Because the electric mobility has its focus on eco-friendly means of transport, a distributed platform designed for a smart city environment that can manage the electrical charging stations is vital. One of the major problems of distributed systems and cloud is security. The purpose of this article is to determine the malicious traffic using a backpropagation neural network. The main focus of the paper is to present a composite network that is able to detect faulted, random and normal types of traffic.
{"title":"OCPP security - Neural network for detecting malicious traffic","authors":"A. Moroșan, Florin Pop","doi":"10.1145/3129676.3129693","DOIUrl":"https://doi.org/10.1145/3129676.3129693","url":null,"abstract":"Because the electric mobility has its focus on eco-friendly means of transport, a distributed platform designed for a smart city environment that can manage the electrical charging stations is vital. One of the major problems of distributed systems and cloud is security. The purpose of this article is to determine the malicious traffic using a backpropagation neural network. The main focus of the paper is to present a composite network that is able to detect faulted, random and normal types of traffic.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116935734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motion-blur effect helps users recognize fast-moving objects in 3D scenes and virtual environments. Recently, the post-processing technique is one of the most commonly used techniques for motion-blur rendering. However, this algorithm has artifacts when there are complex moving directions. In this paper, we present a new algorithm to resolve those artifacts. First, we find pixel locations between t0 and t1 for all moving pixels. t0 and t1 are meant the start and end time respectively, during the period of one frame in which some object moves. We find pixel locations passing between two times on the screen with Bresenham's algorithm. And we store fragments to linked-lists on this position. Theses fragments contain information depth, time and color of a pixel. After we run visibility testing for every fragment and we set the average color from t0 and t1 with determined visible fragment's data. The result of our algorithm can render similar to the accumulation buffer algorithm without artifacts in interactively. We try to contribute a better quality image for motion-blurred. And we suggest a forward processing motion blur in real-time by linked-list. This method is a part of graphics techniques for complex reality 3D scenes. Therefore, we expect to make the better quality and speed of 3D games and virtual reality though this paper.
{"title":"Real-time motion blur based on per pixel fragment list","authors":"Jinhyung Choi, Kyoungsu Oh","doi":"10.1145/3129676.3129692","DOIUrl":"https://doi.org/10.1145/3129676.3129692","url":null,"abstract":"Motion-blur effect helps users recognize fast-moving objects in 3D scenes and virtual environments. Recently, the post-processing technique is one of the most commonly used techniques for motion-blur rendering. However, this algorithm has artifacts when there are complex moving directions. In this paper, we present a new algorithm to resolve those artifacts. First, we find pixel locations between t0 and t1 for all moving pixels. t0 and t1 are meant the start and end time respectively, during the period of one frame in which some object moves. We find pixel locations passing between two times on the screen with Bresenham's algorithm. And we store fragments to linked-lists on this position. Theses fragments contain information depth, time and color of a pixel. After we run visibility testing for every fragment and we set the average color from t0 and t1 with determined visible fragment's data. The result of our algorithm can render similar to the accumulation buffer algorithm without artifacts in interactively. We try to contribute a better quality image for motion-blurred. And we suggest a forward processing motion blur in real-time by linked-list. This method is a part of graphics techniques for complex reality 3D scenes. Therefore, we expect to make the better quality and speed of 3D games and virtual reality though this paper.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional approaches representing chromosomes based on cluster centroids do not allow dividing cluster centroids during crossover operations. Hence, significant diversity may not be achieved while the algorithm iterates from generation to generation. In our approach presented in this paper, we allow a crossover point to be even inside a cluster centroid, modifying some cluster centroids during the crossover operations. Such modifications also guide the algorithm to get rid of the local minima. Thus the proposed approach can find a better solution than the traditional approaches.
