Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652007
Omar Benmiloud, S. Arif
Even with today's technologies, transient stability studies of large power systems present a computational burden. In this paper, a reduced order model of multi-machine power systems is addressed. The methodology is based on information collected from Phasor Measurement Units (PMUs) at boundary buses. The Grey Wolf Optimizer (GWO) is employed then to estimate parameters of the fictitious generator, expressed by the fourth order model with an equivalent exciter. The proposed methodology is tested on 10-machine New England system. Simulation results show the feasibility of the methodology, and the ability to retain the original system behavior for various contingencies.
{"title":"Model Order Reduction of Power Systems Preserving Tie Line Flows","authors":"Omar Benmiloud, S. Arif","doi":"10.1109/ICASS.2018.8652007","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652007","url":null,"abstract":"Even with today's technologies, transient stability studies of large power systems present a computational burden. In this paper, a reduced order model of multi-machine power systems is addressed. The methodology is based on information collected from Phasor Measurement Units (PMUs) at boundary buses. The Grey Wolf Optimizer (GWO) is employed then to estimate parameters of the fictitious generator, expressed by the fourth order model with an equivalent exciter. The proposed methodology is tested on 10-machine New England system. Simulation results show the feasibility of the methodology, and the ability to retain the original system behavior for various contingencies.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652035
B. Benaissa, Kaori Yoshida, M. Köppen, Filip Hendrichovsky
The need for a robust indoor localization solution is mounting in the recent few year, as the IoT technology is growing fast. In this paper, we discuss existing indoor localization approaches, focusing on the signal strength fingerprint approaches, to which belongs the presented study and based on Bluetooth Low Energy signal. The proposed approach employs the Radial Basis Functions (RBF) to create model that describe the real signal strength-position relationship. The present method is fully implemented on a smart phone, namely, offline data collection, model computation and online position estimation. This allow updating the model by collecting more signal data, therefore improving the localization accuracy with small efforts. The presented results shows that updating the model effectively improves the accuracy of estimation.
{"title":"Updatable indoor localization based on BLE signal fingerprint","authors":"B. Benaissa, Kaori Yoshida, M. Köppen, Filip Hendrichovsky","doi":"10.1109/ICASS.2018.8652035","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652035","url":null,"abstract":"The need for a robust indoor localization solution is mounting in the recent few year, as the IoT technology is growing fast. In this paper, we discuss existing indoor localization approaches, focusing on the signal strength fingerprint approaches, to which belongs the presented study and based on Bluetooth Low Energy signal. The proposed approach employs the Radial Basis Functions (RBF) to create model that describe the real signal strength-position relationship. The present method is fully implemented on a smart phone, namely, offline data collection, model computation and online position estimation. This allow updating the model by collecting more signal data, therefore improving the localization accuracy with small efforts. The presented results shows that updating the model effectively improves the accuracy of estimation.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652012
Hakim Bagua, Moulod Guemana, A. Hafaifa, A. Chaibet
In this paper a theoretical and practical comparative study is proposed, between types 1 and 2 fuzzy systems for the monitoring of a gas turbine process. Firstly, the type 1 and type 2 fuzzy sets are presented followed by the description of the two fuzzy systems, to understand the differences between there inference systems, then a theoretical comparative study is presented, and finally the contribution of this work in the practical part by the application of the two fuzzy control approaches type-1 and type-2 in a fuel valve positioning of a gas turbine process, the obtained results shows the advantage of the used time in fuzzy control type-2, which is a very important factor in industrial applications.
{"title":"Gas Turbine Monitoring using Fuzzy Control approaches: Comparison between Fuzzy Type 1 and 2","authors":"Hakim Bagua, Moulod Guemana, A. Hafaifa, A. Chaibet","doi":"10.1109/ICASS.2018.8652012","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652012","url":null,"abstract":"In this paper a theoretical and practical comparative study is proposed, between types 1 and 2 fuzzy systems for the monitoring of a gas turbine process. Firstly, the type 1 and type 2 fuzzy sets are presented followed by the description of the two fuzzy systems, to understand the differences between there inference systems, then a theoretical comparative study is presented, and finally the contribution of this work in the practical part by the application of the two fuzzy control approaches type-1 and type-2 in a fuel valve positioning of a gas turbine process, the obtained results shows the advantage of the used time in fuzzy control type-2, which is a very important factor in industrial applications.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652064
Z. Smara, Ali Laldji, Ahmed Ferkous, M. Tali, A. Mahrane, R. Dizène
This article deals with the case of a house, located in the south Mediterranean coastal region powered by a hybrid photovoltaic wind power plant. The objective is to satisfy as much as possible the energy demand of this house by renewable electric energy. For the case considered adding to the on-grid 3.2kWp PV system with 12kWh backup a 1kW wind turbine improves the self-sufficiency rate of the house which reaches 81.83%, reduces the energy withdrawn from the grid by 40 %.
