首页 > 最新文献

2018 International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
DDoS attack detection mechanism in the application layer using user features DDoS攻击检测机制在应用层利用用户特性
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356848
Silvia Bravo, D. Mauricio
DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot.
DDoS攻击是近年来最具破坏性的计算机攻击之一。攻击者发送大量请求使受害机器饱和,并停止向合法用户提供服务。一般来说,攻击主要针对网络层和应用层,而应用层的攻击越来越多,主要是由于其易于执行和难以检测。本文提出了一种低成本的检测方法,该方法利用Web用户的特征来检测攻击。为此,使用PHP和JavaScript设计的函数实时提取特性。它们由1阶分类器进行评估,以区分真实用户和DDoS攻击。真正的用户是通过与计算机系统交互的请求来识别的,而DDoS攻击是机器人发送的请求,通过不加区分的请求使系统过载。测试在计算机系统上执行,使用真实用户的请求和使用LOIC、OWASP和GoldenEye工具的攻击。结果表明,该方法的检测效率为100%,并且可以根据网络用户的特征区分真实用户和机器人。
{"title":"DDoS attack detection mechanism in the application layer using user features","authors":"Silvia Bravo, D. Mauricio","doi":"10.1109/INFOCT.2018.8356848","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356848","url":null,"abstract":"DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Low-complexity intra coding algorithm based on convolutional neural network for HEVC 基于卷积神经网络的HEVC低复杂度内编码算法
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356852
Takafumi Katayama, Kazuki Kuroda, Wen Shi, Tian Song, T. Shimamoto
In this paper, we propose a fast coding unit (CU) size decision algorithm for high efficiency video coding (HEVC) based on convolutional neural network. The proposed fast algorithm contributes to decrease no less than two CU partition modes in each coding tree unit for full rate-distortion optimization processing, thereby reducing the encoder hardware complexity. Moreover, our algorithm use only texture information and it does not depend on the correlations among CU depths or spatially nearby CUs. It is friendly to the parallel processing and it can improve the pipeline process of RDO. The proposed algorithm is implemented in the reference software of HEVC (HM16.7). The simulation results show that the proposed algorithm can achieve over 67.3% computation complexity reduction comparing to the original HEVC algorithm.
本文提出了一种基于卷积神经网络的高效视频编码(HEVC)的快速编码单元(CU)大小决策算法。提出的快速算法有助于在每个编码树单元中减少不少于两个CU划分模式进行全率失真优化处理,从而降低编码器的硬件复杂度。此外,我们的算法只使用纹理信息,不依赖于CU深度之间的相关性或空间附近的CU。该方法有利于并行处理,改善了RDO的流水线过程。该算法在HEVC参考软件(HM16.7)中实现。仿真结果表明,与原HEVC算法相比,该算法的计算复杂度降低了67.3%以上。
{"title":"Low-complexity intra coding algorithm based on convolutional neural network for HEVC","authors":"Takafumi Katayama, Kazuki Kuroda, Wen Shi, Tian Song, T. Shimamoto","doi":"10.1109/INFOCT.2018.8356852","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356852","url":null,"abstract":"In this paper, we propose a fast coding unit (CU) size decision algorithm for high efficiency video coding (HEVC) based on convolutional neural network. The proposed fast algorithm contributes to decrease no less than two CU partition modes in each coding tree unit for full rate-distortion optimization processing, thereby reducing the encoder hardware complexity. Moreover, our algorithm use only texture information and it does not depend on the correlations among CU depths or spatially nearby CUs. It is friendly to the parallel processing and it can improve the pipeline process of RDO. The proposed algorithm is implemented in the reference software of HEVC (HM16.7). The simulation results show that the proposed algorithm can achieve over 67.3% computation complexity reduction comparing to the original HEVC algorithm.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A brief review of methods and approaches proposed in existing literature to address issues in wireless big data 简要回顾现有文献中提出的解决无线大数据问题的方法和途径
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356832
Mahwish Amjad, Faisal Iradat
Big data generated from wireless devices bring distinct challenges for the researchers due to its inherent spatial temporal nature. Reviewing existing literature on wireless big data, two major challenges are identified, processing and storage. To address these challenges various methodologies/approaches have been proposed and presented in the recent literature. To present the existing state of research on challenges associated with wireless big data, we present a systematic literature review of selected publications that address these issues. We also present areas which have not been addressed in the existing literature.