{"title":"An Improved Evolutionary Approach for Document Clustering","authors":"Ruksana Akter, Yoojin Chung","doi":"10.1145/3129676.3129733","DOIUrl":"https://doi.org/10.1145/3129676.3129733","url":null,"abstract":"Traditional approaches representing chromosomes based on cluster centroids do not allow dividing cluster centroids during crossover operations. Hence, significant diversity may not be achieved while the algorithm iterates from generation to generation. In our approach presented in this paper, we allow a crossover point to be even inside a cluster centroid, modifying some cluster centroids during the crossover operations. Such modifications also guide the algorithm to get rid of the local minima. Thus the proposed approach can find a better solution than the traditional approaches.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper first presents the main features of the dataset obtained from the charging station monitoring system currently in operation on Jeju island. Then, the time series analysis is conducted to find the behavioral trends according to districts and place types, based on periodic report archives from 49 fast chargers. Two most populated districts lead the occupancy rate of the whole island, while those chargers installed in administrative offices account for the most charging demand during office working hours. Combined with the dynamic time warping method, the hierarchical clustering process captures 3 main groups having the same day-by-day occupancy rate dynamics. Additionally, artificial neural network models are built to forecast the next day charging demand, and the prediction for working hours is acceptable as it is not affected by missing data. With the prediction model built upon open data and software, it is possible to develop a new smart grid application such as vehicle-to-grid and renewable energy generation.
{"title":"Temporal data stream analysis for EV charging infrastructure in Jeju","authors":"Junghoon Lee, G. Park","doi":"10.1145/3129676.3129717","DOIUrl":"https://doi.org/10.1145/3129676.3129717","url":null,"abstract":"This paper first presents the main features of the dataset obtained from the charging station monitoring system currently in operation on Jeju island. Then, the time series analysis is conducted to find the behavioral trends according to districts and place types, based on periodic report archives from 49 fast chargers. Two most populated districts lead the occupancy rate of the whole island, while those chargers installed in administrative offices account for the most charging demand during office working hours. Combined with the dynamic time warping method, the hierarchical clustering process captures 3 main groups having the same day-by-day occupancy rate dynamics. Additionally, artificial neural network models are built to forecast the next day charging demand, and the prediction for working hours is acceptable as it is not affected by missing data. With the prediction model built upon open data and software, it is possible to develop a new smart grid application such as vehicle-to-grid and renewable energy generation.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128687183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Until recently, we have concentrated on building hardware based infrastructure such as computing resources, storage resources, and network resources to support rapidly growing big data, and we have been managing it with existing hardware infrastructure management methods. However, as the amount of data explosively increases and the number of infrastructure resources increases, the existing hardware infrastructure operation is confronted with limitations. Therefore, the need for more efficient resource management technology is increasing. This paper has designed intelligent orchestration agent which supports storage platform management with software defined storage concept. The basic structure proposed in this paper is that the orchestration agent manages performance, capacity and power saving based on a software defined storage platform.
{"title":"Intelligent Orchestration Agent for Storage Platform Management","authors":"J. An, Younghwan Kim, Changkwon Park","doi":"10.1145/3129676.3129705","DOIUrl":"https://doi.org/10.1145/3129676.3129705","url":null,"abstract":"Until recently, we have concentrated on building hardware based infrastructure such as computing resources, storage resources, and network resources to support rapidly growing big data, and we have been managing it with existing hardware infrastructure management methods. However, as the amount of data explosively increases and the number of infrastructure resources increases, the existing hardware infrastructure operation is confronted with limitations. Therefore, the need for more efficient resource management technology is increasing. This paper has designed intelligent orchestration agent which supports storage platform management with software defined storage concept. The basic structure proposed in this paper is that the orchestration agent manages performance, capacity and power saving based on a software defined storage platform.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bongjae Kim, Jinmang Jung, Hong Min, Junyoung Heo, Hyedong Jung
GPU-based computations are widely used in various computing areas because GPU provides very high computing performance when compared to typical CPU. In this paper, we evaluate and analyze the computing performance of multiple GPUs based on MPI environments. We examine the performance of sparse matric-vector multiply (SpMV). SpMV is one of the most heavily used components in many scientific applications. Based on the performance evaluation results, generally, the execution time of SpMV is decreased as the number of GPUs increase. In some case, the performance was reduced according to the computation overhead, the memory copy overhead among GPUs, and the characteristics of sparse matrices.
