Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668544
Tibor Eszes, János Botzheim
The aim of this work is to find an automated solution for the Inverse Lindenmayer problem - that is to find the describing system for a given end-result of an L-system - using both Bacterial Programming and other related algorithms. To achieve this, several well-known L-systems were considered, their building symbols taken as the inputs for each algorithm, and the evolution results were compared with the formal definition of each system. The results indicate that this is indeed a viable area of research, as both Bacterial Programming and other different algorithms could be fitted to reverse engineer all of the considered systems.
{"title":"Applying Genetic Programming for the Inverse Lindenmayer Problem","authors":"Tibor Eszes, János Botzheim","doi":"10.1109/CINTI53070.2021.9668544","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668544","url":null,"abstract":"The aim of this work is to find an automated solution for the Inverse Lindenmayer problem - that is to find the describing system for a given end-result of an L-system - using both Bacterial Programming and other related algorithms. To achieve this, several well-known L-systems were considered, their building symbols taken as the inputs for each algorithm, and the evolution results were compared with the formal definition of each system. The results indicate that this is indeed a viable area of research, as both Bacterial Programming and other different algorithms could be fitted to reverse engineer all of the considered systems.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668395
Ferenc Oláh, Kristóf Andrásfalvy, J. Lukács, R. Horváth
Sandwich composites have attracted a lot of attention in the past decade, and the significance of this new type of structure is indisputable. These materials have exceptional mechanical properties, and they seem to be the key to achieving the latest environmental objectives. The aviation and the automotive sectors have implemented composite structures in their designs because of their lightweight nature and considerable energy absorption property. Many types of sandwich structures can be observed in the industry. Still, one of the most important types is the honeycomb sandwich structure which combines a honeycomb-resembling core made of lightweight material, often aluminium, with fiber-reinforced plastic sheets as facings. In this paper, an overview of sandwich composite structures is presented, highlighting their cutting problems, and a structure under development is introduced. This structure has been designed and manufactured to research the machinability of sandwich structures in milling and scoring operations. Furthermore, the planned process for machining is discussed. In addition, milling tests were carried out with a unique honeycomb milling cutter with a total depth of cut to simulate the practical application of such a material. The milling experiments were designed and analysed according to the Design of Experiment (DOE) method.
{"title":"Manufacturing problems of sandwich composite structures","authors":"Ferenc Oláh, Kristóf Andrásfalvy, J. Lukács, R. Horváth","doi":"10.1109/CINTI53070.2021.9668395","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668395","url":null,"abstract":"Sandwich composites have attracted a lot of attention in the past decade, and the significance of this new type of structure is indisputable. These materials have exceptional mechanical properties, and they seem to be the key to achieving the latest environmental objectives. The aviation and the automotive sectors have implemented composite structures in their designs because of their lightweight nature and considerable energy absorption property. Many types of sandwich structures can be observed in the industry. Still, one of the most important types is the honeycomb sandwich structure which combines a honeycomb-resembling core made of lightweight material, often aluminium, with fiber-reinforced plastic sheets as facings. In this paper, an overview of sandwich composite structures is presented, highlighting their cutting problems, and a structure under development is introduced. This structure has been designed and manufactured to research the machinability of sandwich structures in milling and scoring operations. Furthermore, the planned process for machining is discussed. In addition, milling tests were carried out with a unique honeycomb milling cutter with a total depth of cut to simulate the practical application of such a material. The milling experiments were designed and analysed according to the Design of Experiment (DOE) method.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668383
Nina Györfi, A. Vereczkei, Z. Karádi, Károly Kalmár Nagy, Zoltán Vízvári, Zoltan Sári, P. Odry, Adrián Róbert Gál, Attila Tóth
Our publication presents the next important milestone in development of method aimed at the nondestructive diagnosis of Non-alcoholic Fatty Liver Disease (NAFLD). In clinical trials, a specific group of patients (with liver and other carcinomas) were studied. In their case, liver histological examinations are always carried out, which has given us the opportunity to compare bioimpedance spectrum (BIS) data with biopsy results. In our publication, we present the relevant measurement methodology after that we highlight some typical examples that describe the most common pathologies and their associated BIS origins.