无线设备产生的大数据由于其固有的时空性质,给研究人员带来了独特的挑战。回顾现有的关于无线大数据的文献,我们发现了两个主要的挑战,处理和存储。为了应对这些挑战,在最近的文献中提出了各种方法/方法。为了展示与无线大数据相关的挑战的研究现状,我们对选定的解决这些问题的出版物进行了系统的文献综述。我们还提出了在现有文献中尚未解决的领域。
{"title":"A brief review of methods and approaches proposed in existing literature to address issues in wireless big data","authors":"Mahwish Amjad, Faisal Iradat","doi":"10.1109/INFOCT.2018.8356832","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356832","url":null,"abstract":"Big data generated from wireless devices bring distinct challenges for the researchers due to its inherent spatial temporal nature. Reviewing existing literature on wireless big data, two major challenges are identified, processing and storage. To address these challenges various methodologies/approaches have been proposed and presented in the recent literature. To present the existing state of research on challenges associated with wireless big data, we present a systematic literature review of selected publications that address these issues. We also present areas which have not been addressed in the existing literature.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Addressing security aspects for HPC infrastructure 解决HPC基础设施的安全问题
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356835
R. Bulusu, Pallav Jain, Pravin Pawar, M. Afzal, Sanjay Wandhekar
Today High-Performance Computing (HPC) market is finding an increasing rate of adoption of the technology in a number of industries and verticals. With the increased adoption of the HPC technology, there is also rise in the concerns with the security aspects of this technology. Many of the system engineers and technologists that worked closely with the HPC technology believes HPC security posture is in parity with traditional computer infrastructure security. The goal of this paper is to share the learning of common security gaps and also to increase awareness in the market on how best to alleviate the security concerns for the HPC deployments. After analyzing many of the HPC deployments, at Centre for Development of Advanced Computing (CDAC), Indian Institutes of Technology (IITs), and National Institutes of Technology (NITs) in India, CDAC team has identified many common security loopholes and corresponding solutions for better security environment without fundamentally changing how they have deployed and way of using the HPC infrastructure.
今天,高性能计算(HPC)市场发现,在许多行业和垂直领域,该技术的采用率正在不断提高。随着高性能计算技术的日益普及,人们对该技术安全方面的担忧也在增加。许多与HPC技术密切合作的系统工程师和技术人员认为,HPC的安全态势与传统计算机基础设施的安全不相上下。本文的目的是分享对常见安全漏洞的了解,并提高市场对如何最好地减轻HPC部署的安全问题的认识。在分析了高级计算发展中心(CDAC)、印度理工学院(iit)和印度国立理工学院(nit)的许多HPC部署后,CDAC团队发现了许多常见的安全漏洞和相应的解决方案,以获得更好的安全环境,而无需从根本上改变他们部署和使用HPC基础设施的方式。
{"title":"Addressing security aspects for HPC infrastructure","authors":"R. Bulusu, Pallav Jain, Pravin Pawar, M. Afzal, Sanjay Wandhekar","doi":"10.1109/INFOCT.2018.8356835","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356835","url":null,"abstract":"Today High-Performance Computing (HPC) market is finding an increasing rate of adoption of the technology in a number of industries and verticals. With the increased adoption of the HPC technology, there is also rise in the concerns with the security aspects of this technology. Many of the system engineers and technologists that worked closely with the HPC technology believes HPC security posture is in parity with traditional computer infrastructure security. The goal of this paper is to share the learning of common security gaps and also to increase awareness in the market on how best to alleviate the security concerns for the HPC deployments. After analyzing many of the HPC deployments, at Centre for Development of Advanced Computing (CDAC), Indian Institutes of Technology (IITs), and National Institutes of Technology (NITs) in India, CDAC team has identified many common security loopholes and corresponding solutions for better security environment without fundamentally changing how they have deployed and way of using the HPC infrastructure.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization methods for the fault injection tool SEInjector 故障注入工具SEInjector的优化方法
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356836
Xiankai Meng, QingPing Tan, Z. Shao, N. Zhang, Jianjun Xu, -Haoyu Zhang
In the space environment, computer is easily affected by high-energy particle irradiation, which may incur transient faults, also known as soft errors. Soft error is one of the serious problems for space computation, making the space computer system unreliable. Many efforts have been made in this research area. One of them is fault injection technique, an experimental method for software reliability evaluation. To evaluate the software reliability running on x86/x64 architecture, we have designed a fault injection framework SEInjector. Like many other fault injection tools, SEInjector has been designed as making statistically sampling by randomized selection of fault locations. But, in some cases, we need detail analysis for fault-tolerance related design decisions, and full fault space exploration is required. However, the vast fault space makes the complete fault space exploration impractical. In this paper, we propose several methods to prune the fault space. We prune the known-outcome faults by the registers usage information, and we prune faults leading to the same outcome by classify the faults into equivalence classes. Experiment and calculation show that using these methods, the full fault space coverage time consumption can be largely reduced.
