首页 > 最新文献

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

英文 中文
An Efficient Key Management Scheme for Secure Demand-Response Communications in Smart Grid 智能电网安全需求响应通信的有效密钥管理方案
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194168
Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid
Smart Grid (SG) is considered as the next generation power grid, due to its efficiency, resilience, reliability and sustainability. An important feature that will make the SG more reliable and lead to mutual benefits for both customers and power utilities is the Demand Response (DR). DR refers to a set of actions with the aim of dynamically reducing energy demand at specific times and in specific locations in response to a relative shortage in supply. In this paper, we focus on the security of DR and we propose a new key management scheme for SG to secure DR communications. The proposed scheme is based on a novel multi-group key graph structure that supports the management of multiple and dynamic DR programs simultaneously for each customer. A security and performance analysis is conducted to show the effectiveness of our solution.
智能电网以其高效、弹性、可靠和可持续性被认为是下一代电网。需求响应(DR)是一个重要的特性,它将使SG更加可靠,并为客户和电力公司带来互利。DR指的是在特定时间和特定地点动态减少能源需求的一系列行动,以应对供应的相对短缺。本文重点研究了容灾通信的安全性,提出了一种新的SG密钥管理方案来保证容灾通信的安全。该方案基于一种新颖的多组密钥图结构,支持同时管理每个客户的多个动态DR程序。进行了安全性和性能分析,以显示我们的解决方案的有效性。
{"title":"An Efficient Key Management Scheme for Secure Demand-Response Communications in Smart Grid","authors":"Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid","doi":"10.1109/AECT47998.2020.9194168","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194168","url":null,"abstract":"Smart Grid (SG) is considered as the next generation power grid, due to its efficiency, resilience, reliability and sustainability. An important feature that will make the SG more reliable and lead to mutual benefits for both customers and power utilities is the Demand Response (DR). DR refers to a set of actions with the aim of dynamically reducing energy demand at specific times and in specific locations in response to a relative shortage in supply. In this paper, we focus on the security of DR and we propose a new key management scheme for SG to secure DR communications. The proposed scheme is based on a novel multi-group key graph structure that supports the management of multiple and dynamic DR programs simultaneously for each customer. A security and performance analysis is conducted to show the effectiveness of our solution.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Profiling Vulnerabilities Threatening Dual Persona in Android Framework 分析Android框架中威胁双重角色的漏洞
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194151
K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid
Enterprises round the globe have been searching for a way to securely empower AndroidTM devices for work but have spurned away from the Android platform due to ongoing fragmentation and security concerns. Discrepant vulnerabilities have been reported in Android smartphones since Android Lollipop release. Smartphones can be easily hacked by installing a malicious application, visiting an infectious browser, receiving a crafted MMS, interplaying with plug-ins, certificate forging, checksum collisions, inter-process communication (IPC) abuse and much more. To highlight this issue a manual analysis of Android vulnerabilities is performed, by using data available in National Vulnerability Database NVD and Android Vulnerability website. This paper includes the vulnerabilities that risked the dual persona support in Android 5 and above, till Dec 2017. In our security threat analysis, we have identified a comprehensive list of Android vulnerabilities, vulnerable Android versions, manufacturers, and information regarding complete and partial patches released. So far, there is no published research work that systematically presents all the vulnerabilities and vulnerability assessment for dual persona feature of Android’s smartphone. The data provided in this paper will open ways to future research and present a better Android security model for dual persona.
