首页 > 最新文献

2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)最新文献

英文 中文
Development of SCADA Simulator using Omnet++ 利用omnet++开发SCADA模拟器
Zaman Ahmad, M. H. Durad
Industrial control systems (ICS) are used to automate many industries like power generation, petroleum, manufacturing, traffic control etc. Increase in the use of IT (information technology) components in ICS introduces many new vulnerabilities. Security breach in ICS can cause serious damages and is threat to human life. Simulating Security threats and security controls for ICS can help to identify threats and mitigation in advance. This paper explain the construction of open source SCADA simulator which can be used for security testing. Building SCADA simulation using Omnet++ is discussed in detail. We also analyzed TCP Flood DDOS attack on power distribution system as case study.
工业控制系统(ICS)用于许多行业的自动化,如发电,石油,制造,交通控制等。ICS中IT(信息技术)组件使用的增加引入了许多新的漏洞。ICS的安全漏洞会造成严重的损失,威胁到人类的生命安全。模拟ICS的安全威胁和安全控制有助于提前识别威胁和缓解威胁。本文阐述了开源SCADA仿真器的构建,该仿真器可用于安全测试。详细讨论了利用omnet++构建SCADA仿真。并以TCP Flood对配电系统的DDOS攻击为例进行了分析。
{"title":"Development of SCADA Simulator using Omnet++","authors":"Zaman Ahmad, M. H. Durad","doi":"10.1109/IBCAST.2019.8667158","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667158","url":null,"abstract":"Industrial control systems (ICS) are used to automate many industries like power generation, petroleum, manufacturing, traffic control etc. Increase in the use of IT (information technology) components in ICS introduces many new vulnerabilities. Security breach in ICS can cause serious damages and is threat to human life. Simulating Security threats and security controls for ICS can help to identify threats and mitigation in advance. This paper explain the construction of open source SCADA simulator which can be used for security testing. Building SCADA simulation using Omnet++ is discussed in detail. We also analyzed TCP Flood DDOS attack on power distribution system as case study.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative Analysis of Various Hyperelastic Models for Neoprene Gasket at Ranging Strains 不同应变下氯丁橡胶垫片超弹性模型的对比分析
R. F. Latif, Nadeem Shafi Khan
Leakages not only add to the cost, they are also a great threat to the safety of men, machines and the environment as well. Seals and gaskets have evolved as a perfect solution to the problem of leakages. Amongst the various types of gaskets, hyperelastic gaskets have long maintained their dominance in the industrial as well as domestic appliances because of their characteristic advantages. Hyperelasticity is defined for ideally elastic materials by constitutive models where the relations of stress and strain are derived from the strain energy density function denoted by ‘W’ - a scalar-valued quantity that gives the relationship of a material’s strain energy density to its rate of deformation. The constitutive models that explain hyperelasticity, include older Neo-Hookean, Generalized Rivlin and Mooney-Rivlin models as well as Blatz-Ko, Ogden and Arruda-Boyce models. All these models are expressed through different interpretations of W . The selection of the model to be used amongst the mentioned constitutive models depends upon the types of materials and geometric and loading profiles for effective prediction of behavior and results. An effort has been made to present a comparative analysis of 16 hyperelastic models, which are different variants of Mooney Rivlin, Ogden, Blatz-Ko, Yeoh, Gent, Polynomial and Arruda Boyce models. In this study, the above-mentioned hyperelastic models are applied to examine the behavior of a neoprene gasket under uniaxial tensile loading. The study is concluded with determining a hyperelastic constitutive model that predicts with reasonable exactness and safety margin when less or no experimental data is available for the neoprene gasket.
