首页 > 最新文献

2017 International Conference on Electrical Engineering and Computer Science (ICECOS)最新文献

英文 中文
Modelling and optimization of simultaneous AC-DC transmission to enhance power transfer capacity of the existing transmission lines 交直流同步输电建模与优化,提高现有输电线路的输电能力
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167159
Uvais Mustafa, M. S. Arif, H. Rahman, M. Sidik
With ever-growing population, the demand of electric power is also increasing day by day. To meet this increasing demand, the power transferred should also increase. However, the existing EHV transmission lines cannot be loaded up to their thermal limits because of the considerations of their transient stability. To address this issue simultaneous power transfer scheme came into existence. With this scheme it is possible to load the transmission lines close to their thermal limits, thus increasing the power transfer capacity of the line. This is done by the transferring AC power with DC current superimposed on it. A double circuit line is converted into composite AC-DC line which will be used for simultaneous AC-DC transmission. In this work, simple mathematical model of composite line is developed and analysed to track down the conditions for maximum power transfer. Developed mathematical approach is also compared with the existing graphical method for calculating maximum power transfer. The results obtained from mathematical model are found to be in close proximity to those obtained by graphical analysis.
随着人口的不断增长,对电力的需求也日益增加。为了满足这种不断增长的需求,传输的功率也应该增加。然而,现有的超高压输电线路由于暂态稳定性的考虑,不能负荷到其热极限。为了解决这一问题,同步输电方案应运而生。采用这种方案,可以使输电线路的负荷接近其热极限,从而增加线路的输电能力。这是通过将交流电源与直流电流叠加在一起来实现的。将双回线路转换成交直流复合线路,用于交直流同时传输。本文建立并分析了复合线路的简单数学模型,以求出最大功率传输的条件。并将所提出的数学方法与现有的计算最大功率传输的图解方法进行了比较。通过数学模型得到的结果与图形分析得到的结果非常接近。
{"title":"Modelling and optimization of simultaneous AC-DC transmission to enhance power transfer capacity of the existing transmission lines","authors":"Uvais Mustafa, M. S. Arif, H. Rahman, M. Sidik","doi":"10.1109/ICECOS.2017.8167159","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167159","url":null,"abstract":"With ever-growing population, the demand of electric power is also increasing day by day. To meet this increasing demand, the power transferred should also increase. However, the existing EHV transmission lines cannot be loaded up to their thermal limits because of the considerations of their transient stability. To address this issue simultaneous power transfer scheme came into existence. With this scheme it is possible to load the transmission lines close to their thermal limits, thus increasing the power transfer capacity of the line. This is done by the transferring AC power with DC current superimposed on it. A double circuit line is converted into composite AC-DC line which will be used for simultaneous AC-DC transmission. In this work, simple mathematical model of composite line is developed and analysed to track down the conditions for maximum power transfer. Developed mathematical approach is also compared with the existing graphical method for calculating maximum power transfer. The results obtained from mathematical model are found to be in close proximity to those obtained by graphical analysis.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"94 1","pages":"328-332"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85100642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integration of spatial online analytical processing for agricultural commodities with OpenLayers 基于OpenLayers的农产品空间在线分析处理集成
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167127
I. S. Sitanggang, A. Ginanjar, M. Syukur, R. Trisminingsih, H. Khotimah
Data on agricultural commodities in Indonesia are provided Ministry of Agriculture, Republic of Indonesia which can be accessed on Agricultural Statistics Database at http://aplikasi.pertanian.go.id/bdsp/index.asp. The data are presented to the public in tabular formats. In order to provide the analytical tool for the agricultural commodities data, this study aims to develop a Spatial Online Analytical Processing (SOLAP) that is integrated to spatial data warehouse. The SOLAP for Agricultural Commodities adopts the three-tier architecture. The first layer is the visualization layer which is responsible for displaying data summary in tabular format, graphics, and maps. This layer consists of OpenLayers, GeoJSON, HTML and Java Script. The second layer is the logic layer which is responsible for receiving input parameters from the visualization layer, retrieving data according to parameters to the data layer, processing data, then returning the data to the visualization layer. The logic layer uses PHP as the programming language and CakePhp framework. The third layer is the data layer which is the agricultural commodities data storage. This layer consists of OLAP engine Mondrian and PostgreSQL. The SOLAP for Agricultural Commodities has successfully implemented and can provide the summary of agricultural commodities data in tabular format and maps.
