首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
Software development for controlling a group of UAVs 控制一组无人机的软件开发
V. Vishnevsky, A. Larionov, Maxim Zvyagin, T. Dinh, Anton Ovchinnikov, R. Kirichek
In recent years, the market for UAV is actively developing as new ways of using UAVs for both personal and industrial applications are being discovered. Many of their core differences allow employment of UAVs in greater numbers than their manned counterparts. A variety of tasks can be accomplished more efficiently by simultaneous usage of multiple UAVs, but this requires a high level of coordination between UAVs. This article discusses features, approaches, and algorithms of UAV group interaction and describes the developed software for centralized control of a small group of UAVs without direct communication between the group members.
近年来,随着个人和工业应用中使用无人机的新方式被发现,无人机市场正在积极发展。它们的许多核心差异允许使用无人机的数量比载人同行更多。通过同时使用多架无人机可以更有效地完成各种任务,但这需要无人机之间的高水平协调。本文讨论了无人机群交互的特点、方法和算法,并描述了开发的一种软件,用于在群成员之间不直接通信的情况下集中控制一小群无人机。
{"title":"Software development for controlling a group of UAVs","authors":"V. Vishnevsky, A. Larionov, Maxim Zvyagin, T. Dinh, Anton Ovchinnikov, R. Kirichek","doi":"10.1145/3440749.3442614","DOIUrl":"https://doi.org/10.1145/3440749.3442614","url":null,"abstract":"In recent years, the market for UAV is actively developing as new ways of using UAVs for both personal and industrial applications are being discovered. Many of their core differences allow employment of UAVs in greater numbers than their manned counterparts. A variety of tasks can be accomplished more efficiently by simultaneous usage of multiple UAVs, but this requires a high level of coordination between UAVs. This article discusses features, approaches, and algorithms of UAV group interaction and describes the developed software for centralized control of a small group of UAVs without direct communication between the group members.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Face Recognition and Temperature Measurement Based on Deep Learning for Covid-19 Quarantine Checkpoint 基于深度学习的Covid-19隔离检查点人脸识别和温度测量
Vu Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joo-Yeon Choi
The human temperature measurement system has been widely applying in hospitals and public areas during the widespread Covid-19 pandemic. However, the current systems in the quarantine checkpoint are only capable of measuring the human temperature; however, it can not combine with the identification of facial recognition, human temperature information, and wearing mask detection. In addition, in the hospitals as well as the public areas such as schools, libraries, train stations, airports, etc. facial recognition of employees combined with temperature measurement and masking will save the time check and update employee status immediately. This study proposes a method that combines body temperature measurement, facial recognition, and masking based on deep learning. Furthermore, the proposed method adds the ability to prevent spoofing between a real face and face-in-image recognition. A depth camera is used in the proposed system to measure and calculate the length between the human's face and camera to approach the best accuracy of facial recognition and anti-spoofing. Moreover, a low-cost thermal camera measures the human body temperature. The methodology and algorithm for the human face and body temperature recognition are validated through the experimental results.
