Fog computing is a concept integrated in the Internet of Things (IoT) that uses advanced embedded devices, called fog nodes, in order to bring cloud services such as processing, storage and communication closer to the place where data are produced. In this paper, it is proposed an architecture for a fog node that activates the Internet of Things for the devices form industrial environment (Industrial Internet of Things - IIoT) by integrating a set of fieldbuses, such as EtherCAT, Profinet, Modbus TCP/IP, Modbus RTU, CANOpen, and Profibus. An open-source implementation of the DDS middleware protocol is used to interconnect the fog nodes. Furthermore, the fog node will meet the requirements in terms of real time, data security and integrity, latency and response time to external events. The fog node is designed and developed on an embedded device with Sitara™ AM335X processor that includes dual cores PRU-ICSS for industrial protocol. These coprocessors allow the development of application that must meet hard real time requirements.
雾计算是集成在物联网(IoT)中的一个概念,它使用称为雾节点的先进嵌入式设备,以便将处理、存储和通信等云服务更接近数据产生的地方。本文提出了一种雾节点架构,通过集成EtherCAT、Profinet、Modbus TCP/IP、Modbus RTU、CANOpen和Profibus等现场总线,激活工业环境中设备的物联网(industrial Internet of Things - IIoT)。使用DDS中间件协议的开源实现来互连雾节点。此外,雾节点将满足实时性、数据安全性和完整性、延迟和对外部事件的响应时间等方面的要求。雾节点是在内置Sitara™AM335X处理器的嵌入式设备上设计和开发的,该处理器包括用于工业协议的双核PRU-ICSS。这些协处理器允许开发必须满足硬实时性要求的应用程序。
{"title":"Using Co-Processors to Activate Real Time Capabilities on Fog Nodes","authors":"I. Ungurean","doi":"10.1145/3284557.3284700","DOIUrl":"https://doi.org/10.1145/3284557.3284700","url":null,"abstract":"Fog computing is a concept integrated in the Internet of Things (IoT) that uses advanced embedded devices, called fog nodes, in order to bring cloud services such as processing, storage and communication closer to the place where data are produced. In this paper, it is proposed an architecture for a fog node that activates the Internet of Things for the devices form industrial environment (Industrial Internet of Things - IIoT) by integrating a set of fieldbuses, such as EtherCAT, Profinet, Modbus TCP/IP, Modbus RTU, CANOpen, and Profibus. An open-source implementation of the DDS middleware protocol is used to interconnect the fog nodes. Furthermore, the fog node will meet the requirements in terms of real time, data security and integrity, latency and response time to external events. The fog node is designed and developed on an embedded device with Sitara™ AM335X processor that includes dual cores PRU-ICSS for industrial protocol. These coprocessors allow the development of application that must meet hard real time requirements.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In South Korea, Manufacturing Innovation 3.0 Strategy is now underway by the government since 2014. The core of this strategy is to change the existing 20,000 factories to smart factories by 2022. For this, the Korea Government established Korea Smart Factory Foundation and has being investing a large finance for the purpose of the smart factory's proliferation. As a result of this, the government expects that there will build the foundation to enable the advanced smart factory based on Internet of Things, Big Data, and Artificial Intelligence. Despite these efforts, the companies are still hesitant the construction of the smart factory because of the additional expenses caused by the construction of ICT infrastructure and the employment of ICT human resources. On the other hand, they knows the merits of the smart factory and wants some services supported by that, such as the quality test, the aggregation of the actual production, the manufacturing facility maintenance, etc. That is, the underfinanced companies requires the smart factory optimized for their works. The important point to notice is that the implementation of the smart factory can be different according to the factory environments, a type of the manufacturing facility, and data to be collected, even if the companies want same service. Moreover, because every company has its own requirements, it is necessary to design factory-optimized smart factory. Therefore, a smart factory designer must consider and analyse the requirements of company and characteristics of the factory. In this paper, we first describe the four considerations for the establishment of the smart factory in the small and medium enterprises and introduce three case studies in conjunction with the small and medium-sized enterprises that require the smart factory optimized for their business or factory rather than the high-level smart factory.