{"title":"Evaluation of the self sufficiency of a home powered by a PV–Wind system","authors":"Z. Smara, Ali Laldji, Ahmed Ferkous, M. Tali, A. Mahrane, R. Dizène","doi":"10.1109/ICASS.2018.8652064","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652064","url":null,"abstract":"This article deals with the case of a house, located in the south Mediterranean coastal region powered by a hybrid photovoltaic wind power plant. The objective is to satisfy as much as possible the energy demand of this house by renewable electric energy. For the case considered adding to the on-grid 3.2kWp PV system with 12kWh backup a 1kW wind turbine improves the self-sufficiency rate of the house which reaches 81.83%, reduces the energy withdrawn from the grid by 40 %.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130025579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651997
F. Benzerafa, A. Tlemçani, N. Henini
Nowadays, the improvement of power factor has becoming increasingly concerned by the electric power utilities. There are many problems that affect the power quality and the performance of the equipment at consumer such as voltage sags or voltage dips, voltage imbalance, waveform distortion, voltage fluctuations and frequency. The improvement of power quality and the control of networks can be obtained by the implementation of the new devices technologies naming FACTS. Thus, the uses of device such as Distribution Static Compensator (DSTATCOM) can solve many problems in the electrical networks. The DSTATCOM is a source based on semiconductor capable of supplying or absorbing of reactive power in network. It used for correcting power quality problems in distribution systems. Because of limitation of use of conventional two-level inverter based DSTATCOM in the field of high power applications, we used the multilevel inverter. In this paper we will develop the space vector modulation algorith me technique in the case of the three level inverter. To validate the theory and models presented in this paper a structured simulation is executed in the simPowerSystems of MATLAB/Simulink.
{"title":"A Fuzzy Controller Using Three Level-inverter based DSTATCOM","authors":"F. Benzerafa, A. Tlemçani, N. Henini","doi":"10.1109/ICASS.2018.8651997","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651997","url":null,"abstract":"Nowadays, the improvement of power factor has becoming increasingly concerned by the electric power utilities. There are many problems that affect the power quality and the performance of the equipment at consumer such as voltage sags or voltage dips, voltage imbalance, waveform distortion, voltage fluctuations and frequency. The improvement of power quality and the control of networks can be obtained by the implementation of the new devices technologies naming FACTS. Thus, the uses of device such as Distribution Static Compensator (DSTATCOM) can solve many problems in the electrical networks. The DSTATCOM is a source based on semiconductor capable of supplying or absorbing of reactive power in network. It used for correcting power quality problems in distribution systems. Because of limitation of use of conventional two-level inverter based DSTATCOM in the field of high power applications, we used the multilevel inverter. In this paper we will develop the space vector modulation algorith me technique in the case of the three level inverter. To validate the theory and models presented in this paper a structured simulation is executed in the simPowerSystems of MATLAB/Simulink.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652057
Hamza Kheddar, D. Megías, M. Bouzid
In this paper, a novel steganographic technique based on hiding a secret speech, coded with a 2.4 kbps Mixed Excitation Linear Prediction (MELP) speech coder, in another (cover) speech bitstream, also coded with the MELP coder, is presented. First, the secret speech is embedded in the Fourier magnitude (FM) MELP parameter using an LSB method. Second, a necessary parameter for message extraction, the amount of embedded bits (AEB), is also transmitted in the stego speech using some of the fields of MELP frame. In addition, we provide a mechanism for re-synchronization in case of packet loss. The performance of the method is shown experimentally against a Support Vector Machine (steganalyzer). The accuracy of such steganalyzer is around 50%, i.e. equivalent to random guessing. Finally, we also provide transparency results for the stego speech. Although transparency is not usually a requirement in steganographic applications, the proposed method may also be used for other data hiding applications that require good fidelity.
