首页 > 最新文献

2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)最新文献

英文 中文
ISCAIE 2019 Cover Page ISCAIE 2019封面
Pub Date : 2019-04-01 DOI: 10.1109/iscaie.2019.8743978
I am happy to welcome and wish “SELAMAT DATANG” to all delegates attending the 2019 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE 2019). We have been organizing ISCAIE for seven years now, and we continue our tradition of maintaining its high standard and quality. ISCAIE2019 has received full support and technical assistance from the IEEE Malaysia Industrial Electronics & Industrial Applications Joint Chapter.
我很高兴欢迎并祝愿所有参加2019年IEEE计算机应用与工业电子研讨会(ISCAIE 2019)的代表“SELAMAT大唐”。我们组织ISCAIE已经七年了,我们继续保持高标准和高质量的传统。ISCAIE2019得到了IEEE马来西亚工业电子与工业应用联合分会的全力支持和技术援助。
{"title":"ISCAIE 2019 Cover Page","authors":"","doi":"10.1109/iscaie.2019.8743978","DOIUrl":"https://doi.org/10.1109/iscaie.2019.8743978","url":null,"abstract":"I am happy to welcome and wish “SELAMAT DATANG” to all delegates attending the 2019 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE 2019). We have been organizing ISCAIE for seven years now, and we continue our tradition of maintaining its high standard and quality. ISCAIE2019 has received full support and technical assistance from the IEEE Malaysia Industrial Electronics & Industrial Applications Joint Chapter.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISCAIE 2019 Author Index isaie 2019作者索引
Pub Date : 2019-04-01 DOI: 10.1109/iscaie.2019.8743821
{"title":"ISCAIE 2019 Author Index","authors":"","doi":"10.1109/iscaie.2019.8743821","DOIUrl":"https://doi.org/10.1109/iscaie.2019.8743821","url":null,"abstract":"","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced algorithms for clock selection in a packet based synchronization method 基于包的同步方法中时钟选择的增强算法
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743747
Satheesh Kumar S, Prasanth Kemparaj
Clock selection algorithms plays an important role in selecting the best clock sources from the available pool of candidate clock sources based on many factors. Improper selection of the clock source in the network can have a detrimental impact in the network which could affect services that enables various applications in today’s next generation networks. Though the selection algorithms available as per various standard recommendations, it is important to fine tune and design a prominent method that could be adopted in packet based synchronization method. This paper addresses a new proposal for clock selection algorithms for packet based synchronization method by which the algorithm select the best clock from the candidate clocks to establish most reliable and efficient synchronization mechanism for the real-time deployments that comprises of either SyncE or 1588v2 with physical layer frequency assist as the synchronization transport. This method comprises of selecting a best clock based on the actual clock whose frequency expressed in parts per billion (ppb) seen by the Digital Phase Locked Loop (DPLL) at its inputs instead of selecting the clock based on the traditional clock selection algorithms. This method has a potential benefit of establishing a good frequency clock path throughout the network so that more efficient and reliable clock delivery is achieved within or external to the network. This paper therefore takes care of the potential delivery of bad frequency clock on legacy clock selection algorithm. Analysis and measurement results shows that the proposed method eliminate all the existing issues by conforming all the standard recommendations.