在新冠肺炎大流行期间,人体体温测量系统在医院和公共场所得到了广泛应用。然而,目前检疫检查站的系统只能测量人体体温;但是,它不能与人脸识别、人体温度信息、戴口罩检测等识别相结合。此外,在医院以及学校、图书馆、火车站、机场等公共场所,对员工进行面部识别,结合测温和口罩,可以节省检查时间,及时更新员工状态。本研究提出了一种基于深度学习的体温测量、面部识别和掩蔽相结合的方法。此外,该方法还增加了防止真实人脸和图像中人脸识别之间欺骗的能力。该系统采用深度相机测量和计算人脸与相机之间的距离,以达到最佳的人脸识别精度和防欺骗。此外,一种低成本的热像仪可以测量人体温度。实验结果验证了人脸和体温识别的方法和算法。
{"title":"Human Face Recognition and Temperature Measurement Based on Deep Learning for Covid-19 Quarantine Checkpoint","authors":"Vu Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joo-Yeon Choi","doi":"10.1145/3440749.3442654","DOIUrl":"https://doi.org/10.1145/3440749.3442654","url":null,"abstract":"The human temperature measurement system has been widely applying in hospitals and public areas during the widespread Covid-19 pandemic. However, the current systems in the quarantine checkpoint are only capable of measuring the human temperature; however, it can not combine with the identification of facial recognition, human temperature information, and wearing mask detection. In addition, in the hospitals as well as the public areas such as schools, libraries, train stations, airports, etc. facial recognition of employees combined with temperature measurement and masking will save the time check and update employee status immediately. This study proposes a method that combines body temperature measurement, facial recognition, and masking based on deep learning. Furthermore, the proposed method adds the ability to prevent spoofing between a real face and face-in-image recognition. A depth camera is used in the proposed system to measure and calculate the length between the human's face and camera to approach the best accuracy of facial recognition and anti-spoofing. Moreover, a low-cost thermal camera measures the human body temperature. The methodology and algorithm for the human face and body temperature recognition are validated through the experimental results.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"89 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131527046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes 基于密文策略属性加密的智能家居访问控制安全模型
Hmdah Alsolami, O. Bamasag, A. Aljahdali
IoT devices are known to be small, with limited computational and energy capacity. The proliferation of these connected devices and the vulnerabilities resulted from their limitations could lead to threats such as leakage of sensitive information and privacy breach problems. The amount of data generated and transmitted through the IoT is substantial, where this data can be accessed by external entities. Therefore, it is necessary to have an encryption-based system that guarantees the security of this data from unauthorized access. In this paper, we propose Ciphertext Policy Attribute-Based Encryption (CP-ABE) as an encryption solution for data in transit or stored. The proposed solution aims to secure the access control at all layers of communication using (CP-ABE). To evaluate the proposed method, we have conducted performance comparison in every layer of our proposed network topology by measuring the power consumption, After testing the encryption on layers, there is a better layer in performance in terms of the power consumption, and therefore it is better to apply the encryption based on performance measurements by custom simulator that combines the CP-ABE and Internet of Things and Fog Simulation (iFogsim).
众所周知,物联网设备很小,计算和能量容量有限。这些连接设备的激增及其局限性导致的漏洞可能导致敏感信息泄露和隐私泄露等威胁。通过物联网生成和传输的数据量是巨大的,这些数据可以被外部实体访问。因此,有必要有一个基于加密的系统来保证这些数据的安全性,防止未经授权的访问。在本文中,我们提出了基于密文策略属性的加密(CP-ABE)作为传输或存储数据的加密解决方案。提出的解决方案旨在使用(CP-ABE)保护所有通信层的访问控制。为了评估所提出的方法,我们通过测量功耗对所提出的网络拓扑的每一层进行了性能比较,在测试了层上的加密后,在功耗方面有一个更好的层,因此更好地应用基于性能测量的加密,该性能测量基于自定义模拟器结合了pc - abe和物联网和雾仿真(iFogsim)。
{"title":"A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes","authors":"Hmdah Alsolami, O. Bamasag, A. Aljahdali","doi":"10.1145/3440749.3442598","DOIUrl":"https://doi.org/10.1145/3440749.3442598","url":null,"abstract":"IoT devices are known to be small, with limited computational and energy capacity. The proliferation of these connected devices and the vulnerabilities resulted from their limitations could lead to threats such as leakage of sensitive information and privacy breach problems. The amount of data generated and transmitted through the IoT is substantial, where this data can be accessed by external entities. Therefore, it is necessary to have an encryption-based system that guarantees the security of this data from unauthorized access. In this paper, we propose Ciphertext Policy Attribute-Based Encryption (CP-ABE) as an encryption solution for data in transit or stored. The proposed solution aims to secure the access control at all layers of communication using (CP-ABE). To evaluate the proposed method, we have conducted performance comparison in every layer of our proposed network topology by measuring the power consumption, After testing the encryption on layers, there is a better layer in performance in terms of the power consumption, and therefore it is better to apply the encryption based on performance measurements by custom simulator that combines the CP-ABE and Internet of Things and Fog Simulation (iFogsim).","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123603019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model 基于混合NoSQL数据库模型的企业网络Stego-Insiders检测
Igor Kotenko, A. Krasov, I. Ushakov, K. Izrailov
The paper describes the hybrid model of a NoSQL database for storing and subsequent processing of attributes of users, applications, devices, packets containing information on the use of steganographic methods to search for the insiders in corporate networks. Experiments were carried out with data on the network activity of users.
