首页 > 最新文献

2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)最新文献

英文 中文
Sleep stage classification using fuzzy long short-term memory 模糊长短期记忆的睡眠阶段分类
I. Yulita, R. Rosadi, S. Purwani
This study investigates the performance of Fuzzy Long Short-Term Memory (FLSTM) for sleep stage classification. The proposed FLSTM consists of the Fuzzy C-Means Clustering which functions as feature representation, and Long Short-Term Memory (LSTM) as the final classifier. The performance was evaluated based on accuracy, precision, and F-measure by testing some cluster number values from Fuzzy C-Means Clustering. The output of this clustering becomes input for Long Short-Term Memory. The result shows that the best performance achieved when using as much as 9 clusters.
本研究探讨模糊长短期记忆(FLSTM)在睡眠阶段分类中的表现。本文提出的FLSTM由模糊c均值聚类和长短期记忆(LSTM)作为最终分类器组成。通过测试模糊c均值聚类的一些聚类数值,基于准确性、精密度和f测度对性能进行了评估。这种聚类的输出成为长短期记忆的输入。结果表明,当使用多达9个集群时,可以获得最佳性能。
{"title":"Sleep stage classification using fuzzy long short-term memory","authors":"I. Yulita, R. Rosadi, S. Purwani","doi":"10.1109/CAIPT.2017.8320661","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320661","url":null,"abstract":"This study investigates the performance of Fuzzy Long Short-Term Memory (FLSTM) for sleep stage classification. The proposed FLSTM consists of the Fuzzy C-Means Clustering which functions as feature representation, and Long Short-Term Memory (LSTM) as the final classifier. The performance was evaluated based on accuracy, precision, and F-measure by testing some cluster number values from Fuzzy C-Means Clustering. The output of this clustering becomes input for Long Short-Term Memory. The result shows that the best performance achieved when using as much as 9 clusters.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CUDA-based implementation of convolutional neural network 基于cuda的卷积神经网络实现
Sejin Choi, Kwang-yeob Lee
Training of the convolutional neural network (CNN) entails many iterative computations. In addition, as a depth of neural network has increased and the number of training data has become large in recent years, the amount of computation required for the training has also dramatically increased. The parallel operation using the hardware feature of general-purpose computing on graphics processing units (GPGPU) has been known to be suitable to be applied to neural networks. Accordingly, this paper proposed a method to improve a training time by parallelizing a training algorithm in the CNN using the Compute Unified Device Architecture (CUDA) capable of controlling NVIDIA GPGPU. The experiment result showed that the proposed method in this study improved about 2.5 times faster training speed than existing training method that makes use of only a single CPU.
卷积神经网络(CNN)的训练需要大量的迭代计算。此外,近年来随着神经网络深度的增加和训练数据量的增加,训练所需的计算量也急剧增加。利用图形处理单元(GPGPU)通用计算的硬件特性进行并行运算,已被认为适合应用于神经网络。因此,本文提出了一种利用能够控制NVIDIA GPGPU的计算统一设备架构(CUDA)在CNN中并行化训练算法以提高训练时间的方法。实验结果表明,本文方法的训练速度比现有仅使用单个CPU的训练方法提高了约2.5倍。
{"title":"A CUDA-based implementation of convolutional neural network","authors":"Sejin Choi, Kwang-yeob Lee","doi":"10.1109/CAIPT.2017.8320682","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320682","url":null,"abstract":"Training of the convolutional neural network (CNN) entails many iterative computations. In addition, as a depth of neural network has increased and the number of training data has become large in recent years, the amount of computation required for the training has also dramatically increased. The parallel operation using the hardware feature of general-purpose computing on graphics processing units (GPGPU) has been known to be suitable to be applied to neural networks. Accordingly, this paper proposed a method to improve a training time by parallelizing a training algorithm in the CNN using the Compute Unified Device Architecture (CUDA) capable of controlling NVIDIA GPGPU. The experiment result showed that the proposed method in this study improved about 2.5 times faster training speed than existing training method that makes use of only a single CPU.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
User effects of a distributed dynamic scheme in PMIPv6 networks PMIPv6网络中分布式动态方案的用户效应
Yoon-Deock Lee, Jongpil Jeong
In this paper, in order for the signaling overhead to be distributed evenly on the boundary of the regional network, each MN's dynamic mobility and traffic load is adjusted according to the PMIPv6 (Proxy Mobile IPv6) networks in the proposed dynamic regional mobility management scheme (dMMS). Each user in a distributed network system, that offers the least amount of signaling traffic, is tailored to the optimized system configuration. Signaling cost function is used in order to propose a new discrete analytical model, based on the MN's mobility and packet arrival patterns. Location update and packet delivery costs are used to calculate the total average, and the optimized area to determine the size of the network is proposed. The results of the mathematical analysis and the proposed scheme, in terms of reducing the cost of the signaling, were found to have excellent performance.
