首页 > 最新文献

The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)最新文献

英文 中文
Browser JS Guard: Detects and defends against Malicious JavaScript injection based drive by download attacks 浏览器JS防护:检测和防御恶意JavaScript注入驱动的下载攻击
K. Kishore, M. Mallesh, G. Jyostna, P. R. L. Eswari, S. S. Sarma
In the recent times, most of the systems connected to Internet are getting infected with the malware and some of these systems are becoming zombies for the attacker. When user knowingly or unknowingly visits a malware website, his system gets infected. Attackers do this by exploiting the vulnerabilities in the web browser and acquire control over the underlying operating system. Once attacker compromises the users web browser, he can instruct the browser to visit the attackers website by using number of redirections. During the process, users web browser downloads the malware without the intervention of the user. Once the malware is downloaded, it would be placed in the file system and responds as per the instructions of the attacker. These types of attacks are known as Drive by Download attacks. Now-a-days, Drive by Download is the major channel for delivering the Malware. In this paper, Browser JS Guard an extension to the browser is presented for detecting and defending against Drive by Download attacks via HTML tags and JavaScript.
最近,大多数连接到互联网的系统都感染了恶意软件,其中一些系统正在成为攻击者的僵尸。当用户有意或无意地访问恶意软件网站时,他的系统就会受到感染。攻击者通过利用web浏览器中的漏洞并获得对底层操作系统的控制来实现这一点。一旦攻击者攻破了用户的web浏览器,他就可以通过重定向次数来引导浏览器访问攻击者的网站。在此过程中,用户的web浏览器在没有用户干预的情况下下载恶意软件。一旦恶意软件被下载,它将被放置在文件系统中,并按照攻击者的指令进行响应。这些类型的攻击被称为下载驱动攻击。如今,下载驱动是传播恶意软件的主要渠道。在本文中,浏览器JS守卫是一个浏览器的扩展,用于检测和防御通过HTML标签和JavaScript驱动的下载攻击。
{"title":"Browser JS Guard: Detects and defends against Malicious JavaScript injection based drive by download attacks","authors":"K. Kishore, M. Mallesh, G. Jyostna, P. R. L. Eswari, S. S. Sarma","doi":"10.1109/ICADIWT.2014.6814705","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814705","url":null,"abstract":"In the recent times, most of the systems connected to Internet are getting infected with the malware and some of these systems are becoming zombies for the attacker. When user knowingly or unknowingly visits a malware website, his system gets infected. Attackers do this by exploiting the vulnerabilities in the web browser and acquire control over the underlying operating system. Once attacker compromises the users web browser, he can instruct the browser to visit the attackers website by using number of redirections. During the process, users web browser downloads the malware without the intervention of the user. Once the malware is downloaded, it would be placed in the file system and responds as per the instructions of the attacker. These types of attacks are known as Drive by Download attacks. Now-a-days, Drive by Download is the major channel for delivering the Malware. In this paper, Browser JS Guard an extension to the browser is presented for detecting and defending against Drive by Download attacks via HTML tags and JavaScript.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Droid permission miner: Mining prominent permissions for Android malware analysis Android permission miner:为Android恶意软件分析挖掘突出的权限
A. Aswini, P. Vinod
In this paper, we propose static analysis of android malware files by mining prominent permissions. The proposed technique is implemented by extracting permissions from 436 .apk files. Feature pruning is carried out to investigate the impact of feature length on accuracy. The prominent features that give way to lesser misclassification are determined using Bi-Normal Separation (BNS) and Mutual Information (MI) feature selection techniques. Results suggest that Droid permission miner can be used for preliminary classification of Android package files.