本文描述了一个NoSQL数据库的混合模型,用于存储和后续处理用户、应用程序、设备、包含信息的数据包的属性,以及使用隐写方法在企业网络中搜索内部人员。利用用户的网络活动数据进行实验。
{"title":"Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model","authors":"Igor Kotenko, A. Krasov, I. Ushakov, K. Izrailov","doi":"10.1145/3440749.3442612","DOIUrl":"https://doi.org/10.1145/3440749.3442612","url":null,"abstract":"The paper describes the hybrid model of a NoSQL database for storing and subsequent processing of attributes of users, applications, devices, packets containing information on the use of steganographic methods to search for the insiders in corporate networks. Experiments were carried out with data on the network activity of users.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Polygons characterizing the joint statistical properties of the input and output sequences of the binary shift register 描述二进制移位寄存器输入和输出序列联合统计特性的多边形
S. Melnikov, K. Samouylov
Binary non-autonomous shift registers, which are widely used as intermediate nodes in cascade pseudo-random sequence generators, are considered. The joint statistical properties of the symbols of the input and output sequences of such registers are studied depending on the used output function. A geometric approach is proposed for description of such properties, within the framework of which the output function can be characterized by its polygon in the unit square [0, 1] × [0, 1]. The properties of such polygons and their relationship with the properties of the used output function are investigated.
考虑了在级联伪随机序列发生器中广泛用作中间节点的二进制非自治移位寄存器。根据所使用的输出函数,研究了这类寄存器的输入和输出序列符号的联合统计性质。提出了一种几何方法来描述这些性质,在该框架内,输出函数可以用其在单位平方[0,1]×[0,1]中的多边形来表征。研究了这种多边形的性质及其与所使用的输出函数性质的关系。
{"title":"Polygons characterizing the joint statistical properties of the input and output sequences of the binary shift register","authors":"S. Melnikov, K. Samouylov","doi":"10.1145/3440749.3442601","DOIUrl":"https://doi.org/10.1145/3440749.3442601","url":null,"abstract":"Binary non-autonomous shift registers, which are widely used as intermediate nodes in cascade pseudo-random sequence generators, are considered. The joint statistical properties of the symbols of the input and output sequences of such registers are studied depending on the used output function. A geometric approach is proposed for description of such properties, within the framework of which the output function can be characterized by its polygon in the unit square [0, 1] × [0, 1]. The properties of such polygons and their relationship with the properties of the used output function are investigated.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc Networks 基于鱼眼状态路由的无人机自组织飞行网络路由形成
Muhammad Abul Hassan, Syed Irfan Ullah, I. Khan, Syed Bilal Hussain Shah, Abdus Salam, A. Khan
Flying Ad-hoc Networks creates rapid topology changes that causes routing problems between Unmanned Aerial Vehicle and ground base station. Mobile Ad-hoc networks and Vehicular Ad-hoc network protocols are conventionally adopted to overcome routing issues. But Still, they do not fully address the routing problem in Flying Ad-hoc Networks. In this paper, Fisheye state routing protocol is implemented and evaluated to fully overcome routing issues in a Flying Ad-hoc Network and fully utilize the limited resource of Unmanned Aerial Vehicles. Performance evaluation is measured in terms of throughput, average end-to-end delay, packet drop analysis as congestion measure with Ad-Hoc On-Demand Distance Vector (AODV), Distance Sequence Distance Vector (DSDV), Optimized Link State Routing (OLSR), Temporary Ordered Routing Protocol (TORA) and Dynamic Source Routing (DSR). Fisheye state routing protocol showed promising results regarding throughput, packet drop rate, and average end-to-end delay compared with traditional protocols. Moreover, with the suggested improvement of the parameters, network lifetime is increased, and resources harvesting becomes under control.
