首页 > 最新文献

... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security最新文献

英文 中文
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention 基于移动代理的信息泄漏防护分布模型综述
Alese Boniface Kayode, Alowolodu Olufunso Dayo, A. Uthman
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
随着云计算和分布式计算的不断使用,在这种环境中与数据和信息技术(IT)相关的威胁也有所增加。因此,数据安全和数据泄漏预防在分布式环境中变得非常重要。在这方面,基于移动代理的系统是识别和防止网络数据入侵和泄漏的最新机制之一。因此,为了解决基于移动代理的信息泄漏预防的一个或多个挑战,本文旨在对基于移动代理的信息泄漏预防的分布模型进行全面、详细和系统的研究。本文对2009年和2019年发表的期刊论文进行了综述。对基于分布式移动代理的入侵检测系统的设计、分析、技术和不足进行了综述。最初,85篇论文被确定,但论文选择过程将论文数量减少到13篇重要评论。
{"title":"A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention","authors":"Alese Boniface Kayode, Alowolodu Olufunso Dayo, A. Uthman","doi":"10.4236/CN.2021.132006","DOIUrl":"https://doi.org/10.4236/CN.2021.132006","url":null,"abstract":"With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"11 1","pages":"68-78"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89808326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost Optimization Modeling of Renewable Energy Sources in Smart-Grid Using SCADA 基于SCADA的智能电网可再生能源成本优化建模
Nafisa Islam, W. Ali, Emmanuel S. Kolawole, John H. Fuller, Pamela H. Obiomon, J. Attia, S. Abood
In recent times, renewable energy production from renewable energy sources is an alternative way to fulfill the increased energy demands. However, the increasing energy demand rate places more pressure, leading to the termination of conventional energy resources. However, the cost of power generation from coal-fired plants is higher than the power generation’s price from renewable energy sources. This experiment is focused on cost optimization during power generation through pumped storage power plant and wind power plant. The entire modeling of cost optimization has been conducted in two parts. The mathematical modeling was done using MATLAB simulation while the hydro and wind power plant’s emulation was performed using SCADA (Supervisory control and data acquisition) designer implementation. The experiment was conducted using ranges of generated power from both power sources. The optimum combination of output power and cost from both generators is determined via MATLAB simulation within the assumed generated output power range. Secondly, the hydro-generator and wind generator’s emulation were executed individually through synchronizing the grid to determine each generator’s specification using SCADA designer, which provided the optimum power generation from both generators with the specific speed, aligning with results generated through MATLAB. Finally, the operational power cost (with no losses consideration) from MATLAB was compared with the local energy provider to determine the cost-efficiency. This experiment has provided the operational cost optimization of the hydro-wind combined power system with stable wind power generation using SCADA, which will ultimately assist in operations of large-scale power systems, remotely minimizing multi-area dynamic issues while maximizing the system efficiency.
近年来,利用可再生能源生产可再生能源是满足日益增长的能源需求的另一种方式。然而,不断增长的能源需求率带来了更大的压力,导致常规能源的终结。然而,燃煤电厂发电的成本高于可再生能源发电的价格。本实验主要研究抽水蓄能电站和风力电站在发电过程中的成本优化问题。整个成本优化建模分为两部分。数学建模采用MATLAB仿真,水电厂和风电场仿真采用SCADA (Supervisory control and data acquisition)设计器实现。实验是使用两种电源产生的功率范围进行的。在假设的输出功率范围内,通过MATLAB仿真确定了两种发电机的最佳输出功率和成本组合。其次,利用SCADA设计器通过同步电网确定各发电机的规格,分别对水轮发电机和风力发电机进行仿真,并与MATLAB生成的结果进行比对,给出了水轮发电机和风力发电机的最佳发电量和特定转速。最后,将MATLAB中的运行功率成本(不考虑损耗)与当地能源供应商进行比较,以确定成本效率。本实验利用SCADA技术为风力发电稳定的水风联合发电系统提供运行成本优化,最终辅助大型电力系统运行,远程最小化多区域动态问题,最大化系统效率。
{"title":"Cost Optimization Modeling of Renewable Energy Sources in Smart-Grid Using SCADA","authors":"Nafisa Islam, W. Ali, Emmanuel S. Kolawole, John H. Fuller, Pamela H. Obiomon, J. Attia, S. Abood","doi":"10.4236/CN.2021.132005","DOIUrl":"https://doi.org/10.4236/CN.2021.132005","url":null,"abstract":"In recent times, renewable energy production from renewable energy sources is an alternative way to fulfill the increased energy demands. However, the increasing energy demand rate places more pressure, leading to the termination of conventional energy resources. However, the cost of power generation from coal-fired plants is higher than the power generation’s price from renewable energy sources. This experiment is focused on cost optimization during power generation through pumped storage power plant and wind power plant. The entire modeling of cost optimization has been conducted in two parts. The mathematical modeling was done using MATLAB simulation while the hydro and wind power plant’s emulation was performed using SCADA (Supervisory control and data acquisition) designer implementation. The experiment was conducted using ranges of generated power from both power sources. The optimum combination of output power and cost from both generators is determined via MATLAB simulation within the assumed generated output power range. Secondly, the hydro-generator and wind generator’s emulation were executed individually through synchronizing the grid to determine each generator’s specification using SCADA designer, which provided the optimum power generation from both generators with the specific speed, aligning with results generated through MATLAB. Finally, the operational power cost (with no losses consideration) from MATLAB was compared with the local energy provider to determine the cost-efficiency. This experiment has provided the operational cost optimization of the hydro-wind combined power system with stable wind power generation using SCADA, which will ultimately assist in operations of large-scale power systems, remotely minimizing multi-area dynamic issues while maximizing the system efficiency.