在本文中,我们提出了通过挖掘突出权限对android恶意软件文件进行静态分析。提出的技术是通过从436 .apk文件中提取权限来实现的。进行特征修剪以研究特征长度对精度的影响。使用双正态分离(BNS)和互信息(MI)特征选择技术来确定减少误分类的突出特征。结果表明,Droid权限挖掘器可用于Android包文件的初步分类。
{"title":"Droid permission miner: Mining prominent permissions for Android malware analysis","authors":"A. Aswini, P. Vinod","doi":"10.1109/ICADIWT.2014.6814679","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814679","url":null,"abstract":"In this paper, we propose static analysis of android malware files by mining prominent permissions. The proposed technique is implemented by extracting permissions from 436 .apk files. Feature pruning is carried out to investigate the impact of feature length on accuracy. The prominent features that give way to lesser misclassification are determined using Bi-Normal Separation (BNS) and Mutual Information (MI) feature selection techniques. Results suggest that Droid permission miner can be used for preliminary classification of Android package files.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129145889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Searching application for Southern Thailand Travel Guide on iPhone 在iPhone上搜索泰国南部旅游指南应用程序
H. Ketmaneechairat, Phanuwat Yoksiri, Thitisak Jaisiri
Recently, the travel guides have become an important tool to support tourists around the world. The tourists will search the tourist attraction and travel information from the book, brochure or website. In this paper, the searching application for Southern Thailand Travel Guide on iPhone is proposed. The proposed application is developed to search for travel guide information on different provinces of the Southern Thailand. The searching application function is divided into two modes: online and offline mode. The language can be displayed in two languages: Thai and English language. This paper presents the design and implementation by using Apple's iOS Software Development Kit. The results show that the tourists can search tourist attraction including history, picture, address, phone number, website, map and travel detail. The maps can show the current location of the users. In addition, these maps can display in three modes: standard, satellite and hybrid. Overall information on tourist attraction can be shared on Facebook, Twitter and E-mail. The proposed application is better support for the foreign tourists and Thai tourists that they are used iPhone mobile.
最近,旅游指南已成为支持世界各地游客的重要工具。游客会从书籍、小册子或网站上搜索旅游景点和旅游信息。本文提出了在iPhone上搜索《泰国南部旅游指南》的应用程序。开发该应用程序是为了搜索泰国南部不同省份的旅游指南信息。搜索应用功能分为在线和离线两种模式。语言可以显示为两种语言:泰语和英语。本文利用苹果公司的iOS软件开发工具进行设计与实现。结果表明,游客可以搜索旅游景点的历史、图片、地址、电话、网站、地图和旅游详情。地图可以显示用户的当前位置。此外,这些地图可以显示在三种模式:标准,卫星和混合。旅游景点的总体信息可以在Facebook、Twitter和E-mail上分享。所提出的应用程序对使用iPhone手机的外国游客和泰国游客有更好的支持。
{"title":"Searching application for Southern Thailand Travel Guide on iPhone","authors":"H. Ketmaneechairat, Phanuwat Yoksiri, Thitisak Jaisiri","doi":"10.1109/ICADIWT.2014.6814684","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814684","url":null,"abstract":"Recently, the travel guides have become an important tool to support tourists around the world. The tourists will search the tourist attraction and travel information from the book, brochure or website. In this paper, the searching application for Southern Thailand Travel Guide on iPhone is proposed. The proposed application is developed to search for travel guide information on different provinces of the Southern Thailand. The searching application function is divided into two modes: online and offline mode. The language can be displayed in two languages: Thai and English language. This paper presents the design and implementation by using Apple's iOS Software Development Kit. The results show that the tourists can search tourist attraction including history, picture, address, phone number, website, map and travel detail. The maps can show the current location of the users. In addition, these maps can display in three modes: standard, satellite and hybrid. Overall information on tourist attraction can be shared on Facebook, Twitter and E-mail. The proposed application is better support for the foreign tourists and Thai tourists that they are used iPhone mobile.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123632328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy protection in cloud using identity based group signature 基于身份的组签名在云中的隐私保护
S. Kuzhalvaimozhi, G. R. Rao
Cloud computing is one of the emerging computing technology where costs are directly proportional to usage and demand. The advantages of this technology are the reasons of security and privacy problems. The data belongs to the users are stored in some cloud servers which is not under their own control. So the cloud services are required to authenticate the user. In general, most of the cloud authentication algorithms do not provide anonymity of the users. The cloud provider can track the users easily. The privacy and authenticity are two critical issues of cloud security. In this paper, we propose a secure anonymous authentication method for cloud services using identity based group signature which allows the cloud users to prove that they have privilege to access the data without revealing their identities.
