Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604942
S. M. Muzammal, M. A. Shah
Smartphones are ubiquitous in today's world. With the enhanced and advanced functionalities, smartphones carry a large amount of user's private and confidential data. There are numerous risks, threats, and the rise in powerfulness and effectiveness of malware attacks make smartphones more prone and vulnerable. Due to the rapid increase in Android smartphones users, demands based on new and advanced features as well as the usage ease have been lavished on developers. The Android application developers are working hard to develop innovative applications for millions of Android users around the world. In this struggle of advancement, they are seeking permissions to critical system resources, not directly offered by Android. One of the most projecting way is through ADB (Android Debug Bridge) that has been granted permissions to use critical system resources. There are many applications on Google Play Store that utilize ADB proxy to provide users with unconventional and smart features on smartphones. This paper reviews the ADB capabilities and how Internet access and ADB together allow applications to expose sensitive data of an Android smartphone device. Furthermore, a malicious Android application, `ScreenStealer', has been developed and its effects on Android-based smartphones are studied.
智能手机在当今世界无处不在。随着智能手机的增强和先进的功能,携带大量的用户的私人和机密数据。有无数的风险和威胁,恶意软件攻击的强大和有效性的增加使智能手机更容易受到攻击。由于Android智能手机用户的快速增长,开发者对新功能和高级功能的需求以及易用性的要求也越来越高。Android应用程序开发人员正在努力为全球数百万Android用户开发创新的应用程序。在这场进步的斗争中,他们正在寻求关键系统资源的权限,而Android并没有直接提供这些权限。最突出的方法之一是通过ADB (Android Debug Bridge),它被授予使用关键系统资源的权限。Google Play Store上有许多应用程序利用ADB代理为用户提供智能手机上的非常规和智能功能。本文回顾了ADB功能,以及Internet访问和ADB如何一起允许应用程序暴露Android智能手机设备的敏感数据。此外,一种恶意的Android应用程序“ScreenStealer”已经被开发出来,并研究了它对基于Android的智能手机的影响。
{"title":"ScreenStealer: Addressing Screenshot attacks on Android devices","authors":"S. M. Muzammal, M. A. Shah","doi":"10.1109/IConAC.2016.7604942","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604942","url":null,"abstract":"Smartphones are ubiquitous in today's world. With the enhanced and advanced functionalities, smartphones carry a large amount of user's private and confidential data. There are numerous risks, threats, and the rise in powerfulness and effectiveness of malware attacks make smartphones more prone and vulnerable. Due to the rapid increase in Android smartphones users, demands based on new and advanced features as well as the usage ease have been lavished on developers. The Android application developers are working hard to develop innovative applications for millions of Android users around the world. In this struggle of advancement, they are seeking permissions to critical system resources, not directly offered by Android. One of the most projecting way is through ADB (Android Debug Bridge) that has been granted permissions to use critical system resources. There are many applications on Google Play Store that utilize ADB proxy to provide users with unconventional and smart features on smartphones. This paper reviews the ADB capabilities and how Internet access and ADB together allow applications to expose sensitive data of an Android smartphone device. Furthermore, a malicious Android application, `ScreenStealer', has been developed and its effects on Android-based smartphones are studied.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604904
Xinxin Yao, Hua-Liang Wei
This study presents a new method for walking gesture representation and recognition based on a symbolic representation. The symbolic representation is used to represent images which can be decomposed into a number of time series and the distance between time series can be characterized based on the distances between symbols. In this work, the distances between symbols are defined according to the average value of each segment rather than the distance calculated based on Gaussian distribution as used in traditional symbolic representations. The proposed method is applied to a short template video containing a number of walking steps (gestures). In the case studies we consider a database containing 104 test videos, taken from 101 people, and our objective is to identify whether a person in the testing video is the same person as in the template video (i.e. the training video), and the identification accuracy of the method is around 98%.
{"title":"Walking gestures recognition based on a novel symbolic representation","authors":"Xinxin Yao, Hua-Liang Wei","doi":"10.1109/IConAC.2016.7604904","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604904","url":null,"abstract":"This study presents a new method for walking gesture representation and recognition based on a symbolic representation. The symbolic representation is used to represent images which can be decomposed into a number of time series and the distance between time series can be characterized based on the distances between symbols. In this work, the distances between symbols are defined according to the average value of each segment rather than the distance calculated based on Gaussian distribution as used in traditional symbolic representations. The proposed method is applied to a short template video containing a number of walking steps (gestures). In the case studies we consider a database containing 104 test videos, taken from 101 people, and our objective is to identify whether a person in the testing video is the same person as in the template video (i.e. the training video), and the identification accuracy of the method is around 98%.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604925
Leiping Xi, Quanmin Zhu, D. Zhang
This study proposes a new sliding mode control strategy based on a fuzzy reaching law to enhance the yaw angle control of a Tail-sitter UAV. First of all, the simplified yaw angle dynamic model is analyzed, then the fuzzy reaching law is designed considering both the chattering reduction and position tracking; finally, the sliding mode control law is designed for the Tail-sitter UAV's yaw angle system with disturbance and its control behavior is investigated. The simulation results show that the control law is not sensitive to the disturbance, which can not only control the chattering effectively but also achieve a fast tracking.