{"title":"Fourier magnitude-based steganography for hiding 2.4 kbpsMELP secret speech","authors":"Hamza Kheddar, D. Megías, M. Bouzid","doi":"10.1109/ICASS.2018.8652057","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652057","url":null,"abstract":"In this paper, a novel steganographic technique based on hiding a secret speech, coded with a 2.4 kbps Mixed Excitation Linear Prediction (MELP) speech coder, in another (cover) speech bitstream, also coded with the MELP coder, is presented. First, the secret speech is embedded in the Fourier magnitude (FM) MELP parameter using an LSB method. Second, a necessary parameter for message extraction, the amount of embedded bits (AEB), is also transmitted in the stego speech using some of the fields of MELP frame. In addition, we provide a mechanism for re-synchronization in case of packet loss. The performance of the method is shown experimentally against a Support Vector Machine (steganalyzer). The accuracy of such steganalyzer is around 50%, i.e. equivalent to random guessing. Finally, we also provide transparency results for the stego speech. Although transparency is not usually a requirement in steganographic applications, the proposed method may also be used for other data hiding applications that require good fidelity.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651973
M. Bencheikh, S. Boukhenous
The foot pressure measurement is important in gait and posture research for diagnosis of pressure of the feet for the athletes, back injuries, adaptation of insoles for orthopaedic applications and prevention of diabetic foot ulceration. There are several methods to measure the distribution of foot pressure. However, traditional systems have the disadvantage of being no flexible and thus influencing the measurement. In this work we present a low cost smart insole for diagnosis and prevention of plantar perforating disease in diabetic patients. The system consists of an instrumented insole that contains innovative sensors witch allow the quantification of plantar pressure at critical points that have a high risk of ulceration, it also contains a temperature / humidity sensors. A high rate of temperature and humidity allows faster formation of the ulcer, especially in the high friction points. All sensors for both feet communicate wirelessly and in real time with a mobile application through Bluetooth.
{"title":"A low Cost Smart Insole for Diabetic Foot Prevention","authors":"M. Bencheikh, S. Boukhenous","doi":"10.1109/ICASS.2018.8651973","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651973","url":null,"abstract":"The foot pressure measurement is important in gait and posture research for diagnosis of pressure of the feet for the athletes, back injuries, adaptation of insoles for orthopaedic applications and prevention of diabetic foot ulceration. There are several methods to measure the distribution of foot pressure. However, traditional systems have the disadvantage of being no flexible and thus influencing the measurement. In this work we present a low cost smart insole for diagnosis and prevention of plantar perforating disease in diabetic patients. The system consists of an instrumented insole that contains innovative sensors witch allow the quantification of plantar pressure at critical points that have a high risk of ulceration, it also contains a temperature / humidity sensors. A high rate of temperature and humidity allows faster formation of the ulcer, especially in the high friction points. All sensors for both feet communicate wirelessly and in real time with a mobile application through Bluetooth.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652036
Sarah Izza, M. Benssalah, Rabah Ouchikh
Wireless Body Area Network (WBAN) has attracted a huge interest following the development of microelectronics, miniaturized sensors and the advancement of wireless communication. However, medical data are very sensitive and any modification or eavesdropping of the physiological data may affect the diagnosis or the privacy of the patient, so, the security in WBAN remains a big challenge. Therefore, it is important to ensure a secure mutual authentication between the network entities to protect the user’s information from being corrupted and to ensure the privacy of the patient. In this paper, first, we review the security of Li et al.’s authentication scheme which is the most recently proposed protocol in this field. Then, we propose an improved version to overcome flaws found in Li et al.’s scheme. The security and performance analysis show that the improved protocol presents better security features.