泄漏不仅增加了成本,而且对人员、机器和环境的安全也构成了巨大的威胁。密封件和垫圈已经发展成为解决泄漏问题的完美方案。在各种类型的垫片中,超弹性垫片由于其特有的优势,长期以来在工业和家用电器中保持着主导地位。超弹性是由理想弹性材料的本构模型定义的,其中应力和应变的关系来源于用“W”表示的应变能密度函数——一个标量,给出了材料的应变能密度与其变化率的关系。解释超弹性的本构模型包括较早的Neo-Hookean、Generalized Rivlin和Mooney-Rivlin模型,以及blazz - ko、Ogden和Arruda-Boyce模型。所有这些模型都是通过对W的不同解释来表达的。在上述本构模型中使用的模型的选择取决于材料类型和几何和载荷剖面,以便有效地预测行为和结果。本文对Mooney Rivlin、Ogden、Blatz-Ko、Yeoh、Gent、Polynomial和Arruda Boyce模型的不同变体的16种超弹性模型进行了比较分析。在本研究中,应用上述超弹性模型来研究氯丁橡胶垫片在单轴拉伸载荷下的行为。在实验数据较少或没有实验数据的情况下,确定了一个具有合理精度和安全裕度的超弹性本构模型。
{"title":"Comparative Analysis of Various Hyperelastic Models for Neoprene Gasket at Ranging Strains","authors":"R. F. Latif, Nadeem Shafi Khan","doi":"10.1109/IBCAST.2019.8667253","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667253","url":null,"abstract":"Leakages not only add to the cost, they are also a great threat to the safety of men, machines and the environment as well. Seals and gaskets have evolved as a perfect solution to the problem of leakages. Amongst the various types of gaskets, hyperelastic gaskets have long maintained their dominance in the industrial as well as domestic appliances because of their characteristic advantages. Hyperelasticity is defined for ideally elastic materials by constitutive models where the relations of stress and strain are derived from the strain energy density function denoted by ‘W’ - a scalar-valued quantity that gives the relationship of a material’s strain energy density to its rate of deformation. The constitutive models that explain hyperelasticity, include older Neo-Hookean, Generalized Rivlin and Mooney-Rivlin models as well as Blatz-Ko, Ogden and Arruda-Boyce models. All these models are expressed through different interpretations of W . The selection of the model to be used amongst the mentioned constitutive models depends upon the types of materials and geometric and loading profiles for effective prediction of behavior and results. An effort has been made to present a comparative analysis of 16 hyperelastic models, which are different variants of Mooney Rivlin, Ogden, Blatz-Ko, Yeoh, Gent, Polynomial and Arruda Boyce models. In this study, the above-mentioned hyperelastic models are applied to examine the behavior of a neoprene gasket under uniaxial tensile loading. The study is concluded with determining a hyperelastic constitutive model that predicts with reasonable exactness and safety margin when less or no experimental data is available for the neoprene gasket.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Capturing of Shock Wave in Ejector by Numerical Simulations 喷射器激波设计与捕获的数值模拟
A. Zaidi, E. Uddin
Series of two convergent-divergent nozzles is called ejector; the first or primary nozzle accelerates high pressure primary fluid to low pressure and at supersonic speed. The low pressure developed at the end of primary nozzle entrains the fluid in the secondary nozzle. Eventually, these two fluid streams meet at constant area section resulting in a shock wave. Afterwards, diffuser increases the pressure to desired range. In this paper, numerical simulations are used for designing and shock capturing in ejector using R134a as a refrigerant. The flow analysis is done by Reynolds averaged Navier Stokes equation (RANS) using k-epsilon turbulence model. At first, simulations are done for each nozzle and later they are combined in case of ejector. In case of ejector, rapid fluctuations in pressure and magnitude of velocity showed that there are series of shock waves that result in increase in pressure in ejector. The pressure and Mach number contours explained the physics behind the suction and entrainment of secondary fluid in ejector.