全球各地的企业一直在寻找一种方法来安全地授权Android tm设备进行工作,但由于持续的碎片化和安全问题,他们已经放弃了Android平台。自Android Lollipop发布以来,Android智能手机中出现了不同的漏洞。通过安装恶意应用程序、访问具有传染性的浏览器、接收精心制作的彩信、与插件交互、伪造证书、校验和冲突、滥用进程间通信(IPC)等等,智能手机很容易被黑客入侵。为了突出这一问题,通过使用国家漏洞数据库NVD和Android漏洞网站中的数据,对Android漏洞进行了手动分析。本文包含了2017年12月之前Android 5及以上版本存在双重角色支持风险的漏洞。在我们的安全威胁分析中,我们已经确定了一个完整的Android漏洞列表,易受攻击的Android版本,制造商以及有关发布的完整和部分补丁的信息。到目前为止,还没有发表的研究工作系统地展示了Android智能手机双重人格特性的所有漏洞和漏洞评估。本文提供的数据将为未来的研究开辟道路,并为双重角色提供更好的Android安全模型。
{"title":"Profiling Vulnerabilities Threatening Dual Persona in Android Framework","authors":"K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid","doi":"10.1109/AECT47998.2020.9194151","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194151","url":null,"abstract":"Enterprises round the globe have been searching for a way to securely empower AndroidTM devices for work but have spurned away from the Android platform due to ongoing fragmentation and security concerns. Discrepant vulnerabilities have been reported in Android smartphones since Android Lollipop release. Smartphones can be easily hacked by installing a malicious application, visiting an infectious browser, receiving a crafted MMS, interplaying with plug-ins, certificate forging, checksum collisions, inter-process communication (IPC) abuse and much more. To highlight this issue a manual analysis of Android vulnerabilities is performed, by using data available in National Vulnerability Database NVD and Android Vulnerability website. This paper includes the vulnerabilities that risked the dual persona support in Android 5 and above, till Dec 2017. In our security threat analysis, we have identified a comprehensive list of Android vulnerabilities, vulnerable Android versions, manufacturers, and information regarding complete and partial patches released. So far, there is no published research work that systematically presents all the vulnerabilities and vulnerability assessment for dual persona feature of Android’s smartphone. The data provided in this paper will open ways to future research and present a better Android security model for dual persona.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things Security Assessment in Healthcare Environment 医疗环境下的物联网安全评估
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194216
D. Ali, Ahmed Mahmoud
This paper deals with a new generation of the Internet devices which is named Internet of Things (IoT) concerning the health care environment. IoT allows understanding the interconnected devices among them, including gadgets and sensors… etc.Security assessment and security gaps treatment in the healthcare environment is also tackled through the use of secure routing protocol (SecRout) for the protection of wireless sensor networks (WSN) during different types of attacks and security risks. Symmetric encryption is used in SecRout to confirm the validity of the messages and a small cache in each nodes used to record the route of the partial routing (the previous and subsequent nodes) and it ensures that the destination is able to identify or ignore the frivolous messages. Finally, SecRout protocol performance is compared with the performance of unsecured AODV protocol..
本文研究了与医疗环境相关的新一代互联网设备——物联网(IoT)。物联网允许了解它们之间的互联设备,包括小工具和传感器等。通过使用安全路由协议(secroute),在不同类型的攻击和安全风险中保护无线传感器网络(WSN),还可以解决医疗保健环境中的安全评估和安全漏洞处理问题。在secroute中使用对称加密来确认消息的有效性,并在每个节点中使用一个小缓存来记录部分路由(前一个和后一个节点)的路由,并确保目的地能够识别或忽略无关紧要的消息。最后,将secroute协议性能与不安全的AODV协议性能进行了比较。
{"title":"Internet of Things Security Assessment in Healthcare Environment","authors":"D. Ali, Ahmed Mahmoud","doi":"10.1109/AECT47998.2020.9194216","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194216","url":null,"abstract":"This paper deals with a new generation of the Internet devices which is named Internet of Things (IoT) concerning the health care environment. IoT allows understanding the interconnected devices among them, including gadgets and sensors… etc.Security assessment and security gaps treatment in the healthcare environment is also tackled through the use of secure routing protocol (SecRout) for the protection of wireless sensor networks (WSN) during different types of attacks and security risks. Symmetric encryption is used in SecRout to confirm the validity of the messages and a small cache in each nodes used to record the route of the partial routing (the previous and subsequent nodes) and it ensures that the destination is able to identify or ignore the frivolous messages. Finally, SecRout protocol performance is compared with the performance of unsecured AODV protocol..","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Planar Rectangular Antenna Array for Wideband 5G MIMO Applications 宽带5G MIMO应用的改进平面矩形天线阵列
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194162
U. Rafique, Hisham Khalil
A modified planar rectangular antenna array design is presented for wideband 5G MIMO applications. The single element of the array comprises of a modified rectangular patch fed using a $50 Omega$ microstrip feed line, and a partial ground plane with a rectangular notch. It is observed from simulation results that the proposed antenna offers wideband characteristics from 26.88 GHz to 61.17 GHz. Furthermore, a four-element MIMO array has been designed for its possible use in 5G enabled communication devices. It is demonstrated that the proposed MIMO antenna array provides high isolation between array elements without disturbing the return loss of an individual element.