{"title":"Sliding mode control design based on fuzzy reaching law for yaw angle of a Tail-sitter UAV","authors":"Leiping Xi, Quanmin Zhu, D. Zhang","doi":"10.1109/IConAC.2016.7604925","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604925","url":null,"abstract":"This study proposes a new sliding mode control strategy based on a fuzzy reaching law to enhance the yaw angle control of a Tail-sitter UAV. First of all, the simplified yaw angle dynamic model is analyzed, then the fuzzy reaching law is designed considering both the chattering reduction and position tracking; finally, the sliding mode control law is designed for the Tail-sitter UAV's yaw angle system with disturbance and its control behavior is investigated. The simulation results show that the control law is not sensitive to the disturbance, which can not only control the chattering effectively but also achieve a fast tracking.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129900791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604961
Daifur Abubakar Girei, M. A. Shah, Muhammad Bilal Shahid
Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities. We implement the technique in android, taking advantage of the android logging system using logcat command. The effectiveness of this method is shown by experimenting on android devices.
{"title":"An enhanced botnet detection technique for mobile devices using log analysis","authors":"Daifur Abubakar Girei, M. A. Shah, Muhammad Bilal Shahid","doi":"10.1109/IConAC.2016.7604961","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604961","url":null,"abstract":"Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities. We implement the technique in android, taking advantage of the android logging system using logcat command. The effectiveness of this method is shown by experimenting on android devices.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121337699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604949
D. Zhang, Zili Chen, Leiping Xi
A variable universe fractal dual fuzzy PID controller is designed to solve the interference problems caused by the changes of airspeed and aerodynamic parameters during the transition from vertical flight to horizontal flight of tail-sitter UAV. By taking error, error change and airspeed as inputs, the controller can constantly stabilizes the system according to the changes of system error and flight status. High control accuracy is achieved and less fuzzy rules are needed due to the self-tuning of the universe. In order to improve the dynamic performance of the system, a normalized acceleration parameter is designed as fractal factor to reflect the response speed of the system. The simulation and experimental results reveal that the controller not only improves the dynamic performance and control precision of the system, but also has Strong adaptive ability to the changes of system error and flight status.
{"title":"Adaptive dual fuzzy PID control method for longitudinal attitude control of tail-sitter UAV","authors":"D. Zhang, Zili Chen, Leiping Xi","doi":"10.1109/IConAC.2016.7604949","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604949","url":null,"abstract":"A variable universe fractal dual fuzzy PID controller is designed to solve the interference problems caused by the changes of airspeed and aerodynamic parameters during the transition from vertical flight to horizontal flight of tail-sitter UAV. By taking error, error change and airspeed as inputs, the controller can constantly stabilizes the system according to the changes of system error and flight status. High control accuracy is achieved and less fuzzy rules are needed due to the self-tuning of the universe. In order to improve the dynamic performance of the system, a normalized acceleration parameter is designed as fractal factor to reflect the response speed of the system. The simulation and experimental results reveal that the controller not only improves the dynamic performance and control precision of the system, but also has Strong adaptive ability to the changes of system error and flight status.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IConAC.2016.7604895
D. Peng, Hanmei Zhao, Li Huang, Liqun Gu
With the market-oriented reform in power industry, the research on the optimal distribution of load in thermal power plant has highlighted the importance. This paper established a model of the optimal load distribution about turbine, which take the constraints of thermal power plant with the valve point effect. A practical example analysis has verified that this improved algorithm in particle swarm optimization is feasible in solving the problem of optimal load distribution.
{"title":"Optimal load distribution in power plants based on dynamic inertia weight particle swarm algorithm","authors":"D. Peng, Hanmei Zhao, Li Huang, Liqun Gu","doi":"10.1109/IConAC.2016.7604895","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604895","url":null,"abstract":"With the market-oriented reform in power industry, the research on the optimal distribution of load in thermal power plant has highlighted the importance. This paper established a model of the optimal load distribution about turbine, which take the constraints of thermal power plant with the valve point effect. A practical example analysis has verified that this improved algorithm in particle swarm optimization is feasible in solving the problem of optimal load distribution.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/IConAC.2016.7604951
Chenguang Yang, Junshen Chen, Fei Chen
In this paper, we have developed a neural network (NN) control enhanced teleoperation strategy which has been implemented on the Baxter robot. The upper limb motion of the human operator is captured by the inertial measurement unit (IMU) embedded in a pair of MYO armbands which are worn on the operator's forearm and upper arm, respectively. They are used to detect and to reconstruct the physical motion of shoulder and elbow joints of the operator. Given human operator's motion as reference trajectories, the robot is controlled using NN technique to compensate for its unknown dynamics. Adaptive law has been synthesized based on Lyapunov theory to enable effective NN learning. Preliminary experiments have been carried out to test the proposed method, which results in satisfactory performance on the Baxter robot teleoperation.