{"title":"Security Improvement of the Enhanced 1-round Authentication Protocol for Wireless Body Area Networks","authors":"Sarah Izza, M. Benssalah, Rabah Ouchikh","doi":"10.1109/ICASS.2018.8652036","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652036","url":null,"abstract":"Wireless Body Area Network (WBAN) has attracted a huge interest following the development of microelectronics, miniaturized sensors and the advancement of wireless communication. However, medical data are very sensitive and any modification or eavesdropping of the physiological data may affect the diagnosis or the privacy of the patient, so, the security in WBAN remains a big challenge. Therefore, it is important to ensure a secure mutual authentication between the network entities to protect the user’s information from being corrupted and to ensure the privacy of the patient. In this paper, first, we review the security of Li et al.’s authentication scheme which is the most recently proposed protocol in this field. Then, we propose an improved version to overcome flaws found in Li et al.’s scheme. The security and performance analysis show that the improved protocol presents better security features.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651975
Tarek Benarabi, M. Adnane, M. Mansour
Electrocardiogram (ECG) signals processing are vital tools to tracking the cardiac abnormalities, thus it is widely used in assessing and diagnosing the health of the heart. One of the most common cardiac arrhythmias which has been considered by clinicians is ventricular ectopic beats (VEBs), it include premature ventricular contraction (PVC) arrhythmia and others cases. The ECG analysis needs to continuous surveillance of the heartbeat record by cardiologist. To avoid this tedious task for clinicians, several automated diagnostic techniques have been developed in the last years. Most of them depend on the wavelet transform and/or Autoregressive model (AR model) and its various extractive features. In this paper, we are proposing a simple method for heartbeats classification, more precisely, for VEBs arrhythmia detection. It is based on two high order statistical measures (kurtosis, skewness), they are used to discriminate between normal beats (N) and abnormal beats (VEBs), and without the need of mathematical modeling (example: signal transformation such as wavelet, AR model). Obtained results are satisfactory and it proves the potential and efficiency to detect VEB arrhythmia using two high order statistical measures (HOS). Moreover, this method is a simple, fast and easy to implement in several platform for real time practice.
{"title":"High Order Statistics For Ventricular Ectopic Beats Detection","authors":"Tarek Benarabi, M. Adnane, M. Mansour","doi":"10.1109/ICASS.2018.8651975","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651975","url":null,"abstract":"Electrocardiogram (ECG) signals processing are vital tools to tracking the cardiac abnormalities, thus it is widely used in assessing and diagnosing the health of the heart. One of the most common cardiac arrhythmias which has been considered by clinicians is ventricular ectopic beats (VEBs), it include premature ventricular contraction (PVC) arrhythmia and others cases. The ECG analysis needs to continuous surveillance of the heartbeat record by cardiologist. To avoid this tedious task for clinicians, several automated diagnostic techniques have been developed in the last years. Most of them depend on the wavelet transform and/or Autoregressive model (AR model) and its various extractive features. In this paper, we are proposing a simple method for heartbeats classification, more precisely, for VEBs arrhythmia detection. It is based on two high order statistical measures (kurtosis, skewness), they are used to discriminate between normal beats (N) and abnormal beats (VEBs), and without the need of mathematical modeling (example: signal transformation such as wavelet, AR model). Obtained results are satisfactory and it proves the potential and efficiency to detect VEB arrhythmia using two high order statistical measures (HOS). Moreover, this method is a simple, fast and easy to implement in several platform for real time practice.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652008
Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri
This paper proposes an intrusion detection scheme for Denial Of Service (DOS) and Distributed DOS (DDOS) attacks detection. We used Hellinger distance (HD), which is an effective measure to quantify the similarity between two distributions, to detect the presence of potential malicious attackers. Specifically, we applied HD-based anomaly detection mechanism to detect SYN and ICMPv6-based DOS/DDOS attacks. Here, Shewhart chart is applied to HD to set up a detection threshold. The proposed mechanism is evaluated using DARPA99 and ICMPv6 traffic datasets. Results indicate that our mechanism accomplished reliable detection of DOS/DDOS flooding attacks.
{"title":"An Effective Network Intrusion Detection Using Hellinger Distance-Based Monitoring Mechanism","authors":"Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri","doi":"10.1109/ICASS.2018.8652008","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652008","url":null,"abstract":"This paper proposes an intrusion detection scheme for Denial Of Service (DOS) and Distributed DOS (DDOS) attacks detection. We used Hellinger distance (HD), which is an effective measure to quantify the similarity between two distributions, to detect the presence of potential malicious attackers. Specifically, we applied HD-based anomaly detection mechanism to detect SYN and ICMPv6-based DOS/DDOS attacks. Here, Shewhart chart is applied to HD to set up a detection threshold. The proposed mechanism is evaluated using DARPA99 and ICMPv6 traffic datasets. Results indicate that our mechanism accomplished reliable detection of DOS/DDOS flooding attacks.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}