飞行自组织网络造成快速拓扑变化,导致无人机和地面基站之间的路由问题。移动Ad-hoc网络和车载Ad-hoc网络协议通常被用来克服路由问题。但是,它们仍然不能完全解决飞行Ad-hoc网络中的路由问题。本文对鱼眼状态路由协议进行了实现和评估,以充分克服飞行自组织网络中的路由问题,充分利用无人机有限的资源。性能评估是根据吞吐量、平均端到端延迟、分组丢包分析作为拥塞度量来衡量的,包括Ad-Hoc按需距离矢量(AODV)、距离序列距离矢量(DSDV)、优化链路状态路由(OLSR)、临时有序路由协议(TORA)和动态源路由(DSR)。与传统协议相比,鱼眼状态路由协议在吞吐量、丢包率和平均端到端延迟方面表现出了令人满意的结果。此外,通过对这些参数的改进,可以提高网络的生存期,并且可以控制资源的收集。
{"title":"Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc Networks","authors":"Muhammad Abul Hassan, Syed Irfan Ullah, I. Khan, Syed Bilal Hussain Shah, Abdus Salam, A. Khan","doi":"10.1145/3440749.3442600","DOIUrl":"https://doi.org/10.1145/3440749.3442600","url":null,"abstract":"Flying Ad-hoc Networks creates rapid topology changes that causes routing problems between Unmanned Aerial Vehicle and ground base station. Mobile Ad-hoc networks and Vehicular Ad-hoc network protocols are conventionally adopted to overcome routing issues. But Still, they do not fully address the routing problem in Flying Ad-hoc Networks. In this paper, Fisheye state routing protocol is implemented and evaluated to fully overcome routing issues in a Flying Ad-hoc Network and fully utilize the limited resource of Unmanned Aerial Vehicles. Performance evaluation is measured in terms of throughput, average end-to-end delay, packet drop analysis as congestion measure with Ad-Hoc On-Demand Distance Vector (AODV), Distance Sequence Distance Vector (DSDV), Optimized Link State Routing (OLSR), Temporary Ordered Routing Protocol (TORA) and Dynamic Source Routing (DSR). Fisheye state routing protocol showed promising results regarding throughput, packet drop rate, and average end-to-end delay compared with traditional protocols. Moreover, with the suggested improvement of the parameters, network lifetime is increased, and resources harvesting becomes under control.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modified Indexing Algorithm based on Priority Queue in Metric Space for MVP Tree 基于度量空间优先队列的MVP树改进索引算法
Vladimir Fomin, I. Aleksandrov, D. Gallyamov, R. Kirichek
The Internet of Things (IoT) algorithms process huge amounts of heterogeneous data in real-time. One of the most computationally intensive tasks using cloud technologies is the task of clustering and classifying data. The authors propose to develop an approach to data classification within the “Query by Similarity” paradigm, which uses the technology of data indexing based on Metric Access Methods (MAM). To improve the performance of data indexing, this paper proposes a similar nearest neighbor search method combining a multiple vantage point tree (MVP) and improved algorithms for processing the priority queue of nodes. The following two algorithms for processing the priority queue of nodes were developed: 1) algorithm for all kinds of points-queries, which makes it possible to take into account parent nodes of all higher levels; 2) algorithm for grouped based on clustering of points-queries by reusing previously obtained search results. Experimental results confirm the effectiveness of the proposed approaches and algorithms.