{"title":"Neural learning enhanced teleoperation control of Baxter robot using IMU based Motion Capture","authors":"Chenguang Yang, Junshen Chen, Fei Chen","doi":"10.1109/IConAC.2016.7604951","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604951","url":null,"abstract":"In this paper, we have developed a neural network (NN) control enhanced teleoperation strategy which has been implemented on the Baxter robot. The upper limb motion of the human operator is captured by the inertial measurement unit (IMU) embedded in a pair of MYO armbands which are worn on the operator's forearm and upper arm, respectively. They are used to detect and to reconstruct the physical motion of shoulder and elbow joints of the operator. Given human operator's motion as reference trajectories, the robot is controlled using NN technique to compensate for its unknown dynamics. Adaptive law has been synthesized based on Lyapunov theory to enable effective NN learning. Preliminary experiments have been carried out to test the proposed method, which results in satisfactory performance on the Baxter robot teleoperation.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115698608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/IConAC.2016.7604950
Runxian Yang, Chenguang Yang, Mou Chen, J. Na
In this paper, we have developed a disturbance observer (DOB) based on robust control method for a class of nonlinear robot manipulators with time-varying uncertainty. To facilitate digital implementation of the controller, the robot system is formulated in discrete time. The DOB controller is design to compensate for uncertainty and disturbance by bounding both all states and observed uncertain function in a control region. The robust stability of closed-loop robot system can be well guaranteed by applying Schur complement theory and Lyapunov analysis, such that parameters of the DOB controller are derived using linear matrix inequalities (LMIs) theory. Simulation studies have been performed to test and verify the proposed control scheme, which results in supreme robust control and satisfied trajectory tracking performance for robot manipulators with time-varying uncertainty.
{"title":"Robust control for robot manipulators with time-varying uncertainty based on bounded observer in discrete time","authors":"Runxian Yang, Chenguang Yang, Mou Chen, J. Na","doi":"10.1109/IConAC.2016.7604950","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604950","url":null,"abstract":"In this paper, we have developed a disturbance observer (DOB) based on robust control method for a class of nonlinear robot manipulators with time-varying uncertainty. To facilitate digital implementation of the controller, the robot system is formulated in discrete time. The DOB controller is design to compensate for uncertainty and disturbance by bounding both all states and observed uncertain function in a control region. The robust stability of closed-loop robot system can be well guaranteed by applying Schur complement theory and Lyapunov analysis, such that parameters of the DOB controller are derived using linear matrix inequalities (LMIs) theory. Simulation studies have been performed to test and verify the proposed control scheme, which results in supreme robust control and satisfied trajectory tracking performance for robot manipulators with time-varying uncertainty.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/IConAC.2016.7604957
Kim Perren, Lili Yang, Jinjin He, Shuanghua Yang, Yixing Shan
Utility stakeholders often view autonomic feedback systems as valuable tools for moderating consumption of household resources (e.g. electricity). However, to be successful, such technology must be not only informative but also persuasive. This paper presents the water user classification (WUC) function of a decision support system (DSS) for residential water consumers. This function has been designed to harness personal value systems and wider social norms in order to promote water conservation. It uses data on home appliance efficiency, routine water usage and environmental values to attribute DSS users with a water user identity. Where the attributed identity is at odds with a self-defined `green' identity, users may be prompted to reevaluate their everyday practices. The function also offers `smart' personalized water saving advice. In these ways, it aims to encourage consumers to adopt sustainable water saving behaviors. This paper describes the design of the WUC function and its contribution to the DSS. It additionally highlights the crucial role of behavior change theory in the delivery of successful technology-based interventions.
{"title":"Incorporating persuasion into a decision support system: The case of the water user classification function","authors":"Kim Perren, Lili Yang, Jinjin He, Shuanghua Yang, Yixing Shan","doi":"10.1109/IConAC.2016.7604957","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604957","url":null,"abstract":"Utility stakeholders often view autonomic feedback systems as valuable tools for moderating consumption of household resources (e.g. electricity). However, to be successful, such technology must be not only informative but also persuasive. This paper presents the water user classification (WUC) function of a decision support system (DSS) for residential water consumers. This function has been designed to harness personal value systems and wider social norms in order to promote water conservation. It uses data on home appliance efficiency, routine water usage and environmental values to attribute DSS users with a water user identity. Where the attributed identity is at odds with a self-defined `green' identity, users may be prompted to reevaluate their everyday practices. The function also offers `smart' personalized water saving advice. In these ways, it aims to encourage consumers to adopt sustainable water saving behaviors. This paper describes the design of the WUC function and its contribution to the DSS. It additionally highlights the crucial role of behavior change theory in the delivery of successful technology-based interventions.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}