首页 > 最新文献

Proceedings of the 4th International Conference on Networking, Information Systems & Security最新文献

英文 中文
A survey on e-voting based on blockchain 基于区块链的电子投票调查
Fatih Rabia, Sara Arezki, T. Gadi
The Blockchain is one of the recent technologies that have emerged in the last decade. Blockchain has become a topic of many researches in several fields and it was implemented in some industries like finance, energy, health care, and electronic voting. Blockchain presents some great potential solutions that help to tackle difficulties. In this work we will focus on e-voting using blockchain technology. As we all know the voting is a way that leads the governments to approach democracy in their countries by an electoral process. The blockchain voting has replaced the traditional vote paper, also it replaced the voting systems that store data in central database. That gave much efficiency to the blockchain technology through a decentralized system that requires anonymity, confidentiality and transparency.
区块链是过去十年中出现的最新技术之一。区块链已经成为多个领域的研究课题,并在金融、能源、医疗、电子投票等行业得到了应用。区块链提供了一些非常有潜力的解决方案,有助于解决困难。在这项工作中,我们将专注于使用区块链技术进行电子投票。我们都知道,投票是一种引导政府通过选举程序在其国家实现民主的方式。区块链投票取代了传统的投票纸,也取代了将数据存储在中央数据库中的投票系统。这通过一个要求匿名、保密和透明的去中心化系统,极大地提高了区块链技术的效率。
{"title":"A survey on e-voting based on blockchain","authors":"Fatih Rabia, Sara Arezki, T. Gadi","doi":"10.1145/3454127.3457626","DOIUrl":"https://doi.org/10.1145/3454127.3457626","url":null,"abstract":"The Blockchain is one of the recent technologies that have emerged in the last decade. Blockchain has become a topic of many researches in several fields and it was implemented in some industries like finance, energy, health care, and electronic voting. Blockchain presents some great potential solutions that help to tackle difficulties. In this work we will focus on e-voting using blockchain technology. As we all know the voting is a way that leads the governments to approach democracy in their countries by an electoral process. The blockchain voting has replaced the traditional vote paper, also it replaced the voting systems that store data in central database. That gave much efficiency to the blockchain technology through a decentralized system that requires anonymity, confidentiality and transparency.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of Intrusion Detection Systems: Datasets and machine learning methods 入侵检测系统综述:数据集和机器学习方法
Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, A. Moutaouakkil
At the present time, Security is a crucial issue for all organizations and companies, because intruders are constantly developing new techniques to infiltrate their infrastructure to steal or manipulate sensitive data. Thus, Intrusion Detection System (IDS) has emerged as new technology to protect networks and systems against suspicious activities. Numerous cybersecurity experts highlight the importance of IDS to strength the defensive capacities of systems by alerting for suspicious activities and malicious attacks. Over the years, many techniques like Machine learning (ML) and Deep Learning (DL) have been used to increase the detection accuracy and reduce the false alerts of IDSs. This survey paper presents an overview of some ML and DL algorithms among the most used for IDS. Additionally, because these algorithms depend on the characteristics of malicious events stored in datasets to identify anomalies, we list some publicly available cybersecurity datasets. Furthermore, we highlight the challenges that experts must overcome to enhance the performance of their methods.