针对宽带5G MIMO应用,提出了一种改进的平面矩形天线阵列设计。该阵列的单个元件包括使用$50 Omega$微带馈电线馈电的改进矩形贴片,以及带有矩形缺口的部分地平面。仿真结果表明,该天线具有26.88 GHz ~ 61.17 GHz的宽带特性。此外,还设计了一种四元MIMO阵列,以便在支持5G的通信设备中使用。结果表明,所提出的MIMO天线阵列在不干扰单个单元回波损耗的情况下,提供了阵列元素之间的高度隔离。
{"title":"Modified Planar Rectangular Antenna Array for Wideband 5G MIMO Applications","authors":"U. Rafique, Hisham Khalil","doi":"10.1109/AECT47998.2020.9194162","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194162","url":null,"abstract":"A modified planar rectangular antenna array design is presented for wideband 5G MIMO applications. The single element of the array comprises of a modified rectangular patch fed using a $50 Omega$ microstrip feed line, and a partial ground plane with a rectangular notch. It is observed from simulation results that the proposed antenna offers wideband characteristics from 26.88 GHz to 61.17 GHz. Furthermore, a four-element MIMO array has been designed for its possible use in 5G enabled communication devices. It is demonstrated that the proposed MIMO antenna array provides high isolation between array elements without disturbing the return loss of an individual element.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Creating Fair Classification Models in Reality Mining Using Data Resampling Techniques 利用数据重采样技术建立现实挖掘中公平的分类模型
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194174
Ghassan F. Bati
Multiple recent efforts in human-centered computing have used mobile and ubiquitous data to infer propensities of individuals (e.g. to trust others or behave altruistically). Often studied under the umbrella of “Reality Mining” multiple such efforts have reported high accuracies at the considered prediction tasks. However, there has been little work at quantifying the “fairness” of such algorithms in terms of how the quality of the predictions varies over different demographic groups (e.g. across gender). This work takes inspiration from data resampling techniques to create fair classification models. Empirical results suggest that a combination of over and under sampling technique (SmoteTomek) to the sensitive (protected) attribute (e.g. gender) yields improved model’s performance while reducing disparity across genders.
最近在以人为中心的计算方面的多项努力已经使用移动和无处不在的数据来推断个人的倾向(例如,信任他人或利他行为)。通常在“现实挖掘”的保护伞下进行研究,许多这样的努力在考虑的预测任务中报告了很高的准确性。然而,就预测质量在不同人口群体(例如跨性别)中如何变化而言,在量化这种算法的“公平性”方面几乎没有工作。这项工作从数据重采样技术中获得灵感,以创建公平的分类模型。实证结果表明,对敏感(受保护)属性(如性别)的过度采样和欠采样技术(SmoteTomek)相结合可以提高模型的性能,同时减少性别之间的差异。
{"title":"Towards Creating Fair Classification Models in Reality Mining Using Data Resampling Techniques","authors":"Ghassan F. Bati","doi":"10.1109/AECT47998.2020.9194174","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194174","url":null,"abstract":"Multiple recent efforts in human-centered computing have used mobile and ubiquitous data to infer propensities of individuals (e.g. to trust others or behave altruistically). Often studied under the umbrella of “Reality Mining” multiple such efforts have reported high accuracies at the considered prediction tasks. However, there has been little work at quantifying the “fairness” of such algorithms in terms of how the quality of the predictions varies over different demographic groups (e.g. across gender). This work takes inspiration from data resampling techniques to create fair classification models. Empirical results suggest that a combination of over and under sampling technique (SmoteTomek) to the sensitive (protected) attribute (e.g. gender) yields improved model’s performance while reducing disparity across genders.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Efficient FPGA-based TCAM Architecture by using Segmented Matchline Strategy 基于分段匹配线策略的高效fpga TCAM架构
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194189
Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim
Ternary content-addressable memory (TCAM) is famous for its high-speed search operation but this speed comes at the cost of high-power consumption. The paper presents a power efficient architecture for TCAM on field-programmable gate array (FPGA) by using segmented matchline (ML) strategy. Each ML is divided into four equal segments where each segment has nine bits. The proposed TCAM architecture is implemented on Xilinx Virtex-6 FPGA for the size of $64times 36$. Implementation results show that during search operation, the proposed TCAM results in 13.88% reduction in dynamic power consumption compared to the latest FPGA-based TCAMs while not compromising on speed.