时钟选择算法在基于多种因素的候选时钟源池中选择最佳时钟源方面起着重要作用。网络中时钟源选择不当可能会对网络产生不利影响,从而影响在当今下一代网络中实现各种应用的业务。虽然有各种标准推荐的选择算法,但重要的是要微调和设计一个突出的方法,可以在基于分组的同步方法中采用。本文提出了一种基于分组同步方法的时钟选择算法,该算法从候选时钟中选择最佳时钟,以建立最可靠和有效的同步机制,用于由SyncE或1588v2组成的实时部署,其中物理层频率辅助作为同步传输。该方法包括根据数字锁相环(DPLL)在其输入处看到的以十亿分之一(ppb)表示的实际时钟选择最佳时钟,而不是基于传统时钟选择算法选择时钟。这种方法的潜在好处是在整个网络中建立一个良好的频率时钟路径,以便在网络内部或外部实现更有效和可靠的时钟传递。因此,本文考虑了遗留时钟选择算法可能产生的坏频率时钟。分析和测量结果表明,该方法符合所有标准建议,消除了存在的所有问题。
{"title":"Enhanced algorithms for clock selection in a packet based synchronization method","authors":"Satheesh Kumar S, Prasanth Kemparaj","doi":"10.1109/ISCAIE.2019.8743747","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743747","url":null,"abstract":"Clock selection algorithms plays an important role in selecting the best clock sources from the available pool of candidate clock sources based on many factors. Improper selection of the clock source in the network can have a detrimental impact in the network which could affect services that enables various applications in today’s next generation networks. Though the selection algorithms available as per various standard recommendations, it is important to fine tune and design a prominent method that could be adopted in packet based synchronization method. This paper addresses a new proposal for clock selection algorithms for packet based synchronization method by which the algorithm select the best clock from the candidate clocks to establish most reliable and efficient synchronization mechanism for the real-time deployments that comprises of either SyncE or 1588v2 with physical layer frequency assist as the synchronization transport. This method comprises of selecting a best clock based on the actual clock whose frequency expressed in parts per billion (ppb) seen by the Digital Phase Locked Loop (DPLL) at its inputs instead of selecting the clock based on the traditional clock selection algorithms. This method has a potential benefit of establishing a good frequency clock path throughout the network so that more efficient and reliable clock delivery is achieved within or external to the network. This paper therefore takes care of the potential delivery of bad frequency clock on legacy clock selection algorithm. Analysis and measurement results shows that the proposed method eliminate all the existing issues by conforming all the standard recommendations.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiment with Lexicon Based Techniques on Domain-Specific Malay Document Sentiment Analysis 基于词汇的马来语领域情感分析技术实验
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743942
Shaiful Bakhtiar bin Rodzman, Mohammad Hanif Rashid, N. K. Ismail, Nurazzah Abd Rahman, S. A. Aljunid, Hayati Abd Rahman
The nature of Sentiment Analysis (SA) mostly is generated by human beings. They expressed their emotion in writing or expressing their feeling via social media or blog. The Advancement of Internet and the increasing number of users in social media are the factors on why the sentiment analysis gaining its popularity in Malay languages. This research aims to implement the Sentiment Analysis on Malay language documents and propose a lexicon-based technique for Malay based sentiment analysis on specific domain such as Song, Politic and Product to find the best SA classifier on the Domain-Specific Malay Document Sentiment Analysis. Analysis of the evaluation result is based on the comparison of expert evaluation, Lexicon-based evaluation’s result and Naïve Bayes SA classification’s result, which is Naïve Bayes represent Machine Learning approach in this study. The result shows Lexicon-based Classification has outperformed Naïve Bayes SA classification in overall 3 topics which are Song, Politic and Product in average of 70% compared to 50% average for Naïve Bayes. For the future works, the researcher would like to improve in the particular area such as Sentiment Analysis based on the Malay dialect, increase the data in the dictionary and applying phrase level for better and optimum results.
情感分析(SA)的本质主要是由人类产生的。他们通过写作或通过社交媒体或博客表达自己的情感。互联网的进步和社交媒体用户的增加是情感分析在马来语中流行的原因。本研究旨在实现马来语文档的情感分析,并提出一种基于词汇的技术,用于特定领域(如Song, political和Product)的马来语情感分析,以找到针对特定领域马来语文档情感分析的最佳SA分类器。评价结果的分析是基于专家评价、基于lexicon的评价结果和Naïve贝叶斯SA分类结果的比较,即Naïve贝叶斯代表本研究中的机器学习方法。结果显示,基于lexicon的分类在歌曲、政治和产品这三个主题上的平均表现优于Naïve Bayes SA分类,而Naïve Bayes的平均表现为50%。对于未来的工作,研究人员希望在特定领域进行改进,如基于马来语方言的情感分析,增加字典中的数据,并应用短语级别以获得更好和最佳的结果。
{"title":"Experiment with Lexicon Based Techniques on Domain-Specific Malay Document Sentiment Analysis","authors":"Shaiful Bakhtiar bin Rodzman, Mohammad Hanif Rashid, N. K. Ismail, Nurazzah Abd Rahman, S. A. Aljunid, Hayati Abd Rahman","doi":"10.1109/ISCAIE.2019.8743942","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743942","url":null,"abstract":"The nature of Sentiment Analysis (SA) mostly is generated by human beings. They expressed their emotion in writing or expressing their feeling via social media or blog. The Advancement of Internet and the increasing number of users in social media are the factors on why the sentiment analysis gaining its popularity in Malay languages. This research aims to implement the Sentiment Analysis on Malay language documents and propose a lexicon-based technique for Malay based sentiment analysis on specific domain such as Song, Politic and Product to find the best SA classifier on the Domain-Specific Malay Document Sentiment Analysis. Analysis of the evaluation result is based on the comparison of expert evaluation, Lexicon-based evaluation’s result and Naïve Bayes SA classification’s result, which is Naïve Bayes represent Machine Learning approach in this study. The result shows Lexicon-based Classification has outperformed Naïve Bayes SA classification in overall 3 topics which are Song, Politic and Product in average of 70% compared to 50% average for Naïve Bayes. For the future works, the researcher would like to improve in the particular area such as Sentiment Analysis based on the Malay dialect, increase the data in the dictionary and applying phrase level for better and optimum results.