Hybrid mobile applications (or apps) are based on web technologies, such as HTML5 and JavaScript, and run in a browser environment. They facilitate cross-platform development. However, the security issues of web technologies are inherited by hybrid mobile apps, where the injected code may execute with the system-level privilege. In this paper, we propose a behavior model to detect malicious behaviors in hybrid mobile apps. Our model uses function-level information to describe how an app's behaviors are activated. Furthermore, once script injection happens, the behaviors made by the injected code can be detected according to the deviation from the app's behavior model.
{"title":"A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications","authors":"Jian Mao, Ruilong Wang, Yueh-Ting Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang","doi":"10.1109/IIKI.2016.2","DOIUrl":"https://doi.org/10.1109/IIKI.2016.2","url":null,"abstract":"Hybrid mobile applications (or apps) are based on web technologies, such as HTML5 and JavaScript, and run in a browser environment. They facilitate cross-platform development. However, the security issues of web technologies are inherited by hybrid mobile apps, where the injected code may execute with the system-level privilege. In this paper, we propose a behavior model to detect malicious behaviors in hybrid mobile apps. Our model uses function-level information to describe how an app's behaviors are activated. Furthermore, once script injection happens, the behaviors made by the injected code can be detected according to the deviation from the app's behavior model.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124169567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the modern battlefield environment has become increasingly complex, the traditional SAR recognition methods are too dependent on the training data source to be robust and universal, which makes it can not meet the demand of modern warfare. So how to automatically interpret the fast increased SAR images becomes an urgent problem. The emergence of big data, cloud computing and deep learning technology makes the automatic and intelligent interpretation of large volume of SAR images become possible. This paper proposes a SAR image storage and recognition system based on cloud platform to automatically obtain and identify all kinds of military targets from a complex scene. The system combines the cloud-based platform and deep learning method to achieve real-time recognizing analyses and batch processing of data. The seamless integration of distributed storage and cloud services meets the needs of large-scale data recognition and management requirements. The assessment shows that the method is more efficient in terms of performance, storage, and fault tolerance.
{"title":"The SAR Image Storage and Recognition System Based on Cloud Platform","authors":"Jia Zhai, Xiaodan Xie, Yusheng Jia","doi":"10.1109/IIKI.2016.113","DOIUrl":"https://doi.org/10.1109/IIKI.2016.113","url":null,"abstract":"As the modern battlefield environment has become increasingly complex, the traditional SAR recognition methods are too dependent on the training data source to be robust and universal, which makes it can not meet the demand of modern warfare. So how to automatically interpret the fast increased SAR images becomes an urgent problem. The emergence of big data, cloud computing and deep learning technology makes the automatic and intelligent interpretation of large volume of SAR images become possible. This paper proposes a SAR image storage and recognition system based on cloud platform to automatically obtain and identify all kinds of military targets from a complex scene. The system combines the cloud-based platform and deep learning method to achieve real-time recognizing analyses and batch processing of data. The seamless integration of distributed storage and cloud services meets the needs of large-scale data recognition and management requirements. The assessment shows that the method is more efficient in terms of performance, storage, and fault tolerance.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents Fablabs, as co-working spaces, where different stakeholders, such as policy makers, companies and citizens can co-create innovative products and services. We are focusing mainly on Fablabs and the opportunities they are providing for the development of rural areas. As an example, we are presenting two cases from two rural municipalities, Ptuj and Ribnica, in Slovenia, Europe.