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"10 1","pages":"51-67"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85938478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Evaluation of MPLS Network Performance MPLS网络性能分析与评价
Fontaine Rafamantanantsoa, Razafindramonja Clément Aubert, Rabetafika Louis Haja
Currently, the increasing network connectivity is becoming more and more complex and the integration of several services continues to appear. These approaches need a guarantee in terms of throughput, the performance of which they potentially impact. So, the basic aim of this research is to get the best MPLS network performance towards linux and FreeBSD operating systems. This is why in this report, we have worked on MPLS network performance, which will help to identify performance metrics. To evaluate the performance, we used those operating systems implementing the MPLS architecture in order to define the best performing between the two on this domain. For this, we used scapy to measure the response times by varying the size of the packets sent and validate the measurements with the MATLAB Simulink. After all experiments, we realized that FreeBSD operating system is more reliable than linux in MPLS network base.
当前,日益增长的网络连接变得越来越复杂,多种业务的融合不断出现。这些方法需要在吞吐量方面得到保证,它们可能会影响吞吐量的性能。因此,本研究的基本目的是在linux和FreeBSD操作系统上获得最佳的MPLS网络性能。这就是为什么在本报告中,我们研究了MPLS网络性能,这将有助于确定性能指标。为了评估性能,我们使用了那些实现MPLS体系结构的操作系统,以便在这个领域定义两者之间的最佳性能。为此,我们使用scapy通过改变发送的数据包的大小来测量响应时间,并使用MATLAB Simulink验证测量结果。经过实验,我们意识到FreeBSD操作系统在MPLS网络基础上比linux更可靠。
{"title":"Analysis and Evaluation of MPLS Network Performance","authors":"Fontaine Rafamantanantsoa, Razafindramonja Clément Aubert, Rabetafika Louis Haja","doi":"10.4236/CN.2021.131003","DOIUrl":"https://doi.org/10.4236/CN.2021.131003","url":null,"abstract":"Currently, the increasing network connectivity is becoming more and more complex and the \u0000integration of several services continues to appear. These approaches need a \u0000guarantee in terms of throughput, the performance of which they potentially \u0000impact. So, the basic aim of this research is to get the best MPLS network \u0000performance towards linux and FreeBSD operating systems. This is why in this \u0000report, we have worked on MPLS network performance, which will help to identify \u0000performance metrics. To evaluate the performance, we used those operating \u0000systems implementing the MPLS architecture in order to define the best \u0000performing between the two on this domain. For this, we used scapy to measure \u0000the response times by varying the size of the packets sent and validate the \u0000measurements with the MATLAB Simulink. After all experiments, we realized that \u0000FreeBSD operating system is more reliable than linux in MPLS network base.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"9 1","pages":"25-35"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77956697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Elder Health Information Technology Framework for Geriatric Care in Rural India: A Policy Initiative 印度农村老年保健信息技术框架:一项政策倡议
Keya Sen, S. Ingman
Healthcare monitoring and analysis of healthcare parameters is a reality to reduce costs and increase access to specialist and experts that holds the future for geriatric care in India. This paper proposes distinct methods towards the implementation of rural elder health information technologies (IT), which includes electronic medical records, clinical decision support, mobile medical applications, and software driven medical devices used in the diagnosis or treatment of disease for the older adult population in the villages of India. The purpose is online patient satisfaction at the microlevel (village panchayat) through methods accessible and affordable by establishing a common standard of operations at the village primary care units giving way to early disease detection and routine screening among the aged population avoiding institutionalization. The rural elder health IT framework is of great interest for all stakeholders in the field, as it benefits the investors and the consumers, adding to the technological infrastructure, thereby opening new avenues of research in health informatics, telemedicine and enhancing the scope of geriatric research, which in turn enhances the health-related quality of life for the rural older adults in the remote villages of the nation.