印度尼西亚的农产品数据由印度尼西亚共和国农业部提供,可在农业统计数据库http://aplikasi.pertanian.go.id/bdsp/index.asp查阅。这些数据以表格的形式呈现给公众。为了给农产品数据提供分析工具,本研究旨在开发与空间数据仓库集成的空间在线分析处理(SOLAP)。农产品SOLAP采用三层架构。第一层是可视化层,负责以表格格式、图形和地图显示数据摘要。该层由OpenLayers、GeoJSON、HTML和Java Script组成。第二层是逻辑层,负责接收来自可视化层的输入参数,根据参数向数据层检索数据,处理数据,再将数据返回给可视化层。逻辑层采用PHP作为编程语言和CakePhp框架。第三层是数据层,即农产品数据存储。该层由OLAP引擎Mondrian和PostgreSQL组成。农业商品综合应用程序已成功实施,并能以表格格式和地图提供农业商品数据摘要。
{"title":"Integration of spatial online analytical processing for agricultural commodities with OpenLayers","authors":"I. S. Sitanggang, A. Ginanjar, M. Syukur, R. Trisminingsih, H. Khotimah","doi":"10.1109/ICECOS.2017.8167127","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167127","url":null,"abstract":"Data on agricultural commodities in Indonesia are provided Ministry of Agriculture, Republic of Indonesia which can be accessed on Agricultural Statistics Database at http://aplikasi.pertanian.go.id/bdsp/index.asp. The data are presented to the public in tabular formats. In order to provide the analytical tool for the agricultural commodities data, this study aims to develop a Spatial Online Analytical Processing (SOLAP) that is integrated to spatial data warehouse. The SOLAP for Agricultural Commodities adopts the three-tier architecture. The first layer is the visualization layer which is responsible for displaying data summary in tabular format, graphics, and maps. This layer consists of OpenLayers, GeoJSON, HTML and Java Script. The second layer is the logic layer which is responsible for receiving input parameters from the visualization layer, retrieving data according to parameters to the data layer, processing data, then returning the data to the visualization layer. The logic layer uses PHP as the programming language and CakePhp framework. The third layer is the data layer which is the agricultural commodities data storage. This layer consists of OLAP engine Mondrian and PostgreSQL. The SOLAP for Agricultural Commodities has successfully implemented and can provide the summary of agricultural commodities data in tabular format and maps.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"48 1","pages":"167-170"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81707600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The detection of 3D object using a method of a Harris Corner Detector and Lucas-Kanade Tracker based on stereo image 采用基于立体图像的Harris角点检测器和Lucas-Kanade跟踪器对三维目标进行检测
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167126
W. Prawira, E. Nasrullah, S. R. Sulistiyanti, F. A. Setyawan
This research proposes the use of Harris Corner Detector and Lucas-Kanade Tracker methods for the detection of 3D objects based on stereo image. The test image obtained from the results of capturing of the camera to the object of the form of tubes, balls, cubes, and 2D images. This research is the early step in the development of the ability of a computer vision to be able to mimic the performance of eye organs in humans in detecting an object. The detection step of the proposed method begins by determining the feature point on the image of the taking results of two cameras using the Harris Corner Detector. After the feature point of the two images obtained, then performed tracking feature point using the Lucas-Kanade Tracker method. In this research, the distance between the cameras used 10, 20, and 50 cm. The Effectiveness of the detection result of the proposed method is measured using the recall and precision parameter values obtained in the merged of the image. The proposed method gives a Recall value above 90% and a precision value above 50% for a distance of the cameras 10cm and 20cm for ball and tube objects. In the box object, the Recall value is 60% for a distance between the cameras 50cm and below 25% for a distance of the cameras 10cm and 20cm. The precision value for detection of the box object is very low, i.e. less than 25%.