本文提出的动态区域移动性管理方案(dMMS)中,根据PMIPv6 (Proxy Mobile IPv6)网络对各MN的动态移动性和业务负载进行调整,使信令开销在区域网络边界上均匀分布。分布式网络系统中的每个用户,提供最少的信令流量,被定制为优化的系统配置。基于MN的移动性和数据包到达模式,利用信令代价函数提出了一种新的离散分析模型。利用位置更新和分组传输成本计算总平均值,并提出了确定网络规模的最优区域。数学分析结果表明,所提出的方案在降低信令成本方面具有优异的性能。
{"title":"User effects of a distributed dynamic scheme in PMIPv6 networks","authors":"Yoon-Deock Lee, Jongpil Jeong","doi":"10.1109/CAIPT.2017.8320655","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320655","url":null,"abstract":"In this paper, in order for the signaling overhead to be distributed evenly on the boundary of the regional network, each MN's dynamic mobility and traffic load is adjusted according to the PMIPv6 (Proxy Mobile IPv6) networks in the proposed dynamic regional mobility management scheme (dMMS). Each user in a distributed network system, that offers the least amount of signaling traffic, is tailored to the optimized system configuration. Signaling cost function is used in order to propose a new discrete analytical model, based on the MN's mobility and packet arrival patterns. Location update and packet delivery costs are used to calculate the total average, and the optimized area to determine the size of the network is proposed. The results of the mathematical analysis and the proposed scheme, in terms of reducing the cost of the signaling, were found to have excellent performance.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The mechanism of personalized service recommendation for the academic field 个性化服务推荐的机制为学术界所关注
Yun-Young Hwang, Jung-Hoon Park, Seoung Eun Park, Jungsun Yoon
Value services for people living in the flood of information is a service that reduces the time for information retrieval. To reduce the information retrieval time, the system should provide only the content that the user needs. The system collects and analyzes all the information related to the user to select the content that the user needs. Particularly, in the case of academics, such information includes major field, final degree, occupational group information, and contents information used by the user. This paper analyzes the characteristics of people in academia by using KOSEN system and proposes a personalized recommendation system for them. KOSEN is a web site where Korean scientists from all over the world come together to share information and networking. In addition, this paper suggests the services and contents required by KOSEN members considering the residential areas due to the nature of KOSEN. To do this, we use a big data processing solution and describe the analysis result.