{"title":"Case Studies for the Establishment of the Optimized Smart Factory with Small and Medium-Sized Enterprises","authors":"Jin-uk Jung, K. Jin","doi":"10.1145/3284557.3284692","DOIUrl":"https://doi.org/10.1145/3284557.3284692","url":null,"abstract":"In South Korea, Manufacturing Innovation 3.0 Strategy is now underway by the government since 2014. The core of this strategy is to change the existing 20,000 factories to smart factories by 2022. For this, the Korea Government established Korea Smart Factory Foundation and has being investing a large finance for the purpose of the smart factory's proliferation. As a result of this, the government expects that there will build the foundation to enable the advanced smart factory based on Internet of Things, Big Data, and Artificial Intelligence. Despite these efforts, the companies are still hesitant the construction of the smart factory because of the additional expenses caused by the construction of ICT infrastructure and the employment of ICT human resources. On the other hand, they knows the merits of the smart factory and wants some services supported by that, such as the quality test, the aggregation of the actual production, the manufacturing facility maintenance, etc. That is, the underfinanced companies requires the smart factory optimized for their works. The important point to notice is that the implementation of the smart factory can be different according to the factory environments, a type of the manufacturing facility, and data to be collected, even if the companies want same service. Moreover, because every company has its own requirements, it is necessary to design factory-optimized smart factory. Therefore, a smart factory designer must consider and analyse the requirements of company and characteristics of the factory. In this paper, we first describe the four considerations for the establishment of the smart factory in the small and medium enterprises and introduce three case studies in conjunction with the small and medium-sized enterprises that require the smart factory optimized for their business or factory rather than the high-level smart factory.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Architecture design has been for long time relying on graphic drawings and handmade calculations. The results of this procedure was surely an arts and craft product, which very often could not be reproduced or even built in an easy way. Lately, according to the new Computer Aided Systems, many problems - arisen from the impossibility of taking under control various factors - have been solved and a new world of representation, design and construction were born. In the CITTAM (a research centre of the University of Naples) a new methodology has been studied and developed by a team of experts in various disciplines. The methodology, applied to any scale of product, from a small component of a window, until a large urban area, takes into account indicators, parameters and performances of a great number of issues, aimed at assessing the level of sustainability of the product, employed in the construction. This Model, by shape of Multicriteria Matrix, is being processed firstly by means of a structure of Excel sheets, and is now been implementing into a Computer Software, which could help the designers ex-ante, ongoing and after the design procedure and the building construction, in order to allow them to take decisions regarding the choice of materials, shapes, volumes, location, orientation, etc. of the final product. The paper describes the Model and the potential of the innovative Software for assessing sustainability of products, by showing both the structure of the Matrix and the Information Technology. The results, provided by an example of use for a design procedure, demonstrate the usefulness of the tool. In conclusion this new methodology of design and production, by means of Multicriteria Information Tools can help to give again some arts and craft quality to building and architecture, at the same time allowing guarantee of sustainability.
{"title":"Sustainable Design and Software Tools by Multimatrix Criteria","authors":"D. Francese, Luca Buoninconti","doi":"10.1145/3284557.3284695","DOIUrl":"https://doi.org/10.1145/3284557.3284695","url":null,"abstract":"Architecture design has been for long time relying on graphic drawings and handmade calculations. The results of this procedure was surely an arts and craft product, which very often could not be reproduced or even built in an easy way. Lately, according to the new Computer Aided Systems, many problems - arisen from the impossibility of taking under control various factors - have been solved and a new world of representation, design and construction were born. In the CITTAM (a research centre of the University of Naples) a new methodology has been studied and developed by a team of experts in various disciplines. The methodology, applied to any scale of product, from a small component of a window, until a large urban area, takes into account indicators, parameters and performances of a great number of issues, aimed at assessing the level of sustainability of the product, employed in the construction. This Model, by shape of Multicriteria Matrix, is being processed firstly by means of a structure of Excel sheets, and is now been implementing into a Computer Software, which could help the designers ex-ante, ongoing and after the design procedure and the building construction, in order to allow them to take decisions regarding the choice of materials, shapes, volumes, location, orientation, etc. of the final product. The paper describes the Model and the potential of the innovative Software for assessing sustainability of products, by showing both the structure of the Matrix and the Information Technology. The results, provided by an example of use for a design procedure, demonstrate the usefulness of the tool. In conclusion this new methodology of design and production, by means of Multicriteria Information Tools can help to give again some arts and craft quality to building and architecture, at the same time allowing guarantee of sustainability.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.
{"title":"Spatio-temporal Anomaly Detection in Traffic Data","authors":"Qing Wang, Weifeng Lv, Bowen Du","doi":"10.1145/3284557.3284725","DOIUrl":"https://doi.org/10.1145/3284557.3284725","url":null,"abstract":"Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Series compensation of transmission lines is essential for power systems transfer capability enhancement, reactive power equipment and steady-state voltage stability in power systems. However, it leads to increase the risk of sub-synchronous resonance. Sub-synchronous resonance is one of the most critical issue to power system stability which can be described as general oscillation problem at one or more frequency below synchronous frequency. Frequency scanning technique, eigenvalue analysis technique and electromagnetic transient analysis technique are frequently used in the literature for the purpose of analysis sub-synchronous resonance in power systems. In this paper, Using IEEE first benchmark model (FBM), the susceptibility of the system to the SSR is investigated by the eigenvalue technique and electromagnetic transient analysis technique. PSCAD/EMTDC tools is used for electromagnetic transient analysis technique. Furthermore, the susceptibilities of the system are compared for different compensation levels in this study.
