The proceedings contain 113 papers. The topics discussed include: SaaS clouds supporting non computing specialists;improve web service discovery: goal-based approach;integrated development environment for generation o...
ISBN:
(纸本)9781479971008
The proceedings contain 113 papers. The topics discussed include: SaaS clouds supporting non computing specialists;improve web service discovery: goal-based approach;integrated development environment for generation of middleware for hybrid processors based embedded systems;a network protection framework for DNP3 over TCP/IP protocol;classification of high dimensional educational data using particle swarm classification;a novel spreading framework using incremental clustering for viral marketing;ModConTR: a modular and configurable trust and reputation-based system for secure routing in ad-hoc networks;context-based ontology to describe system-of-systems interoperability;anomaly based intrusion detection for building automation and control networks;voice pathology detection using auto-correlation of different filters bank;P-ETL: parallel-ETL based on the MapReduce paradigm;and a metamodel for modeling cost behavior in service composition.
The proceedings contain 138 papers. The topics discussed include: implementation of sorted stair-case modulation and sorted phase disposition PWM for grid-tied multi-level inverter;bi-directional converter for hybrid ...
ISBN:
(纸本)9798350305005
The proceedings contain 138 papers. The topics discussed include: implementation of sorted stair-case modulation and sorted phase disposition PWM for grid-tied multi-level inverter;bi-directional converter for hybrid energy storage system;experimental investigation of the effectiveness and robustness of active disturbance rejection control using a DC motor-driven piston;instantaneous power based effective power balance operation in all-electric ship microgrid;modelling of EV penetration for an Indian state using machine learning approach;finite element-based dynamic eccentricity fault analysis in switched reluctance motor using machine learning approach;setting-free smart recloser for three terminal mixed lines;elevator based car parking system;optimal sizing and operation of PV based battery swapping station considering EV uncertainties for an Indian residential community;and sensitivity of threshold value ‘R’ in approximate entropy based brain-computer interface.
In this paper, our objective has been to comprehensively introduce and elucidate various image description models in the Arabic language. Each of these models is presented individually, accompanied by detailed explana...
详细信息
ISBN:
(纸本)9798350319439
In this paper, our objective has been to comprehensively introduce and elucidate various image description models in the Arabic language. Each of these models is presented individually, accompanied by detailed explanations of their techniques, the datasets they rely on, the evaluation metrics applied, and the outcomes of their evaluations. Our aim is to provide a valuable resource for fellow researchers interested in delving into this domain, offering them an accessible repository of the latest developments in this field.
Additive manufacturing (3D printing) has been seeing growth in recent years with the widespread use of 3D printers for production in different industries. As these systems become integrated into enterprise networks, t...
详细信息
ISBN:
(纸本)9798350319439
Additive manufacturing (3D printing) has been seeing growth in recent years with the widespread use of 3D printers for production in different industries. As these systems become integrated into enterprise networks, the cybersecurity aspect of their functioning is gaining importance. In particular, there exist risks that these devices are exposed to a wide variety of data breaches. The latter range from unauthorized access to the printed designs to Stuxnet-like malware attacks. This research focuses on vulnerability and threat analysis for 3D Printers. Our ultimate goal is to introduce intrusion detection systems, which effectively address the current security challenges.
With the advances in the large-scale computing platforms, jobs that run on such systems are becoming complex and they present increased variability. In these systems, the workload usually has complex structure includi...
详细信息
ISBN:
(纸本)9798350319439
With the advances in the large-scale computing platforms, jobs that run on such systems are becoming complex and they present increased variability. In these systems, the workload usually has complex structure including jobs with different characteristics. Along with regular jobs, there are jobs represented as linear workflows (LWs) or even jobs which are bags of LWs. Consequently, efficient scheduling algorithms should be employed to ensure satisfactory performance as well as fair processing of jobs. This research aims to study appropriate scheduling algorithms of mixed workloads consisting of simple jobs including one task only, along with bags-of-LWs (BoLWs). Different techniques for scheduling are studied in a set of distributed resources. Extensive simulation experiments are carried out to investigate their effectiveness for various system utilization levels and variability in job/task service demands. The results demonstrate that the efficacy of the scheduling schemes depends on the variability level in job/task service demands, the system load, and the level of fairness that is considered as satisfactory.