本研究提出使用Harris角检测器和Lucas-Kanade跟踪器方法对基于立体图像的三维物体进行检测。测试图像由相机捕获的结果得到,以管状、球状、立方体形式的物体,以及二维图像。这项研究是计算机视觉能力发展的早期一步,它能够模仿人类眼睛器官在检测物体时的表现。该方法的检测步骤首先使用Harris角点检测器确定两台相机拍摄结果图像上的特征点。在获得两幅图像的特征点后,使用Lucas-Kanade跟踪方法对特征点进行跟踪。在这项研究中,相机之间的距离使用了10、20和50厘米。利用图像合并后得到的查全率和查准率参数值来衡量该方法检测结果的有效性。对于距离摄像机10cm和20cm的球和管物体,该方法的召回率高于90%,精度高于50%。在box对象中,当摄像机之间的距离为50cm时召回值为60%,当摄像机之间的距离为10cm和20cm时召回值低于25%。盒状物体的检测精度值很低,小于25%。
{"title":"The detection of 3D object using a method of a Harris Corner Detector and Lucas-Kanade Tracker based on stereo image","authors":"W. Prawira, E. Nasrullah, S. R. Sulistiyanti, F. A. Setyawan","doi":"10.1109/ICECOS.2017.8167126","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167126","url":null,"abstract":"This research proposes the use of Harris Corner Detector and Lucas-Kanade Tracker methods for the detection of 3D objects based on stereo image. The test image obtained from the results of capturing of the camera to the object of the form of tubes, balls, cubes, and 2D images. This research is the early step in the development of the ability of a computer vision to be able to mimic the performance of eye organs in humans in detecting an object. The detection step of the proposed method begins by determining the feature point on the image of the taking results of two cameras using the Harris Corner Detector. After the feature point of the two images obtained, then performed tracking feature point using the Lucas-Kanade Tracker method. In this research, the distance between the cameras used 10, 20, and 50 cm. The Effectiveness of the detection result of the proposed method is measured using the recall and precision parameter values obtained in the merged of the image. The proposed method gives a Recall value above 90% and a precision value above 50% for a distance of the cameras 10cm and 20cm for ball and tube objects. In the box object, the Recall value is 60% for a distance between the cameras 50cm and below 25% for a distance of the cameras 10cm and 20cm. The precision value for detection of the box object is very low, i.e. less than 25%.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"15 1","pages":"163-166"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80266485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Car model recognition from frontal image using BRISK 基于正面图像的汽车模型识别
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167114
Malisa Huzaifa, I. Suwardi
Car Recognition is a part of Intelligent Transportation System. This research proposes the manufacture of ITS-based system to identify car model from Its frontal image using Binary Robust Invariant Scalable method. The BRISK method is used to detect image keypoint, and it uses Hamming Distance for keypoint matching. As for matching error, this research depends on RANSAC. BRISK method excellence lies in the speed of scale space searching of images. Car model recognition using BRISK has an accuracy rate of 96.25%.
汽车识别是智能交通系统的一部分。本研究提出利用二值鲁棒不变可扩展方法制作基于Its的汽车正面图像模型识别系统。采用轻快方法检测图像关键点,并利用汉明距离进行关键点匹配。对于匹配误差,本研究依赖RANSAC。BRISK方法的优点在于对图像的尺度空间搜索速度快。使用BRISK进行汽车模型识别,准确率达到96.25%。
{"title":"Car model recognition from frontal image using BRISK","authors":"Malisa Huzaifa, I. Suwardi","doi":"10.1109/ICECOS.2017.8167114","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167114","url":null,"abstract":"Car Recognition is a part of Intelligent Transportation System. This research proposes the manufacture of ITS-based system to identify car model from Its frontal image using Binary Robust Invariant Scalable method. The BRISK method is used to detect image keypoint, and it uses Hamming Distance for keypoint matching. As for matching error, this research depends on RANSAC. BRISK method excellence lies in the speed of scale space searching of images. Car model recognition using BRISK has an accuracy rate of 96.25%.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"220 1","pages":"104-108"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77064681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The user engagement impact along information technology of infrastructure library (ITIL) adoption 基础设施图书馆(ITIL)采用信息技术对用户参与的影响
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167130
Sarifah Putri Raflesia, K. Surendro, Rossi Passarella
There are some issues with the adoption of information technology of infrastructure library (ITIL). The common issue comes from customers that always need excellent services. On the other hand, there are employees acting as an internal element of enterprise who need to be motivated while delivering the services. It has been known that the pressure at work and employees' personal problem can cause negative impacts such as decreasing the productivity and lack of teamwork. Moreover, IT managers have a limitation in understanding the psychological issues. Hence, it drives the enterprise to adopt an approach, which can help IT managers to motivate and reward the employees. They also need to ensure the employees that enterprise can be trusted, which means they should not be any doubt in helping the enterprise to reach the goals. Gamification is one of the persuasive approaches that have been used to boost motivation. In previous research, the design of user-centric ITIL function, which embedded gamification approach has been designed. But, the design still required evaluation in order to reveal the positive correlation between the user engagement and system success. This research focused on presenting the impact of user engagement towards successful ITIL adoption.
