首页 > 最新文献

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)最新文献

英文 中文
Switch: A Battery Conservation Framework for Mobile Devices 开关:移动设备的电池节约框架
Herman Barnardt, M. Coetzee
Sophisticated mobile applications may require more resources than are readily available on mobile devices. Mobile device resources such as processing power and storage can be extended with cloud-based mobile augmentation. However, some resources, specifically battery life and bandwidth, cannot be augmented. This research identifies that it is important to be able to estimate the energy consumption of both offloaded and local tasks when making offloading decisions. Due to the fact that the energy consumption profile of mobile devices with diverse capabilities are not the same, this aspect needs to be considered. This research proposes the Switch framework to conserve the limited battery life on mobile devices using a device specific energy consumption profile. The evaluation of the framework suggests that Switch can successfully be used to conserve battery life on mobile devices by making intelligent offloading decisions.
复杂的移动应用程序可能需要比移动设备上可用的资源更多的资源。处理能力和存储等移动设备资源可以通过基于云的移动增强功能进行扩展。然而,一些资源,特别是电池寿命和带宽,不能增加。这项研究表明,在做出卸载决策时,能够估计卸载任务和本地任务的能耗是很重要的。由于具有不同功能的移动设备的能耗概况不尽相同,因此需要考虑这方面的问题。本研究提出的开关框架,以节省有限的电池寿命在移动设备上使用特定的设备能耗配置文件。对该框架的评估表明,通过做出智能卸载决策,Switch可以成功地用于节省移动设备的电池寿命。
{"title":"Switch: A Battery Conservation Framework for Mobile Devices","authors":"Herman Barnardt, M. Coetzee","doi":"10.1109/ICONIC.2018.8601284","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601284","url":null,"abstract":"Sophisticated mobile applications may require more resources than are readily available on mobile devices. Mobile device resources such as processing power and storage can be extended with cloud-based mobile augmentation. However, some resources, specifically battery life and bandwidth, cannot be augmented. This research identifies that it is important to be able to estimate the energy consumption of both offloaded and local tasks when making offloading decisions. Due to the fact that the energy consumption profile of mobile devices with diverse capabilities are not the same, this aspect needs to be considered. This research proposes the Switch framework to conserve the limited battery life on mobile devices using a device specific energy consumption profile. The evaluation of the framework suggests that Switch can successfully be used to conserve battery life on mobile devices by making intelligent offloading decisions.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call Data Record Based Recommender Systems for Mobile Subscribers 基于呼叫数据记录的移动用户推荐系统
Elias Mbongeni Sibanda, T. Zuva
Recommendation systems for mobile phones are of great importance for mobile operators to achieve their desired profit targets. In a client inferred market, the number of contract users and contract phones is especially significant for mobile service operators. The tremendous growth in the number of available mobile cellular telephone contracts necessitates the need for a recommender system to assist users discover suitable contracts based on their usage patterns. This study used a hybrid of both collaborative and content-based filtering. A prototype of a mobile recommender system was developed and evaluated using precision and recall. The developed recommender system was able to successfully recommend packages to subscribers. A precision-recall curve was produced, and it showed good performance of the system. This study successfully showed that a hybrid system was able to recommend products to the mobile subscribers.