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Login Method Selection in a Multi-modal Authentication System : Login Method Selection based on User Behavior 多模态认证系统中登录方式的自动选择:基于用户行为的登录方式选择
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743992
Chang Pei Shan, Wong HON LOON, Lee Kay Win, Dahlia Din, Sea Chong Seak
An intelligent model is proposed to automate selection of login authentication method in a multi-model authentication system based on user behavior profile. The proposed protocol analyzes the user behavior data to minimize the process in real time and prevent untrusted attempt, meanwhile, it able to facilitate frictionless user experience in a multi-modal authentication system. The proposed system determines a user at a log-in interface and retrieves the user’s behavioral historical data as its determinant factors, matching user behavior based on data retrieval from database. Wherein the behavioral data includes the user’s login sessions time, geolocation, accessed application and type of user-agent used. The system processes the behavioral data to generate a user profile by a profiling module, at that point, evaluates the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method by an evaluation module. The selected authentication method will be displayed for the user to complete the authentication process. On the other hand, the system will updating the user profile with data relating to a new successful login session for future evaluation.
提出了一种基于用户行为特征的多模型认证系统中登录认证方法自动选择的智能模型。该协议实时分析用户行为数据,最大限度地减少过程,防止不可信尝试,同时在多模态认证系统中实现无摩擦的用户体验。该系统在登录界面确定用户,检索用户的行为历史数据作为决定因素,基于数据库数据检索匹配用户行为。其中,行为数据包括用户的登录会话时间、地理位置、访问的应用程序和使用的用户代理类型。系统通过分析模块对所述行为数据进行处理生成用户画像,然后结合用户终端的环境参数对所述用户画像进行评估,由评估模块选择认证方式。将显示所选择的认证方法,供用户完成认证过程。另一方面,系统将使用与新成功登录会话相关的数据更新用户配置文件,以便将来进行评估。
{"title":"Automated Login Method Selection in a Multi-modal Authentication System : Login Method Selection based on User Behavior","authors":"Chang Pei Shan, Wong HON LOON, Lee Kay Win, Dahlia Din, Sea Chong Seak","doi":"10.1109/ISCAIE.2019.8743992","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743992","url":null,"abstract":"An intelligent model is proposed to automate selection of login authentication method in a multi-model authentication system based on user behavior profile. The proposed protocol analyzes the user behavior data to minimize the process in real time and prevent untrusted attempt, meanwhile, it able to facilitate frictionless user experience in a multi-modal authentication system. The proposed system determines a user at a log-in interface and retrieves the user’s behavioral historical data as its determinant factors, matching user behavior based on data retrieval from database. Wherein the behavioral data includes the user’s login sessions time, geolocation, accessed application and type of user-agent used. The system processes the behavioral data to generate a user profile by a profiling module, at that point, evaluates the user’s profile by factoring in environmental parameters of the user terminal to select an authentication method by an evaluation module. The selected authentication method will be displayed for the user to complete the authentication process. On the other hand, the system will updating the user profile with data relating to a new successful login session for future evaluation.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Genetic Algorithm and Particle Swarm Optimization Based Microwave Tomography for Breast Cancer Detection 基于混合遗传算法和粒子群优化的乳腺癌微波断层扫描检测
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743814
Mehrnaz Ronagh, M. Eshghi
A study on the development of a microwave tomography imaging algorithm for detecting the malignant tumor in the breast is presented. Tomography modality is based on the electromagnetic reflections generated by the dielectric contrast between breast tissue types at microwave frequencies. In the tomography method, finite difference time domain method (FDTD) has been used as a technique for calculating electromagnetic scattered fields. In this paper, we propose a novel hybrid optimization technique for solving the inverse scattering problem which uses the binary Genetic algorithm (BGA) and binary particle swarm optimization (BPSO). The convergence rate of this proposed algorithm is around 4 times better than the regular BGA. The proposed FDTD/hybrid BGA-BPSO method has the ability to reconstruct the heterogeneous and dispersive breast tissues to provide a quantitative image of permittivity and conductivity profile of the breast. The proposed technique is capable to detect the size, location and permittivity and conductivity of the tumor even though it is surrounded by benign and fibroglandular tissues.