{"title":"Performance Evaluations of Multiple GPUs based on MPI Environments","authors":"Bongjae Kim, Jinmang Jung, Hong Min, Junyoung Heo, Hyedong Jung","doi":"10.1145/3129676.3129716","DOIUrl":"https://doi.org/10.1145/3129676.3129716","url":null,"abstract":"GPU-based computations are widely used in various computing areas because GPU provides very high computing performance when compared to typical CPU. In this paper, we evaluate and analyze the computing performance of multiple GPUs based on MPI environments. We examine the performance of sparse matric-vector multiply (SpMV). SpMV is one of the most heavily used components in many scientific applications. Based on the performance evaluation results, generally, the execution time of SpMV is decreased as the number of GPUs increase. In some case, the performance was reduced according to the computation overhead, the memory copy overhead among GPUs, and the characteristics of sparse matrices.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, S. Jhang
Android applications are exposed to reverse engineering attacks. In particular, the applications written in Java are more prone to reverse engineering in comparison to the applications written in native-code languages such as C or C++ on the Android platform. This is because Java applications are distributed as byte codes, while applications written in native-code languages are distributed as low-level binary codes. In this paper, we propose a new technique to protect Android applications against reverse engineering. Three key characteristics of the proposed approach are as follows. First, we write the main parts of the application in native-code using Android NDK. This not only makes reverse engineering more difficult, but it is also more effective in terms of code reuse. Second, we introduce obfuscation, which hides the intent of the native codes and obscures theirs structure, at the intermediate representation (IR) level. Finally, we integrate an integrity verification scheme which detects whether the critical module of the application has been modified prior to execution of the application. Based on the results of experimentation on five known Android applications, we show that the proposed techniques can be applied without a significant effect on performance.
{"title":"An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications","authors":"Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, S. Jhang","doi":"10.1145/3129676.3129708","DOIUrl":"https://doi.org/10.1145/3129676.3129708","url":null,"abstract":"Android applications are exposed to reverse engineering attacks. In particular, the applications written in Java are more prone to reverse engineering in comparison to the applications written in native-code languages such as C or C++ on the Android platform. This is because Java applications are distributed as byte codes, while applications written in native-code languages are distributed as low-level binary codes. In this paper, we propose a new technique to protect Android applications against reverse engineering. Three key characteristics of the proposed approach are as follows. First, we write the main parts of the application in native-code using Android NDK. This not only makes reverse engineering more difficult, but it is also more effective in terms of code reuse. Second, we introduce obfuscation, which hides the intent of the native codes and obscures theirs structure, at the intermediate representation (IR) level. Finally, we integrate an integrity verification scheme which detects whether the critical module of the application has been modified prior to execution of the application. Based on the results of experimentation on five known Android applications, we show that the proposed techniques can be applied without a significant effect on performance.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyoungsoo Bok, Geonsik Ko, Jongtae Lim, K. Lee, Jaesoo Yoo
With the development of smartphones and online social networks, the users are creating and sharing a large amount of content. Concurrently, there have been recommendation schemes for providing users with content that matches their preferences. In this paper, we present a content recommendation scheme that uses trust-based user filtering. To perform user filtering, the trust of a user is determined by analyzing user social activities, content usage, and social relationships. In addition, trust of the content is considered to decide the content recommendation priority order. To calculate the content trust, we analyze the expertise of the user and implicit activities. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.