{"title":"Assessment of Sub-synchronous Resonance Analysis Techniques in Series Compensated Line","authors":"Ezgi Ünverdi Ağlar, A. Çapar, A. Arsoy","doi":"10.1145/3284557.3284732","DOIUrl":"https://doi.org/10.1145/3284557.3284732","url":null,"abstract":"Series compensation of transmission lines is essential for power systems transfer capability enhancement, reactive power equipment and steady-state voltage stability in power systems. However, it leads to increase the risk of sub-synchronous resonance. Sub-synchronous resonance is one of the most critical issue to power system stability which can be described as general oscillation problem at one or more frequency below synchronous frequency. Frequency scanning technique, eigenvalue analysis technique and electromagnetic transient analysis technique are frequently used in the literature for the purpose of analysis sub-synchronous resonance in power systems. In this paper, Using IEEE first benchmark model (FBM), the susceptibility of the system to the SSR is investigated by the eigenvalue technique and electromagnetic transient analysis technique. PSCAD/EMTDC tools is used for electromagnetic transient analysis technique. Furthermore, the susceptibilities of the system are compared for different compensation levels in this study.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Yamin, Basel Katt, Espen Torseth, V. Gkioulos, S. Kowalski
Education in the information security domain increasingly integrates practical hands-on training; where exercises focusing on secure cyber operations and secure software development are used for training the participants in designing and building secure systems. These exercises utilize multiple approaches in their context, such as capture the flag, attack/defense, reverse engineering, and incident response, while they are conducted on specifically created testbeds that by design integrate vulnerabilities to support the training scenarios. However, these exercises represent only the perspective of the attacker and/or the defender, without reflecting the perspective of the designer, while they statistically have primary focus on network security. In this article, we argue that the best way to understand the consequences of insecure design and development is to combine engineering and exploitation activities in one exercise, proposing the use of "Make it and break it" type of exercises for security training in cyber physical systems. Accordingly, we conducted a case study for validation and verification, the results of which are presented in this article. The case study was performed over the period of two days, during the training boot camp of the Norwegian national team for the European cyber security challenge 2018. During the boot camp, the team has been separated into two groups, which were challenged to design and build an IoT (Internet of Things) smart home using secure design principles, and then attack each other in order to identify security weaknesses. Pre and post-exercise surveys have been conducted, and the feedback from the participants was used in order to evaluate the effectiveness of the exercise, as a pilot towards further development and optimization.
{"title":"Make it and Break it: An IoT Smart Home Testbed Case Study","authors":"M. Yamin, Basel Katt, Espen Torseth, V. Gkioulos, S. Kowalski","doi":"10.1145/3284557.3284743","DOIUrl":"https://doi.org/10.1145/3284557.3284743","url":null,"abstract":"Education in the information security domain increasingly integrates practical hands-on training; where exercises focusing on secure cyber operations and secure software development are used for training the participants in designing and building secure systems. These exercises utilize multiple approaches in their context, such as capture the flag, attack/defense, reverse engineering, and incident response, while they are conducted on specifically created testbeds that by design integrate vulnerabilities to support the training scenarios. However, these exercises represent only the perspective of the attacker and/or the defender, without reflecting the perspective of the designer, while they statistically have primary focus on network security. In this article, we argue that the best way to understand the consequences of insecure design and development is to combine engineering and exploitation activities in one exercise, proposing the use of \"Make it and break it\" type of exercises for security training in cyber physical systems. Accordingly, we conducted a case study for validation and verification, the results of which are presented in this article. The case study was performed over the period of two days, during the training boot camp of the Norwegian national team for the European cyber security challenge 2018. During the boot camp, the team has been separated into two groups, which were challenged to design and build an IoT (Internet of Things) smart home using secure design principles, and then attack each other in order to identify security weaknesses. Pre and post-exercise surveys have been conducted, and the feedback from the participants was used in order to evaluate the effectiveness of the exercise, as a pilot towards further development and optimization.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Besides the driver and passenger's ride comfort, health harmfulness from oscillation motion must be taken into consideration, especially the drivers who work daily 9-hours long terms like in trucks. The unwanted vibration transmitted from unpredicted road roughness and some disturbance via the chassis and seat to human caused the injury. Generally the passive seats amplified vibration at low frequency between its resonance. For this reasons, we proposed and developed the active seat suspension to reduce the vertical acceleration. The problem was firstly identified via the vibration investigation and field measurement. We have also found that the seat pitch angle and pitch rate disturb the driver is aspect of ride comfort. The two degree of freedom driver seat model in vertical direction and pitch angle were demonstrated with assuming small displacement and pitch model. The equivalent spring stiffness and damping coefficient was preliminary estimated around the operation point. Due to the system nonlinearity between the operating ranges, the FLC was developed together with the optimal index, simulated via Matlab/Sumulink. The results figured out that the proposed controllers are effective in attenuating the vertical acceleration at driver seat. The weight root mean square vertical acceleration must follow the comfort range following ISO 2631-1 as well as the pitch rate amplitude were remarkably reduced.
