首页 > 最新文献

2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Prediction of Defaulters using Machine Learning on Azure ML 在Azure ML上使用机器学习预测违约
Abhishek Shivanna, D. Agrawal
Banks and lending institutions take risk in issuing new credit cards and loans to customers. Lending institutions at large need to have their own credit risk assessment system in accordance with Basel II guidelines. Many lending institutions lose a large amount of money as they do not have an accurate model to predict defaulters. The goal of credit risk management system is to accurately predict borrowers' ability to repay loans or make credit card payments in a timely manner. Researchers have taken multitude of approaches to solve this problem, and it continues to be an active area of research. Data mining and machine learning are emerging tools that are widely used by lending institutions to predict defaulters. These tools can effectively mine large dataset which is not feasible by traditional methods. In this work, we have used different algorithms including Deep Support Vector Machine (DSVM), Boosted Decision Tree (BDT), Averaged Perceptron (AP) and Bayes Point Machine (BPM) to build various models, in an attempt to better predict defaulters. Dataset, comprising of 25 attributes and 30k instances, was obtained from the repository of machine learning, University of California, Irvine (UCI). Our results show that, of all the four models used, DSVM can best predict defaulters. We believe that these models can be used to better predict defaulters by credit risk management system in banking and lending institutions.
银行和贷款机构在向客户发放新信用卡和贷款时要承担风险。总体而言,贷款机构需要根据巴塞尔协议II的指引建立自己的信用风险评估体系。许多贷款机构因为没有准确的模型来预测违约者而损失了大量资金。信用风险管理系统的目标是准确预测借款人偿还贷款或及时支付信用卡款项的能力。研究人员已经采取了多种方法来解决这个问题,并且它仍然是一个活跃的研究领域。数据挖掘和机器学习是新兴的工具,被贷款机构广泛用于预测违约者。这些工具可以有效地挖掘传统方法无法实现的大型数据集。在这项工作中,我们使用了不同的算法,包括深度支持向量机(DSVM)、提升决策树(BDT)、平均感知机(AP)和贝叶斯点机(BPM)来构建各种模型,试图更好地预测违约。数据集由25个属性和30k个实例组成,来自加利福尼亚大学欧文分校(UCI)的机器学习存储库。我们的结果表明,在所有使用的四种模型中,DSVM可以最好地预测违约者。我们认为这些模型可以更好地用于银行和贷款机构信用风险管理系统的违约预测。
{"title":"Prediction of Defaulters using Machine Learning on Azure ML","authors":"Abhishek Shivanna, D. Agrawal","doi":"10.1109/IEMCON51383.2020.9284884","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284884","url":null,"abstract":"Banks and lending institutions take risk in issuing new credit cards and loans to customers. Lending institutions at large need to have their own credit risk assessment system in accordance with Basel II guidelines. Many lending institutions lose a large amount of money as they do not have an accurate model to predict defaulters. The goal of credit risk management system is to accurately predict borrowers' ability to repay loans or make credit card payments in a timely manner. Researchers have taken multitude of approaches to solve this problem, and it continues to be an active area of research. Data mining and machine learning are emerging tools that are widely used by lending institutions to predict defaulters. These tools can effectively mine large dataset which is not feasible by traditional methods. In this work, we have used different algorithms including Deep Support Vector Machine (DSVM), Boosted Decision Tree (BDT), Averaged Perceptron (AP) and Bayes Point Machine (BPM) to build various models, in an attempt to better predict defaulters. Dataset, comprising of 25 attributes and 30k instances, was obtained from the repository of machine learning, University of California, Irvine (UCI). Our results show that, of all the four models used, DSVM can best predict defaulters. We believe that these models can be used to better predict defaulters by credit risk management system in banking and lending institutions.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"7 1","pages":"0320-0325"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Limits of AI as Established by a Multi-Layered Symmetry-Based Model of Light 基于多层对称光模型的人工智能的局限性
Pravir Malik
It has been said that the future of Life is about Artificial Intelligence (AI) and that as AI advances a point will be reached, the Singularity, when humans will no longer have a clue as to what is going on nor why. On the contrary, this article will make the case that the future of Life is enabled by the pre-existent complexity that exists in every iota of it. This pre-existent complexity derives from a multi-layered, symmetry-based model of light from which fundamental layers of matter and life – including the electromagnetic field, quantum particles, atoms, and cells - can be proposed to emerge. As such matter and life are an integral part of a unified light-based edifice proposed to have infinite-potential resident in it. By contrast contemporary AI is based on mind-based processes such as memory, computation, sensing, and learning that operate within a defined and limited conceptual space and are positioned to be substrate independent. This conceptual space and the operating principles that define it limit AI, which in its current incarnation cannot rival the kinds of creations and possibilities inherent in a multi-layered symmetry-based model of light. Unless the gap to such a unified light-based edifice is bridged, AI will always have limits within which its possibilities will be bound.