目前,安全性是所有组织和公司的关键问题,因为入侵者不断开发新技术来渗透其基础设施以窃取或操纵敏感数据。因此,入侵检测系统(IDS)作为一种保护网络和系统免受可疑活动侵害的新技术应运而生。许多网络安全专家强调了IDS的重要性,通过警报可疑活动和恶意攻击来加强系统的防御能力。多年来,机器学习(ML)和深度学习(DL)等许多技术已被用于提高检测精度并减少入侵防御系统的错误警报。本文概述了IDS中最常用的ML和DL算法。此外,由于这些算法依赖于存储在数据集中的恶意事件的特征来识别异常,我们列出了一些公开可用的网络安全数据集。此外,我们强调了专家必须克服的挑战,以提高他们的方法的性能。
{"title":"A Review of Intrusion Detection Systems: Datasets and machine learning methods","authors":"Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, A. Moutaouakkil","doi":"10.1145/3454127.3456576","DOIUrl":"https://doi.org/10.1145/3454127.3456576","url":null,"abstract":"At the present time, Security is a crucial issue for all organizations and companies, because intruders are constantly developing new techniques to infiltrate their infrastructure to steal or manipulate sensitive data. Thus, Intrusion Detection System (IDS) has emerged as new technology to protect networks and systems against suspicious activities. Numerous cybersecurity experts highlight the importance of IDS to strength the defensive capacities of systems by alerting for suspicious activities and malicious attacks. Over the years, many techniques like Machine learning (ML) and Deep Learning (DL) have been used to increase the detection accuracy and reduce the false alerts of IDSs. This survey paper presents an overview of some ML and DL algorithms among the most used for IDS. Additionally, because these algorithms depend on the characteristics of malicious events stored in datasets to identify anomalies, we list some publicly available cybersecurity datasets. Furthermore, we highlight the challenges that experts must overcome to enhance the performance of their methods.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Study on the protocols used by autonomous car,DSRC, C-V2X, 5G 自动驾驶汽车、DSRC、C-V2X、5G协议的比较研究
Jellid Kawtar, T. Mazri
The autonomous car has been in the headlines for a decade and still continues to dominate auto headlines The autonomous car has attracted the researchers, robotics communities and the automobile industries, an autonomous car is a vehicle capable of detecting its environment and driving without human intervention, A human passenger is not required to take control of the vehicle at all times, nor is a human passenger to be present at all in the vehicle, the autonomous car can go wherever a traditional car goes and do whatever a experienced human driver made, the development of autonomous vehicles requires communication between cars and infrastructure, this communication is based on protocols allowing the exchange of information we can cite the Dedicated Short Range Communication (DSRC) protocol, Cellular V2X technology (C-V2X) LTE-V2X and 5G which presents the next generation of communication allowing the exchange of very large volumes of data also participating in the development of the autonomous car ,the paper presents a comparative study of the different protocols used by the autonomous car.
自动驾驶汽车十年来一直是头条新闻,并且仍然占据着汽车头条的主导地位。自动驾驶汽车吸引了研究人员,机器人社区和汽车行业,自动驾驶汽车是一种能够检测其环境并在没有人为干预的情况下驾驶的车辆,不需要人类乘客随时控制车辆,也不需要人类乘客在场。自动驾驶汽车可以去任何传统汽车去的地方,做任何有经验的人类司机做的事情,自动驾驶汽车的发展需要汽车和基础设施之间的通信,这种通信基于允许信息交换的协议,我们可以引用专用短程通信(DSRC)协议,蜂窝V2X技术(C-V2X)、LTE-V2X和5G是下一代通信技术,允许交换大量数据,也参与自动驾驶汽车的开发,本文对自动驾驶汽车使用的不同协议进行了比较研究。
{"title":"Comparative Study on the protocols used by autonomous car,DSRC, C-V2X, 5G","authors":"Jellid Kawtar, T. Mazri","doi":"10.1145/3454127.3456616","DOIUrl":"https://doi.org/10.1145/3454127.3456616","url":null,"abstract":"The autonomous car has been in the headlines for a decade and still continues to dominate auto headlines The autonomous car has attracted the researchers, robotics communities and the automobile industries, an autonomous car is a vehicle capable of detecting its environment and driving without human intervention, A human passenger is not required to take control of the vehicle at all times, nor is a human passenger to be present at all in the vehicle, the autonomous car can go wherever a traditional car goes and do whatever a experienced human driver made, the development of autonomous vehicles requires communication between cars and infrastructure, this communication is based on protocols allowing the exchange of information we can cite the Dedicated Short Range Communication (DSRC) protocol, Cellular V2X technology (C-V2X) LTE-V2X and 5G which presents the next generation of communication allowing the exchange of very large volumes of data also participating in the development of the autonomous car ,the paper presents a comparative study of the different protocols used by the autonomous car.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure user authentication scheme for the Virtual Doctor System enabled H-IoT through 5G Network: A comparison study 基于5G网络的H-IoT虚拟医生系统安全用户认证方案对比研究
F. Rougaii, T. Mazri
In recent times, health-IoT and fifth generation technologies provide special health services for the patient including continuous and remote monitoring, besides other services. The combination of those previous concepts with virtual doctor system technology can offer several benefits such as remote and reliable diagnosis and treatment in real-time. Unfortunately, during the monitoring and diagnosis dialogue, illegitimate users can get unauthorized access to the VDS and disclose a valuable diagnosis, due to the lack of security and privacy of patients. To overcome this issue, some authentication schemes used in e-health applications over 5G networks will be presented. The aim of this paper is to choose a suitable authentication method for gaining access to remote VDS connected with the internet of medical things via the 5G network. So, the comparison between existing mechanisms will be done and the result will be announced after.
