首页 > 最新文献

2012 UKSim 14th International Conference on Computer Modelling and Simulation最新文献

英文 中文
ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++ 在omnet++中快速加速网络仿真的工具
P. Vilhan, J. Gajdos
There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.
现在市场上有很多可访问的移动设备,这导致了移动网络的显著崛起。移动网络主要有两种类型:基础设施和ad-hoc。本文的重点是移动自组织网络,也称为MANET,它易于构建,不依赖于固定的基础设施。另一方面,无线自组网的仿真难度很大,合理设计测试和仿真场景非常重要。虽然有各种知名的仿真环境,但本文针对的是omnet++[5]。本文的主要贡献是介绍了ADEUS,这是一种支持工具,用于简化创建和减少建立omnet++仿真环境所需的时间,用于模拟MANET中的公钥基础设施(进一步称为PKI)。ADEUS是omnet++的图形附加组件,具有简单但功能强大的用户界面。
{"title":"ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++","authors":"P. Vilhan, J. Gajdos","doi":"10.1109/UKSim.2012.90","DOIUrl":"https://doi.org/10.1109/UKSim.2012.90","url":null,"abstract":"There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Qlogic's Dispersive Routing on High Performance Clusters 评价Qlogic在高性能集群上的分散路由
S. M. Sait, R. Al-Shaikh
As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.
随着高性能集群(HPC)在节点数量和处理核心方面的扩展,主机和网络层面的互联网工作拥塞和瓶颈成为集群计算中的主要问题之一。相当重要的是,ib架构(IBA)规范提供了六种不同的路由算法,以更好地优化HPC互联网工作流量。在本文中,我们提出了这些算法,然后使用配备英特尔最新Westmere处理器的大规模Infiniband集群评估QLogic的分散路由。本文介绍了集群配置,并使用高性能LINPACK (HPL)和英特尔MPI (IMB)基准测试评估其性能。我们的结果表明,虽然默认的最小跳算法适用于大多数串行和点对点基准测试,但分散路由算法在运行特定的计算和并行传输例程时表现出更好的性能。
{"title":"Evaluating Qlogic's Dispersive Routing on High Performance Clusters","authors":"S. M. Sait, R. Al-Shaikh","doi":"10.1109/UKSim.2012.75","DOIUrl":"https://doi.org/10.1109/UKSim.2012.75","url":null,"abstract":"As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators 合成幼体激素类似物作为昆虫生长调节剂的对接研究
Pub Date : 2012-03-28 DOI: 10.1109/UKSim.2012.109
P. Awasthi, Priyanka Sharma
Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.
分子模型是理解几乎所有生物现象的基本工具。这为从受体-配体结合过程的物理力角度解释结构-活性关系的理论认识提供了方向。如果能够获得靶受体的三维结构以及对配体结合位点的性质、配体结合方式的详细了解,就可以广泛地研究配体与受体之间的相互作用,从而在短时间内设计和开发新的靶向性新化合物。幼激素类似物倍萜类化合物是一种昆虫生长调节剂,是一种潜在的环境友好型农药。化学灭菌是控制昆虫大量繁殖最有效的方法。少年激素类似物的计算设计是解决昆虫问题的新兴领域。我们利用Linux平台上的Auto Dock软件模块,对实验室合成的含磺胺功能的不同JHAs和含oxa、aza特征的Juvabione作为幼体激素类似物进行了硅质比较,并研究了它们与mellonella虫种受体蛋白的相互作用。
{"title":"Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators","authors":"P. Awasthi, Priyanka Sharma","doi":"10.1109/UKSim.2012.109","DOIUrl":"https://doi.org/10.1109/UKSim.2012.109","url":null,"abstract":"Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Minimizing Vertices in 3D Lips Model Using Relevance Measure 利用相关性度量最小化三维唇部模型中的顶点
Pub Date : 2012-03-28 DOI: 10.1109/UKSim.2012.111
S. S. Salleh
This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.
本文介绍了在视觉语音合成系统中开发三维嘴唇的工作。在类似的领域已经做了一些工作,但是在嘴唇模型中识别和确定适当数量的顶点的系统方法没有得到充分的解释。代替开发技术,本文还提出了一个实验装置,旨在测试嘴唇在变形语音中的能力和灵活性。本文解释了捕捉嘴唇的过程,以及在标准马来语中用于识别最佳顶点数量以变形粘体的相关测量技术。本工作的结果证明,通过将24,000个顶点保留0.005%到120个顶点的系统退化将保持唇形变形的相似质量。因此,本研究的结果证明了适当数量的顶点适合用于三维嘴唇模型的视觉语音合成。
{"title":"Minimizing Vertices in 3D Lips Model Using Relevance Measure","authors":"S. S. Salleh","doi":"10.1109/UKSim.2012.111","DOIUrl":"https://doi.org/10.1109/UKSim.2012.111","url":null,"abstract":"This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":" 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Personalized Learning System Consideration 智能个性化学习系统的思考
Alex Pongpech
Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.
