDS-001 dataset.
入侵检测是网络安全组织面临的最突出和最具挑战性的问题之一。入侵检测系统(IDS)在识别网络安全威胁方面起着至关重要的作用。它保护网络易受攻击的源代码,病毒,蠕虫和未经授权的入侵者为许多内部网/互联网应用程序。尽管有许多开源的api和工具用于入侵检测,但仍然存在许多网络安全问题。这些问题是通过适当的预处理、归一化、特征选择和对基准数据集属性的排序来处理的,然后再执行基于自学习的分类算法。在本文中,我们对基准数据集NSL-KDD和CIDDS-001进行了全面的比较分析。为了获得最佳结果,我们在应用自学习(机器/深度学习)分类算法方法(如SVM, Naïve Bayes, k-NN, Neural Networks, DNN和DAE)之前使用了混合特征选择和排序方法。我们通过一些突出的性能指标指标(如Accuracy、Precision、Recall和F1-Score)分析了IDS的性能。实验结果表明,k-NN、SVM、NN和DNN分类器都能达到近似的分类效果。NSL-KDD数据集的性能评估指标准确率为100%,而k-NN和Naïve贝叶斯分类器的准确率约为100%。在CIDDS-001数据集上的准确率为99%。
{"title":"Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System","authors":"A. Rashid, M. Siddique, S. Ahmed","doi":"10.1109/ICACS47775.2020.9055946","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055946","url":null,"abstract":"Intrusion detection is one of the most prominent and challenging problem faced by cybersecurity organizations. Intrusion Detection System (IDS) plays a vital role in identifying network security threats. It protects the network for vulnerable source code, viruses, worms and unauthorized intruders for many intranet/internet applications. Despite many open source APIs and tools for intrusion detection, there are still many network security problems exist. These problems are handled through the proper pre-processing, normalization, feature selection and ranking on benchmark dataset attributes prior to the enforcement of self-learning-based classification algorithms. In this paper, we have performed a comprehensive comparative analysis of the benchmark datasets NSL-KDD and CIDDS-001. For getting optimal results, we have used the hybrid feature selection and ranking methods before applying self-learning (Machine / Deep Learning) classification algorithmic approaches such as SVM, Naïve Bayes, k-NN, Neural Networks, DNN and DAE. We have analyzed the performance of IDS through some prominent performance indicator metrics such as Accuracy, Precision, Recall and F1-Score. The experimental results show that k-NN, SVM, NN and DNN classifiers perform approx. 100% accuracy regarding performance evaluation metrics on the NSL-KDD dataset whereas k-NN and Naïve Bayes classifiers perform approx. 99% accuracy on the CIDDS-001 dataset.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121957741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Integrating Human Panic Factor in Intelligent Driver Model 智能驾驶员模型中人类恐慌因素的集成
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055947
Hifsa Tanveer, Mian Muhammad Mubasher, S. W. Jaffry
This study aims to explore the effects of human panic factor on drivers' driving behavior. Most of the car following models focus on idealistic situations aiming for perfection, traffic psychology, however, suggests that emotions do play a significant role in drivers' behavior which in result effect their driving and decision making. Therefore, it is necessary to incorporate human factors in car following models for better realistic results in driving situations where external task demand increases (for example, poor weather conditions like fog, or making up to a meeting in time). Despite the fact that car following models have sublime appreciation in literature, none of them has focused on incorporating human panic factor in these models. Although some work is being done on understanding panic factor in drivers which helps us to understand their driving behaviors and effect on acceleration under panic situations, but this work is limited to statistical approach. This study is intended to fill this void by reviewing literature and making latest advancements by integrating human panic factor in Intelligent Driver Model (IDM). We attempted to integrate human panic factor in IDM, and simulation-based results verified our assumptions for the enhanced version of IDM. The enhanced version of model namely P-IDM models the acceleration behavior of drivers under panic condition, and reproduces acceleration as intended.