对医疗保健参数进行监测和分析是降低成本和增加获得专家和专家服务的现实,这是印度老年护理的未来。本文提出了实施农村老年健康信息技术(IT)的不同方法,其中包括电子病历、临床决策支持、移动医疗应用程序以及用于印度农村老年人口疾病诊断或治疗的软件驱动医疗设备。其目的是在微观层面(村委会)通过可获得和负担得起的方法,在村初级保健单位建立共同的操作标准,让位于老年人口的早期疾病检测和常规筛查,从而实现在线患者满意度。农村老年人保健信息技术框架引起该领域所有利益攸关方的极大兴趣,因为它有利于投资者和消费者,增加了技术基础设施,从而开辟了保健信息学、远程医疗研究的新途径,并扩大了老年病学研究的范围,从而提高了该国偏远村庄农村老年人与健康有关的生活质量。
{"title":"The Elder Health Information Technology Framework for Geriatric Care in Rural India: A Policy Initiative","authors":"Keya Sen, S. Ingman","doi":"10.4236/CN.2021.131002","DOIUrl":"https://doi.org/10.4236/CN.2021.131002","url":null,"abstract":"Healthcare monitoring and analysis of healthcare parameters is a reality to reduce costs and increase access to specialist and experts that holds the future for geriatric care in India. This paper proposes distinct methods towards the implementation of rural elder health information technologies (IT), which includes electronic medical records, clinical decision support, mobile medical applications, and software driven medical devices used in the diagnosis or treatment of disease for the older adult population in the villages of India. The purpose is online patient satisfaction at the microlevel (village panchayat) through methods accessible and affordable by establishing a common standard of operations at the village primary care units giving way to early disease detection and routine screening among the aged population avoiding institutionalization. The rural elder health IT framework is of great interest for all stakeholders in the field, as it benefits the investors and the consumers, adding to the technological infrastructure, thereby opening new avenues of research in health informatics, telemedicine and enhancing the scope of geriatric research, which in turn enhances the health-related quality of life for the rural older adults in the remote villages of the nation.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"78 1","pages":"12-24"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76297249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing MANET by Balanced and Energy Efficient Multipath Routing with Robust Transmission Mechanism with Using FF-AOMDV 基于FF-AOMDV的均衡节能多径路由鲁棒传输机制增强MANET
N. Alotaibi, E. I. Assiri
Networking is one of the major areas in which technology is running. Networking plays a vital role in communications for the past few decades. Nodes are the important connections in the network. One of the main parameters considered in the node is power. Power is limited for the nodes in MANET, which is used for some operations where the node energy is not exhausted. Power obligations always affect the systems which ultimately affects the connectivity in the network. Mobility and congestion of nodes are also affected by power problems which simultaneously have some effects like link failures, packet losses which lead some problems in QoS performance of the protocol. This research combines BEMRT (Balanced and Energy Efficient Multipath Routing) with Robust Transmission in MANET. This combination will help the network to survive the problems discussed above which depend on the route discovery mechanism FF-AOMDV. The proposed algorithm will increase the connectivity from end to end and also minimizes the errors at all. Neighbor node selection method is considered with efficient energy which generates multiple paths from source to destination. A stable path is found by the node with effective load balancing. The mechanism is simulated and the protocol FF-AOMDV is compared with AOMDV and AOMRLM with con-cerning PDR (packet delivery ratios), routing overhead, delay, energy consumption, network lifetime, and throughput.