云计算是一种新兴的计算技术,其成本与使用和需求成正比。该技术的优点是安全性和隐私问题的原因。属于用户的数据存储在一些不受用户控制的云服务器中。因此需要云服务对用户进行身份验证。一般来说,大多数云认证算法不提供用户的匿名性。云提供商可以很容易地跟踪用户。隐私和真实性是云安全的两个关键问题。在本文中,我们提出了一种基于身份的组签名的云服务安全匿名认证方法,该方法允许云用户在不暴露身份的情况下证明他们有访问数据的权限。
{"title":"Privacy protection in cloud using identity based group signature","authors":"S. Kuzhalvaimozhi, G. R. Rao","doi":"10.1109/ICADIWT.2014.6814670","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814670","url":null,"abstract":"Cloud computing is one of the emerging computing technology where costs are directly proportional to usage and demand. The advantages of this technology are the reasons of security and privacy problems. The data belongs to the users are stored in some cloud servers which is not under their own control. So the cloud services are required to authenticate the user. In general, most of the cloud authentication algorithms do not provide anonymity of the users. The cloud provider can track the users easily. The privacy and authenticity are two critical issues of cloud security. In this paper, we propose a secure anonymous authentication method for cloud services using identity based group signature which allows the cloud users to prove that they have privilege to access the data without revealing their identities.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An API for Quran portal using Drupal technology 一个使用Drupal技术的可兰经门户API
Z. Adhoni, H. Hamad, Zaheer Ahmed Adhoni
In this paper, we describe the Research and development of a portal using Drupal technology on cloud. The main focus is on designing a portal for Quran Application using Drupal which can be a center of learning resource for various users and can be hosted on cloud. It includes different features which are useful as a knowledge center. Its features can also be used by any internet enable device which can be a deemed as modern application. The quality and assurance of Quran Text is also taken into consideration. It also promotes for research and development of new tools and applications with the provision of API. This paper provides an account of Search API and API.
在本文中,我们描述了在云上使用Drupal技术的门户网站的研究和开发。主要的重点是使用Drupal为Quran Application设计一个门户,它可以成为各种用户的学习资源中心,并且可以托管在云上。它包含了作为知识中心有用的不同功能。它的特性也可以被任何可以被视为现代应用的互联网启用设备使用。《古兰经》文本的质量和保证也被考虑在内。它还通过提供API来促进新工具和应用程序的研究和开发。本文介绍了搜索API和API。
{"title":"An API for Quran portal using Drupal technology","authors":"Z. Adhoni, H. Hamad, Zaheer Ahmed Adhoni","doi":"10.1109/ICADIWT.2014.6814697","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814697","url":null,"abstract":"In this paper, we describe the Research and development of a portal using Drupal technology on cloud. The main focus is on designing a portal for Quran Application using Drupal which can be a center of learning resource for various users and can be hosted on cloud. It includes different features which are useful as a knowledge center. Its features can also be used by any internet enable device which can be a deemed as modern application. The quality and assurance of Quran Text is also taken into consideration. It also promotes for research and development of new tools and applications with the provision of API. This paper provides an account of Search API and API.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127540678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AccAuth: Accounting system for OAuth protocol AccAuth: OAuth协议的计费系统
Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee
When a user accesses a resource, the accounting process at the server side does the job of keeping track of the resource usage so as to charge the user. In cloud computing, a user may use more than one service provider and need two independent service providers to work together. In this user-centric context, the user is the owner of the information and has the right to authorize to a third party application to access the protected resource on the user's behalf. Therefore, the user also needs to monitor the authorized resource usage he granted to third party applications. However, the existing accounting protocols were proposed to monitor the resource usage in terms of how the user uses the resource from the service provider. This paper proposed the user-centric accounting model called AccAuth which designs an accounting layer to an OAuth protocol. Then the prototype was implemented, and the proposed model was evaluated against the standard requirements. The result showed that AccAuth passed all the requirements.