有人说,生命的未来是关于人工智能(AI)的,随着人工智能的发展,将达到一个点,即奇点,到那时,人类将不再知道正在发生什么,也不知道为什么。相反,这篇文章将证明,生命的未来是由存在于它的每一个部分的预先存在的复杂性所实现的。这种预先存在的复杂性来自于光的多层对称模型,物质和生命的基本层次——包括电磁场、量子粒子、原子和细胞——可以由此产生。因此,物质和生命是一个统一的基于光的大厦的组成部分,提议在其中有无限的潜在居住者。相比之下,当代人工智能基于基于思维的过程,如记忆、计算、感知和学习,这些过程在一个定义和有限的概念空间内运行,并被定位为独立于基底。这种概念空间和定义它的操作原则限制了人工智能,目前的人工智能无法与基于多层对称的光模型所固有的各种创造和可能性相媲美。除非这种统一的基于光的大厦之间的差距被弥合,否则人工智能将始终受到其可能性的限制。
{"title":"Limits of AI as Established by a Multi-Layered Symmetry-Based Model of Light","authors":"Pravir Malik","doi":"10.1109/IEMCON51383.2020.9284955","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284955","url":null,"abstract":"It has been said that the future of Life is about Artificial Intelligence (AI) and that as AI advances a point will be reached, the Singularity, when humans will no longer have a clue as to what is going on nor why. On the contrary, this article will make the case that the future of Life is enabled by the pre-existent complexity that exists in every iota of it. This pre-existent complexity derives from a multi-layered, symmetry-based model of light from which fundamental layers of matter and life – including the electromagnetic field, quantum particles, atoms, and cells - can be proposed to emerge. As such matter and life are an integral part of a unified light-based edifice proposed to have infinite-potential resident in it. By contrast contemporary AI is based on mind-based processes such as memory, computation, sensing, and learning that operate within a defined and limited conceptual space and are positioned to be substrate independent. This conceptual space and the operating principles that define it limit AI, which in its current incarnation cannot rival the kinds of creations and possibilities inherent in a multi-layered symmetry-based model of light. Unless the gap to such a unified light-based edifice is bridged, AI will always have limits within which its possibilities will be bound.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"73 1","pages":"0151-0158"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82351925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Deep Learning Technique: U-Net Architecture for Pupil Segmentation 鲁棒深度学习技术:用于瞳孔分割的U-Net架构
Swathi Gowroju, Aarti, Sandeep Kumar
In many of the iris biometric applications plays a major role in tracking the gaze, detecting fatigue, and predicting the age of a person, etc. that were built for human-computer interaction and security applications such as border control applications or criminal tracking applications. In this paper, we proposed a novel CNN U-Net based model to perform the accurate segmentation of pupil. We experimented on the CASIA database and generated an accuracy of 90% in segmentation. We considered various parameters such as Accuracy, Loss, and Mean Square Error (MSE) to predict the efficiency of the model. The proposed system performed the segmentation of pupil from $512times 512$ images with MSE of 1.24.