基础设施图书馆(ITIL)信息技术的应用存在一些问题。常见的问题是客户总是需要优质的服务。另一方面,有些员工作为企业的内部要素,在提供服务时需要激励。众所周知,工作压力和员工的个人问题会造成负面影响,如降低生产力和缺乏团队合作。此外,IT经理对心理问题的理解也有局限性。因此,它促使企业采用一种方法,该方法可以帮助it经理激励和奖励员工。他们还需要让员工相信企业是可以信任的,这意味着他们在帮助企业实现目标时不应该有任何怀疑。游戏化是一种用来提高动机的有说服力的方法。在以往的研究中,设计了以用户为中心的ITIL功能,其中嵌入了游戏化方法。但是,设计仍然需要评估,以揭示用户粘性和系统成功之间的正相关关系。这项研究的重点是展示用户参与对成功采用ITIL的影响。
{"title":"The user engagement impact along information technology of infrastructure library (ITIL) adoption","authors":"Sarifah Putri Raflesia, K. Surendro, Rossi Passarella","doi":"10.1109/ICECOS.2017.8167130","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167130","url":null,"abstract":"There are some issues with the adoption of information technology of infrastructure library (ITIL). The common issue comes from customers that always need excellent services. On the other hand, there are employees acting as an internal element of enterprise who need to be motivated while delivering the services. It has been known that the pressure at work and employees' personal problem can cause negative impacts such as decreasing the productivity and lack of teamwork. Moreover, IT managers have a limitation in understanding the psychological issues. Hence, it drives the enterprise to adopt an approach, which can help IT managers to motivate and reward the employees. They also need to ensure the employees that enterprise can be trusted, which means they should not be any doubt in helping the enterprise to reach the goals. Gamification is one of the persuasive approaches that have been used to boost motivation. In previous research, the design of user-centric ITIL function, which embedded gamification approach has been designed. But, the design still required evaluation in order to reveal the positive correlation between the user engagement and system success. This research focused on presenting the impact of user engagement towards successful ITIL adoption.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"120 1","pages":"184-187"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77155418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A hybrid cuckoo search and K-means for clustering problem 聚类问题的混合布谷鸟搜索和K-means
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167117
A. S. Girsang, A. Yunanto, Ayu Hidayah Aslamiah
Cuckoo search algorithm (CSA) is one of behavior algorithm which is effective to solve optimization problem including the clustering problem. Based on investigation, k-means is also effective to solve the clustering problem specially in fast convergence. This paper combines two algorithms, cuckoo search algorithm and k-means algorithm in clustering problem called FCSA. Cuckoo search is used to build the robust initialization, while K-means is used to accelerate by building the solutions. The result confirms that FCSA's computational time in ten datasets is faster than the compared algorithm.
布谷鸟搜索算法(CSA)是一种能有效解决包括聚类问题在内的优化问题的行为算法。基于研究,k-means对于解决聚类问题也很有效,特别是在快速收敛方面。本文将布谷鸟搜索算法和k-means算法两种算法结合在聚类问题FCSA中。杜鹃搜索用于构建鲁棒初始化,K-means用于通过构建解来加速。结果证实了FCSA算法在10个数据集上的计算速度比比较算法快。
{"title":"A hybrid cuckoo search and K-means for clustering problem","authors":"A. S. Girsang, A. Yunanto, Ayu Hidayah Aslamiah","doi":"10.1109/ICECOS.2017.8167117","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167117","url":null,"abstract":"Cuckoo search algorithm (CSA) is one of behavior algorithm which is effective to solve optimization problem including the clustering problem. Based on investigation, k-means is also effective to solve the clustering problem specially in fast convergence. This paper combines two algorithms, cuckoo search algorithm and k-means algorithm in clustering problem called FCSA. Cuckoo search is used to build the robust initialization, while K-means is used to accelerate by building the solutions. The result confirms that FCSA's computational time in ten datasets is faster than the compared algorithm.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"316 1","pages":"120-124"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77230294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Odor classification using Support Vector Machine 基于支持向量机的气味分类
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167170
N. Husni, A. Handayani, S. Nurmaini, I. Yani
This paper discusses about the process of classifying odor using Support Vector Machine. The training data was taken using a robot that ran in indoor room. The odor was sensed by 3 gas sensors, namely: TGS 2600, TGS 2602, and TGS 2620. The experimental environment was controlled and conditioned. The temperature was kept between 27.5 0C to 30.5 0C and humidity was in the range of 65%–75 %. After simulation testing in Matlab, the classification was then done in real experiment using one versus others technique. The result shows that the classification can be achieved using simulation and real experiment.
本文讨论了用支持向量机对气味进行分类的过程。训练数据由在室内运行的机器人采集。3个气体传感器分别为TGS 2600、TGS 2602和TGS 2620。实验环境是可控的、有条件的。温度控制在27.5℃~ 30.5℃,湿度控制在65% ~ 75%。在Matlab中进行仿真测试后,采用一对一的方法在实际实验中进行分类。仿真和实际实验结果表明,该分类方法是可行的。
{"title":"Odor classification using Support Vector Machine","authors":"N. Husni, A. Handayani, S. Nurmaini, I. Yani","doi":"10.1109/ICECOS.2017.8167170","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167170","url":null,"abstract":"This paper discusses about the process of classifying odor using Support Vector Machine. The training data was taken using a robot that ran in indoor room. The odor was sensed by 3 gas sensors, namely: TGS 2600, TGS 2602, and TGS 2620. The experimental environment was controlled and conditioned. The temperature was kept between 27.5 0C to 30.5 0C and humidity was in the range of 65%–75 %. After simulation testing in Matlab, the classification was then done in real experiment using one versus others technique. The result shows that the classification can be achieved using simulation and real experiment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"89 1","pages":"71-76"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86448733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel three-tier SQLi detection and mitigation scheme for cloud environments 针对云环境的一种新颖的三层SQLi检测和缓解方案
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167160
Wahid Rajeh, Alshreef Abed
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which is certainly one of the top ranking vulnerabilities in cloud systems, is addressed in this paper. Also, a novel three-tier system for detection and mitigation of SQLi attacks is proposed. The methodology is involved over dynamic, static and runtime prevention and detection mechanisms. Moreover, it removes malicious queries and ensures the system is prepared for an environment that is secure despite being focused on the database server only. For the three-tier architecture, the first approach involves detection and prevention that follows the client logic access and data server (three-tier) organization to access, process and exchange queries. Furthermore, it makes sure no vulnerable code is executed that might affect the hosted operating system either partially or entirely. Experimental evaluation schemes demonstrate the efficiency and superiority of the scheme compared with existing approaches.
云计算无疑是最近讨论最多的话题之一,无论是在研究领域还是在商业领域。各种思想流派都试图从许多方面提供一个合适的定义。这种计算范式可以定义为一种基于web的计算模型,旨在允许异地存储和简单的数据和数字文件共享。SQL注入无疑是云系统中排名最高的漏洞之一,本文对此进行了讨论。此外,还提出了一种新的三层SQLi攻击检测和缓解系统。该方法涉及动态、静态和运行时预防和检测机制。此外,它还删除了恶意查询,并确保系统为一个安全的环境做好了准备,尽管它只关注数据库服务器。对于三层体系结构,第一种方法涉及检测和预防,它遵循客户机逻辑访问和数据服务器(三层)组织来访问、处理和交换查询。此外,它确保不会执行可能部分或全部影响宿主操作系统的易受攻击的代码。实验评价方案与现有方法相比,证明了该方案的有效性和优越性。
{"title":"A novel three-tier SQLi detection and mitigation scheme for cloud environments","authors":"Wahid Rajeh, Alshreef Abed","doi":"10.1109/ICECOS.2017.8167160","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167160","url":null,"abstract":"Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which is certainly one of the top ranking vulnerabilities in cloud systems, is addressed in this paper. Also, a novel three-tier system for detection and mitigation of SQLi attacks is proposed. The methodology is involved over dynamic, static and runtime prevention and detection mechanisms. Moreover, it removes malicious queries and ensures the system is prepared for an environment that is secure despite being focused on the database server only. For the three-tier architecture, the first approach involves detection and prevention that follows the client logic access and data server (three-tier) organization to access, process and exchange queries. Furthermore, it makes sure no vulnerable code is executed that might affect the hosted operating system either partially or entirely. Experimental evaluation schemes demonstrate the efficiency and superiority of the scheme compared with existing approaches.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84300000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Designing gamification framework to support social media application based on game elements and cutting-edge technology 基于游戏元素和前沿技术,设计支持社交媒体应用的游戏化框架
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167118
Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji
Gamification is widely applied in various fields, such as business, marketing, education and social media. Gamification is predicted to be used by many companies. Therefore, gamification is still being developed. Nowadays, social media application also growing rapidly and make a new social media application must have new methods to penetrate the global market. This research is assembled from various literature about game elements used in gamification products and it is discovered that there are twenty-five game elements that can be used in a gamification product. The research also describe some cutting-edge technologies are used to improve the benefits of gamification products and affect the habit of the users. This research aims to describe game elements and technologies that can be applied in gamification products. Based on the research, a simple and generic gamification framework is designed to support gamification in social media applications by considering three different perspectives, the developer, the user and the beneficiaries.