两个会聚发散喷嘴组成的系列称为喷射器;第一或一次喷嘴将高压一次流体加速到低压和超音速。在一次喷嘴末端形成的低压将流体带入二次喷嘴。最终,这两种流体流在等面积截面处相遇,产生激波。然后,扩散器将压力增加到所需的范围。本文采用数值模拟方法对R134a为制冷剂的喷射器的设计和冲击捕获进行了研究。采用k-epsilon湍流模型,采用Reynolds平均Navier Stokes方程(RANS)进行流动分析。首先对每个喷管进行了仿真,然后对引射器进行了综合仿真。在引射器中,压力和速度大小的快速波动表明,在引射器中存在一系列冲击波,导致压力升高。压力和马赫数等高线解释了喷射器二次流体吸入和夹带背后的物理现象。
{"title":"Design and Capturing of Shock Wave in Ejector by Numerical Simulations","authors":"A. Zaidi, E. Uddin","doi":"10.1109/IBCAST.2019.8667160","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667160","url":null,"abstract":"Series of two convergent-divergent nozzles is called ejector; the first or primary nozzle accelerates high pressure primary fluid to low pressure and at supersonic speed. The low pressure developed at the end of primary nozzle entrains the fluid in the secondary nozzle. Eventually, these two fluid streams meet at constant area section resulting in a shock wave. Afterwards, diffuser increases the pressure to desired range. In this paper, numerical simulations are used for designing and shock capturing in ejector using R134a as a refrigerant. The flow analysis is done by Reynolds averaged Navier Stokes equation (RANS) using k-epsilon turbulence model. At first, simulations are done for each nozzle and later they are combined in case of ejector. In case of ejector, rapid fluctuations in pressure and magnitude of velocity showed that there are series of shock waves that result in increase in pressure in ejector. The pressure and Mach number contours explained the physics behind the suction and entrainment of secondary fluid in ejector.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct-Sequence Spread Spectrum with Variable Spreading Sequence for Jamming Immunity 具有可变扩频序列的直接序列扩频抗干扰
M. A. Munir, A. R. Maud
Jamming attacks can limit the availability of wireless networks and can lead to significant re-transmissions and increased power consumption. Over the past decades DSSS has been utilized to consolidate jamming-resistant communication. Such a system is relatively immune to jamming interference when the spreading sequence is unknown to the jammer. However, the cyclostationary behavior of the spreading sequence can be exploited by the jammer to identify the spreading sequence and hence completely jam the system. In this paper, a DSSS system using variable spreading sequence is proposed. The proposed system uses a shared secret key with appropriate ciphers like AES for selection of variable spreading sequence. Each bit is spread by a different spreading sequence resulting in jamming immunity. In addition, the proposed system uses a coarse time and date based plaintext after regular intervals to achieve synchronization between transmitter and receiver. Simulation results show the synchronization and bit error rate performance of the proposed system in the presence of different types of jammers.
干扰攻击可以限制无线网络的可用性,并可能导致大量的重传和增加的功耗。在过去的几十年里,DSSS已经被用来巩固抗干扰通信。当扩频序列不为干扰者所知时,这样的系统相对不受干扰干扰。但是,干扰者可以利用扩频序列的循环平稳特性来识别扩频序列,从而完全干扰系统。本文提出了一种可变扩频序列的DSSS系统。该系统采用共享密钥和AES等合适的密码选择变量传播序列。每个比特按不同的扩展顺序进行扩展,从而产生抗干扰性。此外,该系统在间隔一定的时间间隔后使用基于时间和日期的粗明文实现发送端和接收端之间的同步。仿真结果表明了该系统在不同干扰因素下的同步性能和误码率。
{"title":"Direct-Sequence Spread Spectrum with Variable Spreading Sequence for Jamming Immunity","authors":"M. A. Munir, A. R. Maud","doi":"10.1109/IBCAST.2019.8667119","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667119","url":null,"abstract":"Jamming attacks can limit the availability of wireless networks and can lead to significant re-transmissions and increased power consumption. Over the past decades DSSS has been utilized to consolidate jamming-resistant communication. Such a system is relatively immune to jamming interference when the spreading sequence is unknown to the jammer. However, the cyclostationary behavior of the spreading sequence can be exploited by the jammer to identify the spreading sequence and hence completely jam the system. In this paper, a DSSS system using variable spreading sequence is proposed. The proposed system uses a shared secret key with appropriate ciphers like AES for selection of variable spreading sequence. Each bit is spread by a different spreading sequence resulting in jamming immunity. In addition, the proposed system uses a coarse time and date based plaintext after regular intervals to achieve synchronization between transmitter and receiver. Simulation results show the synchronization and bit error rate performance of the proposed system in the presence of different types of jammers.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Iterative Guidance Scheme for Satellite Launch Vehicles 卫星运载火箭迭代制导方案
F. Ashraf, Ashmal Shafique, A. Shahzad
The purpose of this paper is to implement and ascertain the optimality of the Iterative Guidance Algorithm for higher altitude orbits by comparing it with the Optimal Control Algorithm. The objective of SLV guidance is to ensure that the SLV injects the given payload into its orbit, as specified by its mission profile, that too in the presence of various kind of perturbations and other parametric variations which cannot be reliably anticipated or predicted before the launch. These parametric variations include propulsion system performance, launch day winds, weight and other atmospheric parameters like density and temperature uncertainties. This paper discusses the implementation of iterative algorithm in an exo-atmospheric phase to provide near optimal guidance in real-time. The guidance is carried out in an inertial 2-D reference frame and a closed loop simulation in which inputs are taken from the on-board navigation system; also the guidance is carried out in the last stage of the vehicle. In the algorithm, the equations of motion of the launch vehicle are first taken for a flat earth surface with the gravity field being uniform, then those equations are extended over a spherical earth model where gravity follows the inverse square law. The control vector is computed as a function of the state variables of the vehicle and the guidance commands are updated at the end of each guidance cycle using the current state variables. In order to check the optimality of the algorithm, the same problem is solved using the Optimal Control Theory and the results are compared. The optimal control problem is converted into a two-point boundary value problem using Pontryagin’s Minimum Principle. Both the algorithm’s are implemented on MATLAB/SIMULINK. Simulation results and the comparisons show that the iterative guidance approach gives highly accurate results and retains its optimal properties under any kind of perturbation. Hence, the iterative guidance scheme is a very reliable and effective method of guidance for a launch vehicle in real-time as the results indicate that the execution time that is required for a single guidance loop stays within the domain of real-time implementation.