{"title":"Development of 2 DOF Truck's Suspension Seat for Improving Ride Comfort","authors":"Pornporm Boonporm, Kriattisak Houdjaroen, Chackapong Panchomphu","doi":"10.1145/3284557.3284719","DOIUrl":"https://doi.org/10.1145/3284557.3284719","url":null,"abstract":"Besides the driver and passenger's ride comfort, health harmfulness from oscillation motion must be taken into consideration, especially the drivers who work daily 9-hours long terms like in trucks. The unwanted vibration transmitted from unpredicted road roughness and some disturbance via the chassis and seat to human caused the injury. Generally the passive seats amplified vibration at low frequency between its resonance. For this reasons, we proposed and developed the active seat suspension to reduce the vertical acceleration. The problem was firstly identified via the vibration investigation and field measurement. We have also found that the seat pitch angle and pitch rate disturb the driver is aspect of ride comfort. The two degree of freedom driver seat model in vertical direction and pitch angle were demonstrated with assuming small displacement and pitch model. The equivalent spring stiffness and damping coefficient was preliminary estimated around the operation point. Due to the system nonlinearity between the operating ranges, the FLC was developed together with the optimal index, simulated via Matlab/Sumulink. The results figured out that the proposed controllers are effective in attenuating the vertical acceleration at driver seat. The weight root mean square vertical acceleration must follow the comfort range following ISO 2631-1 as well as the pitch rate amplitude were remarkably reduced.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, aiming to fullfill the sharp increasing demand of training for power line inspectors, a set of live broadcast teaching platform based on FPV operating system is researched and designed. Through the introduction of three-dimensional imaging technology and head movement tracking technology, the scene of inspection teaching becomes more immersive and interactive. The platform cannot only reduce the difficulty of inspection teaching, but also help the trainees acquire a better understanding of the standard steps for detecting common faults. At the same time, the platform has broken through the restriction of time and space for inspection teaching. With some experiments, the live teaching platform can work efficiently under the circumstance of 110kV voltage level and a distance of 1.7m from power lines.
{"title":"A Live Teaching Platform for Power Line Inspection with a First-Person-View-Based Unmanned Aerial Vehicle","authors":"Haoran Zheng, Xiao Su, Zikai Zhou, Yuqing Lin","doi":"10.1145/3284557.3284727","DOIUrl":"https://doi.org/10.1145/3284557.3284727","url":null,"abstract":"In this paper, aiming to fullfill the sharp increasing demand of training for power line inspectors, a set of live broadcast teaching platform based on FPV operating system is researched and designed. Through the introduction of three-dimensional imaging technology and head movement tracking technology, the scene of inspection teaching becomes more immersive and interactive. The platform cannot only reduce the difficulty of inspection teaching, but also help the trainees acquire a better understanding of the standard steps for detecting common faults. At the same time, the platform has broken through the restriction of time and space for inspection teaching. With some experiments, the live teaching platform can work efficiently under the circumstance of 110kV voltage level and a distance of 1.7m from power lines.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126544283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.
{"title":"An Overview of Prevention/Mitigation against Memory Corruption Attack","authors":"Mahmood Khalsan, Michael Opoku Agyeman","doi":"10.1145/3284557.3284564","DOIUrl":"https://doi.org/10.1145/3284557.3284564","url":null,"abstract":"One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk
The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.
{"title":"Influence of Hydrate Moisture on the Sealing of a Nanopowder Dispersed System Based on Zirconia","authors":"A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk","doi":"10.1145/3284557.3284726","DOIUrl":"https://doi.org/10.1145/3284557.3284726","url":null,"abstract":"The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}