在空间环境中,计算机容易受到高能粒子辐射的影响,产生瞬态故障,也称为软错误。软误差是空间计算中的一个严重问题,它使空间计算机系统不可靠。在这个研究领域已经做了很多努力。故障注入技术是软件可靠性评估的一种实验方法。为了评估软件在x86/x64架构下的可靠性,我们设计了一个故障注入框架SEInjector。与许多其他断层注入工具一样,SEInjector被设计为通过随机选择断层位置进行统计采样。但是,在某些情况下,我们需要对与容错相关的设计决策进行详细分析,并且需要对整个故障空间进行探索。然而,巨大的断层空间使完整的断层空间勘探变得不切实际。本文提出了几种对故障空间进行剪枝的方法。通过寄存器使用信息对已知结果的故障进行剪枝,并将故障划分为等价类,对导致相同结果的故障进行剪枝。实验和计算表明,使用这些方法可以大大减少全故障空间覆盖的时间消耗。
{"title":"Optimization methods for the fault injection tool SEInjector","authors":"Xiankai Meng, QingPing Tan, Z. Shao, N. Zhang, Jianjun Xu, -Haoyu Zhang","doi":"10.1109/INFOCT.2018.8356836","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356836","url":null,"abstract":"In the space environment, computer is easily affected by high-energy particle irradiation, which may incur transient faults, also known as soft errors. Soft error is one of the serious problems for space computation, making the space computer system unreliable. Many efforts have been made in this research area. One of them is fault injection technique, an experimental method for software reliability evaluation. To evaluate the software reliability running on x86/x64 architecture, we have designed a fault injection framework SEInjector. Like many other fault injection tools, SEInjector has been designed as making statistically sampling by randomized selection of fault locations. But, in some cases, we need detail analysis for fault-tolerance related design decisions, and full fault space exploration is required. However, the vast fault space makes the complete fault space exploration impractical. In this paper, we propose several methods to prune the fault space. We prune the known-outcome faults by the registers usage information, and we prune faults leading to the same outcome by classify the faults into equivalence classes. Experiment and calculation show that using these methods, the full fault space coverage time consumption can be largely reduced.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Single-link failure recovery with or without software-defined networking switches 单链路故障恢复有或没有软件定义的网络交换机
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356846
Dawei Li, Jie Wu, Dajin Wang
In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through pre-configured IP tunnels), which will deliver the affected traffic to its destination without using the failed link. The goal of the approach is to achieve faster failure recovery than traditional routing protocols that employ reactive computing upon link failures. Software-Defined Networking (SDN) switches can serve as the designated switches because they can flexibly redirect affected traffic to other routes, instead of only to the shortest paths in the network. However, SDN switches are very expensive. Our objective is to minimize the number of SDN switches needed and to guarantee that the network can still recover from any single-link failure. For networks with uniform link costs, we show that using normal non-SDN switches with IP tunneling capability as designated switches can guarantee recovery from any single-link failure. For networks with general link costs, we show that by using SDN switches only when necessary, we can reduce the total number of SDN switches needed compared to an existing work.