网络是技术运行的主要领域之一。在过去的几十年里,网络在通信中起着至关重要的作用。节点是网络中的重要连接。在节点中考虑的主要参数之一是功率。MANET中节点的功率是有限的,用于一些节点能量未耗尽的操作。电力义务总是影响到系统,最终影响到网络的连通性。电源问题也会影响节点的移动性和拥塞,同时也会造成链路故障、丢包等影响,从而导致协议的QoS性能出现问题。本研究将均衡节能多径路由技术(BEMRT)与MANET的鲁棒传输技术相结合。这种组合将有助于网络在上述依赖于路由发现机制FF-AOMDV的问题中幸存下来。该算法不仅提高了端到端的连通性,而且最大限度地减少了错误。邻居节点选择方法考虑了从源到目的产生多条路径的高效能量。负载均衡有效的节点会找到一条稳定的路径。仿真了FF-AOMDV与AOMDV、AOMRLM协议的实现机制,并在PDR (packet delivery ratio)、路由开销、时延、能耗、网络生存期和吞吐量等方面进行了比较。
{"title":"Enhancing MANET by Balanced and Energy Efficient Multipath Routing with Robust Transmission Mechanism with Using FF-AOMDV","authors":"N. Alotaibi, E. I. Assiri","doi":"10.4236/cn.2021.134010","DOIUrl":"https://doi.org/10.4236/cn.2021.134010","url":null,"abstract":"Networking is one of the major areas in which technology is running. Networking plays a vital role in communications for the past few decades. Nodes are the important connections in the network. One of the main parameters considered in the node is power. Power is limited for the nodes in MANET, which is used for some operations where the node energy is not exhausted. Power obligations always affect the systems which ultimately affects the connectivity in the network. Mobility and congestion of nodes are also affected by power problems which simultaneously have some effects like link failures, packet losses which lead some problems in QoS performance of the protocol. This research combines BEMRT (Balanced and Energy Efficient Multipath Routing) with Robust Transmission in MANET. This combination will help the network to survive the problems discussed above which depend on the route discovery mechanism FF-AOMDV. The proposed algorithm will increase the connectivity from end to end and also minimizes the errors at all. Neighbor node selection method is considered with efficient energy which generates multiple paths from source to destination. A stable path is found by the node with effective load balancing. The mechanism is simulated and the protocol FF-AOMDV is compared with AOMDV and AOMRLM with con-cerning PDR (packet delivery ratios), routing overhead, delay, energy consumption, network lifetime, and throughput.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Multi-Hop Ad-Hoc Networking over Wi-Fi Direct with Android Smart Devices 基于Android智能设备的Wi-Fi直连多跳自组织网络框架
Remy Maxime Mbala, J. Nlong, Jean Robert Kala Kamdjoug
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the auto-matic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. Howev-er, as buffer size decreases, the packet delivery decreases proportionally.
原生支持自组织通信技术的移动设备的广泛传播导致了一些用于启用和优化移动自组织网络(manet)的协议。然而,由于缺乏自动创建和发展自组织网络的协议,在现实生活中,manet的实际应用似乎有限。最近,Wi-Fi联盟提出了一种名为Wi-Fi Direct的新型P2P协议,并对其进行了标准化,以方便附近设备的互联。Wi-Fi Direct提供高性能的设备间直接通信,包括不同的能量管理机制,现在在大多数Android移动设备上都可以使用。然而,目前在Android上实现的Wi-Fi Direct有几个限制,使得Wi-Fi Direct网络只能是一个单跳自组织网络。本文旨在开发一种在Android智能设备中使用Wi-Fi Direct的多跳自组织网络的新框架。该框架包括连接建立协议和组管理协议。在omnet++模拟器上进行了仿真验证。我们通过改变传输范围、跳数和缓冲区大小来分析该框架。结果表明,对于不同的传输范围和跳数值,该框架提供了最终100%的数据包传输。缓冲区大小有足够的空间容纳所有数据包。但是,随着缓冲区大小的减小,数据包的发送也会成比例地减少。
{"title":"A Framework for Multi-Hop Ad-Hoc Networking over Wi-Fi Direct with Android Smart Devices","authors":"Remy Maxime Mbala, J. Nlong, Jean Robert Kala Kamdjoug","doi":"10.4236/cn.2021.134011","DOIUrl":"https://doi.org/10.4236/cn.2021.134011","url":null,"abstract":"The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the auto-matic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. Howev-er, as buffer size decreases, the packet delivery decreases proportionally.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72523621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physics-Aware Deep Learning on Multiphase Flow Problems 多相流问题的物理感知深度学习
Zipeng Lin
In this article, a physics aware deep learning model is introduced for multiphase flow problems. The deep learning model is shown to be capable of capturing complex physics phenomena such as saturation front, which is even challenging for numerical solvers due to the instability. We display the preciseness of the solution domain delivered by deep learning models and the low cost of deploying this model for complex physics problems, showing the versatile character of this method and bringing it to new areas. This will require more allocation points and more careful design of the deep learning model architectures and residual neural network can be a potential candidate.