在许多虹膜生物识别应用中,在跟踪注视、检测疲劳和预测人的年龄等方面起着重要作用,这些应用是为人机交互和安全应用(如边境控制应用或犯罪跟踪应用)而构建的。本文提出了一种新颖的基于CNN U-Net的瞳孔精确分割模型。我们在CASIA数据库上进行了实验,得到了90%的分割准确率。我们考虑了各种参数,如精度、损失和均方误差(MSE)来预测模型的效率。该系统对$512 × 512$的图像进行瞳孔分割,MSE为1.24。
{"title":"Robust Deep Learning Technique: U-Net Architecture for Pupil Segmentation","authors":"Swathi Gowroju, Aarti, Sandeep Kumar","doi":"10.1109/IEMCON51383.2020.9284947","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284947","url":null,"abstract":"In many of the iris biometric applications plays a major role in tracking the gaze, detecting fatigue, and predicting the age of a person, etc. that were built for human-computer interaction and security applications such as border control applications or criminal tracking applications. In this paper, we proposed a novel CNN U-Net based model to perform the accurate segmentation of pupil. We experimented on the CASIA database and generated an accuracy of 90% in segmentation. We considered various parameters such as Accuracy, Loss, and Mean Square Error (MSE) to predict the efficiency of the model. The proposed system performed the segmentation of pupil from $512times 512$ images with MSE of 1.24.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0609-0613"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75211186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of Requirements for Autonomous Driving Systems 自动驾驶系统需求分析
Felix Müller, P. Nenninger, E. Sax
In this paper, we present an overview on the topic of the periodical technical inspection of passenger cars in general, and focus specifically on the situation in Germany. We argue, that there is a need to advance the current standards in the wake of upcoming autonomous vehicles and the ever increasing market penetration of steadily more capable driver assistance systems. In addition, we present our arguments of why we see a mandate for this already today. This paper concludes with an introduction of our first approach to tackle the problem described with a test bed to examine these systems. For this paper we utilize a radar based system as an example to describe our concept.
在本文中,我们对乘用车定期技术检测的主题进行概述,并特别关注德国的情况。我们认为,在即将到来的自动驾驶汽车和功能更强大的驾驶辅助系统不断增加的市场渗透之后,有必要提高当前的标准。此外,我们提出我们的论点,说明为什么我们今天已经看到这项任务。本文最后介绍了我们的第一种方法来解决用测试平台来检查这些系统所描述的问题。在本文中,我们以基于雷达的系统为例来描述我们的概念。
{"title":"Analysis of Requirements for Autonomous Driving Systems","authors":"Felix Müller, P. Nenninger, E. Sax","doi":"10.1109/IEMCON51383.2020.9284853","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284853","url":null,"abstract":"In this paper, we present an overview on the topic of the periodical technical inspection of passenger cars in general, and focus specifically on the situation in Germany. We argue, that there is a need to advance the current standards in the wake of upcoming autonomous vehicles and the ever increasing market penetration of steadily more capable driver assistance systems. In addition, we present our arguments of why we see a mandate for this already today. This paper concludes with an introduction of our first approach to tackle the problem described with a test bed to examine these systems. For this paper we utilize a radar based system as an example to describe our concept.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"17 1","pages":"0087-0093"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73306051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adapter for IBM Streams and Apache Spark to Facilitate Multi-level Data Analytics 一个适配器IBM流和Apache Spark,以促进多层次的数据分析
Yinchen Shi, Sazia Mahfuz, F. Zulkernine, Peter Nicholls
Data analytics with unsupervised clustering of data streams has provided revolutionary breakthroughs in fields like healthcare, and E-commerce. IBM Streams and Apache Spark are among the most useful and popular data analytics tools that help engineers and researchers extend the abilities to store, analyze, transform, and visualize data for business use. IBM Streams is capable of ingesting, filtering, analyzing, and associating massive volumes of continuous data streams and the Streams Processing Language (SPL) enables coding custom stream graphs to process data and handle real-time events. Apache Spark has unified analytics edge for large scale data processing with high performance for both batch and streaming data. We developed adapters without using third party tools to facilitate data transfer between IBM Streams and Apache Spark to support new and legacy data analytic systems. An example use case would be IBM Streams ingesting and processing realtime data streams, and then passing the data to Spark to train or update machine learning algorithms in real time that can be re-deployed in the IBM Streams data processing pipeline. This paper provides an overview of the structure of the data processing pipeline, describes the implementation details and the principle behind the design.