近年来,健康物联网和第五代技术除了提供其他服务外,还为患者提供了包括连续和远程监测在内的特殊健康服务。将这些概念与虚拟医生系统技术相结合,可以提供远程、可靠的实时诊断和治疗等优点。不幸的是,在监测和诊断对话过程中,由于缺乏患者的安全和隐私,非法用户可以未经授权访问VDS并泄露有价值的诊断。为了克服这个问题,本文将介绍一些在5G网络上的电子医疗应用中使用的身份验证方案。本文的目的是选择一种合适的认证方法,通过5G网络访问与医疗物联网连接的远程VDS。因此,将对现有机制进行比较,然后公布结果。
{"title":"Secure user authentication scheme for the Virtual Doctor System enabled H-IoT through 5G Network: A comparison study","authors":"F. Rougaii, T. Mazri","doi":"10.1145/3454127.3457624","DOIUrl":"https://doi.org/10.1145/3454127.3457624","url":null,"abstract":"In recent times, health-IoT and fifth generation technologies provide special health services for the patient including continuous and remote monitoring, besides other services. The combination of those previous concepts with virtual doctor system technology can offer several benefits such as remote and reliable diagnosis and treatment in real-time. Unfortunately, during the monitoring and diagnosis dialogue, illegitimate users can get unauthorized access to the VDS and disclose a valuable diagnosis, due to the lack of security and privacy of patients. To overcome this issue, some authentication schemes used in e-health applications over 5G networks will be presented. The aim of this paper is to choose a suitable authentication method for gaining access to remote VDS connected with the internet of medical things via the 5G network. So, the comparison between existing mechanisms will be done and the result will be announced after.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Deep Learning in the Full Edge and the Full Cloud Architectures 全边缘和全云架构下深度学习的性能研究
Tajeddine Benbarrad, Marouane Salhaoui, M. Arioua
Deep learning today surpasses various machine learning approaches in performance and is widely used for variety of different tasks. Deep learning has increased accuracy compared to other approaches for tasks like language translation and image recognition. However, training a deep learning model on a large dataset is a challenging and expensive task that can be time consuming and require large computational resources. Therefore, Different architectures have been proposed for the implementation of deep learning models in machine vision systems to deal with this problem. Currently, the application of deep learning in the cloud is the most common and typical method. Nevertheless, the challenge of having to move the data from where it is generated to a cloud data center so that it can be used to prepare and develop machine learning models represents a major limitation of this approach. As a result, it is becoming increasingly important to consider moving aspects of deep learning to the edge, instead of the cloud, especially with the rapid increase in data volumes and the growing need to act in real time. From this perspective, a comparative study between the full edge and the full cloud architectures based on the performance of the deep learning models implemented in both architectures is elaborated. The results of this study lead us to specify the strengths of both the cloud and the edge for deploying deep learning models, and to choose the optimal architecture to deal with the rapid increase in data volumes and the growing need for real-time action.