{"title":"The next milestone in clinical trial of a measurement system developed to diagnose NAFLD","authors":"Nina Györfi, A. Vereczkei, Z. Karádi, Károly Kalmár Nagy, Zoltán Vízvári, Zoltan Sári, P. Odry, Adrián Róbert Gál, Attila Tóth","doi":"10.1109/CINTI53070.2021.9668383","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668383","url":null,"abstract":"Our publication presents the next important milestone in development of method aimed at the nondestructive diagnosis of Non-alcoholic Fatty Liver Disease (NAFLD). In clinical trials, a specific group of patients (with liver and other carcinomas) were studied. In their case, liver histological examinations are always carried out, which has given us the opportunity to compare bioimpedance spectrum (BIS) data with biopsy results. In our publication, we present the relevant measurement methodology after that we highlight some typical examples that describe the most common pathologies and their associated BIS origins.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668609
Simon Weinand, Philipp Rosenberger
This article refers to blackbox-tests of software solutions creating digital twins. The criteria to be assessed are the low-threshold application and the adaptability of the programmes to changing requirements defined in the context of a case study. Instead of simulating a production line through its digital twin, the goal is to simulate a 3D printer within the tested programmes. This approach is selected to evaluate to which extent the software solutions are modifiable according to the changed applicated purpose. A catalogue of criteria, in which twelve requirements are defined, serves as a guideline for creating the digital twins and for testing the programmes simultaneously. Digital twins of the 3D printer are beeing created by implementing and validating the requirements in each of the programmes. While creating the digital twins of the 3D printer it is verified that digital-twin-software dealing with the simulation of production lines is also useful to simulate other systems such as a 3D printer. Finally chances and challenges of digital-twin-software are pointed out and discussed.
{"title":"Digital-Twin-Software Areas of Application, Chances and Challenges","authors":"Simon Weinand, Philipp Rosenberger","doi":"10.1109/CINTI53070.2021.9668609","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668609","url":null,"abstract":"This article refers to blackbox-tests of software solutions creating digital twins. The criteria to be assessed are the low-threshold application and the adaptability of the programmes to changing requirements defined in the context of a case study. Instead of simulating a production line through its digital twin, the goal is to simulate a 3D printer within the tested programmes. This approach is selected to evaluate to which extent the software solutions are modifiable according to the changed applicated purpose. A catalogue of criteria, in which twelve requirements are defined, serves as a guideline for creating the digital twins and for testing the programmes simultaneously. Digital twins of the 3D printer are beeing created by implementing and validating the requirements in each of the programmes. While creating the digital twins of the 3D printer it is verified that digital-twin-software dealing with the simulation of production lines is also useful to simulate other systems such as a 3D printer. Finally chances and challenges of digital-twin-software are pointed out and discussed.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131325719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668353
Zoltán Vízvári, Nina Gyorfi, Kitti Mintál, Z. Karádi, Attila Tóth, Zoltan Sári, P. Odry, G. Eigner, L. Kovács, V. Léner, Lilla Hámori, András Füredi
Breast cancer is one of the most common causes of death in women, therefore early diagnosis of the tumor and continuous monitoring of the therapeutic response are essential for the successful treatment. Bioimpedance spectrum is a completely new oncological biomarker that could support early diagnosis, personalized cancer therapy and medical decision-making. The aim of this project is to develop a bioimpedance spectroscopy (BIS) -based diagnostic device and associated measurement protocols that can detect the emergence of primary tumors, track their growth and response to therapy with the same reproducibility and reliability as the currently used medical imaging methods like CT, MRI, US or PET. Due to the sensitivity and limitations of the BIS method were not yet fully known, the suitability of our novel measuring instrument for monitoring tumor growth was investigated using a genetically engineered mouse model of breast cancer. The following article describes the pilot experiment and its promising preliminary results examining breast cancer.