数据流无监督聚类的数据分析在医疗保健和电子商务等领域带来了革命性的突破。IBM Streams和Apache Spark是最有用和最流行的数据分析工具之一,它们可以帮助工程师和研究人员扩展存储、分析、转换和可视化数据的能力,以供业务使用。IBM Streams能够摄取、过滤、分析和关联大量连续数据流,并且Streams Processing Language (SPL)支持编写自定义流图来处理数据和处理实时事件。Apache Spark为大规模数据处理提供了统一的分析优势,对批处理和流数据都具有高性能。我们开发了适配器,而不使用第三方工具来促进IBM Streams和Apache Spark之间的数据传输,以支持新的和遗留的数据分析系统。一个示例用例是IBM Streams摄取和处理实时数据流,然后将数据传递给Spark以实时训练或更新机器学习算法,这些算法可以重新部署在IBM Streams数据处理管道中。本文概述了数据处理管道的结构,描述了数据处理管道的实现细节和设计原理。
{"title":"An Adapter for IBM Streams and Apache Spark to Facilitate Multi-level Data Analytics","authors":"Yinchen Shi, Sazia Mahfuz, F. Zulkernine, Peter Nicholls","doi":"10.1109/IEMCON51383.2020.9284818","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284818","url":null,"abstract":"Data analytics with unsupervised clustering of data streams has provided revolutionary breakthroughs in fields like healthcare, and E-commerce. IBM Streams and Apache Spark are among the most useful and popular data analytics tools that help engineers and researchers extend the abilities to store, analyze, transform, and visualize data for business use. IBM Streams is capable of ingesting, filtering, analyzing, and associating massive volumes of continuous data streams and the Streams Processing Language (SPL) enables coding custom stream graphs to process data and handle real-time events. Apache Spark has unified analytics edge for large scale data processing with high performance for both batch and streaming data. We developed adapters without using third party tools to facilitate data transfer between IBM Streams and Apache Spark to support new and legacy data analytic systems. An example use case would be IBM Streams ingesting and processing realtime data streams, and then passing the data to Spark to train or update machine learning algorithms in real time that can be re-deployed in the IBM Streams data processing pipeline. This paper provides an overview of the structure of the data processing pipeline, describes the implementation details and the principle behind the design.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0230-0235"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76309655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving energy revenue and security by employing SDNS for the Low Voltage distribution network for residential users in South Africa 通过在南非住宅用户的低压配电网络中使用SDNS来提高能源收入和安全性
Noah.S. Fakude, K. Ogudo
Energy management is a key element in energy distribution utilities. Whilst revenue collection is significant in the industry, safety and energy security are of top priority. With the diffusion and the adoption rate of new domestic electrical appliances and the rate of population growth, the energy demand by residential consumers skyrockets. To keep the electrical network continually distributing, there is a need to control and manage energy usage from the consumption side. This paper proposes a Smart Distribution Network System (SDNS), which employs the Master-Slave metering hierarchy for load management by controlling the usage limits in real-time. The SDNS is a digitalized electrical network concept that allows the existing power network to operate at an optimum level during peak periods and limits unnecessary consumption excesses. The system ensures maximum revenue returns to utilities and energy security to consumers by keeping the network in operation with no disturbances. A standard traditional grid was used to model the smart system using a MATLAB tool. The grid was put under test in heavy load conditions, first with no enhancement and again with the enhancement of the proposed SNDS system. Results were recorded for both simulation tests, then the conclusion was drawn from the discussion of results compared to examining the effectiveness of the system.