对生活在信息洪流中的人们来说,价值服务是一种减少信息检索时间的服务。为了减少信息检索时间,系统应该只提供用户需要的内容。系统收集和分析与用户相关的所有信息,选择用户需要的内容。特别是在学术方面,这些信息包括专业领域、最终学位、职业群体信息和用户使用的内容信息。本文利用KOSEN系统分析了学术界人士的特点,提出了一种针对学术界人士的个性化推荐系统。KOSEN是世界各地的韩国科学家聚集在一起分享信息和交流的网站。此外,由于科森的性质,本文还结合居住区提出了科森成员所需要的服务和内容。为此,我们使用大数据处理解决方案并描述分析结果。
{"title":"The mechanism of personalized service recommendation for the academic field","authors":"Yun-Young Hwang, Jung-Hoon Park, Seoung Eun Park, Jungsun Yoon","doi":"10.1109/CAIPT.2017.8320743","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320743","url":null,"abstract":"Value services for people living in the flood of information is a service that reduces the time for information retrieval. To reduce the information retrieval time, the system should provide only the content that the user needs. The system collects and analyzes all the information related to the user to select the content that the user needs. Particularly, in the case of academics, such information includes major field, final degree, occupational group information, and contents information used by the user. This paper analyzes the characteristics of people in academia by using KOSEN system and proposes a personalized recommendation system for them. KOSEN is a web site where Korean scientists from all over the world come together to share information and networking. In addition, this paper suggests the services and contents required by KOSEN members considering the residential areas due to the nature of KOSEN. To do this, we use a big data processing solution and describe the analysis result.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capability level assessment of IT governance in PTP Mitra Ogan: COBIT 5 framework for BAI 04 process PTP Mitra Ogan中IT治理的能力水平评估:用于BAI 04过程的COBIT 5框架
Sandfreni, Fransiskus Adikara
It is very necessary to implement information technology governance in government corporate organization. Nowadays, information technology investments and IT-enabler must be effectively manage, especially in governance institution. This research is an assessment of IT Governance model for government corporate in Indonesia. This paper shows and describes the result of COBIT 5.0 framework (IT Governance framework) implementation in PTP Mitra Ogan. In this paper, implementation of COBIT 5.0 framework scope is applied especially in the domain of build, acquire, and implementation (process ID number 04), from the area of management. Purpose of this case study is to get the result of COBIT 5.0 framework implementation, describe step-by-step procedures or processes to improve IT Governance implementation, and finally give recommendations for governing IT of PTP Mitra Ogan in the future.
在政府法人组织中实施信息技术治理是十分必要的。当前,必须对信息技术投资和信息技术推动者进行有效管理,特别是在治理机构中。本研究是对印尼政府企业的IT治理模式进行评估。本文展示并描述了在PTP Mitra Ogan中实现COBIT 5.0框架(IT治理框架)的结果。在本文中,COBIT 5.0框架范围的实现特别应用于构建、获取和实现领域(过程ID号04),来自管理领域。本案例研究的目的是获得COBIT 5.0框架实现的结果,描述逐步改进IT治理实现的过程或过程,最后给出PTP Mitra Ogan未来治理IT的建议。
{"title":"Capability level assessment of IT governance in PTP Mitra Ogan: COBIT 5 framework for BAI 04 process","authors":"Sandfreni, Fransiskus Adikara","doi":"10.1109/CAIPT.2017.8320665","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320665","url":null,"abstract":"It is very necessary to implement information technology governance in government corporate organization. Nowadays, information technology investments and IT-enabler must be effectively manage, especially in governance institution. This research is an assessment of IT Governance model for government corporate in Indonesia. This paper shows and describes the result of COBIT 5.0 framework (IT Governance framework) implementation in PTP Mitra Ogan. In this paper, implementation of COBIT 5.0 framework scope is applied especially in the domain of build, acquire, and implementation (process ID number 04), from the area of management. Purpose of this case study is to get the result of COBIT 5.0 framework implementation, describe step-by-step procedures or processes to improve IT Governance implementation, and finally give recommendations for governing IT of PTP Mitra Ogan in the future.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
RFID presence monitoring system as an input to measure the workload of employee RFID在场监控系统作为输入来衡量员工的工作量
R. Rahmat, Eka Tama Herly, B. Siregar, M. F. Syahputra, O. S. Sitompul
In performing an assignment, every employee is expected to complete the work to some level. However, the misuse of working hours happens regularly in their working environment, which mean they shorten their workload and working hour. This problem led to the need to build a system as an alternative in monitoring the presence of the employee in their working environment. The type of the work that requires monitoring due to its presence in the location are customer service, call center, cashier, etc. Monitoring the presence of the employee can be done using tools such as RFID. Trilateration method was used to determine object location using signal value received of an object from multiple transmitters. The signal value can be then converted to a distance value between the object and the transmitters also can be formed three circles with the radius of each circle is the distance value between the object with the transmitters. The result from our system is the employee's location on building virtual maps. System will determine whether the employee location is in their working environment or not then it will produce daily reports on the employee working hours. In the end, system will sum up the workload obtained from the results of its employee presence monitoring.