This paper presents an approach for detection and quantification, with low latency, of the flow of leakage bubbles, in sub-surfaces, making use of video recorded by remote underwater vehicle using only image analysis ...
详细信息
ISBN:
(纸本)9798350319439
This paper presents an approach for detection and quantification, with low latency, of the flow of leakage bubbles, in sub-surfaces, making use of video recorded by remote underwater vehicle using only image analysis and under the premise of no overlapping bubbles. Implementation details are presented allowing its trial and reproduction. Results are confronted with videos acquired in a laboratory under controlled conditions and in real operational situation from literature, showing great efficiency in terms of processing time and all other important aspects for pipeline inspections, considering environment and safety in the oil industry.
The Industrial Internet of Things (IIoT) has completely changed how industrial processes are carried out, resulting in higher production and efficiency. Strong intrusion detection systems (IDS) must be implemented ins...
详细信息
ISBN:
(纸本)9798350319439
The Industrial Internet of Things (IIoT) has completely changed how industrial processes are carried out, resulting in higher production and efficiency. Strong intrusion detection systems (IDS) must be implemented inside IIoT systems because of the increasing risk of security attacks brought on by increased connection and communication channels. In this work, we provide a combined strategy for successful IDS in IIoT systems based on data mining and machine learning/deep learning processes. Our suggested approach integrates a number of strategies, including anomaly detection, feature selection, and ensemble learning, to precisely identify and categorize distinct sorts of intrusion attempts. We conduct extensive trials on publicly accessible datasets (Edge IIoT) to show the efficacy of our method, and the results outperform current state-of-the-art methods.
Information Retrieval systems, often referred to by the acronym IRS, are essential tools in the field of data collection and analysis. Among IRS, Personalized Information Retrieval systems stand out by offering the ab...
详细信息
ISBN:
(纸本)9798350319439
Information Retrieval systems, often referred to by the acronym IRS, are essential tools in the field of data collection and analysis. Among IRS, Personalized Information Retrieval systems stand out by offering the ability to personalize and adapt search results based on the user's individual preferences. This ability to provide tailored information contributes to a more relevant and efficient search experience, meeting the specific needs of each user. A new type of personalized IRS has emerged, emotional IRS, which are distinguished by their ability to adapt search results based on the user's emotions, represented by a structure called an emotional profile. This development is particularly notable thanks to major advances in the field of Natural Language Processing (NLP), which now allow a finer understanding of the emotions present in textual data. In this paper, we present a comparative study of different data structures for the representation of emotional profiles. The objective is to determine the optimal data structure to represent the emotional profile of the user and thus have an efficient and user-friendly emotional IRS.
Maritime surveillance is crucial for security, safety, and efficient marine resource management. This paper introduces a Secure Surveillance System that leverages real-time data from environmental sensors and big data...
详细信息
Integrating data from multiple sources with different native data models can be a demanding task that requires significant manual effort. Polystore is a new federated database view designed to enable polyglot querying...
详细信息
ISBN:
(纸本)9798350319439
Integrating data from multiple sources with different native data models can be a demanding task that requires significant manual effort. Polystore is a new federated database view designed to enable polyglot querying across diverse data models. This paper aims to discuss the most significant security challenges associated with data federation. We identify the key privacy risks hindering polystore technologies and highlight the gap between traditional data protection approaches and current security issues. Moreover, we present a reference architecture as an active solution to significantly improve data usage in compliance with upstream security policies. Access control is the most widely-accepted reference in the database community for dealing effectively with this type of problem. In this context, we propose an access control mechanism that increases the resilience of the Polystore through Moving Target Defense (MTD) concept. Our approach is intended to address the security focus on privacy risks associated with Polystore technologies, and to enhance their adoption in modern data-driven applications.
暂无评论