能源管理是能源分配公用事业的一个关键要素。虽然收入在行业中很重要,但安全和能源保障是重中之重。随着新型家用电器的普及和采用率以及人口的增长速度,住宅消费者的能源需求直线上升。为了保持电网的持续分布,需要从消费端控制和管理能源的使用。本文提出了一种智能配电网系统(SDNS),该系统采用主从计量层次结构进行负荷管理,实时控制配电网的使用限制。SDNS是一种数字化电网概念,允许现有电网在高峰时段以最佳水平运行,并限制不必要的过度消耗。该系统通过保持电网无干扰运行,确保公用事业和消费者能源安全的最大收益回报。采用标准的传统网格,利用MATLAB工具对智能系统进行建模。电网在重载条件下进行了测试,第一次没有增强,第二次增强了拟议的SNDS系统。记录了两次仿真试验的结果,并通过对结果的对比讨论得出结论,验证了系统的有效性。
{"title":"Improving energy revenue and security by employing SDNS for the Low Voltage distribution network for residential users in South Africa","authors":"Noah.S. Fakude, K. Ogudo","doi":"10.1109/IEMCON51383.2020.9284835","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284835","url":null,"abstract":"Energy management is a key element in energy distribution utilities. Whilst revenue collection is significant in the industry, safety and energy security are of top priority. With the diffusion and the adoption rate of new domestic electrical appliances and the rate of population growth, the energy demand by residential consumers skyrockets. To keep the electrical network continually distributing, there is a need to control and manage energy usage from the consumption side. This paper proposes a Smart Distribution Network System (SDNS), which employs the Master-Slave metering hierarchy for load management by controlling the usage limits in real-time. The SDNS is a digitalized electrical network concept that allows the existing power network to operate at an optimum level during peak periods and limits unnecessary consumption excesses. The system ensures maximum revenue returns to utilities and energy security to consumers by keeping the network in operation with no disturbances. A standard traditional grid was used to model the smart system using a MATLAB tool. The grid was put under test in heavy load conditions, first with no enhancement and again with the enhancement of the proposed SNDS system. Results were recorded for both simulation tests, then the conclusion was drawn from the discussion of results compared to examining the effectiveness of the system.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"8 2 1","pages":"0420-0426"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80565269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions 基于upnp的物联网安全概述:威胁、漏洞和未来解决方案
Golam Kayas, M. Hossain, J. Payton, S. Islam
Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among heterogeneous IoT devices, in part due to zero configuration implementation which makes it feasible for use in large-scale networks. The popularity and ubiquity of UPnP to support IoT systems necessitate an exploration of security risks associated with the use of the protocol for IoT deployments. In this work, we analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities. Finally, we propose prospective solutions to secure UPnP-based IoT systems from adversarial operations.
从小型传感器到复杂的云基础设施以及各种网络技术和通信协议,智能设备的发展和可用性的提高支持了物联网部署的快速扩展。通用即插即用(UPnP)协议已被广泛接受并用于物联网领域,以支持异构物联网设备之间的交互,部分原因是零配置实现使其在大规模网络中使用变得可行。支持物联网系统的UPnP的普及和无处不在需要探索与使用物联网部署协议相关的安全风险。在这项工作中,我们分析了基于upnp的物联网系统的安全漏洞,并识别了攻击者利用漏洞的攻击机会。最后,我们提出了前瞻性的解决方案,以保护基于upnp的物联网系统免受对抗性操作的影响。
{"title":"An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions","authors":"Golam Kayas, M. Hossain, J. Payton, S. Islam","doi":"10.1109/IEMCON51383.2020.9284885","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284885","url":null,"abstract":"Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among heterogeneous IoT devices, in part due to zero configuration implementation which makes it feasible for use in large-scale networks. The popularity and ubiquity of UPnP to support IoT systems necessitate an exploration of security risks associated with the use of the protocol for IoT deployments. In this work, we analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities. Finally, we propose prospective solutions to secure UPnP-based IoT systems from adversarial operations.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"97 1","pages":"0452-0460"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75432044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low-Complexity High-Accuracy 5G and LTE Multichannel Spectrum Analysis Aided by Unsupervised Machine Learning 基于无监督机器学习的低复杂度高精度5G和LTE多通道频谱分析
Benjamin Imanilov
In this paper we propose a new method of occupied spectrum analysis for channel detection in a shared spectrum environment. Our approach is based on iterative multi-stage multi-resolution scanning using configurable Sliding Discrete Fourier Transform (SDFT) aided by an Unsupervised Machine Learning (UML) clustering method. The proposed low-complexity high-accuracy real-time spectrum scanning and channel detection is simulated for multiple Radio Access Networks (RAN) of Long-Term Evolution (LTE) & Fifth Generation (5G) channels in a shared frequency band. The results of the simulation show possible successful utilization of the proposed method as a sensing tool for spectrum sharing management and other applications where accurate channel detection occupancy is required.
