Today's digital forensics software tools mostly do not offer automatic analysis methods to reveal evidences among huge amounts of digital files within hard disk images. It is important that finding evidence in dig...
详细信息
ISBN:
(纸本)9781728162515
Today's digital forensics software tools mostly do not offer automatic analysis methods to reveal evidences among huge amounts of digital files within hard disk images. It is important that finding evidence in digital and cyber forensics investigations as soon as possible by examining hard disk images. E-mails constitute a rich source of information in hard disk images, and they are the most possible data source to obtain an evidence. The analyzers search e-mail files by manually or using traditional methods in order to find an evidence. However, this operation could take a long time due to the size of the e-mail data which can contain a huge number of files and a huge volume of data. This study introduces an end-to-end distributed graph analysis framework for large-scale digital forensic datasets, and evaluates the accuracy of the centrality algorithms and the scalability of the proposed framework in terms of running time performance. The framework is comprised of specific processes to perform pre-processing, graph building, and algorithm activities. An architecture is introduced based on distributed big data techniques. Three different centrality algorithms are implemented to analyze the accuracy of our framework. Further, three implementations are provided to demonstrate the running time performance of our framework. Experiments are performed on Enron e-mail dataset to analyze the centrality algorithms, to evaluate the performance of the framework, and to compare the running times between the traditional approach and our approach. Moreover, the running time performance of the framework is evaluated under various parallelization level. The accuracy of the results is also evaluated and compared between the centrality algorithms. The comparison shows that some certain algorithms provide more accurate results and it is possible to improve the running time by orders of magnitude utilizing our end-to-end distributed graph analysis approach.
A joint 2-D angle estimation algorithm based on TDOA is proposed in this paper for multi-antenna system, which can solve the problem of using it in tracking system, such as limited estimation accuracy and inapplicabil...
详细信息
Smart Farming has the goal to support farmers in their various activities, i.e., achieve best results in quality and quantity of their products, with low and efficient resource usage, working in sustainable manners et...
详细信息
ISBN:
(纸本)9781728105703
Smart Farming has the goal to support farmers in their various activities, i.e., achieve best results in quality and quantity of their products, with low and efficient resource usage, working in sustainable manners etc. For that, a lot of information is needed, e.g., about the current state of the monitored agricultural area. Typically this requires a large number of sensors which collect important sensor data at predefined intervals. For further evaluation such data is usually processed in a central place, for which it must first be transferred from the field to a data sink at the farm premises. Cellular networks could be used for such data transmissions, but the network deployment in rural areas is costly with less likely revenues. Thus, mobile operators are not eager to roll out their networks in rural areas so that they are often not well covered. In this paper we introduce PotatoScanner, a mobile Delay Tolerant Wireless sensor Node (DTWSN) that closes this gap and acts with the help of a field sprayer as a data mule for the collected data. In addition, PotatoScanner itself has sensors to obtain further information about the cultivated field. The paper provides an overview of the overall system and analyses the measurement data obtained in real operation over the past two years 2017 and 2018.
The proceedings contain 30 papers. The topics discussed include: versatile software framework for the monitoring and control of distributedcomputingsystems;a new levy flight trajectory-based grasshopper optimization...
ISBN:
(纸本)9781728175034
The proceedings contain 30 papers. The topics discussed include: versatile software framework for the monitoring and control of distributedcomputingsystems;a new levy flight trajectory-based grasshopper optimization algorithm for multi-objective optimization problems;quality of context in the internet of things: parameters and models;the impact of products exchange in multi-levels multi-products distribution network;multiuser access via OFDMA technology in high density ieee 802.11ax WLANs: a survey;and dynamic clustering approach for run-time applications mapping on NoC-based multi/many-core systems.
As computation and advanced high-dimensional signal processing is pushed to edge computational devices, energy efficient, unconventional architectures are needed to ameliorate this growing need. The Google Edge TPU, f...