本文介绍了一种多相流问题的物理感知深度学习模型。深度学习模型被证明能够捕捉复杂的物理现象,如饱和锋,由于不稳定性,这对数值求解者来说甚至是一个挑战。我们展示了由深度学习模型提供的解域的精确性和在复杂物理问题中部署该模型的低成本,展示了该方法的多用途特性,并将其带入了新的领域。这将需要更多的分配点和更仔细的深度学习模型架构设计,残差神经网络可能是一个潜在的候选者。
{"title":"Physics-Aware Deep Learning on Multiphase Flow Problems","authors":"Zipeng Lin","doi":"10.4236/cn.2021.131001","DOIUrl":"https://doi.org/10.4236/cn.2021.131001","url":null,"abstract":"In this article, a physics aware deep learning model is introduced for multiphase flow problems. The deep learning model is shown to be capable of capturing complex physics phenomena such as saturation front, which is even challenging for numerical solvers due to the instability. We display the preciseness of the solution domain delivered by deep learning models and the low cost of deploying this model for complex physics problems, showing the versatile character of this method and bringing it to new areas. This will require more allocation points and more careful design of the deep learning model architectures and residual neural network can be a potential candidate.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"3 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88859157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and Evaluation of Performance Related to Java and PHP Security Codes 与Java和PHP安全代码相关的性能分析与评价
Fontaine Rafamantanantsoa, Rabetafika Louis Haja, Randrianomenjanahary Lala Ferdinand
In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the security of the entire system and raises many performance issues related to code security. The safety of information systems becomes essential. This is why the performance linked to security codes is of importance essential in the security systems of all companies. Indeed, as contribution, to carry out measurements, it appropriates tools that are the JMH tool (Java Microbenchmark Harness) and the PHP Benchmark script tool which include unsecure java and PHP codes and secured against SQL (Structured Query Language) injection, XSS (Cross Site Scripting) i.e., using prepared requests, stored procedures, validation of input from white lists, reinforcement of minimum privilege, when sending requests from the last ones to MySQL databases and Postgresql. We recover the times of response to his requests. From java codes and PHP (Hypertext Preprocessor) secure, we also retrieve the response time for requests to databases MySQL and PostgresqL data. We then obtain the curves and interpretations comparing performance related to security and non-security of codes. The goal is to analyze and evaluate the performance comparing secure Java and PHP code against unsecure java and PHP code using MySQL and Postgresql databases. In Section 1, we presented the performance of the code Java and PHP. The configuration of the experiments and the experimental results are discussed in Sections 2 and 3, respectively. Use of suitable tool which is the JMH tool and the PHP Benchmark script tool, we have developed in Java 1.8 and PHP 7.4 secure and non-secure codes that send the queries to the MySQL or Postgresql database to carry out the measurements which led to the conclusion that the insecure PHP and Java codes are faster in terms of response time compared to the PHP and Java secure codes as the number of tables linked to the query increases because the blocking times of SQL injection and XSS preventions linked to its secure codes are increasing.