个性化学习是促进终身学习者的关键因素。个性化学习的概念基于以学习者为中心的方法,表现为根据学习者的需要调整服务的不同方式,如内容、支持和展示。对于任何支持学习者各种需求的系统,它必须提供允许学习者配置服务以满足其需求的功能。从而促进了系统的适应性,以便根据每个人的需要为其提供服务。自适应系统通常被定义为能够调整其服务以满足每个用户需求的系统。本文回顾了电子学习的原理和学习者的期望,并讨论了几个现有的系统。提出了个性化智能学习机设计中存在的几个可解决和实用的难点。
{"title":"Intelligent Personalized Learning System Consideration","authors":"Alex Pongpech","doi":"10.1109/UKSim.2012.18","DOIUrl":"https://doi.org/10.1109/UKSim.2012.18","url":null,"abstract":"Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of an Y4 Copter Control System 运- 4直升机控制系统的设计与开发
M. S. Hossain, A. Kabir, P. Mazumder, Ahmedullah Aziz, M. Hassan, Md. Azizul Islam, P. K. Saha
The y4 copter is intended to be a UAV (Unmanned Aerial Vehicle) with autonomous subsystems. Automation is implemented in case of maintaining the desired roll, pitch and yaw. An improved algorithm that uses Quaternion is implemented to determine Euler angles avoiding Gimbal lock. It has a self-stabilization system achieved using Proportional Integral Derivative (PID) control system. A custom remote is built to communicate with the y4 copter using XBee modules which offer long range and security. Secured data transmission between the controller and the copter makes it suitable for military applications. Perhaps the most significant purpose of this y4 copter is to exercise a low cost and efficient engineering design with total automation considering all possible aerodynamics which is intended to be the first y4 copter built in the Indian subcontinent.
y4直升机打算成为一种具有自主子系统的无人机(UAV)。在保持所需的横摇、俯仰和偏航的情况下,实现自动化。提出了一种改进的四元数算法来确定避免万向节锁定的欧拉角。采用比例积分导数(PID)控制系统实现自稳定。一个定制的遥控器是建立与y4直升机使用XBee模块,提供远程和安全通信。安全的数据传输之间的控制器和直升机使其适用于军事应用。也许这架y4直升机最重要的目的是为了实现低成本和高效的工程设计,考虑到所有可能的空气动力学,这将是在印度次大陆建造的第一架y4直升机。
{"title":"Design and Development of an Y4 Copter Control System","authors":"M. S. Hossain, A. Kabir, P. Mazumder, Ahmedullah Aziz, M. Hassan, Md. Azizul Islam, P. K. Saha","doi":"10.1109/UKSim.2012.43","DOIUrl":"https://doi.org/10.1109/UKSim.2012.43","url":null,"abstract":"The y4 copter is intended to be a UAV (Unmanned Aerial Vehicle) with autonomous subsystems. Automation is implemented in case of maintaining the desired roll, pitch and yaw. An improved algorithm that uses Quaternion is implemented to determine Euler angles avoiding Gimbal lock. It has a self-stabilization system achieved using Proportional Integral Derivative (PID) control system. A custom remote is built to communicate with the y4 copter using XBee modules which offer long range and security. Secured data transmission between the controller and the copter makes it suitable for military applications. Perhaps the most significant purpose of this y4 copter is to exercise a low cost and efficient engineering design with total automation considering all possible aerodynamics which is intended to be the first y4 copter built in the Indian subcontinent.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Development of Coal Mechanical Preparation in Light of Platform Independent Modeling: Two Solutions 基于平台独立建模的煤炭机械选矿发展:两种解决方案
Bob Arnold, M. R. Shadnam
This contribution describes methodologies for modeling of coal preparation systems. We extend the Reuter and van Deventer steady state method, which optimizes both network design and valuable mineral grade for a network of froth flotation cells in two passes using LP techniques, we have proposed a way that the empirical model for the flotation process can be extended to model heavy media, and water-only cyclones and other types of sieves and classifiers. The initial configuration has been simplified to include one of each of the four types of processing units, initially with only one species of input feed. We have expanded our initial LP model to include multiple elements present in multiple species. The LP model could be used to suggest an alternative circuit configuration based on changed operating conditions, making use in a global control loop possible. We subsequently compared the LP model with a System Dynamics (SD) model, generated from the same coal wash plant platform independent model. We attempt to simulate the same constructs with both approaches but find that extension of the constructs available to the SD platform dependent model may be required to make the two approaches converge.