三元内容可寻址存储器(TCAM)以其高速搜索操作而闻名,但这种速度是以高功耗为代价的。采用分段匹配线(ML)策略,提出了一种现场可编程门阵列(FPGA)上TCAM的低功耗结构。每个ML被分成四个相等的段,每个段有9位。提出的TCAM架构在Xilinx Virtex-6 FPGA上实现,尺寸为64 × 36。实现结果表明,在搜索过程中,与最新的基于fpga的TCAM相比,所提出的TCAM在不影响速度的情况下,动态功耗降低了13.88%。
{"title":"Power Efficient FPGA-based TCAM Architecture by using Segmented Matchline Strategy","authors":"Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim","doi":"10.1109/AECT47998.2020.9194189","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194189","url":null,"abstract":"Ternary content-addressable memory (TCAM) is famous for its high-speed search operation but this speed comes at the cost of high-power consumption. The paper presents a power efficient architecture for TCAM on field-programmable gate array (FPGA) by using segmented matchline (ML) strategy. Each ML is divided into four equal segments where each segment has nine bits. The proposed TCAM architecture is implemented on Xilinx Virtex-6 FPGA for the size of $64times 36$. Implementation results show that during search operation, the proposed TCAM results in 13.88% reduction in dynamic power consumption compared to the latest FPGA-based TCAMs while not compromising on speed.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Overview of Privacy Issues in IoT Environments 物联网环境中的隐私问题概述
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194197
Suha Ibrahim Al-Sharekh, K. Al-Shqeerat
Many regions in the world have recently sought to integrate and apply advanced technologies in various aspects of life. IoT applications have become popular in different areas such as smart homes, e-health, smart cities, smart connected devices, and many more. However, the growth and spread of IoT technology increase the security and privacy risks that users may experience. Security and privacy problems cannot be eradicated but can be mitigated. Therefore, it is necessary to explore and update dedicated solutions to alleviate them. This paper aims to provide and identify a comprehensive overview of privacy issues and a set of enhanced solutions to protect user privacy in IoT environments. Moreover, it surveys the opinion of researchers and experts regarding challenges and solutions related to IoT privacy. Finally, a set of recommendations and guidelines are suggested to enhance privacy in IoT environments.