今天,深度学习在性能上超越了各种机器学习方法,并被广泛用于各种不同的任务。与语言翻译和图像识别等任务的其他方法相比,深度学习提高了准确性。然而,在大型数据集上训练深度学习模型是一项具有挑战性且昂贵的任务,既耗时又需要大量的计算资源。因此,人们提出了不同的架构来实现机器视觉系统中的深度学习模型来处理这个问题。目前,深度学习在云端的应用是最常见、最典型的方法。然而,必须将数据从生成位置移动到云数据中心,以便用于准备和开发机器学习模型的挑战是这种方法的主要限制。因此,考虑将深度学习的各个方面转移到边缘而不是云端变得越来越重要,特别是随着数据量的快速增长和实时行动需求的增长。从这个角度出发,基于在两种架构中实现的深度学习模型的性能,对全边缘和全云架构进行了比较研究。这项研究的结果使我们明确了部署深度学习模型的云计算和边缘计算的优势,并选择最佳架构来处理数据量的快速增长和对实时行动日益增长的需求。
{"title":"On the Performance of Deep Learning in the Full Edge and the Full Cloud Architectures","authors":"Tajeddine Benbarrad, Marouane Salhaoui, M. Arioua","doi":"10.1145/3454127.3457632","DOIUrl":"https://doi.org/10.1145/3454127.3457632","url":null,"abstract":"Deep learning today surpasses various machine learning approaches in performance and is widely used for variety of different tasks. Deep learning has increased accuracy compared to other approaches for tasks like language translation and image recognition. However, training a deep learning model on a large dataset is a challenging and expensive task that can be time consuming and require large computational resources. Therefore, Different architectures have been proposed for the implementation of deep learning models in machine vision systems to deal with this problem. Currently, the application of deep learning in the cloud is the most common and typical method. Nevertheless, the challenge of having to move the data from where it is generated to a cloud data center so that it can be used to prepare and develop machine learning models represents a major limitation of this approach. As a result, it is becoming increasingly important to consider moving aspects of deep learning to the edge, instead of the cloud, especially with the rapid increase in data volumes and the growing need to act in real time. From this perspective, a comparative study between the full edge and the full cloud architectures based on the performance of the deep learning models implemented in both architectures is elaborated. The results of this study lead us to specify the strengths of both the cloud and the edge for deploying deep learning models, and to choose the optimal architecture to deal with the rapid increase in data volumes and the growing need for real-time action.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison Support Vector Machines and K-Nearest Neighbors in Classifying Ischemic Stroke by Using Convolutional Neural Networks as a Feature Extraction 比较支持向量机与k近邻在卷积神经网络缺血性脑卒中分类中的应用
G. Saragih, Z. Rustam
The paper introduces the hybrid method of Convolutional Neural Network (CNN) and machine learning methods as a classifier, that is Support Vector Machines and K-Nearest Neighbors for classifying the ischemic stroke based on CT scan images. CNN is used as a feature extraction and the machine learning methods used to replace the fully connected layers in CNN. The proposed method is used to reduce computation time and improve accuracy in classifying image data, because we know that deep learning is not efficient for small amounts of data, where the data we use is only 93 CT scan images obtained from Cipto Mangunkusumo General Hospital (RSCM), Indonesia. The architecture of CNN used in this research consists of 5 layers convolutional layers, ReLU, MaxPooling, batch normalization and dropout. The elapsed time required for CNN is 7.631490 seconds. The output of feature extraction is used as an input for SVM and KNN. SVM with linear kernel can correctly classify ischemic stroke, with 100% accuracy in the training model and 96% accuracy in testing model with a test size of 60%. KNN classify ischemic stroke, with 97.3% (#neighbors = 5) accuracy in training model with a test size of 60% and 90% (#neighbors = 10, 15, 25) accuracy in the testing model with a test size of 10%. Based on these results, the SVM produces the higher accuracy compared to KNN in classifying ischemic stroke using CNN as feature extraction based on CT scan images with a computation time of only 8.0973 seconds.