本研究旨在探讨人为恐慌因素对驾驶员驾驶行为的影响。大多数汽车跟随模型关注的是追求完美的理想情况,然而,交通心理学表明,情绪确实在驾驶员的行为中起着重要作用,从而影响他们的驾驶和决策。因此,有必要将人为因素纳入汽车跟随模型,以便在外部任务需求增加的驾驶情况下(例如,雾等恶劣天气条件,或及时赶到会议)获得更好的现实结果。尽管汽车跟随模型在文学作品中有着崇高的鉴赏力,但它们都没有关注将人类恐慌因素纳入这些模型。虽然在了解驾驶员的恐慌因素方面已经做了一些工作,这有助于我们了解驾驶员在恐慌情况下的驾驶行为及其对加速的影响,但这些工作仅限于统计方法。本研究旨在通过回顾相关文献,并在智能驾驶模型(IDM)中整合人为恐慌因素方面取得最新进展,以填补这一空白。我们尝试将人为恐慌因素整合到IDM中,基于仿真的结果验证了我们对增强版IDM的假设。模型的增强版本即P-IDM模型模拟驾驶员在恐慌状态下的加速行为,并按预期再现加速度。
{"title":"Integrating Human Panic Factor in Intelligent Driver Model","authors":"Hifsa Tanveer, Mian Muhammad Mubasher, S. W. Jaffry","doi":"10.1109/ICACS47775.2020.9055947","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055947","url":null,"abstract":"This study aims to explore the effects of human panic factor on drivers' driving behavior. Most of the car following models focus on idealistic situations aiming for perfection, traffic psychology, however, suggests that emotions do play a significant role in drivers' behavior which in result effect their driving and decision making. Therefore, it is necessary to incorporate human factors in car following models for better realistic results in driving situations where external task demand increases (for example, poor weather conditions like fog, or making up to a meeting in time). Despite the fact that car following models have sublime appreciation in literature, none of them has focused on incorporating human panic factor in these models. Although some work is being done on understanding panic factor in drivers which helps us to understand their driving behaviors and effect on acceleration under panic situations, but this work is limited to statistical approach. This study is intended to fill this void by reviewing literature and making latest advancements by integrating human panic factor in Intelligent Driver Model (IDM). We attempted to integrate human panic factor in IDM, and simulation-based results verified our assumptions for the enhanced version of IDM. The enhanced version of model namely P-IDM models the acceleration behavior of drivers under panic condition, and reproduces acceleration as intended.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTs CBAM:基于SDN的ndn - iot中基于控制器的广播风暴避免机制
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055939
A. Tariq, R. A. Rehman
The future Internet paradigm Named Data Networking (NDN) and networking architecture like Software Defined Networking (SDN) and Internet of Things (IoT) has caught the attention of research community. NDN is a future internet standard that builds on the practices of current Internet standard TCP/IP. NDN replaces the nodes address with named data that enhance the availability of data. SDN is a good solution for the emerging technologies, efficient resource utilization and communication. Flexible and high-level programmable nature of the SDN caught the attention of the world towards it. IoT enable everything interconnected with other devices and the internet. In dense IoT scenarios, Broadcast storm problem occurs because of the broadcast nature of NDN. Same type of packets cause this problem, that increase the total number of requests and retransmissions. In-time and fast transmission of highly important packets is an issue in IoT. In this paper, we proposed a Controller based Broadcast Storm Avoidance Mechanism (CBAM)in NDN enabled IoT that reduces the broadcast problem with the help of controller. Our scheme used the efficient flow management of SDN controller to control the broadcast storm and efficient transmissions of packets. We also categorized the packet according to the importance and priority. A naming criteria decides the priority of the packet. CBAM outperforms GIF and traditional NDN Flooding in total number of Interests and content retrieval time.