在本文中,我们考虑在给定的网络拓扑中单链路故障的IP快速恢复。其基本思想是用指定的交换机取代一些现有的路由器。当链路发生故障时,受影响的路由器会将所有受影响的流量(通过预先配置的IP隧道)发送到指定的交换机,由指定的交换机将受影响的流量直接送到目的地,而不使用故障的链路。该方法的目标是实现比传统路由协议更快的故障恢复,传统路由协议在链路故障时采用响应式计算。SDN (Software-Defined Networking)交换机可以作为指定交换机,因为它可以灵活地将受影响的流量重定向到其他路由上,而不仅仅是网络中最短的路径。然而,SDN交换机非常昂贵。我们的目标是最小化所需SDN交换机的数量,并保证网络仍然可以从任何单链路故障中恢复。对于具有统一链路成本的网络,我们表明使用具有IP隧道功能的普通非sdn交换机作为指定交换机可以保证从任何单链路故障中恢复。对于具有一般链路成本的网络,我们表明仅在必要时使用SDN交换机,与现有工作相比,我们可以减少所需的SDN交换机总数。
{"title":"Single-link failure recovery with or without software-defined networking switches","authors":"Dawei Li, Jie Wu, Dajin Wang","doi":"10.1109/INFOCT.2018.8356846","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356846","url":null,"abstract":"In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through pre-configured IP tunnels), which will deliver the affected traffic to its destination without using the failed link. The goal of the approach is to achieve faster failure recovery than traditional routing protocols that employ reactive computing upon link failures. Software-Defined Networking (SDN) switches can serve as the designated switches because they can flexibly redirect affected traffic to other routes, instead of only to the shortest paths in the network. However, SDN switches are very expensive. Our objective is to minimize the number of SDN switches needed and to guarantee that the network can still recover from any single-link failure. For networks with uniform link costs, we show that using normal non-SDN switches with IP tunneling capability as designated switches can guarantee recovery from any single-link failure. For networks with general link costs, we show that by using SDN switches only when necessary, we can reduce the total number of SDN switches needed compared to an existing work.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A taxonomy of IoT: Security and privacy threats 物联网的分类:安全和隐私威胁
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356843
Badr Alsamani, Husam Lahza
Potential Security and Privacy concerns are widely discussed in the community of Internet of Things (IoT); however, the issue is still not fully addressed, and the demands for new methods of investigation are highly appraised. The current published research focused more on identifying the security issues associated with early type of IoT's applications based on sensors, such as RFID and WSN. However, todays IoT commercial applications are more advanced and use different of integrated objects. This research paper utilizes Design Science Research (DSR) methodology to better understand the security and privacy issue in IoT through creating an artifact. The purpose of this study is to propose taxonomy in order to categorize IoT's objects, so security and privacy issues would be fully addressed.
潜在的安全和隐私问题在物联网(IoT)社区被广泛讨论;然而,这一问题仍未得到充分解决,人们高度评价了对新调查方法的需求。目前发表的研究更多地关注于识别与基于传感器的早期物联网应用相关的安全问题,如RFID和WSN。然而,今天的物联网商业应用更先进,使用不同的集成对象。本研究论文利用设计科学研究(DSR)方法,通过创建工件来更好地理解物联网中的安全和隐私问题。本研究的目的是提出分类法,以便对物联网对象进行分类,从而充分解决安全和隐私问题。
{"title":"A taxonomy of IoT: Security and privacy threats","authors":"Badr Alsamani, Husam Lahza","doi":"10.1109/INFOCT.2018.8356843","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356843","url":null,"abstract":"Potential Security and Privacy concerns are widely discussed in the community of Internet of Things (IoT); however, the issue is still not fully addressed, and the demands for new methods of investigation are highly appraised. The current published research focused more on identifying the security issues associated with early type of IoT's applications based on sensors, such as RFID and WSN. However, todays IoT commercial applications are more advanced and use different of integrated objects. This research paper utilizes Design Science Research (DSR) methodology to better understand the security and privacy issue in IoT through creating an artifact. The purpose of this study is to propose taxonomy in order to categorize IoT's objects, so security and privacy issues would be fully addressed.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115056008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Centralized framework for controlling heterogeneous appliances in a smart home environment 用于控制智能家居环境中异构设备的集中式框架
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356844
Amit Banerjee, Farhan Sufyanf, Mohammad Shoaib Nayel, S. Sagar
The recent advancement in home automation technologies and inter-connectivity of smart appliances has contributed immensely in developing intelligent home environment. The complex smart home environment consists of smart devices from different vendors having different configuration and communication standards that introduce the problem of a heterogeneous subsystem in a smart home. A need is emerging for a central management system to control all these various devices. In this paper, we propose an action-based framework that acts as a middleware between the user and smart appliances which allow the user to control these heterogeneous devices in a federated manner. The proposed framework is based on a controller, for accepting user input and sending instructions to the intended smart devices. Framework maintains the integrity of an instruction send to the device and employs the mechanism so that only authentic user can access them. We also incorporate Human System Interaction (HSI) in our framework, by developing an Android application which receives input in the form of motion gestures, to fulfill the human-centric interaction requirements of the user to communicate with the smart home appliances. We evaluate the performance of our framework by implementing the controller in a local home network and the cloud.