{"title":"Development of non-invasive, bioimpedance-based measuring device for primary tumor detection","authors":"Zoltán Vízvári, Nina Gyorfi, Kitti Mintál, Z. Karádi, Attila Tóth, Zoltan Sári, P. Odry, G. Eigner, L. Kovács, V. Léner, Lilla Hámori, András Füredi","doi":"10.1109/CINTI53070.2021.9668353","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668353","url":null,"abstract":"Breast cancer is one of the most common causes of death in women, therefore early diagnosis of the tumor and continuous monitoring of the therapeutic response are essential for the successful treatment. Bioimpedance spectrum is a completely new oncological biomarker that could support early diagnosis, personalized cancer therapy and medical decision-making. The aim of this project is to develop a bioimpedance spectroscopy (BIS) -based diagnostic device and associated measurement protocols that can detect the emergence of primary tumors, track their growth and response to therapy with the same reproducibility and reliability as the currently used medical imaging methods like CT, MRI, US or PET. Due to the sensitivity and limitations of the BIS method were not yet fully known, the suitability of our novel measuring instrument for monitoring tumor growth was investigated using a genetically engineered mouse model of breast cancer. The following article describes the pilot experiment and its promising preliminary results examining breast cancer.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128824648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668419
J. Kovecses
Contact tasks represent the most challenging elements of robotic operations. Simulation of such operations is a key element in space robotic applications and also sim-to-real transfer in reinforcement learning. Complex unilateral contact interfaces, friction, diversity of material properties are among the many contributors that make such robotic tasks extremely difficult to realistically reproduce in simulation and in virtual environments in general. In this presentation, we describe and demonstrate simulation methods for such complex robotic systems and tasks in the context of space robotic operations. The techniques rely on the concept of system decomposition and real-time interfacing using co-simulation. We will introduce the concept of model-based coupling that can significantly enhance the performance and accuracy of real-time simulation. Challenging space robotic contact tasks, such as grasping and insertion with jamming, will be used to illustrate the methods and their performance.
{"title":"Simulation Aspects and Challenges for Space Robotic Systems","authors":"J. Kovecses","doi":"10.1109/CINTI53070.2021.9668419","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668419","url":null,"abstract":"Contact tasks represent the most challenging elements of robotic operations. Simulation of such operations is a key element in space robotic applications and also sim-to-real transfer in reinforcement learning. Complex unilateral contact interfaces, friction, diversity of material properties are among the many contributors that make such robotic tasks extremely difficult to realistically reproduce in simulation and in virtual environments in general. In this presentation, we describe and demonstrate simulation methods for such complex robotic systems and tasks in the context of space robotic operations. The techniques rely on the concept of system decomposition and real-time interfacing using co-simulation. We will introduce the concept of model-based coupling that can significantly enhance the performance and accuracy of real-time simulation. Challenging space robotic contact tasks, such as grasping and insertion with jamming, will be used to illustrate the methods and their performance.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668440
Mera Saulaiman, M. Kozlovszky, Á. Csilling
In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.
{"title":"A Survey on Vulnerabilities and Classification of Cyber-Attacks on 5G-V2X","authors":"Mera Saulaiman, M. Kozlovszky, Á. Csilling","doi":"10.1109/CINTI53070.2021.9668440","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668440","url":null,"abstract":"In the Advent of Vehicular Communion as an essential part of autonomous driving, and the demanding requirements and services for autonomous driving, a new technology is needed to fulfill those needs. The new features of 5G and NR-5G enables it as the platform of choice for sensors and vehicles. It fulfills the requirements of vehicular networks and vehicle-to-everything (V2X) services. The Third Generation Partnership Project (3GPP) Release 14 and above addresses the requirements of V2X services with standardized services for the current LTE and upcoming 5G-NR technologies. On the other hand, due to its novelty, serious security and privacy concerns were raised. Wireless interfaces on vehicles create the possibility for attackers to remotely access vehicles. In this paper, we present an organized view of the existing 5G- V2X communication technologies, including V2X history, architecture, communication and use cases, We explore the different attacks and vulnerabilities on 5G-V2X, and present a comprehensive classification based on the combination of various criteria found in the literature. Lastly we discuss the possible direction of future research related to security issues in V2X communication.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668407
D. Drexler, I. Nagy, V. Romanovski
Model-based therapy generation can open new horizons in medicine. Cancer chemotherapy can be optimized using control theoretic methods based on mathematical models of tumor growth. We carry out the qualitative analysis of such a model using the simplest control scheme, i.e., P type control. We look for bifurcations for realistic values of tumor parameters. We show that it is possible to have bifurcations in the closed-loop system, and the qualitative behaviour depends on the initial conditions, and it is independent of the control gain. The analysis shows that the system has rich dynamics and the model can be used to reproduce complex phenomena occurring during real therapies.