本文提出了一种新的占用频谱分析方法,用于共享频谱环境下的信道检测。我们的方法是基于迭代的多阶段多分辨率扫描,使用可配置的滑动离散傅里叶变换(SDFT),辅以无监督机器学习(UML)聚类方法。在共享频段的LTE和5G信道的多个无线接入网(RAN)中,对所提出的低复杂度、高精度实时频谱扫描和信道检测进行了仿真。仿真结果表明,该方法可以成功地应用于频谱共享管理和其他需要精确信道检测占用的应用中。
{"title":"Low-Complexity High-Accuracy 5G and LTE Multichannel Spectrum Analysis Aided by Unsupervised Machine Learning","authors":"Benjamin Imanilov","doi":"10.1109/IEMCON51383.2020.9284843","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284843","url":null,"abstract":"In this paper we propose a new method of occupied spectrum analysis for channel detection in a shared spectrum environment. Our approach is based on iterative multi-stage multi-resolution scanning using configurable Sliding Discrete Fourier Transform (SDFT) aided by an Unsupervised Machine Learning (UML) clustering method. The proposed low-complexity high-accuracy real-time spectrum scanning and channel detection is simulated for multiple Radio Access Networks (RAN) of Long-Term Evolution (LTE) & Fifth Generation (5G) channels in a shared frequency band. The results of the simulation show possible successful utilization of the proposed method as a sensing tool for spectrum sharing management and other applications where accurate channel detection occupancy is required.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"81 1","pages":"0031-0040"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75234106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-of-the-Art VANET Trust Models: Challenges and Recommendations 最先进的VANET信任模型:挑战和建议
Hritik Sateesh, P. Zavarsky
Research on trust models in Vehicular Ad-hoc Networks (VANET) was mainly focused on entity-centric, data-centric, and combined trust models until the latter half of the previous decade. There are a number of attacks these conventional trust models cannot hold back. The popularity of blockchain technology in the last few years resulted in the research on blockchain-based trust management models for VANET. Meanwhile, zero trust solutions claimed to overcome the problems of the traditional perimeter security model. With the perimeter security model, information systems within an organization's internal network are inherently trusted and the ones that belong outside the organization are consequently deemed untrusted. The zero trust architecture overcomes these flaws by simply not trusting any entity regardless of the entity belonging inside the organization's perimeter or outside. This paper discusses the various trust management models for VANET, their drawbacks and proposes a private blockchain technology to improve the performance and highlight the need for a central governing authority. The paper also investigates the challenges of implementing a zero-trust architecture for vehicular communications and brings forth the idea of using the concepts of zero trust to provide state-of-the-art security for VANET's supporting infrastructure. Additionally, this study surveys the benefits and challenges of developing the VANET architecture based on software-defined networking (SDN).
直到上个十年的后半期,对车载自组织网络(VANET)信任模型的研究主要集中在以实体为中心、以数据为中心和组合信任模型。这些传统的信任模型无法抵御许多攻击。区块链技术在过去几年的普及导致了基于区块链的VANET信任管理模型的研究。同时,零信任解决方案声称克服了传统边界安全模型的问题。使用外围安全模型,组织内部网络中的信息系统本质上是可信的,而属于组织外部的信息系统因此被认为是不可信的。零信任体系结构通过不信任任何实体来克服这些缺陷,无论实体属于组织内部还是外部。本文讨论了VANET的各种信任管理模型及其缺点,并提出了一种私有区块链技术来提高性能,并强调了对中央管理机构的需求。本文还研究了为车辆通信实现零信任架构的挑战,并提出了使用零信任概念为VANET的支持基础设施提供最先进的安全性的想法。此外,本研究调查了基于软件定义网络(SDN)开发VANET架构的好处和挑战。
{"title":"State-of-the-Art VANET Trust Models: Challenges and Recommendations","authors":"Hritik Sateesh, P. Zavarsky","doi":"10.1109/IEMCON51383.2020.9284953","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284953","url":null,"abstract":"Research on trust models in Vehicular Ad-hoc Networks (VANET) was mainly focused on entity-centric, data-centric, and combined trust models until the latter half of the previous decade. There are a number of attacks these conventional trust models cannot hold back. The popularity of blockchain technology in the last few years resulted in the research on blockchain-based trust management models for VANET. Meanwhile, zero trust solutions claimed to overcome the problems of the traditional perimeter security model. With the perimeter security model, information systems within an organization's internal network are inherently trusted and the ones that belong outside the organization are consequently deemed untrusted. The zero trust architecture overcomes these flaws by simply not trusting any entity regardless of the entity belonging inside the organization's perimeter or outside. This paper discusses the various trust management models for VANET, their drawbacks and proposes a private blockchain technology to improve the performance and highlight the need for a central governing authority. The paper also investigates the challenges of implementing a zero-trust architecture for vehicular communications and brings forth the idea of using the concepts of zero trust to provide state-of-the-art security for VANET's supporting infrastructure. Additionally, this study surveys the benefits and challenges of developing the VANET architecture based on software-defined networking (SDN).","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"162 1","pages":"0757-0764"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75949063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Adaptation for Full-Duplex Relay-Aided D2D Communications with Direct Link 直接链路全双工中继辅助D2D通信的功率自适应
Yasmine H. Hussein, E. Maher, A. El-Mahdy
Full duplex, cooperative communications and device to device (D2D) communications are considered as key technologies for 5G mobile networks. In this paper, an optimum power allocation for full-duplex(FD) relaying aided D2D communications in underlaying mode is derived. The D2D transmitters act as FD relays to assist cellular downlink transmissions. Both amplify-and-forward and decode- and forward relay protocols are considered. The objective is to maximize the achievable rate for the D2D receiver while fulfilling the minimum rate requirements of the cellular user. Optimization technique is used to reduce the self interference resulted from the full-duplex mode.
全双工、协同通信和设备到设备(D2D)通信被认为是5G移动网络的关键技术。本文推导了全双工(FD)中继辅助D2D通信在底层模式下的最佳功率分配方法。D2D发射机充当FD中继来辅助蜂窝下行传输。考虑了放大转发和解码转发中继协议。目标是在满足蜂窝用户的最低速率要求的同时最大化D2D接收器的可实现速率。采用优化技术减少全双工模式产生的自干扰。
{"title":"Power Adaptation for Full-Duplex Relay-Aided D2D Communications with Direct Link","authors":"Yasmine H. Hussein, E. Maher, A. El-Mahdy","doi":"10.1109/IEMCON51383.2020.9284956","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284956","url":null,"abstract":"Full duplex, cooperative communications and device to device (D2D) communications are considered as key technologies for 5G mobile networks. In this paper, an optimum power allocation for full-duplex(FD) relaying aided D2D communications in underlaying mode is derived. The D2D transmitters act as FD relays to assist cellular downlink transmissions. Both amplify-and-forward and decode- and forward relay protocols are considered. The objective is to maximize the achievable rate for the D2D receiver while fulfilling the minimum rate requirements of the cellular user. Optimization technique is used to reduce the self interference resulted from the full-duplex mode.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"44 1","pages":"0473-0478"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76005954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1