提出了一种用于乳腺恶性肿瘤检测的微波断层成像算法。层析成像模式是基于微波频率下乳房组织类型之间介电对比产生的电磁反射。在层析成像方法中,时域有限差分法(FDTD)被用作计算电磁散射场的技术。本文提出了一种利用二元遗传算法(BGA)和二元粒子群算法(BPSO)求解逆散射问题的混合优化方法。该算法的收敛速度是常规BGA的4倍左右。提出的FDTD/混合BGA-BPSO方法能够重建非均匀和分散的乳房组织,从而提供乳房的介电常数和电导率曲线的定量图像。所提出的技术能够检测肿瘤的大小、位置、介电常数和电导率,即使它被良性和纤维腺组织包围。
{"title":"Hybrid Genetic Algorithm and Particle Swarm Optimization Based Microwave Tomography for Breast Cancer Detection","authors":"Mehrnaz Ronagh, M. Eshghi","doi":"10.1109/ISCAIE.2019.8743814","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743814","url":null,"abstract":"A study on the development of a microwave tomography imaging algorithm for detecting the malignant tumor in the breast is presented. Tomography modality is based on the electromagnetic reflections generated by the dielectric contrast between breast tissue types at microwave frequencies. In the tomography method, finite difference time domain method (FDTD) has been used as a technique for calculating electromagnetic scattered fields. In this paper, we propose a novel hybrid optimization technique for solving the inverse scattering problem which uses the binary Genetic algorithm (BGA) and binary particle swarm optimization (BPSO). The convergence rate of this proposed algorithm is around 4 times better than the regular BGA. The proposed FDTD/hybrid BGA-BPSO method has the ability to reconstruct the heterogeneous and dispersive breast tissues to provide a quantitative image of permittivity and conductivity profile of the breast. The proposed technique is capable to detect the size, location and permittivity and conductivity of the tumor even though it is surrounded by benign and fibroglandular tissues.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115276662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ISCAIE 2019 Book of Abstracts isaie 2019图书文摘
Pub Date : 2019-04-01 DOI: 10.1109/iscaie.2019.8744001
{"title":"ISCAIE 2019 Book of Abstracts","authors":"","doi":"10.1109/iscaie.2019.8744001","DOIUrl":"https://doi.org/10.1109/iscaie.2019.8744001","url":null,"abstract":"","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting trapped humans through chest wall movements with Non-contact Doppler sensor 非接触式多普勒传感器通过胸壁运动检测被困人员
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743708
L. Pham, M. Paul, Chandana Withana
This paper aims to examine a noncontact pulmonary detection method in a laboratory setting, based on the use of frequencies similar to the current smartphone-liked devices. The paper utilises existing Wi-Fi 2.4 GHz spectrum wavelength, and a Doppler effect radar that detects and measures movements of the human chest during in- and exhalation under conditions that simulate entrapment caused by natural or man-made disasters. Based on the simulated scenarios, 100% accuracy was achieved for detecting a human subject when compared to traditional contact or invasive respiration measurements. This approach could be used as an alternative to the commercially designed devices currently used in rescue relief events.