{"title":"Bifurcations in a closed-loop model of tumor growth control","authors":"D. Drexler, I. Nagy, V. Romanovski","doi":"10.1109/CINTI53070.2021.9668407","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668407","url":null,"abstract":"Model-based therapy generation can open new horizons in medicine. Cancer chemotherapy can be optimized using control theoretic methods based on mathematical models of tumor growth. We carry out the qualitative analysis of such a model using the simplest control scheme, i.e., P type control. We look for bifurcations for realistic values of tumor parameters. We show that it is possible to have bifurcations in the closed-loop system, and the qualitative behaviour depends on the initial conditions, and it is independent of the control gain. The analysis shows that the system has rich dynamics and the model can be used to reproduce complex phenomena occurring during real therapies.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124685909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668494
Róbert Kovács, Gergely Kún, László Nádai, P. J. Varga, Sándor Gvánvi, Tibor Wuhrl, Kristóf Mószáros
At Kandó Kálmán Faculty of Electrical Engineering, Obuda University, we have a long history of mobile communication research. Several mobile communication research projects were carried out in our 4G LTE laboratory at our institute - Institute of Telecommunications. Nowadays, standardization of 5G has developed and we could start teaching network systems based on this technology in both BSc and MSc courses. In cooperation with industry partners, we have launched 5G research projects focusing primarily on 5G NR and 5G RAN. NBSZ (Nemzetblztonsági Szakszolgálat - Special Service For National Security) and we have started 5G RAN vulnerability research first, by developing the needed infrastructure. This article presents the tools, the goals and the foundations of the research.
{"title":"5G research in Kandó","authors":"Róbert Kovács, Gergely Kún, László Nádai, P. J. Varga, Sándor Gvánvi, Tibor Wuhrl, Kristóf Mószáros","doi":"10.1109/CINTI53070.2021.9668494","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668494","url":null,"abstract":"At Kandó Kálmán Faculty of Electrical Engineering, Obuda University, we have a long history of mobile communication research. Several mobile communication research projects were carried out in our 4G LTE laboratory at our institute - Institute of Telecommunications. Nowadays, standardization of 5G has developed and we could start teaching network systems based on this technology in both BSc and MSc courses. In cooperation with industry partners, we have launched 5G research projects focusing primarily on 5G NR and 5G RAN. NBSZ (Nemzetblztonsági Szakszolgálat - Special Service For National Security) and we have started 5G RAN vulnerability research first, by developing the needed infrastructure. This article presents the tools, the goals and the foundations of the research.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132494164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-18DOI: 10.1109/CINTI53070.2021.9668499
Ogbolu Melvin Omone, M. Kucarov, Abdallah Benhamida, Miklós Vincze, M. Kozlovszky
The technology behind the provision of software services for the utilization of all related geographical raw data and processed information is known as Location-based Services (LBS). The raw data and processed information which are provided based on geographic location are presented in realtime; thus, the medium of transfer is possible through wireless communication networks and other forms of network clients (wired communication network). Early 2020, the impact of fifth generation (5G) network on Location-based Services (LBS) has been on the rise with improvements in the level of accuracy, speed in delivery, and the provision of information with Global Positioning System (GPS). In this paper, the application of Location-based Services (LBS) in fifth generation (5G) network as regards cybersecurity is being explored and emphasized. The use of the fifth generation (5G) network to curtail/prevent cybersecurity vulnerabilities (such as fraud, protection from known/unknown threats, data loss prevention, and privacy breach in the branch of cybersecurity) on businesses, the government, across all sectors, and individuals are extensively explained in this paper.
{"title":"Cybersecurity Aspects of Location-Based Services (LBS) in 5G Networks","authors":"Ogbolu Melvin Omone, M. Kucarov, Abdallah Benhamida, Miklós Vincze, M. Kozlovszky","doi":"10.1109/CINTI53070.2021.9668499","DOIUrl":"https://doi.org/10.1109/CINTI53070.2021.9668499","url":null,"abstract":"The technology behind the provision of software services for the utilization of all related geographical raw data and processed information is known as Location-based Services (LBS). The raw data and processed information which are provided based on geographic location are presented in realtime; thus, the medium of transfer is possible through wireless communication networks and other forms of network clients (wired communication network). Early 2020, the impact of fifth generation (5G) network on Location-based Services (LBS) has been on the rise with improvements in the level of accuracy, speed in delivery, and the provision of information with Global Positioning System (GPS). In this paper, the application of Location-based Services (LBS) in fifth generation (5G) network as regards cybersecurity is being explored and emphasized. The use of the fifth generation (5G) network to curtail/prevent cybersecurity vulnerabilities (such as fraud, protection from known/unknown threats, data loss prevention, and privacy breach in the branch of cybersecurity) on businesses, the government, across all sectors, and individuals are extensively explained in this paper.","PeriodicalId":340545,"journal":{"name":"2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122378133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}