手机推荐系统对于移动运营商实现预期的利润目标至关重要。在客户推断市场中,合约用户和合约电话的数量对移动服务运营商尤为重要。可获得的移动移动电话合同数量的巨大增长使得需要一个推荐系统来帮助用户根据他们的使用模式发现合适的合同。这项研究使用了协作过滤和基于内容过滤的混合方法。开发了一个移动推荐系统的原型,并使用准确率和召回率对其进行了评估。开发的推荐系统能够成功地向订阅者推荐软件包。得到了系统的查准率-查全率曲线,显示了系统的良好性能。该研究成功地证明了混合系统能够向移动用户推荐产品。
{"title":"Call Data Record Based Recommender Systems for Mobile Subscribers","authors":"Elias Mbongeni Sibanda, T. Zuva","doi":"10.1109/ICONIC.2018.8601097","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601097","url":null,"abstract":"Recommendation systems for mobile phones are of great importance for mobile operators to achieve their desired profit targets. In a client inferred market, the number of contract users and contract phones is especially significant for mobile service operators. The tremendous growth in the number of available mobile cellular telephone contracts necessitates the need for a recommender system to assist users discover suitable contracts based on their usage patterns. This study used a hybrid of both collaborative and content-based filtering. A prototype of a mobile recommender system was developed and evaluated using precision and recall. The developed recommender system was able to successfully recommend packages to subscribers. A precision-recall curve was produced, and it showed good performance of the system. This study successfully showed that a hybrid system was able to recommend products to the mobile subscribers.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Spectrum Handoff Algorithm for Continuous Connectivity 连续连接的频谱切换算法研究
Duduzile Zamanhlane Masuku, M. Velempini, N. Gasela
Cognitive Radio networks (CR) is a new technique that uses available unlicensed spectrum band this is due to the limited number of fixed licensed spectrum bands [1]. The main features of the CR are spectrum sensing, management, sharing, and mobility [2]. This paper focuses on spectrum mobility for military systems often referred to as spectrum handoff for military systems, which is a process when the CR user changes its frequency of operation due to spectrum occupancy by the licensed user. Spectrum mobility is important in military networks since mission success may depend on reliable communications. In this paper, we propose the use of Fuzzy logic to come up with a decision making handoff scheme. The proposed scheme avoids interruptions caused by the movement of a secondary user and minimizes handoff latency if the SU selects a correct channel. It was observed through the analysis of literature that even though most of the existing schemes can perform handoff successfully, these existing schemes result in slow handoff and are complicated to implement.
认知无线电网络(Cognitive Radio networks, CR)是一种利用可用的未授权频谱频带的新技术,这是由于固定许可频谱频带数量有限[1]。CR的主要特征是频谱感知、管理、共享和移动性[2]。本文主要研究军事系统的频谱迁移,通常称为军事系统的频谱切换,即由于频谱被许可用户占用,CR用户改变其操作频率的过程。频谱移动性在军事网络中很重要,因为任务的成功可能取决于可靠的通信。在本文中,我们提出使用模糊逻辑来提出一个决策切换方案。该方案避免了由辅助用户移动引起的中断,并且在SU选择正确信道的情况下最大限度地减少了切换延迟。通过文献分析发现,虽然现有的方案大多数都能成功完成切换,但这些方案的切换速度较慢,并且实现起来比较复杂。
{"title":"A Survey on Spectrum Handoff Algorithm for Continuous Connectivity","authors":"Duduzile Zamanhlane Masuku, M. Velempini, N. Gasela","doi":"10.1109/ICONIC.2018.8601222","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601222","url":null,"abstract":"Cognitive Radio networks (CR) is a new technique that uses available unlicensed spectrum band this is due to the limited number of fixed licensed spectrum bands [1]. The main features of the CR are spectrum sensing, management, sharing, and mobility [2]. This paper focuses on spectrum mobility for military systems often referred to as spectrum handoff for military systems, which is a process when the CR user changes its frequency of operation due to spectrum occupancy by the licensed user. Spectrum mobility is important in military networks since mission success may depend on reliable communications. In this paper, we propose the use of Fuzzy logic to come up with a decision making handoff scheme. The proposed scheme avoids interruptions caused by the movement of a secondary user and minimizes handoff latency if the SU selects a correct channel. It was observed through the analysis of literature that even though most of the existing schemes can perform handoff successfully, these existing schemes result in slow handoff and are complicated to implement.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Services and Applications Security in IoT Enabled Networks 支持物联网的网络中的服务和应用安全
Philani M. Khumalo, B. Nleya, A. Gomba, A. Mutsvangwa
5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication’s security requirements.