本文旨在研究一种在实验室环境下的非接触肺部检测方法,该方法基于使用与当前智能手机类似的设备相似的频率。该论文利用现有的Wi-Fi 2.4 GHz频谱波长和多普勒效应雷达,在模拟自然或人为灾害造成的困住的情况下,探测和测量人体胸部在吸气和呼气时的运动。基于模拟场景,与传统的接触性或侵入性呼吸测量相比,检测人体受试者的准确率达到100%。这种方法可以作为目前在救援活动中使用的商业设计装置的替代方法。
{"title":"Detecting trapped humans through chest wall movements with Non-contact Doppler sensor","authors":"L. Pham, M. Paul, Chandana Withana","doi":"10.1109/ISCAIE.2019.8743708","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743708","url":null,"abstract":"This paper aims to examine a noncontact pulmonary detection method in a laboratory setting, based on the use of frequencies similar to the current smartphone-liked devices. The paper utilises existing Wi-Fi 2.4 GHz spectrum wavelength, and a Doppler effect radar that detects and measures movements of the human chest during in- and exhalation under conditions that simulate entrapment caused by natural or man-made disasters. Based on the simulated scenarios, 100% accuracy was achieved for detecting a human subject when compared to traditional contact or invasive respiration measurements. This approach could be used as an alternative to the commercially designed devices currently used in rescue relief events.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Automated-Scripting Method for Improved Management of SQL Injection Penetration Tests on a Large Scale 改进大规模SQL注入渗透测试管理的增强自动化脚本方法
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743936
Razman Hakim Abdul Raman
Typically, in an assessment project for a web application or database with a large scale and scope, tasks required to be performed by a security analyst are such as SQL injection and penetration testing. To carry out these large-scale tasks, the analyst will have to perform 100 or more SQLi penetration tests on one or more target. This makes the process much more complex and much harder to implement. This paper attempts to compare large-scale SQL injections performed with Manual Methods, which is the benchmark, and the proposed SQLiAutoScript Method. The SQLiAutoScript method uses sqlmap as a tool, in combination with sqlmap scripting and logging features, to facilitate a more effective and manageable approach within a large scale of hundreds or thousands of SQL injection penetration tests. Comparison of the test results for both Manual and SQLiAutoScript approaches and their benefits is included in the comparative analysis. The tests were performed over a scope of 24 SQL injection (SQLi) tests that comprises over 100,000 HTTP requests and injections, and within a total testing run-time period of about 50 hours. The scope of testing also covers both SQLiAutoScript and Manual methods. In the SQLiAutoScript method, each SQL injection test has its own sub-folder and files for data such as results (output), progress (traffic logs) and logging. In this way across all SQLi tests, the results, data and details related to SQLi tests are logged, available, traceable, accurate and not missed out. Available and traceable data also facilitates traceability of failed SQLi tests, and higher recovery and reruns of failed SQLi tests to maximize increased attack surface upon the target.
通常,在一个规模和范围较大的web应用程序或数据库的评估项目中,需要由安全分析师执行的任务包括SQL注入和渗透测试。为了执行这些大规模任务,分析人员必须在一个或多个目标上执行100个或更多的SQLi渗透测试。这使得这个过程更加复杂,也更加难以实现。本文试图比较以Manual Methods为基准执行的大规模SQL注入和提出的SQLiAutoScript Method。SQLiAutoScript方法使用sqlmap作为工具,结合sqlmap脚本和日志功能,在大规模的数百或数千个SQL注入渗透测试中提供更有效和可管理的方法。对比分析中包括了Manual和SQLiAutoScript方法的测试结果及其优点的比较。测试在24个SQL注入(SQLi)测试范围内执行,这些测试包括超过100,000个HTTP请求和注入,并且在大约50小时的总测试运行周期内执行。测试的范围还包括SQLiAutoScript和Manual方法。在SQLiAutoScript方法中,每个SQL注入测试都有自己的子文件夹和数据文件,例如结果(输出)、进度(流量日志)和日志记录。通过这种方式,在所有SQLi测试中,与SQLi测试相关的结果、数据和细节都被记录下来,可用、可跟踪、准确且不会遗漏。可用和可跟踪的数据还有助于跟踪失败的SQLi测试,提高失败的SQLi测试的恢复和重新运行,从而最大限度地增加对目标的攻击面。