被称为数据网络(NDN)的未来互联网范式以及软件定义网络(SDN)和物联网(IoT)等网络架构引起了研究界的关注。NDN是建立在当前internet标准TCP/IP实践基础上的未来internet标准。NDN用命名数据替换节点地址,从而增强数据的可用性。SDN是一种很好的解决新兴技术、高效资源利用和通信的方案。SDN的灵活性和高可编程性引起了全世界的关注。物联网使一切与其他设备和互联网互联。在密集物联网场景下,由于NDN的广播性质,会出现广播风暴问题。相同类型的数据包会导致这个问题,这会增加请求和重传的总数。在物联网中,重要数据包的及时快速传输是一个问题。在本文中,我们提出了一种基于控制器的NDN支持物联网广播风暴避免机制(CBAM),该机制在控制器的帮助下减少了广播问题。我们的方案利用SDN控制器的高效流量管理来控制广播风暴和数据包的高效传输。我们还根据重要性和优先级对数据包进行了分类。报文的优先级由命名标准决定。在兴趣总数和内容检索时间方面,CBAM优于GIF和传统的NDN洪泛。
{"title":"CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTs","authors":"A. Tariq, R. A. Rehman","doi":"10.1109/ICACS47775.2020.9055939","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055939","url":null,"abstract":"The future Internet paradigm Named Data Networking (NDN) and networking architecture like Software Defined Networking (SDN) and Internet of Things (IoT) has caught the attention of research community. NDN is a future internet standard that builds on the practices of current Internet standard TCP/IP. NDN replaces the nodes address with named data that enhance the availability of data. SDN is a good solution for the emerging technologies, efficient resource utilization and communication. Flexible and high-level programmable nature of the SDN caught the attention of the world towards it. IoT enable everything interconnected with other devices and the internet. In dense IoT scenarios, Broadcast storm problem occurs because of the broadcast nature of NDN. Same type of packets cause this problem, that increase the total number of requests and retransmissions. In-time and fast transmission of highly important packets is an issue in IoT. In this paper, we proposed a Controller based Broadcast Storm Avoidance Mechanism (CBAM)in NDN enabled IoT that reduces the broadcast problem with the help of controller. Our scheme used the efficient flow management of SDN controller to control the broadcast storm and efficient transmissions of packets. We also categorized the packet according to the importance and priority. A naming criteria decides the priority of the packet. CBAM outperforms GIF and traditional NDN Flooding in total number of Interests and content retrieval time.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116720879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
People Profile Metrics for Improved Classification of Defect Prone Files in Open Source Projects 在开放源码项目中改进易缺陷文件分类的人员概要度量
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055942
Humaira Aslam Chughtai, Z. Rana
Numerous models have been studied and presented in literature for classification of defect-prone source code files. Usually these models use static code metrics, process metrics, and change metrics as input and predict defect proneness of code. However, there has been limited use of people related metrics as input to the prediction models. Impact of using people related information should be studied for better classification of defect prone files in future releases of software projects. This study proposes the use of People Profile Metrics (PPM) of software development team members to improve the prediction of defect prone source code files. The experiment is performed on an open source project and the defect prone source code files have been classified. In addition, severity of defects has also been predicted. The PPM have been evaluated for three classifiers Decision Tree, Random Forest, and K-Nearest Neighbors using Weka. Significant improvement in classification of defect prone source code files, in terms of Precision, Recall and F-Measure has been achieved. The combination of existing static code metrics and the PPM will be tested for more projects and for unsupervised models.