物联网(IoT)算法实时处理大量异构数据。使用云技术计算最密集的任务之一是数据聚类和分类任务。作者提出了一种基于度量访问方法(Metric Access Methods, MAM)的数据索引技术在“相似性查询”范式下进行数据分类的方法。为了提高数据索引的性能,本文提出了一种结合多有利点树(MVP)和改进算法的类似最近邻搜索方法来处理节点的优先级队列。开发了以下两种处理节点优先级队列的算法:1)各种点查询的算法,可以兼顾所有更高层次的父节点;2)基于点查询聚类的分组算法,通过重用先前获得的搜索结果。实验结果验证了所提方法和算法的有效性。
{"title":"Modified Indexing Algorithm based on Priority Queue in Metric Space for MVP Tree","authors":"Vladimir Fomin, I. Aleksandrov, D. Gallyamov, R. Kirichek","doi":"10.1145/3440749.3442617","DOIUrl":"https://doi.org/10.1145/3440749.3442617","url":null,"abstract":"The Internet of Things (IoT) algorithms process huge amounts of heterogeneous data in real-time. One of the most computationally intensive tasks using cloud technologies is the task of clustering and classifying data. The authors propose to develop an approach to data classification within the “Query by Similarity” paradigm, which uses the technology of data indexing based on Metric Access Methods (MAM). To improve the performance of data indexing, this paper proposes a similar nearest neighbor search method combining a multiple vantage point tree (MVP) and improved algorithms for processing the priority queue of nodes. The following two algorithms for processing the priority queue of nodes were developed: 1) algorithm for all kinds of points-queries, which makes it possible to take into account parent nodes of all higher levels; 2) algorithm for grouped based on clustering of points-queries by reusing previously obtained search results. Experimental results confirm the effectiveness of the proposed approaches and algorithms.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence 一种高效安全的基于DNA序列的指纹认证隐藏技术
Wala'a Al-Ahmadi, A. Aljahdali, A. Munshi
Information security is earning more attention due to the increase in the size of the data being exchanged over the network. One of the suggested solutions to preserve the secrecy is the cryptography of the information by turning them into codes before the data transfer. The stenographic technique is another way to protect the information, and it is based on hiding the information from the advisory. Cryptography and steganography are methods that allow the information to be sent securely. Current studies suggest that the integration of cryptography and steganography techniques will provide more security and confidentiality compared with the application of each technique individually. The DNA steganography uses the DNA sequence as a carrier to enable secure transfer of the critical data. The principle of this technique is basically to encrypt and conceal messages within high capacity of DNA strands to prevent adversaries from reading and deciphering the messages. This research intends to develop a technique that integrates the sciences of steganography and cryptography to protect the secret fingerprint image in the communication channel and to preserve the confidentiality of the information.
由于在网络上交换的数据量的增加,信息安全越来越受到关注。建议的保密解决方案之一是在数据传输之前将信息转换为代码,从而对信息进行加密。速记技术是另一种保护信息的方法,它是建立在隐藏信息的基础上的。密码学和隐写术是允许安全地发送信息的方法。目前的研究表明,将密码学和隐写技术结合起来使用比单独使用更具有安全性和保密性。DNA隐写术使用DNA序列作为载体,实现关键数据的安全传输。这种技术的原理基本上是在高容量的DNA链中加密和隐藏信息,以防止对手读取和破译信息。本研究旨在开发一种融合隐写术与密码学的技术,以保护通信信道中的秘密指纹图像,并保持信息的机密性。
{"title":"An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence","authors":"Wala'a Al-Ahmadi, A. Aljahdali, A. Munshi","doi":"10.1145/3440749.3442639","DOIUrl":"https://doi.org/10.1145/3440749.3442639","url":null,"abstract":"Information security is earning more attention due to the increase in the size of the data being exchanged over the network. One of the suggested solutions to preserve the secrecy is the cryptography of the information by turning them into codes before the data transfer. The stenographic technique is another way to protect the information, and it is based on hiding the information from the advisory. Cryptography and steganography are methods that allow the information to be sent securely. Current studies suggest that the integration of cryptography and steganography techniques will provide more security and confidentiality compared with the application of each technique individually. The DNA steganography uses the DNA sequence as a carrier to enable secure transfer of the critical data. The principle of this technique is basically to encrypt and conceal messages within high capacity of DNA strands to prevent adversaries from reading and deciphering the messages. This research intends to develop a technique that integrates the sciences of steganography and cryptography to protect the secret fingerprint image in the communication channel and to preserve the confidentiality of the information.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Decentralization 网络分散
