Thursday, December 30, 2021
VLSI Design of Low Power High Speed 4 Bit Resolution Pipeline ADC In Submicron CMOS Technology
Tuesday, December 28, 2021
Information and Communication Security Mechanisms For Microservices-based Systems
Author : Lenin Leines-Vite
Affiliation : Universidad Veracruzana
Country : Mexico
Category : Networks & Communications
Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
Comparative Review of Malware Analysis Methodologies
Author : Ioannis G. Kiachidis
Affiliation : International Hellenic University
Country : Greece
Category : Networks & Communications
Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
Sunday, December 26, 2021
Post-Segmentation Approach for Lossless Region of Interest Coding
Author : Ji Hyun Lee and Jung H. Kim
Affiliation : Tuskegee University
Category : Digital Signal & Image Processing
Volume, Issue, Month, Year : 2, 4, December, 2011
Abstract :
Thursday, December 23, 2021
A Novel Approach to Minimize Spare Cell Leakage Power Consumption During Physical Design Implementation
Author : Vasantha Kumar B.V.P, Dr. N. S. Murthy Sharma, Dr. K. Lal Kishore and Jibanjeet Mishra
Affiliation : Synopsys (India) Pvt. Ltd
Country : India
Category : Digital Signal & Image Processing
Volume, Issue, Month, Year : 2, 4, December, 2011
Abstract :
Tuesday, December 21, 2021
Research on the Model of Interaction and Coupling Relationship between Standard System Construction and Process Management
Author : Wang Chaofan、 Chen Xinyue
Affiliation : 1North China Electric Power University, School of Economics and Management, Wang Chaofan, Beijing, China 2Qingdao University,
Country : People's Republic of China
Category : Business Management
Volume, Issue, Month, Year : 7th Intern, MaVaS 2021, December, 2021
Abstract :
Monday, December 20, 2021
A Novel Attention-Based Network for Fast Salient Object Detection
Author : Bin Zhang, Yang Wu, Xiaojing Zhang and Ming Ma
Affiliation : Inner Mongolian University
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 11, 22, December, 2021
Abstract :
EMERGENCY MANAGEMENT SYSTEM FOR COLLEGE STUDENTS BASED ON BIG DATA PROCESSING TECHNOLOGY
Author : Ziyue wang
Affiliation : Hubei University of Technology
Country : China
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 11, 16, October, 2021
Abstract :
Since 2020, the epidemic of Corona Virus Disease 2019 has swept the world, which has had a great impact on people's life. Especially for college campus life. This paper presents an emergency management system for college students. We use Java Web, big data processing and other technologies to develop, implement and test the system. The system integrates daily management and emergency management, which can meet the basic needs of teachers and students on campus. We hope to provide convenience for students and teachers in learning and management.
Keyword : Web System, Stream Data Processing, Data visualization, Internet Worm.
For More Details : https://aircconline.com/csit/papers/vol11/csit111601.pdf
Sunday, December 19, 2021
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWORK ANOMALY DETECTION WITH SHAPLEY ADDITIVE EXPLANATION(SHAP)
Author : Khushnaseeb Roshan
Affiliation : Aligarh Muslim Univesity
Country : India
Category : Soft Computing
Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
Friday, December 17, 2021
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Discrete Wavelet Transform
Author : Mohsen Zare Baghbidi, Kamal Jamshidi, Ahmad Reza Naghsh Nilchi and Saeid Homayouni
Affiliation : University of Isfahan
Country : Iran
Category : Digital Signal & Image Processing
Volume, Issue, Month, Year : 2, 4, December, 2011
Abstract :
Recently anomaly detection (AD) has become an important application for target detection in hyperspectral remotely sensed images. In many applications, in addition to high accuracy of detection we need a fast and reliable algorithm as well. This paper presents a novel method to improve the performance of current AD algorithms. The proposed method first calculates Discrete Wavelet Transform (DWT) of every pixel vector of image using Daubechies4 wavelet. Then, AD algorithm performs on four bands of “Wavelet transform” matrix which are the approximation of main image. In this research some benchmark AD algorithms including Local RX, DWRX and DWEST have been implemented on Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) hyperspectral datasets. Experimental results demonstrate significant improvement of runtime in proposed method. In addition, this method improves the accuracy of AD algorithms because of DWT’s power in extracting approximation coefficients of signal, which contain the main behaviour of signal, and abandon the redundant information in hyperspectral image data.