世界上许多地区最近都在设法在生活的各个方面综合和应用先进技术。物联网应用已经在智能家居、电子医疗、智能城市、智能连接设备等不同领域变得流行起来。然而,物联网技术的发展和普及增加了用户可能遇到的安全和隐私风险。安全和隐私问题无法根除,但可以减轻。因此,有必要探索和更新专门的解决方案来缓解这些问题。本文旨在提供并确定隐私问题的全面概述和一套增强的解决方案,以保护物联网环境中的用户隐私。此外,它还调查了研究人员和专家对与物联网隐私相关的挑战和解决方案的看法。最后,提出了一套建议和指南,以增强物联网环境中的隐私。
{"title":"An Overview of Privacy Issues in IoT Environments","authors":"Suha Ibrahim Al-Sharekh, K. Al-Shqeerat","doi":"10.1109/AECT47998.2020.9194197","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194197","url":null,"abstract":"Many regions in the world have recently sought to integrate and apply advanced technologies in various aspects of life. IoT applications have become popular in different areas such as smart homes, e-health, smart cities, smart connected devices, and many more. However, the growth and spread of IoT technology increase the security and privacy risks that users may experience. Security and privacy problems cannot be eradicated but can be mitigated. Therefore, it is necessary to explore and update dedicated solutions to alleviate them. This paper aims to provide and identify a comprehensive overview of privacy issues and a set of enhanced solutions to protect user privacy in IoT environments. Moreover, it surveys the opinion of researchers and experts regarding challenges and solutions related to IoT privacy. Finally, a set of recommendations and guidelines are suggested to enhance privacy in IoT environments.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Bug Prediction Employing Feature Selection and Deep Learning 基于特征选择和深度学习的软件Bug预测
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194215
Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal
It was proven that the cost of fixing errors escalates as a project moves through its life cycle in an exponential fashion. Identifying buggy classes, as soon as they are committed to the Version Control System, would have a significant impact on reducing such cost. Mining in software repositories is a growing research area, where innovative techniques and models are designed to analyze software repositories data and uncover useful information that can help in software bug prediction. Previous studies showed that Deep Learning has achieved remarkable results in many fields and it keeps evolving.In this paper, experiments are carried out to study the effect of feature selection on the performance of bug prediction models and to check if better results can be obtained by using the promising Deep Learning techniques. Results show that applying feature selection, using a simple filter approach, such as selecting the highly ranked 9 and 5 features out of the 17 features, did not enhance the performance measures in most cases. On the other hand, results show that Deep Learning model (DL) achieves higher performance measures than the selected set of base classifiers for small and balanced datasets.
事实证明,修复错误的成本随着项目以指数方式在其生命周期中移动而上升。一旦将有bug的类提交给版本控制系统,识别它们将对减少此类成本产生重大影响。软件存储库中的挖掘是一个不断发展的研究领域,其中设计了创新的技术和模型来分析软件存储库数据并发现有助于软件错误预测的有用信息。以往的研究表明,深度学习在许多领域都取得了显著的成果,并且还在不断发展。本文通过实验研究了特征选择对bug预测模型性能的影响,并验证了使用有前途的深度学习技术是否可以获得更好的结果。结果表明,应用特征选择,使用简单的过滤方法,例如从17个特征中选择排名最高的9和5个特征,在大多数情况下并没有提高性能指标。另一方面,结果表明深度学习模型(DL)在小数据集和平衡数据集上比所选的基本分类器集实现了更高的性能指标。
{"title":"Software Bug Prediction Employing Feature Selection and Deep Learning","authors":"Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal","doi":"10.1109/AECT47998.2020.9194215","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194215","url":null,"abstract":"It was proven that the cost of fixing errors escalates as a project moves through its life cycle in an exponential fashion. Identifying buggy classes, as soon as they are committed to the Version Control System, would have a significant impact on reducing such cost. Mining in software repositories is a growing research area, where innovative techniques and models are designed to analyze software repositories data and uncover useful information that can help in software bug prediction. Previous studies showed that Deep Learning has achieved remarkable results in many fields and it keeps evolving.In this paper, experiments are carried out to study the effect of feature selection on the performance of bug prediction models and to check if better results can be obtained by using the promising Deep Learning techniques. Results show that applying feature selection, using a simple filter approach, such as selecting the highly ranked 9 and 5 features out of the 17 features, did not enhance the performance measures in most cases. On the other hand, results show that Deep Learning model (DL) achieves higher performance measures than the selected set of base classifiers for small and balanced datasets.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Implementation of a Secure Email System with ID-based Encryption 基于id加密的安全电子邮件系统的实现
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194199
Eltigani B. Abdelsatir, Mohammad H. Alrashdan
Email continues to be the major business correspondence tool as one of the most regularly used means of communication and collaboration today. The unsecured nature of email, however, can cause unauthorized disclosure of sensitive information. Currently, many email systems are based on schemes such as S/MIME,PGP and PKI to secure communication. However, authentication methods utilized in these systems can become costly with the growing burden of certificate management and pre-enrolment as the number of users increases. In this paper, a secure email framework while taking into account Identity-Based Encryption without pairing is considered. The proposed system provides secure email environment that eliminates PKI hassles with effortless key creation and management.