本文的目的是通过与最优控制算法的比较,实现并确定高轨道迭代制导算法的最优性。SLV制导的目标是确保SLV按照其任务轮廓将给定的有效载荷注入其轨道,这也是在发射前无法可靠地预测或预测的各种扰动和其他参数变化存在的情况下。这些参数变化包括推进系统性能、发射日风、重量和其他大气参数,如密度和温度的不确定性。本文讨论了迭代算法在大气外相位的实现,以实时提供近最优制导。制导在惯性二维参考系和闭环仿真中进行,其中输入来自机载导航系统;制导也是在飞行器的最后一级进行的。该算法首先在重力均匀的平坦地球表面上建立了运载火箭的运动方程,然后将其推广到重力服从平方反比律的球形地球模型上。控制向量作为飞行器状态变量的函数进行计算,制导命令在每个制导周期结束时使用当前状态变量进行更新。为了检验算法的最优性,利用最优控制理论对同一问题进行了求解,并对结果进行了比较。利用庞特里亚金最小值原理将最优控制问题转化为两点边值问题。这两种算法都在MATLAB/SIMULINK上实现。仿真和比较结果表明,迭代制导方法具有较高的精度,在任何扰动下都能保持其最优特性。因此,迭代制导方案对于运载火箭的实时制导是一种非常可靠和有效的方法,因为单个制导回路所需的执行时间都在实时实现的范围内。
{"title":"Iterative Guidance Scheme for Satellite Launch Vehicles","authors":"F. Ashraf, Ashmal Shafique, A. Shahzad","doi":"10.1109/IBCAST.2019.8667124","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667124","url":null,"abstract":"The purpose of this paper is to implement and ascertain the optimality of the Iterative Guidance Algorithm for higher altitude orbits by comparing it with the Optimal Control Algorithm. The objective of SLV guidance is to ensure that the SLV injects the given payload into its orbit, as specified by its mission profile, that too in the presence of various kind of perturbations and other parametric variations which cannot be reliably anticipated or predicted before the launch. These parametric variations include propulsion system performance, launch day winds, weight and other atmospheric parameters like density and temperature uncertainties. This paper discusses the implementation of iterative algorithm in an exo-atmospheric phase to provide near optimal guidance in real-time. The guidance is carried out in an inertial 2-D reference frame and a closed loop simulation in which inputs are taken from the on-board navigation system; also the guidance is carried out in the last stage of the vehicle. In the algorithm, the equations of motion of the launch vehicle are first taken for a flat earth surface with the gravity field being uniform, then those equations are extended over a spherical earth model where gravity follows the inverse square law. The control vector is computed as a function of the state variables of the vehicle and the guidance commands are updated at the end of each guidance cycle using the current state variables. In order to check the optimality of the algorithm, the same problem is solved using the Optimal Control Theory and the results are compared. The optimal control problem is converted into a two-point boundary value problem using Pontryagin’s Minimum Principle. Both the algorithm’s are implemented on MATLAB/SIMULINK. Simulation results and the comparisons show that the iterative guidance approach gives highly accurate results and retains its optimal properties under any kind of perturbation. Hence, the iterative guidance scheme is a very reliable and effective method of guidance for a launch vehicle in real-time as the results indicate that the execution time that is required for a single guidance loop stays within the domain of real-time implementation.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Simple TCP and F-TCP for Smooth Connectivity in Wireless Communication 简单TCP和F-TCP在无线通信中平滑连接的性能分析
Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir
In wireless communication many packets may be lost during handoff. In conventional wired networks Transmission Control Protocol (TCP) is used. But in case of wireless communication TCP needs to be modifies according to the environment because if a packet drops during communication it reduces the congestion window sizes excessively due to congestion. To overcome this problem many extension in TCP has been proposed. The purpose of this research is to analyze the performance of TCP and Freeze -TCP in the wireless environment. The simulation was done using Network Simulator-2 (NS-2) for both the TCP and Freeze-TCP for managing the mobility and handoffs and the result was compared according to the performance. The simulation is categorized in to two scenarios Varying Window Size, Varying Segment Size on the basis of window and segment sizes. Each scenario consist of three window sizes and three segment sizes. For each and every scenario the performance of TCP and Freeze-TCP are analyzed and compared. The result shows that for managing the handoffs in mobile wireless communication the F-TCP performs better than that of simple TCP.