在执行任务时,每个员工都被期望在一定程度上完成工作。然而,在他们的工作环境中,滥用工作时间的情况经常发生,这意味着他们缩短了工作量和工作时间。这个问题导致需要建立一个系统,作为监视员工在其工作环境中的存在的替代方案。需要监控的工作类型是客户服务、呼叫中心、收银员等。可以使用诸如RFID之类的工具来监控员工的存在。采用三边测量法,利用多台发射机接收到的一个目标的信号值确定目标位置。然后可将该信号值转换为所述物体与所述发射器之间的距离值,也可将所述物体与所述发射器之间的距离值形成三个圆,每个圆的半径为所述物体与所述发射器之间的距离值。我们系统的结果是员工在虚拟地图上的位置。系统将确定员工的位置是否在他们的工作环境中,然后它将产生关于员工工作时间的每日报告。最后,系统将从其员工在线监控结果中得出的工作量进行汇总。
{"title":"RFID presence monitoring system as an input to measure the workload of employee","authors":"R. Rahmat, Eka Tama Herly, B. Siregar, M. F. Syahputra, O. S. Sitompul","doi":"10.1109/CAIPT.2017.8320664","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320664","url":null,"abstract":"In performing an assignment, every employee is expected to complete the work to some level. However, the misuse of working hours happens regularly in their working environment, which mean they shorten their workload and working hour. This problem led to the need to build a system as an alternative in monitoring the presence of the employee in their working environment. The type of the work that requires monitoring due to its presence in the location are customer service, call center, cashier, etc. Monitoring the presence of the employee can be done using tools such as RFID. Trilateration method was used to determine object location using signal value received of an object from multiple transmitters. The signal value can be then converted to a distance value between the object and the transmitters also can be formed three circles with the radius of each circle is the distance value between the object with the transmitters. The result from our system is the employee's location on building virtual maps. System will determine whether the employee location is in their working environment or not then it will produce daily reports on the employee working hours. In the end, system will sum up the workload obtained from the results of its employee presence monitoring.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
PassPositions: A secure and user-friendly graphical password scheme PassPositions:一个安全且用户友好的图形密码方案
Gi-Chul Yang
To solve the problem of text-based password authentication, graphical passwords using images have evolved. Graphical passwords process authentication by selecting the exact positions on the image shown on the screen. These conventional graphical password schemes cannot be used for recognition if the correct points on the screen cannot be selected in the same order. To solve this problem, a new graphical password scheme called PassPositions was introduced. PassPositions were designed based on universal design, so it is user-friendly for everyone, regardless of their physical abilities. However, in certain cases, PassPositions does have some weak points. In this paper will identify a problem of PassPositions, and improve the PassPositions.
为了解决基于文本的密码认证问题,使用图像的图形密码应运而生。图形密码通过选择屏幕上显示的图像上的确切位置来进行身份验证。如果不能以相同的顺序选择屏幕上正确的点,这些传统的图形密码方案就不能用于识别。为了解决这个问题,引入了一种新的图形密码方案paspositions。paspositions是基于通用设计设计的,所以它对每个人都是友好的,无论他们的身体能力如何。然而,在某些情况下,paspositions确实有一些弱点。本文将找出其中存在的问题,并对其进行改进。
{"title":"PassPositions: A secure and user-friendly graphical password scheme","authors":"Gi-Chul Yang","doi":"10.1109/CAIPT.2017.8320723","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320723","url":null,"abstract":"To solve the problem of text-based password authentication, graphical passwords using images have evolved. Graphical passwords process authentication by selecting the exact positions on the image shown on the screen. These conventional graphical password schemes cannot be used for recognition if the correct points on the screen cannot be selected in the same order. To solve this problem, a new graphical password scheme called PassPositions was introduced. PassPositions were designed based on universal design, so it is user-friendly for everyone, regardless of their physical abilities. However, in certain cases, PassPositions does have some weak points. In this paper will identify a problem of PassPositions, and improve the PassPositions.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Search engine optimization: Raising the ranking of “Suku Osing” websites on search engine page 搜索引擎优化:提高“Suku Osing”网站在搜索引擎页面上的排名
Nur Kholis Mansur, Fahrobby Adnan
The tribe Osing (Suku Osing) is a native of Banyuwangi and is the majority population in several sub districts in Banyuwangi District. The Osing tribe is a Javanese sub-tribe. The Osing tribe occupies several sub-districts in central and northern Banyuwangi district. The cultural potential possessed by the Osing Tribe is very diverse. Arts, crafts, food, herbal medicines / more familiarly called “jamu”, language, and also customs are the cultural potential possessed by the Osing Tribe. The need for information by the community can easily be met with the utilization of the internet. Website is one of the media that become the reference for the public to get information. When people search for information on search engines, it is not uncommon for websites that appear on the first page of a search engine to provide information that cannot be justified / questionable validity. For that we need an effort to provide appropriate / relevant information related to the culture of Osing tribe through the website. www.osingbanyuwangi.com is a website that provide all about Osing tribe potential resource. In additions it requires a Search Engine Optimization (SEO) strategy that is able to make the website appear on the earlier pages of search engines when people enter keywords related to the cultural potential of the Osing tribe. Increasing the possibility ofpeople to access the website.