{"title":"Fablabs as Drivers for Open Innovation and Co-creation to Foster Rural Development","authors":"Emilija Stojmenova Duh, A. Kos","doi":"10.1109/IIKI.2016.70","DOIUrl":"https://doi.org/10.1109/IIKI.2016.70","url":null,"abstract":"The paper presents Fablabs, as co-working spaces, where different stakeholders, such as policy makers, companies and citizens can co-create innovative products and services. We are focusing mainly on Fablabs and the opportunities they are providing for the development of rural areas. As an example, we are presenting two cases from two rural municipalities, Ptuj and Ribnica, in Slovenia, Europe.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The routing in DTN (Delay/Disruption Tolerant Network) deals with network partition and the mobility of nodes. In order to motivate involvement in routing, several incentive schemes are created, one of them is by payment. Suppose the budget is limited, the question is how to make a routing plan based on payments. That is to say how a sender can decide the data amount assigned to one special next hop and the payment for it. This paper proposes a mechanism design approach to define the utility function of the sender and the next hops, then maximize the utility functions for all the participants, including the sender and next hops, using the tool of KKT (Karush-Kuhn-Tucker) conditions solving a nonlinear programming problem with one inequality constraint. Index
{"title":"A Mechanism Design Solution for DTN Routing","authors":"Zhi Lin, Shengling Wang, Chun-Chi Liu, Madiha Ikram","doi":"10.1109/IIKI.2016.42","DOIUrl":"https://doi.org/10.1109/IIKI.2016.42","url":null,"abstract":"The routing in DTN (Delay/Disruption Tolerant Network) deals with network partition and the mobility of nodes. In order to motivate involvement in routing, several incentive schemes are created, one of them is by payment. Suppose the budget is limited, the question is how to make a routing plan based on payments. That is to say how a sender can decide the data amount assigned to one special next hop and the payment for it. This paper proposes a mechanism design approach to define the utility function of the sender and the next hops, then maximize the utility functions for all the participants, including the sender and next hops, using the tool of KKT (Karush-Kuhn-Tucker) conditions solving a nonlinear programming problem with one inequality constraint. Index","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High Resolution Range Profile (HRRP) reflects the size and partial structure feature, and is an effective feature for target recognition. A statistic wide-band feature method based on Optimal Path is proposed, and it can extract accurately the statistic feature of HRRP to realize the stable and unstable targets. The method firstly estimates the scattering points for HRRP based on Optimal Path Means, and more calculates the self-relation feature of all scattering points, and utilizes the value of feature to judge the wave characteristic of target movement, finally can recognize stable targets. Simulation examples show that the proposed feature is steady compared with the common wide-band features, such as radial length, central moments feature, and the entropy of HRRP, and can get a well classified result in the low Signal-to-Noise (SNR) condition.
高分辨率距离像(High Resolution Range Profile, HRRP)反映了目标的大小和局部结构特征,是目标识别的有效特征。提出了一种基于最优路径的统计宽带特征提取方法,该方法能够准确提取出HRRP的统计特征,从而实现稳定目标和不稳定目标。该方法首先基于最优路径均值对HRRP散射点进行估计,然后计算各散射点的自关联特征,利用特征值判断目标运动的波动特性,最终实现对稳定目标的识别。仿真实例表明,与常用的径向长度、中心矩特征、HRRP熵等宽带特征相比,该特征具有较好的稳定性,在低信噪比条件下可以得到较好的分类结果。
{"title":"The Statistical Wide-Band Feature Method of HRRP Based on Optimal Path Means","authors":"Tao Zhao, Chunzhu Dong","doi":"10.1109/IIKI.2016.38","DOIUrl":"https://doi.org/10.1109/IIKI.2016.38","url":null,"abstract":"High Resolution Range Profile (HRRP) reflects the size and partial structure feature, and is an effective feature for target recognition. A statistic wide-band feature method based on Optimal Path is proposed, and it can extract accurately the statistic feature of HRRP to realize the stable and unstable targets. The method firstly estimates the scattering points for HRRP based on Optimal Path Means, and more calculates the self-relation feature of all scattering points, and utilizes the value of feature to judge the wave characteristic of target movement, finally can recognize stable targets. Simulation examples show that the proposed feature is steady compared with the common wide-band features, such as radial length, central moments feature, and the entropy of HRRP, and can get a well classified result in the low Signal-to-Noise (SNR) condition.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Global navigation satellite system can only work in line of sight environment, and it fails to operate in non-line of sight to the sky. The emerging 5G cellular networks will provide the ability of device to device real-time communication, at the same time, millimeter-wave transmission is regarded as a key technique, which can provide the location precise of centimeter or millimeter level. In this paper, two millimeter-wave with Raised-Cosine carrier are introduced, and the precisions are simulated and analyzed which will provide some reference to the future waveform design in 5G.