当用户访问资源时,服务器端的计费流程负责跟踪资源使用情况,以便向用户收费。在云计算中,用户可能使用不止一个服务提供商,并且需要两个独立的服务提供商协同工作。在这种以用户为中心的上下文中,用户是信息的所有者,有权授权第三方应用程序代表用户访问受保护的资源。因此,用户还需要监控他授予第三方应用程序的授权资源使用情况。然而,根据用户如何使用来自服务提供者的资源,提出了现有的会计协议来监控资源使用情况。本文提出了以用户为中心的计费模型AccAuth,该模型为OAuth协议设计了一个计费层。然后实现了原型,并根据标准需求对所提出的模型进行了评估。结果表明,AccAuth通过了所有要求。
{"title":"AccAuth: Accounting system for OAuth protocol","authors":"Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee","doi":"10.1109/ICADIWT.2014.6814698","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814698","url":null,"abstract":"When a user accesses a resource, the accounting process at the server side does the job of keeping track of the resource usage so as to charge the user. In cloud computing, a user may use more than one service provider and need two independent service providers to work together. In this user-centric context, the user is the owner of the information and has the right to authorize to a third party application to access the protected resource on the user's behalf. Therefore, the user also needs to monitor the authorized resource usage he granted to third party applications. However, the existing accounting protocols were proposed to monitor the resource usage in terms of how the user uses the resource from the service provider. This paper proposed the user-centric accounting model called AccAuth which designs an accounting layer to an OAuth protocol. Then the prototype was implemented, and the proposed model was evaluated against the standard requirements. The result showed that AccAuth passed all the requirements.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121569346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A fast narrow band level set formulation for shape extraction 一种用于形状提取的快速窄带水平集公式
R. Nair
Shape modeling is an active area of research in Computer Graphics and Computer Vision. Shape models aid in the representation and recognition of arbitrarily complex shapes. This paper proposes a fast and computationally efficient narrow band level set algorithm for recovering arbitrary shapes of objects from various types of image data. The overall computational cost is reduced by using a five grid point wide narrow band applied on a variational level set formulation that can be easily implemented by simple finite difference scheme. The proposed method is more efficient and has many advantages when compared to traditional level set formulations. The periodical reinitialization of the level set function to a signed distance function is completely avoided. Implementation by simple finite difference scheme reduces computational complexity and ensures faster curve evolution. The level set function is initialized to an arbitrary region in the image domain. The region based initialization is computationally more efficient and flexible. This formulation can form the basis of a shape modeling scheme for implementing solid modeling techniques on free form shapes set in a level set framework. The proposed method has been applied to extract shapes from both synthetic and real images including some low contrast medical images, with promising results.
形状建模是计算机图形学和计算机视觉研究的一个活跃领域。形状模型有助于任意复杂形状的表示和识别。本文提出了一种快速、计算效率高的窄带水平集算法,用于从各种类型的图像数据中恢复任意形状的物体。在变分水平集公式上使用五网格点宽窄带,可通过简单的有限差分格式实现,从而减少了总计算量。与传统的水平集公式相比,该方法效率更高,具有许多优点。完全避免了周期性地将水平集函数重新初始化为带符号距离函数。采用简单的有限差分格式实现,降低了计算复杂度,保证了更快的曲线演化速度。水平集函数初始化为图像域中的任意区域。基于区域的初始化在计算上更加高效和灵活。该公式可以形成形状建模方案的基础,用于在水平集框架中设置的自由形状上实现实体建模技术。该方法已应用于合成图像和真实图像(包括一些低对比度的医学图像)的形状提取,取得了良好的效果。
{"title":"A fast narrow band level set formulation for shape extraction","authors":"R. Nair","doi":"10.1109/ICADIWT.2014.6814664","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814664","url":null,"abstract":"Shape modeling is an active area of research in Computer Graphics and Computer Vision. Shape models aid in the representation and recognition of arbitrarily complex shapes. This paper proposes a fast and computationally efficient narrow band level set algorithm for recovering arbitrary shapes of objects from various types of image data. The overall computational cost is reduced by using a five grid point wide narrow band applied on a variational level set formulation that can be easily implemented by simple finite difference scheme. The proposed method is more efficient and has many advantages when compared to traditional level set formulations. The periodical reinitialization of the level set function to a signed distance function is completely avoided. Implementation by simple finite difference scheme reduces computational complexity and ensures faster curve evolution. The level set function is initialized to an arbitrary region in the image domain. The region based initialization is computationally more efficient and flexible. This formulation can form the basis of a shape modeling scheme for implementing solid modeling techniques on free form shapes set in a level set framework. The proposed method has been applied to extract shapes from both synthetic and real images including some low contrast medical images, with promising results.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Passwords to absolutely avoid 密码要绝对避免
G. Violettas, Kyriakos Papadopoulos
This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their password(s) to friends and/or family and if they ever realized that their password was exposed or revealed to an attacker and the measures they took after that. Additionally, an extended literature review about password habits and effectiveness regarding length and complexity is included. At the end of the paper, for first time in Greece, there is a list of the 100 passwords that Greek users should absolutely avoid using due to the ease of guessing or weak complexity, short length or simply because they exist in every dictionary used for password attacks in the wild.
