One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.
{"title":"An Overview of Prevention/Mitigation against Memory Corruption Attack","authors":"Mahmood Khalsan, Michael Opoku Agyeman","doi":"10.1145/3284557.3284564","DOIUrl":"https://doi.org/10.1145/3284557.3284564","url":null,"abstract":"One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk
The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.
{"title":"Influence of Hydrate Moisture on the Sealing of a Nanopowder Dispersed System Based on Zirconia","authors":"A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk","doi":"10.1145/3284557.3284726","DOIUrl":"https://doi.org/10.1145/3284557.3284726","url":null,"abstract":"The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.
{"title":"Simulating Video Capturing for Phacoemulsification Surgery Using Aftermarket Cameras","authors":"Soetrisno, Josiah Irma, D. H. Hareva, H. Tjahyadi","doi":"10.1145/3284557.3284703","DOIUrl":"https://doi.org/10.1145/3284557.3284703","url":null,"abstract":"The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.
{"title":"Spatio-temporal Anomaly Detection in Traffic Data","authors":"Qing Wang, Weifeng Lv, Bowen Du","doi":"10.1145/3284557.3284725","DOIUrl":"https://doi.org/10.1145/3284557.3284725","url":null,"abstract":"Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.
{"title":"Human-Robot Interaction Using Pointing Gestures","authors":"Michal Tölgyessy, Martin Dekan, P. Hubinský","doi":"10.1145/3284557.3284718","DOIUrl":"https://doi.org/10.1145/3284557.3284718","url":null,"abstract":"Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called "Base stations". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.
{"title":"A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things","authors":"Benfilali Mostefa, Gafour Abdelkader","doi":"10.1145/3284557.3284699","DOIUrl":"https://doi.org/10.1145/3284557.3284699","url":null,"abstract":"The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called \"Base stations\". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.
{"title":"Smart Office: A Voice-controlled Workplace for Everyone","authors":"Z. Y. Chan, P. Shum","doi":"10.1145/3284557.3284712","DOIUrl":"https://doi.org/10.1145/3284557.3284712","url":null,"abstract":"Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi
Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.
{"title":"Development of CoAP-based IoT Communication System for Smart Energy Storage System","authors":"Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi","doi":"10.1145/3284557.3284706","DOIUrl":"https://doi.org/10.1145/3284557.3284706","url":null,"abstract":"Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat
Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.
{"title":"Design and Integration of an IoT Device for Training Purposes of Industry 4.0","authors":"Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat","doi":"10.1145/3284557.3284740","DOIUrl":"https://doi.org/10.1145/3284557.3284740","url":null,"abstract":"Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.
{"title":"Electromagnetic Sensing and Imaging for Stroke Detection","authors":"Lulu Wang","doi":"10.1145/3284557.3284734","DOIUrl":"https://doi.org/10.1145/3284557.3284734","url":null,"abstract":"Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}