{"title":"Study on the Ranging Estimation Based on Millimeter-Wave with Raised-Cosine Carrier","authors":"Xue-rong Cui, Xiao Chen, Huiying Song, Juan Li","doi":"10.1109/IIKI.2016.107","DOIUrl":"https://doi.org/10.1109/IIKI.2016.107","url":null,"abstract":"Global navigation satellite system can only work in line of sight environment, and it fails to operate in non-line of sight to the sky. The emerging 5G cellular networks will provide the ability of device to device real-time communication, at the same time, millimeter-wave transmission is regarded as a key technique, which can provide the location precise of centimeter or millimeter level. In this paper, two millimeter-wave with Raised-Cosine carrier are introduced, and the precisions are simulated and analyzed which will provide some reference to the future waveform design in 5G.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133958330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weishan Zhang, Bo Li, Dehai Zhao, Faming Gong, Q. Lu
Maximizing benefits from a cloud cluster with minimum computational costs is challenging. An accurate prediction to cloud workload is important to maximize resources usage in the cloud environment. In this paper, we propose an approach using recurrent neural networks (RNN) to realize workload prediction, where CPU and RAM metrics are used to evaluate the performance of the proposed approach. In order to obtain optimized parameter set, an orthogonal experimental design is conducted to find the most influential parameters in RNN. The experiments with Google Cloud Trace data set shows that the RNN based approach can achieve high accuracy of workload prediction, which lays a good foundation for optimizing the running of a cloud computing environment.
{"title":"Workload Prediction for Cloud Cluster Using a Recurrent Neural Network","authors":"Weishan Zhang, Bo Li, Dehai Zhao, Faming Gong, Q. Lu","doi":"10.1109/IIKI.2016.39","DOIUrl":"https://doi.org/10.1109/IIKI.2016.39","url":null,"abstract":"Maximizing benefits from a cloud cluster with minimum computational costs is challenging. An accurate prediction to cloud workload is important to maximize resources usage in the cloud environment. In this paper, we propose an approach using recurrent neural networks (RNN) to realize workload prediction, where CPU and RAM metrics are used to evaluate the performance of the proposed approach. In order to obtain optimized parameter set, an orthogonal experimental design is conducted to find the most influential parameters in RNN. The experiments with Google Cloud Trace data set shows that the RNN based approach can achieve high accuracy of workload prediction, which lays a good foundation for optimizing the running of a cloud computing environment.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133076478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Compared with the traditional multi-source data, the data of scientific and technical literature are mainly based on different scientific and technological documents. Their contents are more emphasis on technical and correlation. The paper took the data of scientific and technical periodical papers, patent and scientific and technical policies as examples, described the characteristics of data about multi-source scientific and technical literature, the method of data processing. And it introduced the author's research work on data processing and analysis for multi-source scientific and technical literature. Experiments showed that proposed model and method in the paper had certain effect. It was necessary to explore the application of multi-source scientific and technical literature.