{"title":"Enhanced Automated-Scripting Method for Improved Management of SQL Injection Penetration Tests on a Large Scale","authors":"Razman Hakim Abdul Raman","doi":"10.1109/ISCAIE.2019.8743936","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743936","url":null,"abstract":"Typically, in an assessment project for a web application or database with a large scale and scope, tasks required to be performed by a security analyst are such as SQL injection and penetration testing. To carry out these large-scale tasks, the analyst will have to perform 100 or more SQLi penetration tests on one or more target. This makes the process much more complex and much harder to implement. This paper attempts to compare large-scale SQL injections performed with Manual Methods, which is the benchmark, and the proposed SQLiAutoScript Method. The SQLiAutoScript method uses sqlmap as a tool, in combination with sqlmap scripting and logging features, to facilitate a more effective and manageable approach within a large scale of hundreds or thousands of SQL injection penetration tests. Comparison of the test results for both Manual and SQLiAutoScript approaches and their benefits is included in the comparative analysis. The tests were performed over a scope of 24 SQL injection (SQLi) tests that comprises over 100,000 HTTP requests and injections, and within a total testing run-time period of about 50 hours. The scope of testing also covers both SQLiAutoScript and Manual methods. In the SQLiAutoScript method, each SQL injection test has its own sub-folder and files for data such as results (output), progress (traffic logs) and logging. In this way across all SQLi tests, the results, data and details related to SQLi tests are logged, available, traceable, accurate and not missed out. Available and traceable data also facilitates traceability of failed SQLi tests, and higher recovery and reruns of failed SQLi tests to maximize increased attack surface upon the target.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Sample and Hold Time-to-Amplitude Converter for single photon time-of-flight measurement 用于单光子飞行时间测量的采样和保持时间-幅度转换器
Pub Date : 2019-04-01 DOI: 10.1109/ISCAIE.2019.8743999
Sihui Zhu, Yue Xu, Ding Li, Zhong Wu
A novel Time-to-Amplitude Converter (TAC) based on Sample and Hold (S/H) principle is presented for single photon time-of-flight (TOF) measurement. With a high fill factor as much as 34% for a single photon avalanche diode (SPAD) pixel, the designed TAC offers the potential to realize high-density time-correlated single photon counting (TCSPC) detectors. Post-layout simulation reveals that time resolution of 195 ps LSB is obtained over a 100 ns time full-scale range (FSR). Furthermore, the TAC is characterized by a low differential nonlinearity (DNL) of 0.25% LSB and a low integral nonlinearity (INL) of 0.15 LSB in the whole detectable time range.
提出了一种基于采样保持(S/H)原理的单光子飞行时间(TOF)测量时幅变换器(TAC)。设计的TAC具有高达34%的单光子雪崩二极管(SPAD)像素的高填充因子,为实现高密度时间相关单光子计数(TCSPC)探测器提供了潜力。布局后仿真结果表明,在100 ns时间满量程范围内,LSB的时间分辨率为195 ps。此外,TAC在整个可探测时间范围内具有0.25% LSB的低微分非线性(DNL)和0.15 LSB的低积分非线性(INL)。
{"title":"A Sample and Hold Time-to-Amplitude Converter for single photon time-of-flight measurement","authors":"Sihui Zhu, Yue Xu, Ding Li, Zhong Wu","doi":"10.1109/ISCAIE.2019.8743999","DOIUrl":"https://doi.org/10.1109/ISCAIE.2019.8743999","url":null,"abstract":"A novel Time-to-Amplitude Converter (TAC) based on Sample and Hold (S/H) principle is presented for single photon time-of-flight (TOF) measurement. With a high fill factor as much as 34% for a single photon avalanche diode (SPAD) pixel, the designed TAC offers the potential to realize high-density time-correlated single photon counting (TCSPC) detectors. Post-layout simulation reveals that time resolution of 195 ps LSB is obtained over a 100 ns time full-scale range (FSR). Furthermore, the TAC is characterized by a low differential nonlinearity (DNL) of 0.25% LSB and a low integral nonlinearity (INL) of 0.15 LSB in the whole detectable time range.","PeriodicalId":369098,"journal":{"name":"2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1