在无线通信中,在切换过程中可能会丢失许多数据包。在传统的有线网络中使用传输控制协议(TCP)。但是在无线通信的情况下,TCP需要根据环境进行修改,因为如果在通信过程中数据包丢失,它会由于拥塞而过度减少拥塞窗口的大小。为了克服这个问题,人们提出了TCP的许多扩展。本研究的目的是分析TCP和Freeze -TCP在无线环境下的性能。利用Network Simulator-2 (NS-2)对TCP和Freeze-TCP进行了移动和切换管理仿真,并根据性能对仿真结果进行了比较。根据窗口和段的大小,将仿真分为变窗口和变段两种场景。每个场景由三个窗口大小和三个段大小组成。对TCP和Freeze-TCP在各种场景下的性能进行了分析比较。结果表明,对于移动无线通信中的切换管理,F-TCP比简单的TCP性能更好。
{"title":"Performance Analysis of Simple TCP and F-TCP for Smooth Connectivity in Wireless Communication","authors":"Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir","doi":"10.1109/IBCAST.2019.8667196","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667196","url":null,"abstract":"In wireless communication many packets may be lost during handoff. In conventional wired networks Transmission Control Protocol (TCP) is used. But in case of wireless communication TCP needs to be modifies according to the environment because if a packet drops during communication it reduces the congestion window sizes excessively due to congestion. To overcome this problem many extension in TCP has been proposed. The purpose of this research is to analyze the performance of TCP and Freeze -TCP in the wireless environment. The simulation was done using Network Simulator-2 (NS-2) for both the TCP and Freeze-TCP for managing the mobility and handoffs and the result was compared according to the performance. The simulation is categorized in to two scenarios Varying Window Size, Varying Segment Size on the basis of window and segment sizes. Each scenario consist of three window sizes and three segment sizes. For each and every scenario the performance of TCP and Freeze-TCP are analyzed and compared. The result shows that for managing the handoffs in mobile wireless communication the F-TCP performs better than that of simple TCP.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Mobile Security Concerns and their Solutions 挖掘移动安全问题及其解决方案
Zeeshan Anwar, Nazia Bibi, H. Afzal
Mobile devices are now an important part of our lives. In many respect mobile devices make our life easier and increases our working capabilities, but with the increased usage many security concerns are also introduced. Most of these concerns are related to mobile technologies like 3G, 4G etc., and security and privacy of users. In this study, we identified the eleven major security concerns associated with mobile devices that are reported in research literature and performed risk analysis on identified concerns to propose detection and mitigation strategy. Furthermore, we developed the corpus of research literature on mobile devices, security concerns to identify the most important security concerns by using word frequency. The concerns which are most discussed by the researchers are more important. Finally, based results of text mining, we proposed a framework to detect, mitigate and address the security concerns. For benchmarking, we evaluate the proposed framework with the results of various research papers and found that our framework is more effective as it is covering more dimensions of mobile security.