A. Koucheryavy
There are three interrelated concepts of development of telecommunication networks today: 5G, 6G and Network 2030. The creation of fifth-generation telecommunication networks is the first step towards a fundamental modernization of telecommunication networks towards the emergence of ultra-highly reliable networks with ultra-low delays [3]. Ultra low delays due to fundamental restrictions on the speed of propagation of light lead to decentralization of the network and create preconditions for the decentralization of the economy. If the delay is limited to a value of, for example, 1ms, taking into account the application of this value to the two-way delay and assuming the use of modern high-bandwidth systems as transmission systems, the network range for providing, for example, Tactile Internet services is limited to about 50 km [1, 2]. This means that the operator’s resources (for example, data centers) in communication networks with ultra low latency should be located, if possible, in the center of a circle with a radius of 50 km. This is the decentralization of the network. The Russian Federation will need at least 6-8 thousand data processing centers installed, including in district centers. Naturally, along with it, the economy will decentralize by reducing the digital divide between different territories, which is one of the main tasks of building the state’s digital economy. This process will already begin with the introduction of sixth generation telecommunication networks. One of the most important applications for 2030 networks is the widespread use and distribution of avatars and human holographic copies to reproduce and perform the actions of the person who controls them (telepresence). These networks should effectively reduce the digital device between territories, as well as effectively resist pandemic-like phenomena through telepresence services.
当今电信网络的发展有三个相互关联的概念:5G、6G和网络2030。第五代电信网络的创建是电信网络基本现代化的第一步,朝着出现超低延迟的超高可靠网络迈出了第一步。由于对光传播速度的基本限制,超低延迟导致了网络的去中心化,为经济的去中心化创造了先决条件。如果延迟被限制为一个值,例如1ms,考虑到该值对双向延迟的应用,并假设使用现代高带宽系统作为传输系统,则提供(例如,触觉互联网服务)的网络范围被限制在约50公里[1,2]。这意味着运营商在超低延迟通信网络中的资源(例如数据中心)应尽可能位于半径为50公里的圆圈中心。这就是网络的去中心化。俄罗斯联邦将需要安装至少6-8千个数据处理中心,包括在地区中心。自然,与此同时,通过减少不同地区之间的数字鸿沟,经济将分散,这是建设国家数字经济的主要任务之一。这一进程将随着第六代电信网络的引入而开始。2030年网络最重要的应用之一是广泛使用和分发化身和人类全息副本,以复制和执行控制他们的人的行动(远程呈现)。这些网络应有效减少地区之间的数字设备,并通过网真服务有效抵御类似流行病的现象。
{"title":"Network Decentralization","authors":"A. Koucheryavy","doi":"10.1145/3440749.3442648","DOIUrl":"https://doi.org/10.1145/3440749.3442648","url":null,"abstract":"There are three interrelated concepts of development of telecommunication networks today: 5G, 6G and Network 2030. The creation of fifth-generation telecommunication networks is the first step towards a fundamental modernization of telecommunication networks towards the emergence of ultra-highly reliable networks with ultra-low delays [3]. Ultra low delays due to fundamental restrictions on the speed of propagation of light lead to decentralization of the network and create preconditions for the decentralization of the economy. If the delay is limited to a value of, for example, 1ms, taking into account the application of this value to the two-way delay and assuming the use of modern high-bandwidth systems as transmission systems, the network range for providing, for example, Tactile Internet services is limited to about 50 km [1, 2]. This means that the operator’s resources (for example, data centers) in communication networks with ultra low latency should be located, if possible, in the center of a circle with a radius of 50 km. This is the decentralization of the network. The Russian Federation will need at least 6-8 thousand