本文介绍了卷积神经网络(CNN)与机器学习方法的混合分类方法,即支持向量机(Support Vector Machines)和k近邻(K-Nearest Neighbors)对基于CT扫描图像的缺血性中风进行分类。用CNN作为特征提取,用机器学习方法替换CNN中的全连接层。该方法用于减少计算时间并提高图像数据分类的准确性,因为我们知道深度学习对于少量数据并不有效,其中我们使用的数据仅为来自印度尼西亚Cipto Mangunkusumo General Hospital (RSCM)的93张CT扫描图像。本研究中使用的CNN架构由5层卷积层、ReLU、MaxPooling、批处理归一化和dropout组成。CNN所需的运行时间为7.631490秒。特征提取的输出作为支持向量机和KNN的输入。具有线性核的支持向量机可以正确地对缺血性中风进行分类,训练模型的准确率为100%,测试模型的准确率为96%,测试规模为60%。KNN对缺血性脑卒中进行分类,在测试规模为60%的训练模型中准确率为97.3% (#neighbors = 5),在测试规模为10%的测试模型中准确率为90% (#neighbors = 10,15,25)。基于这些结果,SVM在CT扫描图像上使用CNN作为特征提取对缺血性脑卒中进行分类的准确率高于KNN,计算时间仅为8.0973秒。
{"title":"Comparison Support Vector Machines and K-Nearest Neighbors in Classifying Ischemic Stroke by Using Convolutional Neural Networks as a Feature Extraction","authors":"G. Saragih, Z. Rustam","doi":"10.1145/3454127.3456606","DOIUrl":"https://doi.org/10.1145/3454127.3456606","url":null,"abstract":"The paper introduces the hybrid method of Convolutional Neural Network (CNN) and machine learning methods as a classifier, that is Support Vector Machines and K-Nearest Neighbors for classifying the ischemic stroke based on CT scan images. CNN is used as a feature extraction and the machine learning methods used to replace the fully connected layers in CNN. The proposed method is used to reduce computation time and improve accuracy in classifying image data, because we know that deep learning is not efficient for small amounts of data, where the data we use is only 93 CT scan images obtained from Cipto Mangunkusumo General Hospital (RSCM), Indonesia. The architecture of CNN used in this research consists of 5 layers convolutional layers, ReLU, MaxPooling, batch normalization and dropout. The elapsed time required for CNN is 7.631490 seconds. The output of feature extraction is used as an input for SVM and KNN. SVM with linear kernel can correctly classify ischemic stroke, with 100% accuracy in the training model and 96% accuracy in testing model with a test size of 60%. KNN classify ischemic stroke, with 97.3% (#neighbors = 5) accuracy in training model with a test size of 60% and 90% (#neighbors = 10, 15, 25) accuracy in the testing model with a test size of 10%. Based on these results, the SVM produces the higher accuracy compared to KNN in classifying ischemic stroke using CNN as feature extraction based on CT scan images with a computation time of only 8.0973 seconds.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INSOMNIA EEG SIGNAL PREPROCESSING USING ICA ALGORITHMS 失眠症脑电信号预处理的ica算法
Djerassembe Laouhingamaye Frédéric, Awatif Rouijel, Hassan El Ghazi
Polysomnography (PSG) is a technique involved on the sleep disorders diagnostic. The signals acquired in a PSG study contain at least the electroencephalogram, the electrocardiogram, the electromiogram,the electrooculogram. Component Independent Analysis is a blindsource separation technique that has been shown to be very effec-tive in removing noise and artifacts that contaminate EEG signals.Inthis article, we will discuss the different ICA algorithms and thenapply them to denoising the EEG signal. This lead to well making decision regarding to this kind of disorder. These algorithms will beapplied for the denoising of the EEG signal containing insomniadisorders. The database used is the “CAP Sleep database” which isa collection of 108 polysomnographic recordings recorded in theCenter of Sleep Disorders at Ospedale Maggiore in Parma, Italy.Finally, theoretical and simulation results are presented to comparethe differents ICA algorithms applied to Insomnia EEG signals