Keyword : Hyperspectral Remote Sensing, Anomaly Detection, Discrete Wavelet Transform, ROC Curve, RX.
Thursday, December 16, 2021
Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer
Author : Raed Al-hamarneh
Affiliation : University of Almaarefa
Country : Kingdom of Saudi Arabia
Category : Networks & Communications
Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it. My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
Keyword : Smart cities, smart devices, security issue, cyber-attack, Cisco Packet tracer, Cisco Packet tracer
Wednesday, December 15, 2021
BLOCKCHAIN DECENTRALIZED VOTING FOR VERIFIED USERS WITH A FOCUS ON ANONYMITY
Author : Piotr Pospiech
Affiliation : Wroclaw University of Science and Technology
Country : Poland
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 11, 08, June, 2021
Abstract :
The paper presents decentralized voting scheme for verified users while maintaining their anonymity. A blockchain network was applied, which is a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, the Ethereum network was used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. Ethereum and the use of smart contracts were also discussed in paper. The implementation uses the blind signature protocol by David Chaum and encryption with the Rivest-Shamir-Adleman (RSA) algorithm. Presented in this paper scheme for blockchain decentralized voting for verified users with focus on anonymity is then fully implemented and identified potential issues are analysed and discussed.
Keyword : Blockchain, e-voting, Ethereum.
Monday, December 13, 2021
Improving Security and Fairness in Federated Learning Systems
Author : Andrew R. Short
Affiliation :
University of West Attica
Country : Greece
Category : Networks & CommunicationsAbstract :
The ever-increasing use of Artificial Intelligence applications has made apparent that the quality of the training datasets affects the performance of the models. To this end, Federated Learning aims to engage multiple entities to contribute to the learning process with locally maintained data, without requiring them to share the actual datasets. Since the parameter server does not have access to the actual training datasets, it becomes challenging to offer rewards to users by directly inspecting the dataset quality. Instead, this paper focuses on ways to strengthen user engagement by offering “fair” rewards, proportional to the model improvement (in terms of accuracy) they offer. Furthermore, to enable objective judgment of the quality of contribution, we devise a point system to record user performance assisted by blockchain technologies. More precisely, we have developed a verification algorithm that evaluates the performance of users’ contributions by comparing the resulting accuracy of the global model against a verification dataset and we demonstrate how this metric can be used to offer security improvements in a Federated Learning process. Further on, we implement the solution in a simulation environment in order to assess the feasibility and collect baseline results using datasets of varying quality.
Keyword : Incentive schemes, Federated Learning, Blockchain, Rewards, Incentive schemes
BLOCKCHAIN DECENTRALIZED VOTING FOR VERIFIED USERS WITH A FOCUS ON ANONYMITY
Author : Piotr Pospiech
Affiliation : Wroclaw University of Science and Technology
Country : Poland
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 11, 08, June, 2021
Abstract :
The paper presents decentralized voting scheme for verified users while maintaining their anonymity. A blockchain network was applied, which is a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, the Ethereum network was used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. Ethereum and the use of smart contracts were also discussed in paper. The implementation uses the blind signature protocol by David Chaum and encryption with the Rivest-Shamir-Adleman (RSA) algorithm. Presented in this paper scheme for blockchain decentralized voting for verified users with focus on anonymity is then fully implemented and identified potential issues are analysed and discussed.
Keyword : