首页 > 最新文献

2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)最新文献

英文 中文
A fuzzy similarity measure for search results evaluation 搜索结果评价的模糊相似度度量
Marwa Massaâbi, J. Akaichi
The wide spread of the world wide web, the accelerating internet technologies development and the continuous upload of documents has produced large volumes of data. As a result, a huge amount of similar information is available on the web however very difficult to retrieve the best, concise and most precise one. In addition, the continuous upload of information leads to another issue which is documents' redundancy. It still an issue that irritates researchers due to the multiplicity of duplicated documents. Hence, the unsatisfaction of the user is due to the irrelevance and the multiple duplications in the search results. Therefore, the need to study the fields of information retrieval and document similarity is essential to ameliorate the results. Working on retrieving and comparing information, then deleting duplications will finally achieve the needed results in short time and efficient way. For this reason, we propose, in this paper, a new approach which detects and deletes automatically duplicated research results. This approach is based on fuzzy logic and distance measurements. In fact, it has shown promising results.
万维网的广泛传播、互联网技术的加速发展以及文件的不断上传产生了大量的数据。因此,网络上有大量的类似信息,但是很难检索到最好的、简洁的和最精确的信息。此外,信息的不断上传也带来了文件冗余的问题。由于重复文件的多样性,这仍然是一个困扰研究人员的问题。因此,用户的不满意是由于搜索结果中的不相关和多次重复。因此,有必要研究信息检索和文献相似度领域,以改善结果。通过对信息的检索和比对,再进行重复的删除,可以在短时间内高效地达到所需的效果。为此,本文提出了一种自动检测和删除重复研究结果的新方法。该方法基于模糊逻辑和距离测量。事实上,它已经显示出可喜的结果。
{"title":"A fuzzy similarity measure for search results evaluation","authors":"Marwa Massaâbi, J. Akaichi","doi":"10.1109/AICCSA.2016.7945765","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945765","url":null,"abstract":"The wide spread of the world wide web, the accelerating internet technologies development and the continuous upload of documents has produced large volumes of data. As a result, a huge amount of similar information is available on the web however very difficult to retrieve the best, concise and most precise one. In addition, the continuous upload of information leads to another issue which is documents' redundancy. It still an issue that irritates researchers due to the multiplicity of duplicated documents. Hence, the unsatisfaction of the user is due to the irrelevance and the multiple duplications in the search results. Therefore, the need to study the fields of information retrieval and document similarity is essential to ameliorate the results. Working on retrieving and comparing information, then deleting duplications will finally achieve the needed results in short time and efficient way. For this reason, we propose, in this paper, a new approach which detects and deletes automatically duplicated research results. This approach is based on fuzzy logic and distance measurements. In fact, it has shown promising results.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122212739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-level synthesis for FPGA design based-SLAM application 基于slam应用的FPGA设计高级综合
Mohamed Abouzahir, A. Elouardi, S. Bouaziz, O. Hammami, Ismail Ali
The development of SLAM algorithms in the era of autonomous navigation and the growing demand for autonomous robot in place of human being, has put into question how to reduce the computational complexity and make use of these algorithms to operate in real time. Our work aims to take advantage of the high level synthesis (HLS) on FPGAs to design a real time SLAM application. Precisely, we evaluate the promess-held by the new modern low power FPGAs in accelerating SLAM algorithms. Throughtout this, we will attempt to implement a well-known algorithms (FastSLAM2.0), on a new modern FPGA using OpenCL, a standard high level language. Our implementation results show a significant improvement of the algorithm processing time on an FPGA device over a modern powerful embedded GPGPU.
自主导航时代SLAM算法的发展以及对自主机器人代替人类的需求日益增长,对如何降低计算复杂度并利用这些算法实时运行提出了疑问。我们的工作旨在利用fpga上的高级综合(HLS)来设计一个实时SLAM应用程序。准确地说,我们评估了新型现代低功耗fpga在加速SLAM算法方面的前景。在此过程中,我们将尝试在使用OpenCL(一种标准高级语言)的新型现代FPGA上实现一个著名的算法(FastSLAM2.0)。我们的实现结果表明,与现代功能强大的嵌入式GPGPU相比,在FPGA设备上的算法处理时间显着提高。
{"title":"High-level synthesis for FPGA design based-SLAM application","authors":"Mohamed Abouzahir, A. Elouardi, S. Bouaziz, O. Hammami, Ismail Ali","doi":"10.1109/AICCSA.2016.7945638","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945638","url":null,"abstract":"The development of SLAM algorithms in the era of autonomous navigation and the growing demand for autonomous robot in place of human being, has put into question how to reduce the computational complexity and make use of these algorithms to operate in real time. Our work aims to take advantage of the high level synthesis (HLS) on FPGAs to design a real time SLAM application. Precisely, we evaluate the promess-held by the new modern low power FPGAs in accelerating SLAM algorithms. Throughtout this, we will attempt to implement a well-known algorithms (FastSLAM2.0), on a new modern FPGA using OpenCL, a standard high level language. Our implementation results show a significant improvement of the algorithm processing time on an FPGA device over a modern powerful embedded GPGPU.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a framework for customer emotion detection 构建客户情感检测框架
Moulay Smail Bouzakraoui, A. Sadiq, N. Enneya
Automated analysis of human affective behavior has attracted increasing attention from researchers in psychology neuroscience, linguistics, computer science and related disciplines. Nowadays, emotional factors are important as classic functional aspects of customer purchasing behavior. Recent studies have shown that most of our purchasing choices and decisions are the result of a careful analysis of the product advantages and disadvantages and of affective and emotional aspects. Psychological literature recognizes that the emotional conditions are always present and influence every stage of decision-making in purchasing process. The main contribution of this paper is the design of a novel framework that provides the essential for customer sentiments analysis and emotion measuring in marketing. We focus our study on automatic facial expression analysis as a tool for measuring emotional customer that can predict their behavior in the decision-making.
人类情感行为的自动化分析越来越受到心理学、神经科学、语言学、计算机科学及相关学科研究者的关注。如今,情感因素作为顾客购买行为的经典功能方面,占有重要地位。最近的研究表明,我们的大多数购买选择和决定都是仔细分析产品的优缺点以及情感和情感方面的结果。心理学文献认识到,情绪状况始终存在,并影响着购买过程中决策的每一个阶段。本文的主要贡献是设计了一个新的框架,为市场营销中的顾客情感分析和情感测量提供了必要的基础。我们的研究重点是面部表情自动分析作为一种测量顾客情绪的工具,可以预测顾客在决策中的行为。
{"title":"Towards a framework for customer emotion detection","authors":"Moulay Smail Bouzakraoui, A. Sadiq, N. Enneya","doi":"10.1109/AICCSA.2016.7945830","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945830","url":null,"abstract":"Automated analysis of human affective behavior has attracted increasing attention from researchers in psychology neuroscience, linguistics, computer science and related disciplines. Nowadays, emotional factors are important as classic functional aspects of customer purchasing behavior. Recent studies have shown that most of our purchasing choices and decisions are the result of a careful analysis of the product advantages and disadvantages and of affective and emotional aspects. Psychological literature recognizes that the emotional conditions are always present and influence every stage of decision-making in purchasing process. The main contribution of this paper is the design of a novel framework that provides the essential for customer sentiments analysis and emotion measuring in marketing. We focus our study on automatic facial expression analysis as a tool for measuring emotional customer that can predict their behavior in the decision-making.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"51 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things DTMS-IoT:基于dirichlet的信任管理系统,可减轻物联网的开关攻击和不诚实建议
Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, L. Saïdane
The Internet of Things (IoT) is based on the idea that things surrounding the human living space can be connected to the Internet, allowing smarter living environments and more comfortable life. However, adoption of the IoT might not be approved unless security issues are solved. In this paper, we propose a new Dirichlet based trust management system for the IoT called DTMS-IoT. This system detects nodes malicious behaviour which permits to mitigate both on-off attacks and dishonest recommendations. It also uses service levels and things capacities to reinforce security. As in many trust management systems introduced in the literature, the computation of trust in our solution is based on direct observations and recommendations. The novelty of our approach can be summed up in two aspects. The first aspect concerns recommendations that we do not consider unless direct observations are not credible. However the second aspect tries to prevent On-Off attacks using the precaution factor and mitigates dishonest recommendations based on k-means selection algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against on-off attacks and good/bad mouthing attacks.
物联网(IoT)的理念是将人类生活空间周围的事物连接到互联网,从而实现更智能的生活环境和更舒适的生活。然而,除非安全问题得到解决,否则物联网的采用可能不会得到批准。本文提出了一种新的基于Dirichlet的物联网信任管理系统DTMS-IoT。该系统检测节点的恶意行为,从而可以减轻开关攻击和不诚实的建议。它还使用服务级别和事物能力来加强安全性。与文献中介绍的许多信任管理系统一样,我们的解决方案中的信任计算基于直接观察和建议。我们方法的新颖性可以概括为两个方面。第一个方面涉及除非直接观察不可信,否则我们不会考虑的建议。然而,第二个方面试图使用预防因子来防止on - off攻击,并减轻基于k-means选择算法和保证事物的不诚实推荐。通过仿真验证了该系统在抗开关攻击和恶意攻击中的有效性。
{"title":"DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things","authors":"Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, L. Saïdane","doi":"10.1109/AICCSA.2016.7945691","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945691","url":null,"abstract":"The Internet of Things (IoT) is based on the idea that things surrounding the human living space can be connected to the Internet, allowing smarter living environments and more comfortable life. However, adoption of the IoT might not be approved unless security issues are solved. In this paper, we propose a new Dirichlet based trust management system for the IoT called DTMS-IoT. This system detects nodes malicious behaviour which permits to mitigate both on-off attacks and dishonest recommendations. It also uses service levels and things capacities to reinforce security. As in many trust management systems introduced in the literature, the computation of trust in our solution is based on direct observations and recommendations. The novelty of our approach can be summed up in two aspects. The first aspect concerns recommendations that we do not consider unless direct observations are not credible. However the second aspect tries to prevent On-Off attacks using the precaution factor and mitigates dishonest recommendations based on k-means selection algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against on-off attacks and good/bad mouthing attacks.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123758473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A density clustering approach for CBIR system CBIR系统的密度聚类方法
Lacheheb Hadjer, Saliha Aouat
Searching an image in a huge set of images became an important task in several domains such as crime, medicine, geology and so on. The task of retrieving images by their visual contents is called content-based image retrieval (CBIR) systems. These systems have to be fast, efficient and semantically similar. For this aim, we used a new density clustering technique in our proposed CBIR system. The paper describes a new CBIR that uses a t-SNE (t-Distributed Stochastic Neighbor Embedding) data reduction and a proposed density-based clustering method. Several advantages are deduced from the proposition. First, reducing the dimensionality minimizes the required time and storage space. Next, reducing images to a very low dimension such as 2D or 3D permits an easier visualization. Also, no need to set image data parameters for clustering. Likewise, No need to introduce the number of clusters. Besides, it is effective for several image data especially shaped data. For validation tests, we use ZUBUD, Wang databases and shape datasets. Several comparison with two other CBIR systems such as FIRE and LIRE are included. The results obtained demonstrate the originality, reliability, and relevance of our proposition.
在海量图像中搜索图像已成为犯罪、医学、地质等多个领域的重要任务。根据图像的视觉内容检索图像的任务被称为基于内容的图像检索(CBIR)系统。这些系统必须快速、高效且语义相似。为此,我们在提出的CBIR系统中使用了一种新的密度聚类技术。本文描述了一种使用t-SNE (t-分布随机邻居嵌入)数据约简和提出的基于密度的聚类方法的新的CBIR。从这个命题中可以推断出几个优点。首先,减少维数可以最大限度地减少所需的时间和存储空间。其次,将图像减少到非常低的维度,如2D或3D,可以更容易地可视化。此外,不需要设置图像数据参数进行聚类。同样,不需要介绍集群的数量。此外,该方法对多种图像数据特别是形状数据都是有效的。对于验证测试,我们使用ZUBUD、Wang数据库和形状数据集。并与其他两种CBIR系统(FIRE和live)进行了比较。获得的结果证明了我们的主张的原创性、可靠性和相关性。
{"title":"A density clustering approach for CBIR system","authors":"Lacheheb Hadjer, Saliha Aouat","doi":"10.1109/AICCSA.2016.7945742","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945742","url":null,"abstract":"Searching an image in a huge set of images became an important task in several domains such as crime, medicine, geology and so on. The task of retrieving images by their visual contents is called content-based image retrieval (CBIR) systems. These systems have to be fast, efficient and semantically similar. For this aim, we used a new density clustering technique in our proposed CBIR system. The paper describes a new CBIR that uses a t-SNE (t-Distributed Stochastic Neighbor Embedding) data reduction and a proposed density-based clustering method. Several advantages are deduced from the proposition. First, reducing the dimensionality minimizes the required time and storage space. Next, reducing images to a very low dimension such as 2D or 3D permits an easier visualization. Also, no need to set image data parameters for clustering. Likewise, No need to introduce the number of clusters. Besides, it is effective for several image data especially shaped data. For validation tests, we use ZUBUD, Wang databases and shape datasets. Several comparison with two other CBIR systems such as FIRE and LIRE are included. The results obtained demonstrate the originality, reliability, and relevance of our proposition.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complementary features for traffic sign detection and recognition 交通标志检测和识别的互补功能
Ayoub Ellahyani, Mohamed El Ansari
Traffic Sign Detection and Recognition is an important component of intelligent transportation systems. It has captured the attention of the computer vision community for several decades. In this paper, we propose a new traffic sign detection and recognition approach consisting of color segmentation, shape classification and recognition stages. In the first stage, the image is segmented using look-up tables and thresholding on the HSI color space. The second stage uses Distance to borders (DtBs) features and random forest classifier to detect circular, triangular and rectangular shapes among the segmented ROIs. The last stage consists in the recognition of the detected signs. It is performed using Random Forest as classifier and histogram of oriented gradients (HOG) together with local self-similarity (LSS) as features. Experimental results show that the proposed method achieves high recall, precision, and correct classification accuracy ratios, and is robust to various adverse situations.
交通标志检测与识别是智能交通系统的重要组成部分。几十年来,它一直引起计算机视觉界的注意。本文提出了一种由颜色分割、形状分类和识别三个阶段组成的交通标志检测与识别新方法。在第一阶段,使用查找表和HSI颜色空间的阈值对图像进行分割。第二阶段使用边界距离特征和随机森林分类器来检测分割的roi中的圆形、三角形和矩形形状。最后一个阶段是识别检测到的信号。该算法以随机森林为分类器,以定向梯度直方图(HOG)和局部自相似性(LSS)为特征。实验结果表明,该方法具有较高的查全率、查准率和分类正确率,对各种不利情况具有较强的鲁棒性。
{"title":"Complementary features for traffic sign detection and recognition","authors":"Ayoub Ellahyani, Mohamed El Ansari","doi":"10.1109/AICCSA.2016.7945653","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945653","url":null,"abstract":"Traffic Sign Detection and Recognition is an important component of intelligent transportation systems. It has captured the attention of the computer vision community for several decades. In this paper, we propose a new traffic sign detection and recognition approach consisting of color segmentation, shape classification and recognition stages. In the first stage, the image is segmented using look-up tables and thresholding on the HSI color space. The second stage uses Distance to borders (DtBs) features and random forest classifier to detect circular, triangular and rectangular shapes among the segmented ROIs. The last stage consists in the recognition of the detected signs. It is performed using Random Forest as classifier and histogram of oriented gradients (HOG) together with local self-similarity (LSS) as features. Experimental results show that the proposed method achieves high recall, precision, and correct classification accuracy ratios, and is robust to various adverse situations.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"68 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114000009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A generic architecture of ADAS sensor fault injection for virtual tests 面向虚拟测试的ADAS传感器故障注入通用体系结构
M. Elgharbawy, A. Schwarzhaupt, Gerrit Scheike, Michael Frey, F. Gauterin
This paper deals with an advanced approach for the verification of ADAS algorithms in complex automotive sensor networks. We introduce a real-time modular framework that can benchmark the performance of the ADAS algorithms at the electronic system level using a Hardware-in-the-Loop (HiL) co-simulation. The presented research provides a generic architecture of ADAS sensor error injection for robustness testing of the System under Test (SuT). Effects of sensor failures can be added in a continuous manner to achieve increased degrees of realism. For efficient verification, an astute selection of relevant test scenarios is conducted using model-based testing to avoid repetitive test scenarios. The industry-proven framework facilitates a systematic testing of ADAS algorithms precisely and more efficiently on the target electronic control unit (ECU) in the laboratory.
本文讨论了一种在复杂汽车传感器网络中验证ADAS算法的先进方法。我们引入了一个实时模块化框架,可以使用硬件在环(HiL)联合仿真在电子系统级别对ADAS算法的性能进行基准测试。本研究为被测系统(SuT)的鲁棒性测试提供了一种通用的ADAS传感器错误注入架构。传感器故障的影响可以以连续的方式添加,以达到更高的逼真程度。为了有效的验证,使用基于模型的测试来精明地选择相关的测试场景,以避免重复的测试场景。业界认可的框架有助于在实验室的目标电子控制单元(ECU)上精确、高效地对ADAS算法进行系统测试。
{"title":"A generic architecture of ADAS sensor fault injection for virtual tests","authors":"M. Elgharbawy, A. Schwarzhaupt, Gerrit Scheike, Michael Frey, F. Gauterin","doi":"10.1109/AICCSA.2016.7945680","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945680","url":null,"abstract":"This paper deals with an advanced approach for the verification of ADAS algorithms in complex automotive sensor networks. We introduce a real-time modular framework that can benchmark the performance of the ADAS algorithms at the electronic system level using a Hardware-in-the-Loop (HiL) co-simulation. The presented research provides a generic architecture of ADAS sensor error injection for robustness testing of the System under Test (SuT). Effects of sensor failures can be added in a continuous manner to achieve increased degrees of realism. For efficient verification, an astute selection of relevant test scenarios is conducted using model-based testing to avoid repetitive test scenarios. The industry-proven framework facilitates a systematic testing of ADAS algorithms precisely and more efficiently on the target electronic control unit (ECU) in the laboratory.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of RPL metrics in environments with strained transmission ranges 传输范围应变环境下RPL指标的性能评价
C. Thomson, Isam Wadhaj, I. Romdhani, A. Al-Dubai
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consistent approach taken of optimal node distribution. This in order to best evaluate networking metrics such as Packet Delivery Ratio (PDR), latency and energy consumption. The tests detailed in this paper differ from previous work, in that there is no concerted effort to ensure the appropriate density of the network topologies. The intention being to ‘strain’ the limits of the transmission ranges. Using the Cooja simulator, we take the approach of utilising nodes in less-than perfect, real-world scenarios. In this way the main factor at play is the ability to retain nodes as part of the Destination Oriented Directed Acyclic Graph (DODAG) build in environments with ‘strained’ transmission ranges. In this regard we compare Objective Function Zero (OF0) Hop-count with The Minimum Rank with Hysteresis Objective Function (MRHOF) Energy and expected transmission count (ETX) metrics. In utilising the energy metric, a novel approach, we prove that it is ineffective in this scenario. Resultantly, the ETX metric outperforms Hop-count, producing results that improve over time, adjusting to ‘strained’ environments to include more motes in the DODAG build as time passes. In conclusion, we propose future work to develop an extension to Cooja to utilise the ETX metric with an Energy constraint. This in order to better evaluate the use of node energy levels as part of a DODAG build in ‘strained’ WSN implementations in the future.
通过对低功耗损耗网络路由协议(RPL)在无线传感器网络(WSNs)中实现领域的现有研究,揭示了采用最优节点分布的一致方法。这是为了最好地评估网络指标,如包传送率(PDR)、延迟和能耗。本文中详细的测试与以前的工作不同,因为没有协调一致的努力来确保网络拓扑的适当密度。这样做的目的是“拉伸”传输范围的极限。使用Cooja模拟器,我们采用了在不太完美的现实场景中利用节点的方法。通过这种方式,发挥作用的主要因素是在具有“紧张”传输范围的环境中保留节点作为目标定向无环图(DODAG)的一部分的能力。在这方面,我们比较了目标函数零(OF0)跳数与最小秩与滞后目标函数(MRHOF)能量和期望传输计数(ETX)指标。在利用能量度量这一新颖的方法时,我们证明了它在这种情况下是无效的。因此,ETX指标优于Hop-count,产生的结果随着时间的推移而改善,随着时间的推移调整到“紧张”的环境中,在DODAG构建中包含更多的mote。总之,我们建议未来的工作是开发Cooja的扩展,以利用具有能源约束的ETX度量。这是为了更好地评估节点能量水平的使用,作为未来“紧张”WSN实现中DODAG构建的一部分。
{"title":"Performance evaluation of RPL metrics in environments with strained transmission ranges","authors":"C. Thomson, Isam Wadhaj, I. Romdhani, A. Al-Dubai","doi":"10.1109/AICCSA.2016.7945687","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945687","url":null,"abstract":"An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consistent approach taken of optimal node distribution. This in order to best evaluate networking metrics such as Packet Delivery Ratio (PDR), latency and energy consumption. The tests detailed in this paper differ from previous work, in that there is no concerted effort to ensure the appropriate density of the network topologies. The intention being to ‘strain’ the limits of the transmission ranges. Using the Cooja simulator, we take the approach of utilising nodes in less-than perfect, real-world scenarios. In this way the main factor at play is the ability to retain nodes as part of the Destination Oriented Directed Acyclic Graph (DODAG) build in environments with ‘strained’ transmission ranges. In this regard we compare Objective Function Zero (OF0) Hop-count with The Minimum Rank with Hysteresis Objective Function (MRHOF) Energy and expected transmission count (ETX) metrics. In utilising the energy metric, a novel approach, we prove that it is ineffective in this scenario. Resultantly, the ETX metric outperforms Hop-count, producing results that improve over time, adjusting to ‘strained’ environments to include more motes in the DODAG build as time passes. In conclusion, we propose future work to develop an extension to Cooja to utilise the ETX metric with an Energy constraint. This in order to better evaluate the use of node energy levels as part of a DODAG build in ‘strained’ WSN implementations in the future.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improved target tracking using regression tree in wireless sensor networks 基于回归树的无线传感器网络改进目标跟踪
H. Ahmadi, F. Viani, A. Polo, R. Bouallègue
Positioning and tracking of wireless devices in indoor environment is a challenging research problem. Accurate localization of a moving target is a fundamental requirement in Wireless Sensor Networks monitoring applications. In this paper, a novel location tracking algorithm which combines learning methods is proposed. In previous work, regression tree using received signal strength method is proposed to localize a static sensor node. This approach is employed in this paper to solve the complex relation between the received signal strength and the target position. Then, an ensemble of trees are applied leading to more accurate position of the moving target. The proposed algorithm has been experimentally evaluated using real measurement of a moving target in an office room. The performance results have been analyzed through a comparison with the standard regression tree and ordinary Kalman filter.
无线设备在室内环境中的定位与跟踪是一个具有挑战性的研究课题。运动目标的精确定位是无线传感器网络监测应用的基本要求。本文提出了一种结合学习方法的定位跟踪算法。在以往的工作中,提出了基于接收信号强度的回归树方法来定位静态传感器节点。本文采用该方法解决了接收信号强度与目标位置之间的复杂关系。然后,应用树的集合,使运动目标的位置更加精确。该算法已通过对办公室内运动目标的实际测量进行了实验验证。通过与标准回归树和普通卡尔曼滤波的比较,分析了其性能结果。
{"title":"Improved target tracking using regression tree in wireless sensor networks","authors":"H. Ahmadi, F. Viani, A. Polo, R. Bouallègue","doi":"10.1109/AICCSA.2016.7945735","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945735","url":null,"abstract":"Positioning and tracking of wireless devices in indoor environment is a challenging research problem. Accurate localization of a moving target is a fundamental requirement in Wireless Sensor Networks monitoring applications. In this paper, a novel location tracking algorithm which combines learning methods is proposed. In previous work, regression tree using received signal strength method is proposed to localize a static sensor node. This approach is employed in this paper to solve the complex relation between the received signal strength and the target position. Then, an ensemble of trees are applied leading to more accurate position of the moving target. The proposed algorithm has been experimentally evaluated using real measurement of a moving target in an office room. The performance results have been analyzed through a comparison with the standard regression tree and ordinary Kalman filter.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A compression-based technique to classify metamorphic malware 一种基于压缩的变形恶意软件分类技术
Duaa Ekhtoom, M. Al-Ayyoub, Mohammed I. Al-Saleh, M. Alsmirat, Ismail Hmeidi
Metamorphic malware are able to change their appearance to evade detection by traditional anti-malware software. One of the ways to help mitigate the threat of new metamorphic malware is to determine their origins, i.e., the families to which they belong. This type of metamorphic malware analysis is not typically handled by commercial software. Moreover, existing works rely on analyzing the op-code sequences extracted from the Assembly files of the malware. Very few papers have tried to perform analysis on the binary files of the malware. However, they focused on the simple binary problem of differentiating between a certain malware family and benign files. In this work, we address the more difficult problem of determining the origin of a new metamorphic malware by measuring its similarity to hundreds of variants taken from 13 families of real malware. To address this problem, we use a compression-based classification approach. We experiment with two such approaches: AMDL and BCN. The results showed that AMDL performed no better than a random guess (11% accuracy for AMDL and 18% for the random baseline). On the other hand, BCN performed really well with 67% accuracy.
变形恶意软件能够改变其外观以逃避传统反恶意软件的检测。帮助减轻新变形恶意软件威胁的方法之一是确定它们的来源,即它们所属的家族。这种类型的变形恶意软件分析通常不是由商业软件处理的。此外,现有的工作依赖于分析从恶意软件的汇编文件中提取的操作码序列。很少有论文试图对恶意软件的二进制文件进行分析。然而,他们关注的是区分某个恶意软件家族和良性文件的简单二进制问题。在这项工作中,我们解决了更困难的问题,即通过测量其与来自13个真实恶意软件家族的数百种变体的相似性来确定新的变形恶意软件的起源。为了解决这个问题,我们使用基于压缩的分类方法。我们试验了两种这样的方法:AMDL和BCN。结果表明,AMDL的表现并不比随机猜测好(AMDL的准确率为11%,随机基线的准确率为18%)。另一方面,BCN表现得非常好,准确率达到67%。
{"title":"A compression-based technique to classify metamorphic malware","authors":"Duaa Ekhtoom, M. Al-Ayyoub, Mohammed I. Al-Saleh, M. Alsmirat, Ismail Hmeidi","doi":"10.1109/AICCSA.2016.7945801","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945801","url":null,"abstract":"Metamorphic malware are able to change their appearance to evade detection by traditional anti-malware software. One of the ways to help mitigate the threat of new metamorphic malware is to determine their origins, i.e., the families to which they belong. This type of metamorphic malware analysis is not typically handled by commercial software. Moreover, existing works rely on analyzing the op-code sequences extracted from the Assembly files of the malware. Very few papers have tried to perform analysis on the binary files of the malware. However, they focused on the simple binary problem of differentiating between a certain malware family and benign files. In this work, we address the more difficult problem of determining the origin of a new metamorphic malware by measuring its similarity to hundreds of variants taken from 13 families of real malware. To address this problem, we use a compression-based classification approach. We experiment with two such approaches: AMDL and BCN. The results showed that AMDL performed no better than a random guess (11% accuracy for AMDL and 18% for the random baseline). On the other hand, BCN performed really well with 67% accuracy.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1