data processing centers installed, including in district centers. Naturally, along with it, the economy will decentralize by reducing the digital divide between different territories, which is one of the main tasks of building the state’s digital economy. This process will already begin with the introduction of sixth generation telecommunication networks. One of the most important applications for 2030 networks is the widespread use and distribution of avatars and human holographic copies to reproduce and perform the actions of the person who controls them (telepresence). These networks should effectively reduce the digital device between territories, as well as effectively resist pandemic-like phenomena through telepresence services.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-Based DevOps of Software and Hardware Resources for Digital Twins of Infrastructural Objects 基于agent的基础设施对象数字孪生软硬件资源开发
R. Kostromin, A. Feoktistov
Nowadays, the problem of automating the software delivery processes and resource configuring in computing environments with parallel and distributed architectures to ensure the functioning of digital twins is highly relevant. A large spectrum of the well-known tools for software configuration management is available. However, most of them do not solve problems emerging in the considered subject domain fully. To this end, we propose a new framework for implementing preparing, debugging, delivering, testing, deploying, and configuring virtualized software of digital twins. Currently, we are developing such twins for analyzing the operation of environmentally friendly equipment of infrastructural objects located in the Baikal natural territory. The proposed framework is based on the integrated applying methods and tools of knowledge engineering, multi-agent technologies, conceptual and service-oriented programming, and administration of hybrid distributed computing systems. These systems can include both personal resources and resources of public access centers, grid systems, and cloud or fog platforms. We carried out the practical experiments with the framework prototype. The obtained results have shown that significant speedup in performing the aforementioned processes can be achieved.
目前,如何在并行和分布式架构的计算环境中实现软件交付过程和资源配置的自动化,以确保数字孪生的功能是一个非常重要的问题。有很多著名的软件配置管理工具可供使用。然而,它们中的大多数并不能完全解决所考虑的学科领域中出现的问题。为此,我们提出了一个新的框架来实现数字孪生虚拟软件的准备、调试、交付、测试、部署和配置。目前,我们正在开发这样的双胞胎,以分析位于贝加尔湖自然领土的基础设施对象的环保设备的运行。该框架基于知识工程、多智能体技术、概念编程和面向服务编程以及混合分布式计算系统管理的综合应用方法和工具。这些系统可以包括个人资源和公共访问中心、网格系统以及云或雾平台的资源。我们用框架原型进行了实际实验。所得结果表明,在执行上述过程中可以实现显着的加速。
{"title":"Agent-Based DevOps of Software and Hardware Resources for Digital Twins of Infrastructural Objects","authors":"R. Kostromin, A. Feoktistov","doi":"10.1145/3440749.3442599","DOIUrl":"https://doi.org/10.1145/3440749.3442599","url":null,"abstract":"Nowadays, the problem of automating the software delivery processes and resource configuring in computing environments with parallel and distributed architectures to ensure the functioning of digital twins is highly relevant. A large spectrum of the well-known tools for software configuration management is available. However, most of them do not solve problems emerging in the considered subject domain fully. To this end, we propose a new framework for implementing preparing, debugging, delivering, testing, deploying, and configuring virtualized software of digital twins. Currently, we are developing such twins for analyzing the operation of environmentally friendly equipment of infrastructural objects located in the Baikal natural territory. The proposed framework is based on the integrated applying methods and tools of knowledge engineering, multi-agent technologies, conceptual and service-oriented programming, and administration of hybrid distributed computing systems. These systems can include both personal resources and resources of public access centers, grid systems, and cloud or fog platforms. We carried out the practical experiments with the framework prototype. The obtained results have shown that significant speedup in performing the aforementioned processes can be achieved.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1