本文描述了网络用户的密码习惯,特别是在希腊。我们在网上进行了一项研究,询问用户目前使用的密码长度,他们在多少个网站上使用相同的密码,他们在设置密码时是否使用了个人数据,以及他们是否曾经使用一些微不足道的单词作为密码。他们还被问及是否向朋友和/或家人透露自己的密码,是否意识到自己的密码被暴露或泄露给了攻击者,以及在此之后他们采取了什么措施。此外,一个扩展的文献综述关于密码的习惯和有效性关于长度和复杂性包括在内。在论文的最后,希腊首次列出了100个密码,希腊用户应该绝对避免使用这些密码,因为这些密码容易被猜测,或者复杂性较弱,长度较短,或者仅仅是因为它们存在于用于密码攻击的所有字典中。
{"title":"Passwords to absolutely avoid","authors":"G. Violettas, Kyriakos Papadopoulos","doi":"10.1109/ICADIWT.2014.6814693","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814693","url":null,"abstract":"This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their password(s) to friends and/or family and if they ever realized that their password was exposed or revealed to an attacker and the measures they took after that. Additionally, an extended literature review about password habits and effectiveness regarding length and complexity is included. At the end of the paper, for first time in Greece, there is a list of the 100 passwords that Greek users should absolutely avoid using due to the ease of guessing or weak complexity, short length or simply because they exist in every dictionary used for password attacks in the wild.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An algorithm for carrier frequency offset estimation in BPSK burst transmission BPSK突发传输中载波频偏估计算法
L. Tian, Jianbo Wang
In this paper, we propose a novel carrier frequency offset estimation algorithm in Binary Phase Shift Keying (BPSK) burst transmission based on pilot symbols and modulated data symbols. Its estimation range is large, about ±0.5 of the symbol rate. The simulation results show that this algorithm has low SNR threshold, and its estimation mean square error (MSE) is close to Cramer-Rao Lower Bound (CRLB). The algorithm's computational complexity is low and it is very suitable for practical application.
