The proceedings contain 96 papers. The topics discussed include: bike security with theft prevention;audio hiding in an image using steganographic methods;automated api testing;extended kalman filter based distributed...
ISBN:
(纸本)9781538649855
The proceedings contain 96 papers. The topics discussed include: bike security with theft prevention;audio hiding in an image using steganographic methods;automated api testing;extended kalman filter based distributed state estimation algorithm for cyber physical systems.review on application of machine learning algorithm for data science;a review of data mining & machine learning approaches for identifying risk factor contributing to likelihood of cardiovascular diseases;offloading with QOS in the mobile cloud computing environment;application of IoT in monitoring patient's health ward relevant parameters;hybrid solar and wind powered electric vehicle using sepic converter;design of MEMS sensor for the detection of diabetes;and hard and soft decision decoding using Viterbi algorithm.
There has been a growing interest in using smart grids due to their capability in delivering automated and distributed energy level to the consumption units. However, in order to guarantee the safe and reliable delive...
详细信息
The presence of bugs in a software release has become inevitable. The loss incurred by a company due to the presence of bugs in a software release is phenomenal. Modern methods of testing and debugging have shifted fo...
详细信息
The proceedings contain 28 papers. The special focus in this conference is on Cyber Security Cryptography and Machine Learning. The topics include: The advantage of truncated permutations;reconstructing C2 servers for...
ISBN:
(纸本)9783030209506
The proceedings contain 28 papers. The special focus in this conference is on Cyber Security Cryptography and Machine Learning. The topics include: The advantage of truncated permutations;reconstructing C2 servers for remote access trojans with symbolic execution;generating a random string with a fixed weight;an access control model for data security in online social networks based on role and user credibility;enhancing image steganalysis with adversarially generated examples;controllable privacy preserving blockchain: Fiatchain: distributed privacy preserving cryptocurrency with law enforcement capabilities;a relay attack on a tamper detection system;amended cross-entropy cost: An approach for encouraging diversity in classification ensemble;governance and regulations implications on machine learning;linear cryptanalysis reduced round of piccolo-80;simulating homomorphic evaluation of deep learning predictions;Everything is in the name – a URL based approach for phishing detection;network cloudification;new goal recognition algorithms using attack graphs;peerClear: Peer-to-peer bot-net detection;Rethinking identification protocols from the point of view of the GDPR;Temporal pattern-based malicious activity detection in SCADA systems.anonymous deniable identification in ephemeral setup and leakage scenarios;randomized and set-system based collusion resistant key predistribution schemes;continuous key agreement with reduced bandwidth;Covert channel cyber-attack over video stream DCT payload: (Copyright protection algorithm for video and audio streams);Effects of weather on drone to IoT QKD;malware classification using image representation;MLDStore: DNNs as similitude models for sharing big data;cyber attack localization in smart grids by graph modulation;Beyond replications in blockchain: on/off-blockchain IDA for storage efficiency and confidentiality.
Recently, the rapid development of modern nonvolatile memories (NVMs) have renovated the designs of computingsystems. However, the unique characteristics of NVMs often degrade the performance, reliability, or lifetim...
详细信息
Finding free parking space is a common problem in cities nowadays, both in streets and parking lots. This problem causes traffic congestion and influence in the delay of people to get to their jobs. With the advent of...
详细信息
ISBN:
(纸本)9781538676127
Finding free parking space is a common problem in cities nowadays, both in streets and parking lots. This problem causes traffic congestion and influence in the delay of people to get to their jobs. With the advent of smart cities and buildings, research in this area is increasingly relevant. This work proposes a distributed architecture of a real time system for the detection of vacant space in parking lots, using computerized vision and machine learning. The proposed architecture seeks to minimize the search time for a parking space, as well as reduce the congestion resulting from having to maneuver in small spaces with pedestrians. The expected benefits are mainly the reduction of delays in reaching the position of work and study, and the risk reduction of pedestrians circulating in the parking areas, all this with a minimum investment.
Femtosecond laser direct writing achieves high precision into micro-metric in additive manufacturing of customized-geometric structures and was used to fabricate the high quality micro optical lenses in various photor...
详细信息
Femtosecond laser direct writing achieves high precision into micro-metric in additive manufacturing of customized-geometric structures and was used to fabricate the high quality micro optical lenses in various photoresist, including SU-8, by two-photon polymerization. The fabricates axicons could approximately create the Bessel beam, which has smaller beam diameter and extended depth of focus, so that widely employed in imaging systems. The axicons and any geometric micro-lenses of certain applications were designed and optimized using ZEMAX before the lenses being fabricated by femtosecond laser direct writing, and they serve as core components of imaging systems. microscopy, and other research fields.
Cloud storage systems.(CSS) are heterogeneous in nature. In such a heterogeneous distributed storage system, how to identify a tradeoff between system storage cost and system repair cost is investigated by analyzing t...
详细信息
ISBN:
(纸本)9781538643013
Cloud storage systems.(CSS) are heterogeneous in nature. In such a heterogeneous distributed storage system, how to identify a tradeoff between system storage cost and system repair cost is investigated by analyzing the min-cut constraints of information flow graph. Moreover, it is proved that the number of min-cut constraints can be greatly reduced such that the tradeoff curve can be established in polynomial time.
The convergence between computing- and data-centric workloads and platforms is imposing new challenges on how to best use the resources of modern computingsystems. In this paper we show the need of enhancing system s...
详细信息
ISBN:
(数字)9783319751788
ISBN:
(纸本)9783319751788;9783319751771
The convergence between computing- and data-centric workloads and platforms is imposing new challenges on how to best use the resources of modern computingsystems. In this paper we show the need of enhancing system schedulers to differentiate between compute- and data-oriented applications to minimise interferences between storage and application traffic. These interferences can be especially harmful in systems.featuring fully distributed storage systems.together with unified interconnects, such as our custom-made architecture ExaNeSt. We analyse several data-aware allocation strategies, and found that such strategies are essential to maintain performance in distributed storage systems.
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by a...
详细信息
ISBN:
(纸本)9781450365628
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by adapting them to big data technology to allow a fundamental change in the access to voluminous information in the web. That Intended to have a complete and relevant response to the user request. Our research work focuses on the semantic web. Focus exactly on the semantic search on many data expressed by rdF (Resource Description Framework) in distributed system. The semantic language proposed by W3C (World Wide Web Consortium) provides the formalism necessary for the representation of data for the Semantic Web. However, only a knowledge representation format is insufficient and we need powerful response mechanisms to manage effectively global and distributed queries across a set of stand-alone and heterogeneous rdF resources marked by the dynamic and scalable nature of their content.
暂无评论