近年来,应用程序的Internet暴露不断产生新的表单威胁,危及整个系统的安全,并引发了许多与代码安全相关的性能问题。信息系统的安全变得至关重要。这就是为什么与安全代码相关的性能在所有公司的安全系统中都是至关重要的。事实上,为了进行测量,它使用了JMH工具(Java Microbenchmark Harness)和PHP Benchmark脚本工具,这些工具包括不安全的Java和PHP代码,并防止SQL(结构化查询语言)注入,XSS(跨站脚本),即使用准备好的请求,存储过程,验证来自白名单的输入,增强最小权限,当从最后一个请求发送到MySQL数据库和Postgresql时。我们恢复了响应他的请求的时间。从java代码和PHP(超文本预处理器)安全,我们还检索数据库请求MySQL和PostgresqL数据的响应时间。然后,我们得到了曲线和解释,比较了与安全性和非安全性相关的代码的性能。目标是分析和评估使用MySQL和Postgresql数据库比较安全Java和PHP代码与不安全Java和PHP代码的性能。在第1节中,我们展示了Java和PHP代码的性能。实验的配置和实验结果分别在第2节和第3节中讨论。使用合适的工具,JMH工具和PHP Benchmark脚本工具;Java 1.8和PHP 7.4中我们已经开发出安全,不安全的代码,将查询发送到MySQL或Postgresql数据库执行测量导致的结论是,不安全的PHP和Java代码更快的响应时间比PHP和Java安全编码表的查询数量的增加,因为阻止SQL注入和XSS预防与安全代码正在增加。
{"title":"Analysis and Evaluation of Performance Related to Java and PHP Security Codes","authors":"Fontaine Rafamantanantsoa, Rabetafika Louis Haja, Randrianomenjanahary Lala Ferdinand","doi":"10.4236/CN.2021.131004","DOIUrl":"https://doi.org/10.4236/CN.2021.131004","url":null,"abstract":"In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the security of the entire system and raises many performance issues related to code security. The safety of information systems becomes essential. This is why the performance linked to security codes is of importance essential in the security systems of all companies. Indeed, as contribution, to carry out measurements, it appropriates tools that are the JMH tool (Java Microbenchmark Harness) and the PHP Benchmark script tool which include unsecure java and PHP codes and secured against SQL (Structured Query Language) injection, XSS (Cross Site Scripting) i.e., using prepared requests, stored procedures, validation of input from white lists, reinforcement of minimum privilege, when sending requests from the last ones to MySQL databases and Postgresql. We recover the times of response to his requests. From java codes and PHP (Hypertext Preprocessor) secure, we also retrieve the response time for requests to databases MySQL and PostgresqL data. We then obtain the curves and interpretations comparing performance related to security and non-security of codes. The goal is to analyze and evaluate the performance comparing secure Java and PHP code against unsecure java and PHP code using MySQL and Postgresql databases. In Section 1, we presented the performance of the code Java and PHP. The configuration of the experiments and the experimental results are discussed in Sections 2 and 3, respectively. Use of suitable tool which is the JMH tool and the PHP Benchmark script tool, we have developed in Java 1.8 and PHP 7.4 secure and non-secure codes that send the queries to the MySQL or Postgresql database to carry out the measurements which led to the conclusion that the insecure PHP and Java codes are faster in terms of response time compared to the PHP and Java secure codes as the number of tables linked to the query increases because the blocking times of SQL injection and XSS preventions linked to its secure codes are increasing.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"37 1","pages":"36-49"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84487428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer-Learning for Automated Seizure Detection Based on Electric Field Encephalography Reconstructed Signal 基于电场脑电图重构信号的癫痫自动检测迁移学习
Gefei Zhu
Building an automatic seizure onset prediction model based on multi-channel electroencephalography (EEG) signals has been a hot topic in computer science and neuroscience field for a long time. In this research, we collect EEG data from different epilepsy patients and EEG devices and reconstruct and combine the EEG signals using an innovative electric field encephalography (EFEG) method, which establishes a virtual electric field vector, enabling extraction of electric field components and increasing detection accuracy compared to the conventional method. We extract a number of important features from the reconstructed signals and pass them through an ensemble model based on support vector machine (SVM), Random Forest (RF), and deep neural network (DNN) classifiers. By applying this EFEG channel combination method, we can achieve the highest detection accuracy at 87% which is 6% to 17% higher than the conventional channel averaging combination method. Meanwhile, to reduce the potential overfitting problem caused by DNN models on a small dataset and limited training patient, we ensemble the DNN model with two “weaker” classifiers to ensure the best performance in model transferring for different patients. Based on these methods, we can achieve the highest detection accuracy at 82% on a new patient using a different EEG device. Thus, we believe our method has good potential to be applied on different commercial and clinical devices.