本文提出了一种基于导频符号和调制数据符号的二进制相移键控(BPSK)突发传输载波频偏估计算法。其估计范围大,约为符号率的±0.5。仿真结果表明,该算法具有较低的信噪比阈值,估计均方误差(MSE)接近Cramer-Rao下限(CRLB)。该算法计算复杂度低,非常适合实际应用。
{"title":"An algorithm for carrier frequency offset estimation in BPSK burst transmission","authors":"L. Tian, Jianbo Wang","doi":"10.1109/ICADIWT.2014.6814692","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814692","url":null,"abstract":"In this paper, we propose a novel carrier frequency offset estimation algorithm in Binary Phase Shift Keying (BPSK) burst transmission based on pilot symbols and modulated data symbols. Its estimation range is large, about ±0.5 of the symbol rate. The simulation results show that this algorithm has low SNR threshold, and its estimation mean square error (MSE) is close to Cramer-Rao Lower Bound (CRLB). The algorithm's computational complexity is low and it is very suitable for practical application.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collision probability based Available Bandwidth estimation in Mobile Ad Hoc Networks 基于碰撞概率的移动Ad Hoc网络可用带宽估计
S. Chaudhari, R. Biradar
Ever increasing demand for streaming applications transfer data in real-time over Mobile Ad hoc NETworks (MANETs). These transmission estimates Available Bandwidth (ABW) at each node before transmission in MANETs as channel is shared. The ABW mainly depends on the channel utilization which can be improved by minimizing packet losses. Researchers proposed many techniques to minimize the packet losses by developing models for synchronized idle period at sender-receiver pair before data transfer, collision probability and random waiting. In this paper, we propose a scheme of estimating ABW in MANETs using similar but modified models. The idle period synchronization model of previous work uses parameters of various node state for actual workload, channel utilization at optimal workload and collision rate at optimal workload instead of actual. We use the actual channel utilization and collision rate. The collision probability model of previous work uses same Lagrange Interpolation polynomial irrespective of node behavior. We compute separate Lagrange Interpolation polynomial at each node according to node behavior dynamically. The random waiting time calculated in previous work does not consider all waiting time statistics which is added in our model of random waiting time calculation. The ABW estimated by our scheme is approximately 19.99% more accurate compare to the recent work done by other researchers. As we are computing Lagrange Interpolation polynomial at each node dynamically, evidently it adds computation overhead which is ignored as our goal is towards accuracy of ABW but optimized for speed in future.
在移动自组织网络(manet)上实时传输数据的流应用需求日益增长。这些传输估计在每个节点的可用带宽(ABW)在manet中传输之前,信道是共享的。ABW主要取决于信道利用率,而信道利用率可以通过最小化丢包来提高。研究人员通过建立数据传输前收发对同步空闲时间模型、碰撞概率模型和随机等待模型,提出了多种减少丢包的技术。在本文中,我们提出了一种使用类似但经过修改的模型估计manet中ABW的方案。前期工作的空闲周期同步模型使用各种节点状态参数作为实际工作负载、最优工作负载下的信道利用率和最优工作负载下的碰撞率,而不是实际工作负载。我们使用实际的信道利用率和碰撞率。先前的碰撞概率模型使用相同的拉格朗日插值多项式,而不考虑节点的行为。我们根据节点的行为动态地在每个节点上计算单独的拉格朗日插值多项式。之前计算的随机等待时间并没有考虑所有的等待时间统计数据,我们的随机等待时间计算模型中加入了这些统计数据。与其他研究人员最近的工作相比,我们的方案估计的ABW精度提高了约19.99%。由于我们在每个节点动态计算拉格朗日插值多项式,显然它增加了计算开销,因为我们的目标是ABW的准确性,但在未来优化速度,因此忽略了计算开销。
{"title":"Collision probability based Available Bandwidth estimation in Mobile Ad Hoc Networks","authors":"S. Chaudhari, R. Biradar","doi":"10.1109/ICADIWT.2014.6814665","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814665","url":null,"abstract":"Ever increasing demand for streaming applications transfer data in real-time over Mobile Ad hoc NETworks (MANETs). These transmission estimates Available Bandwidth (ABW) at each node before transmission in MANETs as channel is shared. The ABW mainly depends on the channel utilization which can be improved by minimizing packet losses. Researchers proposed many techniques to minimize the packet losses by developing models for synchronized idle period at sender-receiver pair before data transfer, collision probability and random waiting. In this paper, we propose a scheme of estimating ABW in MANETs using similar but modified models. The idle period synchronization model of previous work uses parameters of various node state for actual workload, channel utilization at optimal workload and collision rate at optimal workload instead of actual. We use the actual channel utilization and collision rate. The collision probability model of previous work uses same Lagrange Interpolation polynomial irrespective of node behavior. We compute separate Lagrange Interpolation polynomial at each node according to node behavior dynamically. The random waiting time calculated in previous work does not consider all waiting time statistics which is added in our model of random waiting time calculation. The ABW estimated by our scheme is approximately 19.99% more accurate compare to the recent work done by other researchers. As we are computing Lagrange Interpolation polynomial at each node dynamically, evidently it adds computation overhead which is ignored as our goal is towards accuracy of ABW but optimized for speed in future.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1