移动设备现在是我们生活中重要的一部分。在许多方面,移动设备使我们的生活更轻松,提高了我们的工作能力,但随着使用的增加,也引入了许多安全问题。这些担忧大多与3G、4G等移动技术以及用户的安全和隐私有关。在本研究中,我们确定了研究文献中报道的与移动设备相关的11个主要安全问题,并对确定的问题进行了风险分析,以提出检测和缓解策略。此外,我们开发了关于移动设备安全问题的研究文献语料库,通过使用词频来识别最重要的安全问题。研究人员讨论最多的问题更为重要。最后,基于文本挖掘的结果,我们提出了一个检测、缓解和解决安全问题的框架。对于基准测试,我们用各种研究论文的结果评估了提议的框架,发现我们的框架更有效,因为它涵盖了移动安全的更多维度。
{"title":"Mining Mobile Security Concerns and their Solutions","authors":"Zeeshan Anwar, Nazia Bibi, H. Afzal","doi":"10.1109/IBCAST.2019.8667251","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667251","url":null,"abstract":"Mobile devices are now an important part of our lives. In many respect mobile devices make our life easier and increases our working capabilities, but with the increased usage many security concerns are also introduced. Most of these concerns are related to mobile technologies like 3G, 4G etc., and security and privacy of users. In this study, we identified the eleven major security concerns associated with mobile devices that are reported in research literature and performed risk analysis on identified concerns to propose detection and mitigation strategy. Furthermore, we developed the corpus of research literature on mobile devices, security concerns to identify the most important security concerns by using word frequency. The concerns which are most discussed by the researchers are more important. Finally, based results of text mining, we proposed a framework to detect, mitigate and address the security concerns. For benchmarking, we evaluate the proposed framework with the results of various research papers and found that our framework is more effective as it is covering more dimensions of mobile security.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public Perception Based Recommendation System for Cryptocurrency 基于公众感知的加密货币推荐系统
Shaista Bibi, Shahid Hussain, Muhammad Imran Faisal
Cryptocurrency is one of the emerging online currency of the modern era. Big companies are investing in this technology. However, some established companies still hesitate to use it. According to them, it is a volatile trend which will fade up eventually. There is no such authority which will provide them feasibility information. So, investors can be helped by providing them feasibility information about locations for cryptocurrency investment around the world. This paper aims to provide the aforementioned information to the investors. The proposed methodology is based on Topic modeling along with public opinion mining about cryptocurrencies, blockchain network, bitcoin, litecoin, and ethereum. The crawled data for other cryptocurrencies are much insufficient, so that are excluded from the study. In the proposed methodology, the top locations where cryptocurrency is widely used are identified, then in that particular locations' users concerns along with their sentiment analyses are investigated. Top locations are identified such as Australia, Denmark, Netherlands, and the USA etc. Almost 83.7% tweets of Sweden show positive sentiment for cryptocurrency investment which ranks as the highest having friendly environment for cryptocurrency investment. Similarly, the UK shows the least positive perception of cryptocurrency and blockchain technology usage. Some of the noteworthy terms found are legitimacy, authorization rules, volatility, profit, investment, and fluctuations. Which describe the users’ concerns/ interests’ about cryptocurrency. Investors can focus on all these areas during business. These subtopics can help business experts to evolve their businesses’ and to make them more sustainable on the basis of public perception.
加密货币是现代新兴的在线货币之一。大公司正在投资这项技术。然而,一些老牌公司仍不愿使用它。根据他们的说法,这是一个不稳定的趋势,最终会消退。没有这样的权威机构向他们提供可行性信息。因此,投资者可以通过向他们提供有关全球加密货币投资地点的可行性信息来获得帮助。本文旨在为投资者提供上述信息。所提出的方法是基于主题建模以及关于加密货币、区块链网络、比特币、莱特币和以太坊的舆论挖掘。其他加密货币的抓取数据远远不足,因此被排除在研究之外。在提出的方法中,确定加密货币广泛使用的顶级位置,然后在特定位置调查用户关注的问题以及他们的情绪分析。确定了诸如澳大利亚,丹麦,荷兰和美国等顶级地点。瑞典近83.7%的推文对加密货币投资持积极态度,是加密货币投资环境最友好的国家。同样,英国对加密货币和区块链技术的使用表现出最不积极的看法。其中一些值得注意的术语是合法性、授权规则、波动性、利润、投资和波动。描述了用户对加密货币的关注/兴趣。投资者在经营期间可以关注所有这些领域。这些子主题可以帮助商业专家发展他们的业务,并在公众认知的基础上使其更具可持续性。
{"title":"Public Perception Based Recommendation System for Cryptocurrency","authors":"Shaista Bibi, Shahid Hussain, Muhammad Imran Faisal","doi":"10.1109/IBCAST.2019.8667123","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667123","url":null,"abstract":"Cryptocurrency is one of the emerging online currency of the modern era. Big companies are investing in this technology. However, some established companies still hesitate to use it. According to them, it is a volatile trend which will fade up eventually. There is no such authority which will provide them feasibility information. So, investors can be helped by providing them feasibility information about locations for cryptocurrency investment around the world. This paper aims to provide the aforementioned information to the investors. The proposed methodology is based on Topic modeling along with public opinion mining about cryptocurrencies, blockchain network, bitcoin, litecoin, and ethereum. The crawled data for other cryptocurrencies are much insufficient, so that are excluded from the study. In the proposed methodology, the top locations where cryptocurrency is widely used