5G无线和光骨干网预计将成为设想的下一代/下一代网络(N/FGN)基础设施的主要支柱。这将推动物联网网络的实际实现,该网络将支持并确保相对较高的带宽,并在接入网段和核心网段提高服务质量(QoS)。网络外设的高速无线链路将作为设备对设备(D2D)通信的有利平台。D2D驱动的应用程序和服务只有在相关的机器类型通信设备(mtcd)已经成功验证和认证的前提下才能有效和安全。通常,D2D类型的服务和应用程序涉及组中几个mtcd的交互。因此,安全有效的基于D2D组的身份验证和密钥协议(AKA)协议是必要的。它们需要在保持组密钥不链接能力方面达到固有的有效性,并产生最小的信号开销,否则可能导致网络拥塞。本文详细介绍了一种安全高效的D2D通信组AKA (Gr-AKA)协议。将其性能与现有的类似协议进行比较,发现其计算和信令开销要求都相对较低。总的来说,分析表明Gr-AKA协议在满足D2D通信的安全需求方面提高了性能。
{"title":"Services and Applications Security in IoT Enabled Networks","authors":"Philani M. Khumalo, B. Nleya, A. Gomba, A. Mutsvangwa","doi":"10.1109/ICONIC.2018.8601298","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601298","url":null,"abstract":"5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication’s security requirements.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114196221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CMedia Compressor: An Application to Graphically Compare General Compression Algorithms and Adaptive Huffman Compression Algorithm CMedia压缩器:图形化比较通用压缩算法和自适应霍夫曼压缩算法的应用
S. Asare, P. Mbewe
Much discussion and research has been done on compression algorithms but not many have gone to the extent of developing an application that can test and compare various compression algorithms with each other. In this paper, we present an application known as the CMedia Compressor, that tests and compares various compression algorithms. The application shows that adaptive Huffman and Arithmetic Coding tend to outperform the others such as the Run-length encoding (RLE), Huffman coding, Arithmetic coding (AC) and Lempel-Ziv-Welch (LZW) methods. Results obtained from this study are discussed and also presented graphically. The study’s results indicates that Arithmetic coding yields higher space-savings than Huffman coding and Adaptive Huffman coding.
人们对压缩算法进行了大量的讨论和研究,但很少有人开发出能够测试和比较各种压缩算法的应用程序。在本文中,我们提出了一个名为CMedia Compressor的应用程序,用于测试和比较各种压缩算法。应用表明,自适应霍夫曼编码和算术编码的性能明显优于其他编码方法,如行长编码(RLE)、霍夫曼编码、算术编码(AC)和Lempel-Ziv-Welch编码(LZW)。本文讨论了本研究的结果,并给出了图表。研究结果表明,算术编码比霍夫曼编码和自适应霍夫曼编码节省空间。
{"title":"CMedia Compressor: An Application to Graphically Compare General Compression Algorithms and Adaptive Huffman Compression Algorithm","authors":"S. Asare, P. Mbewe","doi":"10.1109/ICONIC.2018.8601237","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601237","url":null,"abstract":"Much discussion and research has been done on compression algorithms but not many have gone to the extent of developing an application that can test and compare various compression algorithms with each other. In this paper, we present an application known as the CMedia Compressor, that tests and compares various compression algorithms. The application shows that adaptive Huffman and Arithmetic Coding tend to outperform the others such as the Run-length encoding (RLE), Huffman coding, Arithmetic coding (AC) and Lempel-Ziv-Welch (LZW) methods. Results obtained from this study are discussed and also presented graphically. The study’s results indicates that Arithmetic coding yields higher space-savings than Huffman coding and Adaptive Huffman coding.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121944671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fabless Semiconductor Implementation Model as an Enabling Factor for "Virtual Labs" in Online Postgraduate Degrees in Microelectronics 无晶圆厂半导体实现模型作为微电子在线研究生学位“虚拟实验室”的使能因素
M. Božanić, S. Sinha
Modern technology and the increasingly readily available access to the internet in recent years have initiated the paradigm shift from the "local student" to the "global and virtual student", which is evident in the increased numbers of students who are enrolling in the postgraduate (master’s and PhD) degrees offered through remote means. Such students are not necessarily even present in the town or the country of the university at which they have enrolled. Traditional walk-in universities such as the University of Johannesburg, South Africa, are consequently increasing the portfolio of online degrees, which is in line with the trend seen by many universities worldwide. Education in electronics traditionally requires a hands-on approach, and the laboratory component remains a requirement even at postgraduate level. In this paper, the fabless semiconductor manufacturing approach, already deployed by many microelectronic industry giants, is aligned as an enabling factor of establishing "virtual labs", used to fulfil the practical education component of both research-based and coursework microelectronic modules offered online. A case study involving postgraduate degrees with specialization in microelectronics from the University of Johannesburg is also presented.