近年来,家庭自动化技术的进步和智能家电的互联互通为智能家庭环境的发展做出了巨大贡献。复杂的智能家居环境由来自不同厂商的智能设备组成,这些设备具有不同的配置和通信标准,这就引入了智能家居中异构子系统的问题。需要一个中央管理系统来控制所有这些不同的设备。在本文中,我们提出了一个基于操作的框架,作为用户和智能设备之间的中间件,允许用户以联合的方式控制这些异构设备。提出的框架基于控制器,用于接受用户输入并向预期的智能设备发送指令。框架维护发送到设备的指令的完整性,并采用只有真实用户才能访问它们的机制。我们还在我们的框架中加入了人机交互(HSI),通过开发一个Android应用程序,该应用程序以动作手势的形式接收输入,以满足用户与智能家电通信的以人为中心的交互需求。我们通过在本地家庭网络和云中实现控制器来评估框架的性能。
{"title":"Centralized framework for controlling heterogeneous appliances in a smart home environment","authors":"Amit Banerjee, Farhan Sufyanf, Mohammad Shoaib Nayel, S. Sagar","doi":"10.1109/INFOCT.2018.8356844","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356844","url":null,"abstract":"The recent advancement in home automation technologies and inter-connectivity of smart appliances has contributed immensely in developing intelligent home environment. The complex smart home environment consists of smart devices from different vendors having different configuration and communication standards that introduce the problem of a heterogeneous subsystem in a smart home. A need is emerging for a central management system to control all these various devices. In this paper, we propose an action-based framework that acts as a middleware between the user and smart appliances which allow the user to control these heterogeneous devices in a federated manner. The proposed framework is based on a controller, for accepting user input and sending instructions to the intended smart devices. Framework maintains the integrity of an instruction send to the device and employs the mechanism so that only authentic user can access them. We also incorporate Human System Interaction (HSI) in our framework, by developing an Android application which receives input in the form of motion gestures, to fulfill the human-centric interaction requirements of the user to communicate with the smart home appliances. We evaluate the performance of our framework by implementing the controller in a local home network and the cloud.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An information transport dynamic load balancing policy based on software defined mobile networks 一种基于软件定义移动网络的信息传输动态负载均衡策略
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356845
Cheng-Wei Hu, Zhiqing Huang, Zhuying Lin
In the general architecture of software defined networks, controller often uses traditional OSPF (Open Shortest Path First) routing algorithm selecting the shortest path as the final single path when calculate networks' topology. This may cause the busy nodes will still receive large amount of transmission data requests when they had already blocked by current works. Especially in the environment of the mobile networks, the differences in data requests can suddenly cause some node data to be congested, while the other part is idle, both waste the resources of network and influence the quality of network service. This paper designs an all pairs shortest paths algorithm to calculate the topology information in the nodes of software defined networks regularly and put forward a congestion control strategy based on OpenFlow protocol to solve the problem of loading imbalanced of the data center networking of the software defined mobile networks. We elaborate on its overall framework and algorithm implementation process, and is proved by experimental simulation that the algorithm can relieve network congestion, improve network utilization and enhance the effectiveness of network stability.