建立基于多通道脑电图信号的癫痫发作自动预测模型一直是计算机科学和神经科学领域的研究热点。在本研究中,我们收集了来自不同癫痫患者和EEG设备的脑电图数据,并采用创新的电场脑电图(EFEG)方法对脑电图信号进行重构和组合,该方法建立了虚拟电场矢量,可以提取电场分量,比传统方法提高了检测精度。我们从重构信号中提取了一些重要的特征,并将它们传递给基于支持向量机(SVM)、随机森林(RF)和深度神经网络(DNN)分类器的集成模型。应用该EFEG信道组合方法,检测精度达到87%,比传统的信道平均组合方法提高6% ~ 17%。同时,为了减少DNN模型在小数据集和有限训练患者上可能导致的过拟合问题,我们将DNN模型与两个“较弱”分类器集成在一起,以确保在不同患者的模型转移中具有最佳性能。基于这些方法,我们可以在使用不同EEG设备的新患者上达到82%的最高检测准确率。因此,我们相信我们的方法有很好的潜力应用于不同的商业和临床设备。
{"title":"Transfer-Learning for Automated Seizure Detection Based on Electric Field Encephalography Reconstructed Signal","authors":"Gefei Zhu","doi":"10.4236/cn.2020.124009","DOIUrl":"https://doi.org/10.4236/cn.2020.124009","url":null,"abstract":"Building an automatic seizure onset prediction model based on \u0000multi-channel electroencephalography (EEG) signals has been a hot topic in computer science and \u0000neuroscience field for a long time. In this research, we collect EEG data from \u0000different epilepsy patients and EEG devices and reconstruct and combine the EEG \u0000signals using an innovative electric field encephalography (EFEG) method, which \u0000establishes a virtual electric field vector, enabling extraction of electric \u0000field components and increasing detection accuracy compared to the conventional \u0000method. We extract a number of important features from the reconstructed \u0000signals and pass them through an ensemble model based on support vector machine \u0000(SVM), Random Forest (RF), and deep neural network (DNN) classifiers. By \u0000applying this EFEG channel combination method, we can achieve the highest detection accuracy \u0000at 87% which is 6% to 17% higher than the conventional channel averaging combination method. Meanwhile, to reduce \u0000the potential overfitting problem caused by DNN models on a small dataset and \u0000limited training patient, we ensemble the DNN model with two “weaker” \u0000classifiers to ensure the best performance in model transferring for different patients. Based on \u0000these methods, we can achieve the highest detection accuracy at 82% on a new patient using a different EEG \u0000device. Thus, we believe our method has good potential to be applied on \u0000different commercial and clinical devices.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"5 1","pages":"174-198"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82422310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid IoT Security Model of MQTT and UMA MQTT和UMA的混合物联网安全模型
Khalid S. Aloufi, Omar H. Alhazmi
IoT applications are promising for future daily activities; therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks; therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT applications integrated from different developing parties.
物联网应用在未来的日常活动中很有前景;因此,物联网连接设备的数量预计将在未来几年内达到数十亿。然而,物联网有不同的应用框架。此外,物联网应用需要更高的安全标准。在这项工作中,使用消息队列遥测传输(MQTT)和用户管理访问(UMA)之间的集成,提出了一个具有安全嵌入式结构的物联网应用框架。对该模型进行了性能分析。将模型与现有模型和不同的设计结构进行比较表明,本工作中提出的模型有望成为具有安全性的功能物联网设计模型。模型中的安全性是其结构中的内置特性。该模型建立在推荐的框架之上;因此,它已经准备好与其他web标准集成数据共享,这将有助于从不同的开发方集成物联网应用程序。
{"title":"A Hybrid IoT Security Model of MQTT and UMA","authors":"Khalid S. Aloufi, Omar H. Alhazmi","doi":"10.4236/cn.2020.124008","DOIUrl":"https://doi.org/10.4236/cn.2020.124008","url":null,"abstract":"IoT applications are promising for future daily activities; therefore, the number \u0000of IoT connected devices is expected to reach billions in the coming few years. \u0000However, IoT has different application frameworks. Furthermore, IoT \u0000applications require higher security standards. In this work, an IoT \u0000application framework is presented with a security embedded structure using the \u0000integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The \u0000performance analysis of the model is presented. Comparing the model with existing \u0000models and different design structures shows that the model presented in this \u0000work is promising for a functioning IoT design model with security. The \u0000security in the model is a built-in feature in its structure. The model is \u0000built on recommended frameworks; therefore, it is ready for integration with \u0000other web standards for data sharing, which will help in making IoT applications integrated from different \u0000developing parties.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"277 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75202174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1