文献中已经研究并提出了许多模型来对容易出现缺陷的源代码文件进行分类。通常,这些模型使用静态代码度量、过程度量和变更度量作为输入,并预测代码的缺陷倾向。然而,将与人相关的指标作为预测模型的输入使用是有限的。应该研究使用人员相关信息的影响,以便在软件项目的未来版本中更好地对容易出现缺陷的文件进行分类。本研究建议使用软件开发团队成员的人员概要度量(PPM)来改进对容易出现缺陷的源代码文件的预测。实验是在一个开源项目上进行的,并且容易出现缺陷的源代码文件已经被分类。此外,还对缺陷的严重程度进行了预测。使用Weka对三个分类器决策树、随机森林和k近邻进行了PPM评估。在容易出现缺陷的源代码文件的分类方面,在Precision, Recall和F-Measure方面取得了显著的改进。现有的静态代码度量和PPM的组合将在更多的项目和无监督模型中进行测试。
{"title":"People Profile Metrics for Improved Classification of Defect Prone Files in Open Source Projects","authors":"Humaira Aslam Chughtai, Z. Rana","doi":"10.1109/ICACS47775.2020.9055942","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055942","url":null,"abstract":"Numerous models have been studied and presented in literature for classification of defect-prone source code files. Usually these models use static code metrics, process metrics, and change metrics as input and predict defect proneness of code. However, there has been limited use of people related metrics as input to the prediction models. Impact of using people related information should be studied for better classification of defect prone files in future releases of software projects. This study proposes the use of People Profile Metrics (PPM) of software development team members to improve the prediction of defect prone source code files. The experiment is performed on an open source project and the defect prone source code files have been classified. In addition, severity of defects has also been predicted. The PPM have been evaluated for three classifiers Decision Tree, Random Forest, and K-Nearest Neighbors using Weka. Significant improvement in classification of defect prone source code files, in terms of Precision, Recall and F-Measure has been achieved. The combination of existing static code metrics and the PPM will be tested for more projects and for unsupervised models.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Security Machanism in internet of Things(IoT) 物联网安全机制研究综述
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055949
Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra, M. Safder
The web of the IoT has been started but also had some serious issues related to its security. It doesn't matter to what level its vulnerability affects. It can be domestic or any enterprise level. Billions of devices are linked with the internet. It is the network of objects and sensors by which these devices exchange data with each other without human involvement. On a large scale, there is a struggle to protect data from leaking. The main purpose of this is to review the survey of the work done in security in the specific area. As a whole, this study is measuring the flaws in the security related to the Internet of Things. Design and Protocols are studied in this survey for securing the communications between so-called ‘things'. Open inspection problems and security application challenges in IoT security are still present. This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.
物联网网络已经开始,但也有一些严重的安全问题。它的脆弱性影响到什么程度并不重要。可以是国内的,也可以是任何企业级的。数以十亿计的设备与互联网相连。它是一个由物体和传感器组成的网络,通过这个网络,这些设备可以在没有人类参与的情况下相互交换数据。在大范围内,保护数据不被泄露是一场斗争。这样做的主要目的是审查调查在保安工作中所做的具体领域。总的来说,这项研究是在测量与物联网相关的安全漏洞。本调查研究了设计和协议,以确保所谓的“事物”之间的通信安全。物联网安全中的开放性检测问题和安全应用挑战依然存在。本研究旨在成为一本有用的指南,以了解与物联网安全相关的漏洞和威胁,并增加安全设计。
{"title":"A Review of Security Machanism in internet of Things(IoT)","authors":"Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra, M. Safder","doi":"10.1109/ICACS47775.2020.9055949","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055949","url":null,"abstract":"The web of the IoT has been started but also had some serious issues related to its security. It doesn't matter to what level its vulnerability affects. It can be domestic or any enterprise level. Billions of devices are linked with the internet. It is the network of objects and sensors by which these devices exchange data with each other without human involvement. On a large scale, there is a struggle to protect data from leaking. The main purpose of this is to review the survey of the work done in security in the specific area. As a whole, this study is measuring the flaws in the security related to the Internet of Things. Design and Protocols are studied in this survey for securing the communications between so-called ‘things'. Open inspection problems and security application challenges in IoT security are still present. This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BSMS: A Reliable Interest Forwarding Protocol for NDN based VANETs 基于NDN的vanet的可靠兴趣转发协议