在软件定义网络的一般架构中,控制器在计算网络拓扑时,通常采用传统的OSPF (Open Shortest Path First)路由算法,选择最短路径作为最终的单路径。这可能导致繁忙节点在已经被当前工作阻塞的情况下,仍然会收到大量的传输数据请求。特别是在移动网络环境下,数据请求的差异会突然造成部分节点数据拥塞,而另一部分节点数据闲置,既浪费了网络资源,又影响了网络服务质量。本文设计了一种全对最短路径算法,定期计算软件定义网络节点中的拓扑信息,并提出了一种基于OpenFlow协议的拥塞控制策略,解决了软件定义移动网络数据中心组网的负载不均衡问题。详细阐述了其总体框架和算法实现过程,并通过实验仿真证明了该算法能够缓解网络拥塞,提高网络利用率,增强网络稳定性的有效性。
{"title":"An information transport dynamic load balancing policy based on software defined mobile networks","authors":"Cheng-Wei Hu, Zhiqing Huang, Zhuying Lin","doi":"10.1109/INFOCT.2018.8356845","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356845","url":null,"abstract":"In the general architecture of software defined networks, controller often uses traditional OSPF (Open Shortest Path First) routing algorithm selecting the shortest path as the final single path when calculate networks' topology. This may cause the busy nodes will still receive large amount of transmission data requests when they had already blocked by current works. Especially in the environment of the mobile networks, the differences in data requests can suddenly cause some node data to be congested, while the other part is idle, both waste the resources of network and influence the quality of network service. This paper designs an all pairs shortest paths algorithm to calculate the topology information in the nodes of software defined networks regularly and put forward a congestion control strategy based on OpenFlow protocol to solve the problem of loading imbalanced of the data center networking of the software defined mobile networks. We elaborate on its overall framework and algorithm implementation process, and is proved by experimental simulation that the algorithm can relieve network congestion, improve network utilization and enhance the effectiveness of network stability.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault class prediction in unsupervised learning using model-based clustering approach 基于模型聚类方法的无监督学习故障分类预测
Pub Date : 2018-03-23 DOI: 10.1109/INFOCT.2018.8356831
Nagdev Amruthnath, Tarun Gupta
Manufacturing industries have been on a steady path considering for new methods to achieve near-zero downtime to have flexibility in the manufacturing process and being economical. In the last decade with the availability of industrial internet of things (IIoT) devices, this has made it possible to monitor the machine continuously using wireless sensors, assess the degradation and predict the failures of time. Condition-based predictive maintenance has made a significant influence in monitoring the asset and predicting the failure of time. This has minimized the impact on production, quality, and maintenance cost. Numerous approaches have been in proposed over the years and implemented in supervised learning. In this paper, challenges of supervised learning such as need for historical data and incapable of classifying new faults accurately will be overcome with a new methodology using unsupervised learning for rapid implementation of predictive maintenance activity which includes fault prediction and fault class detection for known and unknown faults using density estimation via Gaussian Mixture Model Clustering and K-means algorithm and compare their results with a real case vibration data.
制造业一直在考虑采用新的方法来实现接近零停机时间,从而在制造过程中具有灵活性和经济性。在过去十年中,随着工业物联网(IIoT)设备的可用性,这使得使用无线传感器连续监控机器,评估退化并预测时间故障成为可能。基于状态的预测性维修对资产的监测和故障时间预测具有重要的影响。这将对生产、质量和维护成本的影响降到最低。多年来,人们提出了许多方法,并在监督学习中实施。本文将利用一种新的无监督学习方法来克服监督学习对历史数据的需求和无法准确分类新故障等挑战,该方法使用高斯混合模型聚类和K-means算法的密度估计对已知和未知故障进行故障预测和故障分类检测,并将其结果与实际案例振动数据进行比较。
{"title":"Fault class prediction in unsupervised learning using model-based clustering approach","authors":"Nagdev Amruthnath, Tarun Gupta","doi":"10.1109/INFOCT.2018.8356831","DOIUrl":"https://doi.org/10.1109/INFOCT.2018.8356831","url":null,"abstract":"Manufacturing industries have been on a steady path considering for new methods to achieve near-zero downtime to have flexibility in the manufacturing process and being economical. In the last decade with the availability of industrial internet of things (IIoT) devices, this has made it possible to monitor the machine continuously using wireless sensors, assess the degradation and predict the failures of time. Condition-based predictive maintenance has made a significant influence in monitoring the asset and predicting the failure of time. This has minimized the impact on production, quality, and maintenance cost. Numerous approaches have been in proposed over the years and implemented in supervised learning. In this paper, challenges of supervised learning such as need for historical data and incapable of classifying new faults accurately will be overcome with a new methodology using unsupervised learning for rapid implementation of predictive maintenance activity which includes fault prediction and fault class detection for known and unknown faults using density estimation via Gaussian Mixture Model Clustering and K-means algorithm and compare their results with a real case vibration data.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2018 International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1