{"title":"Contents Recommendation Scheme Considering Trust and Collaborative Filtering in Online Social Networks","authors":"Kyoungsoo Bok, Geonsik Ko, Jongtae Lim, K. Lee, Jaesoo Yoo","doi":"10.1145/3129676.3130217","DOIUrl":"https://doi.org/10.1145/3129676.3130217","url":null,"abstract":"With the development of smartphones and online social networks, the users are creating and sharing a large amount of content. Concurrently, there have been recommendation schemes for providing users with content that matches their preferences. In this paper, we present a content recommendation scheme that uses trust-based user filtering. To perform user filtering, the trust of a user is determined by analyzing user social activities, content usage, and social relationships. In addition, trust of the content is considered to decide the content recommendation priority order. To calculate the content trust, we analyze the expertise of the user and implicit activities. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong
With the development of the Internet of Things(IoT), where things are connected to the Internet, the number of IoT services and users is increasing day by day. Cloud computing is widely used to save and process the huge amounts of data generated by increasing IoT devices efficiently. However transmission delay problem occurs in the cloud computing environment because the huge amounts of data generated by the IoT devices is saved in the remote cloud servers. To solve this problem, fog computing emerged. Fog computing is a concept that brings cloud servers close to user area to provide high quality service by reducing the network transmission time. In this paper, we propose a Monitoring, Analyzing, and Controlling as a Service, which called MACaaS, platform for the fog computing. The proposed MACaaS platform provides services for monitoring, analyzing and controlling various IoT devices. In addition, the proposed platform can easily expand new services according to the additional requirements of IoT devices and users and provide the consistent interface for integrating various IoT devices.
随着物联网(Internet of Things, IoT)的发展,物联网服务和用户的数量日益增加。云计算被广泛用于有效地保存和处理因增加物联网设备而产生的大量数据。然而,在云计算环境中,由于物联网设备产生的大量数据保存在远程云服务器中,导致了传输延迟问题。为了解决这个问题,雾计算出现了。雾计算是通过减少网络传输时间,使云服务器靠近用户区域,提供高质量服务的概念。在本文中,我们提出了一个监测、分析和控制即服务(mcacaas)的雾计算平台。提出的macas平台提供各种物联网设备的监控、分析和控制服务。此外,该平台可以根据物联网设备和用户的额外需求轻松扩展新的业务,并为各种物联网设备的集成提供一致的接口。
{"title":"MACaaS Platform for Fog Computing","authors":"Gibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong","doi":"10.1145/3129676.3129718","DOIUrl":"https://doi.org/10.1145/3129676.3129718","url":null,"abstract":"With the development of the Internet of Things(IoT), where things are connected to the Internet, the number of IoT services and users is increasing day by day. Cloud computing is widely used to save and process the huge amounts of data generated by increasing IoT devices efficiently. However transmission delay problem occurs in the cloud computing environment because the huge amounts of data generated by the IoT devices is saved in the remote cloud servers. To solve this problem, fog computing emerged. Fog computing is a concept that brings cloud servers close to user area to provide high quality service by reducing the network transmission time. In this paper, we propose a Monitoring, Analyzing, and Controlling as a Service, which called MACaaS, platform for the fog computing. The proposed MACaaS platform provides services for monitoring, analyzing and controlling various IoT devices. In addition, the proposed platform can easily expand new services according to the additional requirements of IoT devices and users and provide the consistent interface for integrating various IoT devices.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"121 45","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is an industrial shift from Service-Oriented Architectures (SOA) into Microservices; however, a quick review of online resources on these topics reveals a range of different understandings of these two architectures. Individuals often mix terms, grant false advantages or expect different quality attributes and properties. The purpose of this paper is to provide readers a solid understanding of the differences between these two architectures and their features. We provide both research and industry perspectives to point out strengths and weaknesses of both architectural directions, and we point out many shortcomings in both approaches that are not addressed by the architecture. Finally, based on this we propose challenges for future research.
{"title":"Disambiguation and Comparison of SOA, Microservices and Self-Contained Systems","authors":"T. Cerný, M. Donahoo, J. Pechanec","doi":"10.1145/3129676.3129682","DOIUrl":"https://doi.org/10.1145/3129676.3129682","url":null,"abstract":"There is an industrial shift from Service-Oriented Architectures (SOA) into Microservices; however, a quick review of online resources on these topics reveals a range of different understandings of these two architectures. Individuals often mix terms, grant false advantages or expect different quality attributes and properties. The purpose of this paper is to provide readers a solid understanding of the differences between these two architectures and their features. We provide both research and industry perspectives to point out strengths and weaknesses of both architectural directions, and we point out many shortcomings in both approaches that are not addressed by the architecture. Finally, based on this we propose challenges for future research.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}