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055953
Muhammad Burhan, R. A. Rehman
In recent years, Named-Data Network (NDN) has been introduced and considered as an emerging movement for the architecture of future Internet. It depends on the data-centric communication approach to retrieve content objects from the network. In such a way, NDN is expected to assist several applications such as VANET, known as Vehicular Named-Data Network (VNDN). In VNDN, a vehicle broadcasts an Interest packet to retrieve required content object regardless end-to-end connection with other vehicles. This situation leads to the broadcast storm problem of Interest packets, where each vehicle have to broadcast same Interest packet within their transmission range in the network. Further, this situation may lead to the additional delay and wastage of network resources. Along, it degrades the performance of VANET applications. In this paper, a new strategy, named as Broadcast Storm Mitigation Strategy (BSMS) is proposed in order to mitigate the broadcast problem of the Interest packets in the network. Furthermore, vehicles travel at high and different speeds. Therefore, Data packets do not reach to the consumer vehicle by following the same path as Interest packet. However, the proposed scheme also provides a solution to tackle the problem of disconnect link. The proposed scheme is evaluated by use of simulations which demonstrates that BSMS provides better results as compared to traditional native VNDN implementation in terms of average number of Interest packets broadcast in the network and average time delay per Interest satisfied.
近年来,命名数据网络(NDN)被引入,并被认为是未来互联网架构的新兴运动。它依赖于从网络中检索内容对象的以数据为中心的通信方法。以这种方式,NDN有望协助一些应用,如VANET,即车辆命名数据网络(VNDN)。在VNDN中,车辆广播一个兴趣包来检索所需的内容对象,而不考虑与其他车辆的端到端连接。这种情况导致了兴趣包的广播风暴问题,每辆车都必须在自己的网络传输范围内广播相同的兴趣包。此外,这种情况可能导致额外的延迟和网络资源的浪费。同时,它降低了VANET应用程序的性能。本文提出了一种新的策略,称为广播风暴缓解策略(BSMS),以缓解网络中兴趣包的广播问题。此外,车辆以高速和不同的速度行驶。因此,数据包不会按照与兴趣数据包相同的路径到达消费者车辆。然而,该方案也提供了一种解决断开链路问题的方案。仿真结果表明,与传统的本地VNDN实现相比,BSMS在网络中广播兴趣包的平均数量和满足每个兴趣的平均时间延迟方面提供了更好的效果。
{"title":"BSMS: A Reliable Interest Forwarding Protocol for NDN based VANETs","authors":"Muhammad Burhan, R. A. Rehman","doi":"10.1109/ICACS47775.2020.9055953","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055953","url":null,"abstract":"In recent years, Named-Data Network (NDN) has been introduced and considered as an emerging movement for the architecture of future Internet. It depends on the data-centric communication approach to retrieve content objects from the network. In such a way, NDN is expected to assist several applications such as VANET, known as Vehicular Named-Data Network (VNDN). In VNDN, a vehicle broadcasts an Interest packet to retrieve required content object regardless end-to-end connection with other vehicles. This situation leads to the broadcast storm problem of Interest packets, where each vehicle have to broadcast same Interest packet within their transmission range in the network. Further, this situation may lead to the additional delay and wastage of network resources. Along, it degrades the performance of VANET applications. In this paper, a new strategy, named as Broadcast Storm Mitigation Strategy (BSMS) is proposed in order to mitigate the broadcast problem of the Interest packets in the network. Furthermore, vehicles travel at high and different speeds. Therefore, Data packets do not reach to the consumer vehicle by following the same path as Interest packet. However, the proposed scheme also provides a solution to tackle the problem of disconnect link. The proposed scheme is evaluated by use of simulations which demonstrates that BSMS provides better results as compared to traditional native VNDN implementation in terms of average number of Interest packets broadcast in the network and average time delay per Interest satisfied.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Preventive Techniques of Phishing Attacks in Networks 网络钓鱼攻击的防范技术