近年来,现代技术和越来越容易获得的互联网接入已经启动了从“本地学生”到“全球和虚拟学生”的范式转变,这在通过远程方式注册研究生(硕士和博士)学位的学生数量增加中是显而易见的。这些学生甚至不一定在他们所就读的大学所在的城镇或国家。传统的步入式大学,如南非的约翰内斯堡大学,因此增加了在线学位的组合,这与世界上许多大学所看到的趋势一致。传统上,电子学教育需要动手实践,即使在研究生阶段,实验室部分仍然是一项要求。在本文中,许多微电子行业巨头已经部署了无晶圆厂半导体制造方法,并将其作为建立“虚拟实验室”的有利因素,用于实现在线提供的研究型和课程型微电子模块的实践教育部分。还介绍了一个涉及约翰内斯堡大学微电子专业研究生学位的案例研究。
{"title":"Fabless Semiconductor Implementation Model as an Enabling Factor for \"Virtual Labs\" in Online Postgraduate Degrees in Microelectronics","authors":"M. Božanić, S. Sinha","doi":"10.1109/ICONIC.2018.8601229","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601229","url":null,"abstract":"Modern technology and the increasingly readily available access to the internet in recent years have initiated the paradigm shift from the \"local student\" to the \"global and virtual student\", which is evident in the increased numbers of students who are enrolling in the postgraduate (master’s and PhD) degrees offered through remote means. Such students are not necessarily even present in the town or the country of the university at which they have enrolled. Traditional walk-in universities such as the University of Johannesburg, South Africa, are consequently increasing the portfolio of online degrees, which is in line with the trend seen by many universities worldwide. Education in electronics traditionally requires a hands-on approach, and the laboratory component remains a requirement even at postgraduate level. In this paper, the fabless semiconductor manufacturing approach, already deployed by many microelectronic industry giants, is aligned as an enabling factor of establishing \"virtual labs\", used to fulfil the practical education component of both research-based and coursework microelectronic modules offered online. A case study involving postgraduate degrees with specialization in microelectronics from the University of Johannesburg is also presented.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a Cloud-based Monitoring System for Potential Leaves Decomposition for Manures 基于云的肥料潜在叶片分解监测系统设计
K. E. Adetunji, C. E. Ngene
The agriculture sector is important to the economic growth of agriculture-inclined countries like South Africa. Issues regarding agriculture may not only directly affect consumers, but cause the increase in food price. This may further affect the price control policy on food. This paper discusses soil manuring as one of the problems faced in optimum food productivity. Since leaves droppings could be decomposed to fertilize the soil, the need to understand the factors that may affect the process or outcome is important, hence our project. We designed a compact monitoring circuit using the Redboard and GSM/GPRS module. Three TCS3200 color sensors were used to detect leaves droppings, giving a large coverage area. The colors detected were categorized to numbers, for possible data analysis. Other sensors were used to collect parameters for possible factors that may affect decomposition. We measured soil moisture, soil temperature, ambient temperature, relative humidity, and dew point. Our Heroku-deployed developed cloud platform was synced to the monitoring circuit for remote monitoring. Our whole project embraced a continuous real-time monitoring from the site to the cloud platform.