{"title":"Processing and Mining of Multi-source Scientific and Technical Literature Data","authors":"Wen Zeng","doi":"10.1109/IIKI.2016.89","DOIUrl":"https://doi.org/10.1109/IIKI.2016.89","url":null,"abstract":"Compared with the traditional multi-source data, the data of scientific and technical literature are mainly based on different scientific and technological documents. Their contents are more emphasis on technical and correlation. The paper took the data of scientific and technical periodical papers, patent and scientific and technical policies as examples, described the characteristics of data about multi-source scientific and technical literature, the method of data processing. And it introduced the author's research work on data processing and analysis for multi-source scientific and technical literature. Experiments showed that proposed model and method in the paper had certain effect. It was necessary to explore the application of multi-source scientific and technical literature.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"42 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a new concept propulsion system, pulse detonation engines (PDE) show many advantages compared to other conventional propulsion system. In the future, pulse detonation engines will be expected to become the propulsion system of hypersonic flight vehicle. However, exhaust plume is the infrared radiation source of detection, tracking and recognition. Two-dimensional axisymmetric and unsteady Navier-Stokes equations were numerically solved and detailed chemical reaction kinetics of hydrogen/air mixture was used. With the fields of pressure, temperature and main components of the exhaust plume as input data, the line-by-line method and LOS method was used to calculate the infrared spectral radiation properties of the plume. The plume flow field structure and infrared radiation characteristics are analyzed in detail. The effect of the different nozzle structure on plume radiation was analyzed.
{"title":"The Research on Plume Flow Field and Infrared Radiation Characteristic of Pulse Detonation Engine","authors":"Hongxia Mao, Xingdong Bao, Jie Wu, Li Zheng","doi":"10.1109/IIKI.2016.112","DOIUrl":"https://doi.org/10.1109/IIKI.2016.112","url":null,"abstract":"As a new concept propulsion system, pulse detonation engines (PDE) show many advantages compared to other conventional propulsion system. In the future, pulse detonation engines will be expected to become the propulsion system of hypersonic flight vehicle. However, exhaust plume is the infrared radiation source of detection, tracking and recognition. Two-dimensional axisymmetric and unsteady Navier-Stokes equations were numerically solved and detailed chemical reaction kinetics of hydrogen/air mixture was used. With the fields of pressure, temperature and main components of the exhaust plume as input data, the line-by-line method and LOS method was used to calculate the infrared spectral radiation properties of the plume. The plume flow field structure and infrared radiation characteristics are analyzed in detail. The effect of the different nozzle structure on plume radiation was analyzed.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The challenge of taking care of aged patients who lost control of their bladders and bowel movements is to respond to the patients' needs in a timely manner, which often requires a caretaker (e.g., a family member or a hired assistant) to stay on watch 24/7. In light of advance in cloud computing, we present a real-time low-cost low-power monitoring and notification system that can continuously monitor the patient bedding conditions, detect the conditions that help is needed and notify the care-takers. The system consists of TI SensorTags, Raspberry Pis, and IBM Bluemix. The TI SensorTag is a sensing device, while Raspberry Pi acts as a messenger receiving data collected by TI SensorTags via Bluetooth technology and transmitting the data to Bluemix, a cloud based platform developed by IBM, via WiFi. The low power Bluetooth communication enables a longer sensor battery life. The system design and operation of a working prototype will be described in this paper.
{"title":"An IoT-based Real Time Low Cost Low Power Monitoring and Notification System for Aged Care","authors":"Quang Nguyen, C. Gong, Liran Ma","doi":"10.1109/IIKI.2016.11","DOIUrl":"https://doi.org/10.1109/IIKI.2016.11","url":null,"abstract":"The challenge of taking care of aged patients who lost control of their bladders and bowel movements is to respond to the patients' needs in a timely manner, which often requires a caretaker (e.g., a family member or a hired assistant) to stay on watch 24/7. In light of advance in cloud computing, we present a real-time low-cost low-power monitoring and notification system that can continuously monitor the patient bedding conditions, detect the conditions that help is needed and notify the care-takers. The system consists of TI SensorTags, Raspberry Pis, and IBM Bluemix. The TI SensorTag is a sensing device, while Raspberry Pi acts as a messenger receiving data collected by TI SensorTags via Bluetooth technology and transmitting the data to Bluemix, a cloud based platform developed by IBM, via WiFi. The low power Bluetooth communication enables a longer sensor battery life. The system design and operation of a working prototype will be described in this paper.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}