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055943
M. Adil, Rahim Khan, M. Ghani
Internet is the most widely used technology in the current era of information technology and it is embedded in daily life activities. Due to its extensive use in everyday life, it has many applications such as social media (Face book, WhatsApp, messenger etc.,) and other online applications such as online businesses, e-counseling, advertisement on websites, e-banking, e-hunting websites, e-doctor appointment and e-doctor opinion. The above mentioned applications of internet technology makes things very easy and accessible for human being in limited time, however, this technology is vulnerable to various security threats. A vital and severe threat associated with this technology or a particular application is “Phishing attack” which is used by attacker to usurp the network security. Phishing attacks includes fake E-mails, fake websites, fake applications which are used to steal their credentials or usurp their security. In this paper, a detailed overview of various phishing attacks, specifically their background knowledge, and solutions proposed in literature to address these issues using various techniques such as anti-phishing, honey pots and firewalls etc. Moreover, installation of intrusion detection systems (IDS) and intrusion detection and prevention system (IPS) in the networks to allow the authentic traffic in an operational network. In this work, we have conducted end use awareness campaign to educate and train the employs in order to minimize the occurrence probability of these attacks. The result analysis observed for this survey was quite excellent by means of its effectiveness to address the aforementioned issues.
互联网是当今信息技术时代应用最广泛的技术,它已经深入到人们的日常生活活动中。由于它在日常生活中的广泛使用,它有许多应用,如社交媒体(facebook, WhatsApp, messenger等)和其他在线应用,如网上商务,电子咨询,网站广告,电子银行,电子狩猎网站,电子医生预约和电子医生意见。互联网技术的上述应用使人们在有限的时间内可以很容易地接触到事物,然而,这项技术容易受到各种安全威胁。与该技术或特定应用相关的一个重要而严重的威胁是“网络钓鱼攻击”,攻击者利用它来篡夺网络安全。网络钓鱼攻击包括假电子邮件、假网站、假应用程序,用来窃取他们的凭据或篡夺他们的安全。在本文中,详细概述了各种网络钓鱼攻击,特别是他们的背景知识,以及在文献中提出的解决方案,以解决这些问题,使用各种技术,如反网络钓鱼,蜜罐和防火墙等。此外,在网络中安装入侵检测系统(IDS)和入侵检测与防御系统(IPS),使真实的流量能够在网络中正常运行。在这项工作中,我们开展了终端用户意识宣传活动,教育和培训员工,以尽量减少这些攻击的发生概率。结果分析观察到这个调查是相当优秀的手段,其有效性,以解决上述问题。
{"title":"Preventive Techniques of Phishing Attacks in Networks","authors":"M. Adil, Rahim Khan, M. Ghani","doi":"10.1109/ICACS47775.2020.9055943","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055943","url":null,"abstract":"Internet is the most widely used technology in the current era of information technology and it is embedded in daily life activities. Due to its extensive use in everyday life, it has many applications such as social media (Face book, WhatsApp, messenger etc.,) and other online applications such as online businesses, e-counseling, advertisement on websites, e-banking, e-hunting websites, e-doctor appointment and e-doctor opinion. The above mentioned applications of internet technology makes things very easy and accessible for human being in limited time, however, this technology is vulnerable to various security threats. A vital and severe threat associated with this technology or a particular application is “Phishing attack” which is used by attacker to usurp the network security. Phishing attacks includes fake E-mails, fake websites, fake applications which are used to steal their credentials or usurp their security. In this paper, a detailed overview of various phishing attacks, specifically their background knowledge, and solutions proposed in literature to address these issues using various techniques such as anti-phishing, honey pots and firewalls etc. Moreover, installation of intrusion detection systems (IDS) and intrusion detection and prevention system (IPS) in the networks to allow the authentic traffic in an operational network. In this work, we have conducted end use awareness campaign to educate and train the employs in order to minimize the occurrence probability of these attacks. The result analysis observed for this survey was quite excellent by means of its effectiveness to address the aforementioned issues.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Exploring the Proportion of Content Represented by the Metadata of Research Articles 探索科研论文元数据所代表的内容比例