详细信息
ISBN:
(纸本)9781728149226
As computation and advanced high-dimensional signal processing is pushed to edge computational devices, energy efficient, unconventional architectures are needed to ameliorate this growing need. The Google Edge TPU, first used on a Cloud platform, is one such accelerator that is now commercially available for consumer use. Similarly, low-power, data-efficient vision sensors, such as the Dynamic Vision sensor (DVS), have been developed and commercialized as well to improve upon the large data redundancy seen in these ML applications. This live demonstration is linking these two technologies to benchmark the Coral Edge TPU Board in a high-speed object tracking and prediction application. In comparison to a floating point architecture of similar form factor, the Intel Compute Stick, the Edge TPU has been show to outperform in terms of latency and computational efficiency.
computing and communication are getting increasingly ubiquitous with the inclusion of sophisticated devices like electric vehicles, smart phones and other house hold appliances. Due to the constant evolution in Intern...
详细信息
Existing street light monitoring systems use vehicle-borne sensor platforms, LiDAR etc. which are obtrusive for in-the-wild deployments. In this paper, we propose BikeL;a crowd sensed system to monitor street lighting...
详细信息
ISBN:
(纸本)9781728169972
Existing street light monitoring systems use vehicle-borne sensor platforms, LiDAR etc. which are obtrusive for in-the-wild deployments. In this paper, we propose BikeL;a crowd sensed system to monitor street lighting conditions in a novel approach using smartphone sensors during Bike navigation. We identify the underlying issues and challenges from pilot experiments to make the system phone-invariant, robust, and user-friendly. We used regression models and unsupervised clustering to resolve these issues. We have carried out extensive experiments under various road type illumination scenarios and phones type covering more than 400 km. Over 80 night trips collecting 10,000 functional light pole samples to tune the system parameters. Results show that the overall system successfully detects both functioning and non-functioning light poles with good accuracy (F1 score > 0.85) and can produce uniformly calibrated illumination levels. This viable, economical, and easy to deploy solution can work effectively for under-developed regions of low and middle-economy countries.
The paper considers the problem of gramians computation for linear parabolic distributed parameters systems like the heat flow in a rod. The solution of the described partial differential equation is derived by applyi...
详细信息
Decentralized and distributed Generation of solar power is one of the fastest growing models of power generation across the world. Harmonics are generated because of the presence of non-linear and small industrial typ...
详细信息
Group key management for any secure multicast architecture is an essential functional building block which is a security measure just as important as encryption and authentication. Broadly speaking, two main functiona...
详细信息
ISBN:
(纸本)9781728148762
Group key management for any secure multicast architecture is an essential functional building block which is a security measure just as important as encryption and authentication. Broadly speaking, two main functional entities manage the security of a multicast session: a Group Controller (GS) responsible for authorization, authentication, and access control, and a Key Server (KS) responsible for maintaining and distributing the required key material. Whenever a service provider sends a multicast content, it is encrypted using a Traffic Encryption Key (TEK) that legitimate members can decrypt on delivery of multicast content. To prevent a leaving or an expelled member from the group from continuing to decrypt the secret multicast messages, the KS generates a new TEK and securely distributes it to the remaining members of the group except the one left. Due to the inherent resource limitation of Internet of Things (IoT) devices, these security protocols cannot be extended as is for IoT devices and sensor nodes. How to securely generate and distribute the new TEK without disruption of service and degradation of network performance remains a major challenge. This work aims at providing a solution in group key management for IoT devices to the aforementioned gap. The proposal is to manage keys for multiple nodes belonging to multiple groups using Routing Protocol for Low Power and Lossy Networks (RPL) to build topology and add to it the ability of Multigroup Key Management using Key Store and Homomorphic encryption. Our solution is using Paillier Encryption scheme to produce keys. These keys are stored in the Keystore. These keys would be distributed to the root controller nodes, which are RPL DODAG roots, and these root nodes will distribute it to their respective nodes in a group. The cases of members leaving groups and joining groups also has been handled.
暂无评论