作为当今最常用的沟通和协作方式之一,电子邮件仍然是主要的商业通信工具。然而,电子邮件的不安全特性可能导致敏感信息未经授权的泄露。目前,许多电子邮件系统都基于S/MIME、PGP和PKI等方案来保证通信的安全性。但是,随着用户数量的增加,证书管理和预注册的负担越来越重,在这些系统中使用的身份验证方法可能会变得昂贵。提出了一种考虑基于身份的无配对加密的安全电子邮件框架。该系统提供了安全的电子邮件环境,通过轻松的密钥创建和管理消除了PKI的麻烦。
{"title":"On the Implementation of a Secure Email System with ID-based Encryption","authors":"Eltigani B. Abdelsatir, Mohammad H. Alrashdan","doi":"10.1109/AECT47998.2020.9194199","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194199","url":null,"abstract":"Email continues to be the major business correspondence tool as one of the most regularly used means of communication and collaboration today. The unsecured nature of email, however, can cause unauthorized disclosure of sensitive information. Currently, many email systems are based on schemes such as S/MIME,PGP and PKI to secure communication. However, authentication methods utilized in these systems can become costly with the growing burden of certificate management and pre-enrolment as the number of users increases. In this paper, a secure email framework while taking into account Identity-Based Encryption without pairing is considered. The proposed system provides secure email environment that eliminates PKI hassles with effortless key creation and management.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wearable Millimeter Wave MIMO Antenna Design For High Frequency Applications 用于高频应用的可穿戴毫米波MIMO天线设计
Pub Date : 2020-02-01 DOI: 10.1109/aect47998.2020.9194218
Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder
In this paper, we propose an improved methodology for the reduction of mutual coupling within millimeter-wave (mmwave) wearable multiple-input and multiple-output (MIMO) antennas. Such approach is crucial for high frequency applications. The important parameters such as return loss (with best matching having $S_{11}, lt -10$ dB with 35 GHz centered frequency), radiation pattern, diversity gain (DG $gt 9.99)$, envelop correlation coefficient (ECC $lt 0.05)$, and mutual coupling evaluate the presented antenna. The main issue that arises in MIMO antenna is mutual coupling. We mitigate this problem by introducing slots on either end of the transmission line. We achieve a reduced mutual coupling even less than -36 dB and it works within a high-frequency range, which is its beauty.
在本文中,我们提出了一种改进的方法来减少毫米波(mmwave)可穿戴多输入多输出(MIMO)天线内的相互耦合。这种方法对于高频应用至关重要。回波损耗(35 GHz中心频率下的最佳匹配值为$S_{11}, lt -10$ dB)、辐射方向图、分集增益(DG $gt 9.99)$、包络相关系数(ECC $lt 0.05)$和互耦性等重要参数对天线进行了评价。MIMO天线中出现的主要问题是相互耦合。我们通过在传输线的两端引入插槽来缓解这个问题。我们实现了更低的互耦,甚至小于- 36db,并且它在高频范围内工作,这就是它的优点。
{"title":"A Wearable Millimeter Wave MIMO Antenna Design For High Frequency Applications","authors":"Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder","doi":"10.1109/aect47998.2020.9194218","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194218","url":null,"abstract":"In this paper, we propose an improved methodology for the reduction of mutual coupling within millimeter-wave (mmwave) wearable multiple-input and multiple-output (MIMO) antennas. Such approach is crucial for high frequency applications. The important parameters such as return loss (with best matching having $S_{11}, lt -10$ dB with 35 GHz centered frequency), radiation pattern, diversity gain (DG $gt 9.99)$, envelop correlation coefficient (ECC $lt 0.05)$, and mutual coupling evaluate the presented antenna. The main issue that arises in MIMO antenna is mutual coupling. We mitigate this problem by introducing slots on either end of the transmission line. We achieve a reduced mutual coupling even less than -36 dB and it works within a high-frequency range, which is its beauty.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1