are identified, then in that particular locations' users concerns along with their sentiment analyses are investigated. Top locations are identified such as Australia, Denmark, Netherlands, and the USA etc. Almost 83.7% tweets of Sweden show positive sentiment for cryptocurrency investment which ranks as the highest having friendly environment for cryptocurrency investment. Similarly, the UK shows the least positive perception of cryptocurrency and blockchain technology usage. Some of the noteworthy terms found are legitimacy, authorization rules, volatility, profit, investment, and fluctuations. Which describe the users’ concerns/ interests’ about cryptocurrency. Investors can focus on all these areas during business. These subtopics can help business experts to evolve their businesses’ and to make them more sustainable on the basis of public perception.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132194550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Analysis of Multi-User Polar Coded CDMA system 多用户极化编码CDMA系统性能分析
Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali
It is a well-known fact that as the number of users increase in a CDMA system, the bit error rate (BER) performance drops drastically. To overcome, such problems, forward error correction codes come to aid and BER performance is significantly improved. Recently, polar codes have gained much attention in the research which approach theoretical Shannon’s limit after turbo and low density and parity check (LDPC) codes. To the best of our knowledge, this paper presents the use of state of-the-art Polar codes in conjunction with CDMA system for the first time. It is observed that the polar coded CDMA systems outperform convolutional coded CDMA by the margin of more than 4dB under identical conditions. Successive cancellation (SC) decoder is used at the receiver nodes which has low decoding complexity and thus reduces receiver’s complexity.
众所周知,在CDMA系统中,随着用户数量的增加,误码率(BER)性能会急剧下降。为了克服这些问题,前向纠错码可以帮助提高误码率性能。近年来,在turbo码和低密度奇偶校验码(LDPC)之后逼近理论香农极限的极码研究受到了广泛关注。据我们所知,本文首次介绍了将最先进的Polar码与CDMA系统结合使用。在相同的条件下,极化编码的CDMA系统比卷积编码的CDMA系统高出4dB以上。在接收节点上采用连续消去(SC)解码器,具有较低的解码复杂度,从而降低了接收节点的复杂度。
{"title":"Performance Analysis of Multi-User Polar Coded CDMA system","authors":"Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali","doi":"10.1109/IBCAST.2019.8667181","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667181","url":null,"abstract":"It is a well-known fact that as the number of users increase in a CDMA system, the bit error rate (BER) performance drops drastically. To overcome, such problems, forward error correction codes come to aid and BER performance is significantly improved. Recently, polar codes have gained much attention in the research which approach theoretical Shannon’s limit after turbo and low density and parity check (LDPC) codes. To the best of our knowledge, this paper presents the use of state of-the-art Polar codes in conjunction with CDMA system for the first time. It is observed that the polar coded CDMA systems outperform convolutional coded CDMA by the margin of more than 4dB under identical conditions. Successive cancellation (SC) decoder is used at the receiver nodes which has low decoding complexity and thus reduces receiver’s complexity.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131662260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synthesis and Characterization of ZnO-ZnS Nanoflowers for Enhanced Photocatalytic Performance : ZnS Decorated ZnO Nanoflowers 增强光催化性能的ZnO-ZnS纳米花的合成与表征:ZnS修饰ZnO纳米花
Talha Farooq Khan, Mohsin Muhyuddin, S. Husain, Muhammad Abdul Basit
Metal oxide nanomaterials exhibit high chemical and physical stability, non-toxic nature, and attractive biological properties, hence they are part of one of the most important classes of materials. Zinc oxide is a very commonly used semiconductor, having potential applications in optoelectronics, ultraviolet lasers and detectors, sensors, photovoltaic cells, photo-electrochemical cells and photocatalysts [1] – [5] . Most of these applications involve the ability of ZnO nanostructures to utilize light and effectively separate the photogenerated electrons and holes. Being a wide bandgap semiconductor (3.37 eV) [6] , ZnO is only able to harvest light in the ultraviolet (UV) region. In order to make sure that the visible light is also effectively utilized, the most common strategy is to functionalize the surface of ZnO with other semiconductors. For this reason, researchers have successfully functionalized the surface of ZnO nanostructures with narrow bandgap semiconductors such as CdS [7] , Cu 2 O [8] , CdSe [9] , CdTe [10] – [12] , etc. which act as sensitizer to absorb light with a greater spectrum range [13] . Similarly, ZnO has also been incorporated with wide bandgap semiconductors such as TiO 2 , SnO 2, and ZnS in order to improve utilization of ultraviolet (UV) spectrum of solar light. Fabrication of ZnO-TiO 2 architectures resulted in an increased light absorption, higher photo-induced current, and more effective charge separation [14] , [15] . Synthesis of ZnO coupled with SnO 2 produced unique luminescence properties and improved photocatalytic performance [16] – [18] .