多导睡眠图(PSG)是一种用于睡眠障碍诊断的技术。PSG研究中获得的信号至少包括脑电图、心电图、心电图和眼电图。分量独立分析是一种盲源分离技术,已被证明在去除干扰脑电图信号的噪声和伪影方面非常有效。在本文中,我们将讨论不同的ICA算法,然后将它们应用于脑电信号的去噪。这导致了对这种疾病做出正确的决定。这些算法将应用于含有失眠症的脑电图信号的去噪。使用的数据库是“CAP睡眠数据库”,该数据库收集了意大利帕尔马Ospedale Maggiore睡眠障碍中心记录的108个多导睡眠图记录。最后,给出了理论和仿真结果,比较了不同的ICA算法对失眠症脑电信号的处理效果
{"title":"INSOMNIA EEG SIGNAL PREPROCESSING USING ICA ALGORITHMS","authors":"Djerassembe Laouhingamaye Frédéric, Awatif Rouijel, Hassan El Ghazi","doi":"10.1145/3454127.3457630","DOIUrl":"https://doi.org/10.1145/3454127.3457630","url":null,"abstract":"Polysomnography (PSG) is a technique involved on the sleep disorders diagnostic. The signals acquired in a PSG study contain at least the electroencephalogram, the electrocardiogram, the electromiogram,the electrooculogram. Component Independent Analysis is a blindsource separation technique that has been shown to be very effec-tive in removing noise and artifacts that contaminate EEG signals.Inthis article, we will discuss the different ICA algorithms and thenapply them to denoising the EEG signal. This lead to well making decision regarding to this kind of disorder. These algorithms will beapplied for the denoising of the EEG signal containing insomniadisorders. The database used is the “CAP Sleep database” which isa collection of 108 polysomnographic recordings recorded in theCenter of Sleep Disorders at Ospedale Maggiore in Parma, Italy.Finally, theoretical and simulation results are presented to comparethe differents ICA algorithms applied to Insomnia EEG signals","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN Control Plane Security: Attacks and Mitigation Techniques SDN控制平面安全:攻击和缓解技术
Kiran Fatima, Kanwal Zahoor, N. Bawany
Traditional networks are complex and hard to manage due to many reasons such as manual configuration requirements of dedicated devices, lack of flexibility and a non-dynamic approach. To overcome these limitations and to meet the challenges of modern networks a new networking paradigm Software Defined Networking (SDN) has been introduced. SDN presents a centralized and completely dynamic environment which provides flexibility and programmability in networks. It enables the network to be controlled centrally and intelligently using multiple software applications. SDN being in its infancy, brings along new challenges. Standardization of various interfaces, scalability, compatibility of contrasting or divergent networks, and vulnerability issues are few of them. This paper discusses various vulnerabilities and possible attacks on every layer of an SDN and focuses on control plane attacks. Further, it presents a comprehensive survey on numerous attacks on the brain of an SDN i.e. the control plane along with existing solutions. The study concludes that despite the challenges that are worth debating, SDN has many characteristics that make it an ideal candidate for future networks.