奥辛部落(Suku Osing)是班yuwangi的原住民,是班yuwangi区的几个街道的多数人口。奥辛部落是爪哇的一个分支部落。奥辛部落占据了班宇旺吉区中部和北部的几个街道。奥辛部落所拥有的文化潜力是非常多样化的。艺术、手工艺品、食物、草药/更熟悉地称为“jamu”,语言和习俗是奥辛部落拥有的文化潜力。利用互联网,社会对信息的需求可以很容易地得到满足。网站是公众获取信息的参考媒介之一。当人们在搜索引擎上搜索信息时,出现在搜索引擎第一页的网站提供的信息不能被证明/有效性可疑的情况并不罕见。为此,我们需要努力通过网站提供与奥辛部落文化相关的适当/相关信息。www.osingbanyuwangi.com是一个提供所有关于奥辛部落潜在资源的网站。此外,它还需要一个搜索引擎优化(SEO)策略,当人们输入与奥辛部落文化潜力相关的关键词时,能够使网站出现在搜索引擎的较早页面上。增加人们访问网站的可能性。
{"title":"Search engine optimization: Raising the ranking of “Suku Osing” websites on search engine page","authors":"Nur Kholis Mansur, Fahrobby Adnan","doi":"10.1109/CAIPT.2017.8320731","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320731","url":null,"abstract":"The tribe Osing (Suku Osing) is a native of Banyuwangi and is the majority population in several sub districts in Banyuwangi District. The Osing tribe is a Javanese sub-tribe. The Osing tribe occupies several sub-districts in central and northern Banyuwangi district. The cultural potential possessed by the Osing Tribe is very diverse. Arts, crafts, food, herbal medicines / more familiarly called “jamu”, language, and also customs are the cultural potential possessed by the Osing Tribe. The need for information by the community can easily be met with the utilization of the internet. Website is one of the media that become the reference for the public to get information. When people search for information on search engines, it is not uncommon for websites that appear on the first page of a search engine to provide information that cannot be justified / questionable validity. For that we need an effort to provide appropriate / relevant information related to the culture of Osing tribe through the website. www.osingbanyuwangi.com is a website that provide all about Osing tribe potential resource. In additions it requires a Search Engine Optimization (SEO) strategy that is able to make the website appear on the earlier pages of search engines when people enter keywords related to the cultural potential of the Osing tribe. Increasing the possibility ofpeople to access the website.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Heartbeat count estimation in safety critical systems 安全关键系统中的心跳计数估计
Hyeon Gyu Kim
Heartbeats are signals periodically generated from remote sensors attached to a system whose status needs to be continuously monitored for safety. If consecutive n heartbeats are not transferred to a monitoring site, the target system is considered abnormal and might be shut down as in the case of monitoring nuclear power plants. In this paper, we propose a method to estimate the heartbeat count in the safety critical systems. Given a user-defined safety bound, the proposed method estimates the count n which satisfies the safety bound.