农业部门对南非等农业倾向国家的经济增长至关重要。农业问题不仅会直接影响到消费者,而且会导致食品价格上涨。这可能会进一步影响食品价格控制政策。本文讨论了土壤施肥是实现粮食生产最优化所面临的问题之一。由于树叶排泄物可以被分解来施肥,因此了解可能影响过程或结果的因素是很重要的,因此我们的项目。我们利用红板和GSM/GPRS模块设计了一个紧凑的监控电路。使用3个TCS3200颜色传感器检测树叶粪便,覆盖面积大。检测到的颜色被分类为数字,以便进行可能的数据分析。其他传感器用于收集可能影响分解的因素的参数。我们测量了土壤湿度、土壤温度、环境温度、相对湿度和露点。我们部署的heroku开发的云平台被同步到监控电路中进行远程监控。我们的整个项目包含了从现场到云平台的连续实时监控。
{"title":"Design of a Cloud-based Monitoring System for Potential Leaves Decomposition for Manures","authors":"K. E. Adetunji, C. E. Ngene","doi":"10.1109/ICONIC.2018.8601261","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601261","url":null,"abstract":"The agriculture sector is important to the economic growth of agriculture-inclined countries like South Africa. Issues regarding agriculture may not only directly affect consumers, but cause the increase in food price. This may further affect the price control policy on food. This paper discusses soil manuring as one of the problems faced in optimum food productivity. Since leaves droppings could be decomposed to fertilize the soil, the need to understand the factors that may affect the process or outcome is important, hence our project. We designed a compact monitoring circuit using the Redboard and GSM/GPRS module. Three TCS3200 color sensors were used to detect leaves droppings, giving a large coverage area. The colors detected were categorized to numbers, for possible data analysis. Other sensors were used to collect parameters for possible factors that may affect decomposition. We measured soil moisture, soil temperature, ambient temperature, relative humidity, and dew point. Our Heroku-deployed developed cloud platform was synced to the monitoring circuit for remote monitoring. Our whole project embraced a continuous real-time monitoring from the site to the cloud platform.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Authentication Security Using Image Steganography and AES Encryption 使用图像隐写和AES加密的Web身份验证安全性
Hope Mogale, M. Esiefarienrhe, Lucia Letlonkane
In this paper we present Web based highly secure Authentication Security system that uses Image Steganography and 128-bit Advanced Encryption Standard algorithm. Our developed web authentication system encrypts users passwords with an AES encryption that takes octillion years to decrypt and is coupled with face identification photograph which is used as a stegoimage to hide the encrypted password for more robust security. When put to test our Web Authentication Security systems shows positive results which outstand advanced steganalysis attacks such as the chi-squared attack and neighbourhood histogram. We recommend this security for prospective web applications of the future that will be handling sensitive user information.
本文提出了一种基于Web的采用图像隐写和128位高级加密标准算法的高安全认证安全系统。我们开发的web认证系统使用AES加密加密用户密码,需要几亿年才能解密,并加上人脸识别照片作为隐写图像来隐藏加密的密码,以获得更强大的安全性。经过测试,我们的Web认证安全系统显示出积极的结果,突出了先进的隐写分析攻击,如卡方攻击和邻域直方图。我们建议将来处理敏感用户信息的潜在web应用程序使用这种安全性。
{"title":"Web Authentication Security Using Image Steganography and AES Encryption","authors":"Hope Mogale, M. Esiefarienrhe, Lucia Letlonkane","doi":"10.1109/ICONIC.2018.8601208","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601208","url":null,"abstract":"In this paper we present Web based highly secure Authentication Security system that uses Image Steganography and 128-bit Advanced Encryption Standard algorithm. Our developed web authentication system encrypts users passwords with an AES encryption that takes octillion years to decrypt and is coupled with face identification photograph which is used as a stegoimage to hide the encrypted password for more robust security. When put to test our Web Authentication Security systems shows positive results which outstand advanced steganalysis attacks such as the chi-squared attack and neighbourhood histogram. We recommend this security for prospective web applications of the future that will be handling sensitive user information.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation of a jam code signal in the conical-scan seeker processor 干扰码信号在锥形扫描导引头处理器中的传播
Tsholofelo M. Malatji, C. Willers, M. S. Willers
Infrared guided missiles pose a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. The effectiveness of various jamming code signals on the tracking performance of a second generation frequency modulation, conical-scan man portable air defence missile seeker is evaluated in a comprehensive simulation system. The simulation comprises accurate scene geometrical and radiometric models, as well as detailed seeker and kinematic models of the missile. The study investigated the effect a jam signal has on the signal processing circuitry of the conical-scan seeker and compared an effective and non-effective jam signal. It was found that the processor produces a large error if the jam signal oscillates at a frequency that is well suited to the automatic gain control time constant used in the seeker.