由于专用设备需要手工配置、缺乏灵活性和非动态方法等原因,传统网络结构复杂,管理难度大。为了克服这些限制并迎接现代网络的挑战,一种新的网络范式软件定义网络(SDN)被引入。SDN提供了一个集中的、完全动态的环境,为网络提供了灵活性和可编程性。它可以使用多个软件应用程序对网络进行集中和智能控制。SDN处于起步阶段,带来了新的挑战。各种接口的标准化、可扩展性、对比或分歧网络的兼容性以及漏洞问题只是其中的一小部分。本文讨论了SDN各层的各种漏洞和可能的攻击,重点讨论了控制平面攻击。此外,它还对SDN大脑(即控制平面)的众多攻击以及现有解决方案进行了全面调查。该研究的结论是,尽管存在值得讨论的挑战,但SDN具有许多特性,使其成为未来网络的理想候选。
{"title":"SDN Control Plane Security: Attacks and Mitigation Techniques","authors":"Kiran Fatima, Kanwal Zahoor, N. Bawany","doi":"10.1145/3454127.3456612","DOIUrl":"https://doi.org/10.1145/3454127.3456612","url":null,"abstract":"Traditional networks are complex and hard to manage due to many reasons such as manual configuration requirements of dedicated devices, lack of flexibility and a non-dynamic approach. To overcome these limitations and to meet the challenges of modern networks a new networking paradigm Software Defined Networking (SDN) has been introduced. SDN presents a centralized and completely dynamic environment which provides flexibility and programmability in networks. It enables the network to be controlled centrally and intelligently using multiple software applications. SDN being in its infancy, brings along new challenges. Standardization of various interfaces, scalability, compatibility of contrasting or divergent networks, and vulnerability issues are few of them. This paper discusses various vulnerabilities and possible attacks on every layer of an SDN and focuses on control plane attacks. Further, it presents a comprehensive survey on numerous attacks on the brain of an SDN i.e. the control plane along with existing solutions. The study concludes that despite the challenges that are worth debating, SDN has many characteristics that make it an ideal candidate for future networks.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128354294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Protocols – MQTT versus CoAP
Alyaziya Almheiri, Z. Maamar
The usage of Internet of Things has increased in the recent years allowing a new way of connecting devices together. Many transactions happen over the IoT calling for protocols to ensure the efficiency and management of the communication traffic. This paper examines 2 particular protocols, Message Queuing Telemetry Transport (MQTT) and Constrained application protocol (CoAP). The main differences between MQTT and CoAP that MQTT runs over TCP and CoAP runs over UDP. MQTT uses three level of QoS to ensure the message delivery while CoAP uses 4 types of transmission attempts which are confirmable, non-confirmable, acknowledgment, and rest. Through a set of experiments, we show that MQTT is more accurate when ensuring packet delivery. However, CoAP is better when it comes to performance when sending a limited number of messages.
近年来,物联网的使用有所增加,为连接设备提供了一种新的方式。许多事务发生在物联网上,需要协议来确保通信流量的效率和管理。本文研究了两个特定的协议,消息队列遥测传输(MQTT)和约束应用协议(CoAP)。MQTT和CoAP之间的主要区别是MQTT在TCP上运行,而CoAP在UDP上运行。MQTT使用三个级别的QoS来确保消息传递,而CoAP使用4种类型的传输尝试,分别是可确认的、不可确认的、确认的和休息的。通过一组实验,我们证明MQTT在保证包的传递方面更加准确。但是,在发送有限数量的消息时,CoAP在性能方面更胜一筹。
{"title":"IoT Protocols – MQTT versus CoAP","authors":"Alyaziya Almheiri, Z. Maamar","doi":"10.1145/3454127.3456594","DOIUrl":"https://doi.org/10.1145/3454127.3456594","url":null,"abstract":"The usage of Internet of Things has increased in the recent years allowing a new way of connecting devices together. Many transactions happen over the IoT calling for protocols to ensure the efficiency and management of the communication traffic. This paper examines 2 particular protocols, Message Queuing Telemetry Transport (MQTT) and Constrained application protocol (CoAP). The main differences between MQTT and CoAP that MQTT runs over TCP and CoAP runs over UDP. MQTT uses three level of QoS to ensure the message delivery while CoAP uses 4 types of transmission attempts which are confirmable, non-confirmable, acknowledgment, and rest. Through a set of experiments, we show that MQTT is more accurate when ensuring packet delivery. However, CoAP is better when it comes to performance when sending a limited number of messages.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BMGC: A Deep Learning Approach to Classify Bengali Music Genres 孟加拉音乐流派分类的深度学习方法
Moumita Sen Sarma, Avishek Das
Music genre classification (MGC) is the process of tagging music with their appropriate genres by analyzing music signals or the lyrics. With the accelerated surge in music data repositories, MGC can be extensively used in music recommendation systems, advertisement, and streaming services for systematic and efficient management. However, there have been many works on English music classification using different statistical and machine learning approaches, but there is no notable progress found in the arena of Bengali music. Besides, a few significant works have been found in utilizing Deep Learning (DL) methods to classify different music genres. Bengali music is significantly enriched with its contents and uniqueness. Moreover, the extent and scope of exploring the DL approach in Bengali music ground are still latent. Therefore, Bengali music genre classification is quite a new research area in the Deep learning field. In this work, we have constructed a Bengali Music Genre Classifier (BMGC) to categorize 6 Bengali music genres: ‘Adhunik’, ‘Band’, ‘Hiphop’, ‘Nazrulgeeti’, ‘Lalon’, and ‘Rabindra Sangeet’. We have created a Bengali music genre classification dataset (hereafter named BMGCD) containing 2944 Bengali music clips, and a Gated Recurrent Unit based deep learning model has been developed to predict the music genre from audio signals. Our developed model achieved an accuracy of 80.4% and 80.6% F1-score which surpasses the related existing works.