金属氧化物纳米材料具有较高的化学和物理稳定性、无毒性和吸引人的生物学特性,是一类重要的材料之一。氧化锌是一种非常常用的半导体,在光电子、紫外激光器和探测器、传感器、光伏电池、光电化学电池和光催化剂等方面具有潜在的应用前景[1]-[5]。这些应用大多涉及ZnO纳米结构利用光的能力,并有效地分离光产生的电子和空穴。作为一种宽带隙半导体(3.37 eV) [6], ZnO只能在紫外(UV)区域捕获光。为了确保可见光也被有效利用,最常见的策略是在ZnO表面用其他半导体功能化。因此,研究人员已经成功地在ZnO纳米结构表面功能化了窄带隙半导体,如CdS[7]、cu2o[8]、CdSe[9]、CdTe[10] -[12]等,这些半导体作为敏化剂吸收更大光谱范围的光[13]。同样,ZnO也被掺入到tio2、sno2和ZnS等宽禁带半导体中,以提高太阳光的紫外(UV)光谱利用率。zno - tio2结构的制备导致光吸收增加,光感应电流更高,电荷分离更有效[14],[15]。ZnO与sno2偶联的合成产生了独特的发光性能,提高了光催化性能[16]-[18]。
{"title":"Synthesis and Characterization of ZnO-ZnS Nanoflowers for Enhanced Photocatalytic Performance : ZnS Decorated ZnO Nanoflowers","authors":"Talha Farooq Khan, Mohsin Muhyuddin, S. Husain, Muhammad Abdul Basit","doi":"10.1109/IBCAST.2019.8667220","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667220","url":null,"abstract":"Metal oxide nanomaterials exhibit high chemical and physical stability, non-toxic nature, and attractive biological properties, hence they are part of one of the most important classes of materials. Zinc oxide is a very commonly used semiconductor, having potential applications in optoelectronics, ultraviolet lasers and detectors, sensors, photovoltaic cells, photo-electrochemical cells and photocatalysts [1] – [5] . Most of these applications involve the ability of ZnO nanostructures to utilize light and effectively separate the photogenerated electrons and holes. Being a wide bandgap semiconductor (3.37 eV) [6] , ZnO is only able to harvest light in the ultraviolet (UV) region. In order to make sure that the visible light is also effectively utilized, the most common strategy is to functionalize the surface of ZnO with other semiconductors. For this reason, researchers have successfully functionalized the surface of ZnO nanostructures with narrow bandgap semiconductors such as CdS [7] , Cu 2 O [8] , CdSe [9] , CdTe [10] – [12] , etc. which act as sensitizer to absorb light with a greater spectrum range [13] . Similarly, ZnO has also been incorporated with wide bandgap semiconductors such as TiO 2 , SnO 2, and ZnS in order to improve utilization of ultraviolet (UV) spectrum of solar light. Fabrication of ZnO-TiO 2 architectures resulted in an increased light absorption, higher photo-induced current, and more effective charge separation [14] , [15] . Synthesis of ZnO coupled with SnO 2 produced unique luminescence properties and improved photocatalytic performance [16] – [18] .","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133053669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1