红外制导导弹对军用和民用飞机都构成威胁,因此,发展对付这种威胁的有效对策仍然至关重要。在综合仿真系统中,评估了多种干扰码信号对第二代调频锥形扫描便携式防空导弹导引头跟踪性能的影响。仿真包括精确的场景几何和辐射模型,以及导弹的详细导引头和运动学模型。研究了干扰信号对锥形扫描导引头信号处理电路的影响,并对有效和无效干扰信号进行了比较。研究发现,如果干扰信号的振荡频率与导引头的自动增益控制时间常数相适应,则处理器会产生较大的误差。
{"title":"Propagation of a jam code signal in the conical-scan seeker processor","authors":"Tsholofelo M. Malatji, C. Willers, M. S. Willers","doi":"10.1109/ICONIC.2018.8601256","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601256","url":null,"abstract":"Infrared guided missiles pose a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. The effectiveness of various jamming code signals on the tracking performance of a second generation frequency modulation, conical-scan man portable air defence missile seeker is evaluated in a comprehensive simulation system. The simulation comprises accurate scene geometrical and radiometric models, as well as detailed seeker and kinematic models of the missile. The study investigated the effect a jam signal has on the signal processing circuitry of the conical-scan seeker and compared an effective and non-effective jam signal. It was found that the processor produces a large error if the jam signal oscillates at a frequency that is well suited to the automatic gain control time constant used in the seeker.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards the Development of an Interlink Protocol for Disease Surveillance Data Aggregation: A Namibian Context 迈向疾病监测数据汇总互连协议的发展:纳米比亚背景
Nikodemus Angula, N. Dlodlo
Wikipedia’s definition of semantic interoperability is about two or more computer systems having the ability to be able to communicate and exchange data in a meaningful way, which means data exchanged from different source can be understood by the other computer systems. Protocols specify interactions between the communicating entities. In this research, a protocol is developed as an interpreter of disease surveillance data from heterogeneous health information systems (HIS) in Namibian public health institutions for data semantic interoperability. This enables the District Health Information System (DHIS-2) and other health information silo systems to exchange health data and information, and specifically disease surveillance data. The study has produced a new interlink protocol which acts as a converter of data coming from multiple silo systems. Therefore, the interlink protocol has the capability to aggregate disease surveillance data from different data sources. This interlink protocol is based on JSON format.
维基百科对语义互操作性的定义是两个或多个计算机系统能够以一种有意义的方式进行通信和交换数据,这意味着从不同来源交换的数据可以被其他计算机系统理解。协议指定通信实体之间的交互。在这项研究中,开发了一个协议,作为来自纳米比亚公共卫生机构异构卫生信息系统(HIS)的疾病监测数据的解释器,用于数据语义互操作性。这使地区卫生信息系统(DHIS-2)和其他卫生信息筒仓系统能够交换卫生数据和信息,特别是疾病监测数据。该研究产生了一种新的互连协议,作为来自多个筒仓系统的数据转换器。因此,互连协议具有聚合来自不同数据源的疾病监测数据的能力。该互连协议基于JSON格式。
{"title":"Towards the Development of an Interlink Protocol for Disease Surveillance Data Aggregation: A Namibian Context","authors":"Nikodemus Angula, N. Dlodlo","doi":"10.1109/ICONIC.2018.8601209","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601209","url":null,"abstract":"Wikipedia’s definition of semantic interoperability is about two or more computer systems having the ability to be able to communicate and exchange data in a meaningful way, which means data exchanged from different source can be understood by the other computer systems. Protocols specify interactions between the communicating entities. In this research, a protocol is developed as an interpreter of disease surveillance data from heterogeneous health information systems (HIS) in Namibian public health institutions for data semantic interoperability. This enables the District Health Information System (DHIS-2) and other health information silo systems to exchange health data and information, and specifically disease surveillance data. The study has produced a new interlink protocol which acts as a converter of data coming from multiple silo systems. Therefore, the interlink protocol has the capability to aggregate disease surveillance data from different data sources. This interlink protocol is based on JSON format.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1