音乐类型分类(Music genre classification, MGC)是通过分析音乐信号或歌词,给音乐贴上相应类型标签的过程。随着音乐数据存储的加速增长,MGC可以广泛应用于音乐推荐系统、广告和流媒体服务中,实现系统高效的管理。然而,已经有许多使用不同统计和机器学习方法进行英语音乐分类的工作,但在孟加拉音乐领域没有发现明显的进展。此外,在利用深度学习(DL)方法对不同音乐类型进行分类方面也有一些重要的工作。孟加拉音乐内容丰富,独具特色。此外,在孟加拉音乐领域探索DL方法的程度和范围仍然是潜在的。因此,孟加拉音乐类型分类是深度学习领域中一个相当新的研究领域。在这项工作中,我们构建了一个孟加拉音乐类型分类器(BMGC)来对6种孟加拉音乐类型进行分类:“Adhunik”、“Band”、“Hiphop”、“Nazrulgeeti”、“Lalon”和“Rabindra Sangeet”。我们创建了一个包含2944个孟加拉音乐片段的孟加拉音乐类型分类数据集(以下称为BMGCD),并开发了一个基于门控循环单元的深度学习模型来从音频信号中预测音乐类型。我们开发的模型达到了80.4%和80.6%的f1分数的准确率,超过了相关的现有作品。
{"title":"BMGC: A Deep Learning Approach to Classify Bengali Music Genres","authors":"Moumita Sen Sarma, Avishek Das","doi":"10.1145/3454127.3456593","DOIUrl":"https://doi.org/10.1145/3454127.3456593","url":null,"abstract":"Music genre classification (MGC) is the process of tagging music with their appropriate genres by analyzing music signals or the lyrics. With the accelerated surge in music data repositories, MGC can be extensively used in music recommendation systems, advertisement, and streaming services for systematic and efficient management. However, there have been many works on English music classification using different statistical and machine learning approaches, but there is no notable progress found in the arena of Bengali music. Besides, a few significant works have been found in utilizing Deep Learning (DL) methods to classify different music genres. Bengali music is significantly enriched with its contents and uniqueness. Moreover, the extent and scope of exploring the DL approach in Bengali music ground are still latent. Therefore, Bengali music genre classification is quite a new research area in the Deep learning field. In this work, we have constructed a Bengali Music Genre Classifier (BMGC) to categorize 6 Bengali music genres: ‘Adhunik’, ‘Band’, ‘Hiphop’, ‘Nazrulgeeti’, ‘Lalon’, and ‘Rabindra Sangeet’. We have created a Bengali music genre classification dataset (hereafter named BMGCD) containing 2944 Bengali music clips, and a Gated Recurrent Unit based deep learning model has been developed to predict the music genre from audio signals. Our developed model achieved an accuracy of 80.4% and 80.6% F1-score which surpasses the related existing works.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 4th International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1