游戏化被广泛应用于商业、营销、教育和社交媒体等各个领域。游戏化预计将被许多公司采用。因此,游戏化仍在发展中。如今,社交媒体应用也在快速增长,制作一款新的社交媒体应用必须有新的方法来渗透全球市场。这项研究收集了关于游戏化产品中使用的游戏元素的各种文献,发现有25种游戏元素可以用于游戏化产品。研究还描述了一些尖端技术被用来提高游戏化产品的好处,并影响用户的习惯。本研究旨在描述可以应用于游戏化产品的游戏元素和技术。在此基础上,从开发者、用户和受益者三个角度出发,设计了一个简单而通用的游戏化框架,以支持社交媒体应用中的游戏化。
{"title":"Designing gamification framework to support social media application based on game elements and cutting-edge technology","authors":"Meyhart Bangkit Sitorus, R. Ferdiana, T. B. Adji","doi":"10.1109/ICECOS.2017.8167118","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167118","url":null,"abstract":"Gamification is widely applied in various fields, such as business, marketing, education and social media. Gamification is predicted to be used by many companies. Therefore, gamification is still being developed. Nowadays, social media application also growing rapidly and make a new social media application must have new methods to penetrate the global market. This research is assembled from various literature about game elements used in gamification products and it is discovered that there are twenty-five game elements that can be used in a gamification product. The research also describe some cutting-edge technologies are used to improve the benefits of gamification products and affect the habit of the users. This research aims to describe game elements and technologies that can be applied in gamification products. Based on the research, a simple and generic gamification framework is designed to support gamification in social media applications by considering three different perspectives, the developer, the user and the beneficiaries.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"1 1","pages":"125-130"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile-robot positioning for Wi-Fi signal strength measurement 移动机器人定位Wi-Fi信号强度测量
Pub Date : 2017-08-01 DOI: 10.1109/ICECOS.2017.8167173
A. Handayani, N. Husni, S. Nurmaini, I. Yani, Deby Adhisty Putri
The aim of this work is to design a mobile robot using WPT (Wi-Fi Position Techniques) method. The design in this research is intended to determine the mobile robot position by using the Wi-Fi module to determine the coordinates of position as determination to reach the target position and to find the strength of the detected Wi-Fi signal. Mobile robot is using to get the results of the strength of the signal, besides mobile robot can also be applied for various purposes, such as potential for localization and navigation purposes in areas hard to reach by humans. The proposed method does not require the environment layout and additional equipment.
本工作的目的是利用WPT (Wi-Fi定位技术)方法设计一个移动机器人。本研究设计的目的是利用Wi-Fi模块确定位置坐标作为到达目标位置的判定,并求出检测到的Wi-Fi信号的强度。移动机器人是用来获取信号强度的结果,除此之外,移动机器人还可以应用于各种各样的目的,比如在人类难以到达的地区进行定位和导航。该方法不需要环境布局和额外的设备。
{"title":"Mobile-robot positioning for Wi-Fi signal strength measurement","authors":"A. Handayani, N. Husni, S. Nurmaini, I. Yani, Deby Adhisty Putri","doi":"10.1109/ICECOS.2017.8167173","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167173","url":null,"abstract":"The aim of this work is to design a mobile robot using WPT (Wi-Fi Position Techniques) method. The design in this research is intended to determine the mobile robot position by using the Wi-Fi module to determine the coordinates of position as determination to reach the target position and to find the strength of the detected Wi-Fi signal. Mobile robot is using to get the results of the strength of the signal, besides mobile robot can also be applied for various purposes, such as potential for localization and navigation purposes in areas hard to reach by humans. The proposed method does not require the environment layout and additional equipment.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"107 1","pages":"87-91"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81451279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 International Conference on Electrical Engineering and Computer Science (ICECOS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1