Pub Date : 2020-02-01 DOI: 10.1109/ICACS47775.2020.9055955
Shahzad Nazir, M. Asif, Shahbaz Ahmad
In this era, to find out relevant research articles is considered an important task to track the state-of-the-art-work, and it is termed as research paper recommender system. Considering the massive increase in research corpora, the research community has turned its focus towards finding the most relevant research papers. Researchers have adopted different techniques that are bibliographic information based, content-based, and collaborative filtering based. The most common approach for the research paper recommender system is content-based. According to a survey, 55% of research paper recommender systems use a content-based approach. On the other hand, due to the unavailability of the full text of research papers, researchers started utilizing the Meta-data. But it is still unclear that what proportion of full content can be represented by the Meta-data. This research explored the significant portion of the full content contained by the Metadata of research articles. We applied two different techniques; in the first technique, we implemented the TF-IDF over Metadata and full content and considered the intersection of key terms. Secondly, similarity scores of Meta-data and full content were calculated by applying cosine similarity. This approach was assessed on a dataset of 271 research articles that were automatically downloaded from CiteseerX. The results revealed that the Meta-data of research articles could effectively represent the 47% proportion.
在这个时代,寻找相关的研究论文被认为是跟踪最新工作的一项重要任务,并被称为研究论文推荐系统。考虑到研究语料库的大量增加,研究界已将重点转向寻找最相关的研究论文。研究人员采用了基于书目信息、基于内容和基于协同过滤的不同技术。研究论文推荐系统最常见的方法是基于内容的。根据一项调查,55%的研究论文推荐系统使用基于内容的方法。另一方面,由于无法获得研究论文的全文,研究人员开始利用元数据。但是元数据能代表多少比例的完整内容还不清楚。本研究探讨了研究文章元数据所包含的完整内容的重要部分。我们采用了两种不同的技术;在第一种技术中,我们在元数据和完整内容上实现TF-IDF,并考虑关键术语的交集。其次,利用余弦相似度计算元数据与完整内容的相似度得分;该方法在从CiteseerX自动下载的271篇研究文章的数据集上进行了评估。结果显示,研究论文的Meta-data可以有效地代表47%的比例。
{"title":"Exploring the Proportion of Content Represented by the Metadata of Research Articles","authors":"Shahzad Nazir, M. Asif, Shahbaz Ahmad","doi":"10.1109/ICACS47775.2020.9055955","DOIUrl":"https://doi.org/10.1109/ICACS47775.2020.9055955","url":null,"abstract":"In this era, to find out relevant research articles is considered an important task to track the state-of-the-art-work, and it is termed as research paper recommender system. Considering the massive increase in research corpora, the research community has turned its focus towards finding the most relevant research papers. Researchers have adopted different techniques that are bibliographic information based, content-based, and collaborative filtering based. The most common approach for the research paper recommender system is content-based. According to a survey, 55% of research paper recommender systems use a content-based approach. On the other hand, due to the unavailability of the full text of research papers, researchers started utilizing the Meta-data. But it is still unclear that what proportion of full content can be represented by the Meta-data. This research explored the significant portion of the full content contained by the Metadata of research articles. We applied two different techniques; in the first technique, we implemented the TF-IDF over Metadata and full content and considered the intersection of key terms. Secondly, similarity scores of Meta-data and full content were calculated by applying cosine similarity. This approach was assessed on a dataset of 271 research articles that were automatically downloaded from CiteseerX. The results revealed that the Meta-data of research articles could effectively represent the 47% proportion.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122849966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 3rd International Conference on Advancements in Computational Sciences (ICACS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1