这篇文章描述了选煤系统建模的方法。我们扩展了Reuter和van Deventer稳态方法,该方法使用LP技术在两个通道中优化泡沫浮选池网络的网络设计和有价矿物品位,我们提出了一种方法,可以将浮选过程的经验模型扩展到模拟重介质,仅水旋风和其他类型的筛子和分级机。初始配置已简化为包括四种处理单元中的一种,最初只有一种输入饲料。我们已经扩展了我们最初的LP模型,以包括多种物种中存在的多种元素。LP模型可用于根据变化的操作条件提出备选电路配置,使其在全局控制回路中使用成为可能。随后,我们将LP模型与系统动力学(SD)模型进行了比较,后者是由同一个洗煤厂平台独立模型生成的。我们试图用这两种方法模拟相同的结构,但发现可能需要对SD平台相关模型可用的结构进行扩展,以使两种方法收敛。
{"title":"Development of Coal Mechanical Preparation in Light of Platform Independent Modeling: Two Solutions","authors":"Bob Arnold, M. R. Shadnam","doi":"10.1109/UKSim.2012.58","DOIUrl":"https://doi.org/10.1109/UKSim.2012.58","url":null,"abstract":"This contribution describes methodologies for modeling of coal preparation systems. We extend the Reuter and van Deventer steady state method, which optimizes both network design and valuable mineral grade for a network of froth flotation cells in two passes using LP techniques, we have proposed a way that the empirical model for the flotation process can be extended to model heavy media, and water-only cyclones and other types of sieves and classifiers. The initial configuration has been simplified to include one of each of the four types of processing units, initially with only one species of input feed. We have expanded our initial LP model to include multiple elements present in multiple species. The LP model could be used to suggest an alternative circuit configuration based on changed operating conditions, making use in a global control loop possible. We subsequently compared the LP model with a System Dynamics (SD) model, generated from the same coal wash plant platform independent model. We attempt to simulate the same constructs with both approaches but find that extension of the constructs available to the SD platform dependent model may be required to make the two approaches converge.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applicability of Neural Networks to Software Security 神经网络在软件安全中的适用性
A. Adebiyi, J. Arreymbi, C. Imafidon
Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.
软件设计缺陷占当今软件安全漏洞的50%。随着对脆弱软件的攻击不断增加,对安全软件的需求也在增加,从而给软件开发人员带来了更大的压力。对于那些主要目标是在紧迫的期限内快速生产软件以便尽早将其发布到市场的开发人员来说尤其如此。虽然有许多工具关注软件开发生命周期(SDLC)中的实现问题,但这并没有提供解决软件安全问题的完整解决方案。因此,在设计软件时考虑到安全性将对开发安全软件大有帮助。本文简要讨论了目前在SDLC设计层面集成安全性的一些方法,并提出了一种利用神经网络评价软件设计的新方法。利用所提出的神经网络工具,本研究发现软件设计场景可以匹配到识别设计场景中安全漏洞的攻击模式。最后给出了神经网络的性能测试结果。
{"title":"Applicability of Neural Networks to Software Security","authors":"A. Adebiyi, J. Arreymbi, C. Imafidon","doi":"10.1109/UKSim.2012.14","DOIUrl":"https://doi.org/10.1109/UKSim.2012.14","url":null,"abstract":"Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scatter and Doppler Effect of Wind Power Plants to Land Radars 风力发电厂对陆地雷达的散射和多普勒效应
Derya Sozen, M. Kartal
Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as "radar" throughout this paper.
从2000年开始,不同规模的风力发电厂的安装呈增加趋势。大约4-5年前,人们对风力涡轮机是否会干扰雷达产生了好奇。当风力涡轮机反射雷达波时,就会产生干扰,导致雷达图像上的目标缺失和盲区。多普勒雷达最常用于区分来自期望目标和不希望目标(通常是地杂波)的回波[1]。干扰产生的影响有很多,如遮蔽、雷达设备损坏、雷达截面积(RCS)增大和目标丢失等。雷达和风力发电厂的缓解措施都可用。但是,仍然没有全面的解决方案,只能逐个处理。RADAR是RAdio Detection And Ranging(无线电探测与测距)的首字母缩写,在本文中我们将使用它作为“雷达”。
{"title":"Scatter and Doppler Effect of Wind Power Plants to Land Radars","authors":"Derya Sozen, M. Kartal","doi":"10.1109/UKSim.2012.68","DOIUrl":"https://doi.org/10.1109/UKSim.2012.68","url":null,"abstract":"Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as \"radar\" throughout this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature 使用隐形签名保护PDF文档的完整性和所有权
I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan
Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.
通过不安全的渠道分发数字文件会导致接收方对文件的完整性和所有权的问题。采用哈希函数和数字签名算法解决了接收方证明发送方对文件的认可以及检测文件是否被非法方修改的困难。提出了一种将数字签名作为不可见水印附加到可移植文档文件(Portable Document File, PDF)中的方法。我们展示了在交叉引用表中分隔字段的空格字符可以被覆盖而不会损坏文件。由于交叉引用表的偏移索引在文件末尾可用,因此证明了嵌入和提取签名的方法是有效的。我们提出的在PDF文件中嵌入签名的方法不会增加文件的大小,并且为用户提供了实现自己喜欢的数字签名方案的灵活性。
{"title":"Protection of Integrity and Ownership of PDF Documents Using Invisible Signature","authors":"I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan","doi":"10.1109/UKSim.2012.81","DOIUrl":"https://doi.org/10.1109/UKSim.2012.81","url":null,"abstract":"Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2012 UKSim 14th International Conference on Computer Modelling and Simulation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1