心跳是由连接在系统上的远程传感器周期性产生的信号,为了安全,系统的状态需要持续监测。如果连续的心跳没有传送到监测点,则认为目标系统异常,可能会像监测核电站一样被关闭。在本文中,我们提出了一种估计安全关键系统心跳次数的方法。给定用户定义的安全边界,该方法估计满足安全边界的计数n。
{"title":"Heartbeat count estimation in safety critical systems","authors":"Hyeon Gyu Kim","doi":"10.1109/CAIPT.2017.8320685","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320685","url":null,"abstract":"Heartbeats are signals periodically generated from remote sensors attached to a system whose status needs to be continuously monitored for safety. If consecutive n heartbeats are not transferred to a monitoring site, the target system is considered abnormal and might be shut down as in the case of monitoring nuclear power plants. In this paper, we propose a method to estimate the heartbeat count in the safety critical systems. Given a user-defined safety bound, the proposed method estimates the count n which satisfies the safety bound.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared secret key update scheme between RADIUS server and access point using PUFs 使用puf的RADIUS服务器和接入点之间的共享密钥更新方案
JungSoo Park, Souhwan Jung
The existing AP and Radius Server used the SSK(Shared Secret Key) to authenticate the accounting messages between devices. This SSK had the vulnerability of easy exposure because of the lack of encryption and difficulty of administration for the AP and RADIUS Server due to the requirement of direct input by the administrator. After the SSK is exposed, a billing problem may be induced by sending a user's counterfeit accounting information which is possible by creating a Rouge AP with a forged MAC address and connecting to the server. This paper attempts to resolve this issue by creating SSK with the characteristic of Physical Uncloneable Functions (PUFs) and propose the method of periodic automatic update through the server. A more secure and powerful protocol will be provided by adding the PUF hardware to the AP which creates a non-duplicable key that not only protects the AP but also encrypts the message and additionally assures its integrity. Furthermore, the proposed protocol will have a centralized administration through batch updates and it will eliminate the inconvenience of the administrator which in existing methods required manually configuration of each SSK values in the AP and RADIUS server. Conclusively, this paper adds PUF to the protocol to protect the SSK with augmented security and proposes the centralized administration of the SSK value in replacement of the current administration method of direct input.
已有AP和Radius Server使用共享密钥(SSK)对设备间的计费消息进行认证。该SSK缺乏加密,AP和RADIUS服务器由于需要管理员直接输入而难以管理,存在容易暴露的漏洞。SSK暴露后,可能会通过发送用户伪造的计费信息而导致计费问题,这可以通过创建伪造MAC地址的Rouge AP连接到服务器来实现。本文试图通过创建具有物理不可克隆功能(puf)特征的SSK来解决这一问题,并提出了通过服务器进行周期性自动更新的方法。通过将PUF硬件添加到AP,将提供一个更安全、更强大的协议,该协议创建了一个不可复制的密钥,不仅可以保护AP,还可以加密消息,并额外确保其完整性。此外,提议的协议将通过批量更新进行集中管理,并且它将消除管理员的不便,因为在现有方法中,管理员需要手动配置AP和RADIUS服务器中的每个SSK值。最后,本文在协议中加入PUF,增强对SSK的安全性保护,并提出对SSK值进行集中管理,以取代目前直接输入的管理方式。
{"title":"Shared secret key update scheme between RADIUS server and access point using PUFs","authors":"JungSoo Park, Souhwan Jung","doi":"10.1109/CAIPT.2017.8320725","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320725","url":null,"abstract":"The existing AP and Radius Server used the SSK(Shared Secret Key) to authenticate the accounting messages between devices. This SSK had the vulnerability of easy exposure because of the lack of encryption and difficulty of administration for the AP and RADIUS Server due to the requirement of direct input by the administrator. After the SSK is exposed, a billing problem may be induced by sending a user's counterfeit accounting information which is possible by creating a Rouge AP with a forged MAC address and connecting to the server. This paper attempts to resolve this issue by creating SSK with the characteristic of Physical Uncloneable Functions (PUFs) and propose the method of periodic automatic update through the server. A more secure and powerful protocol will be provided by adding the PUF hardware to the AP which creates a non-duplicable key that not only protects the AP but also encrypts the message and additionally assures its integrity. Furthermore, the proposed protocol will have a centralized administration through batch updates and it will eliminate the inconvenience of the administrator which in existing methods required manually configuration of each SSK values in the AP and RADIUS server. Conclusively, this paper adds PUF to the protocol to protect the SSK with augmented security and proposes the centralized administration of the SSK value in replacement of the current administration method of direct input.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1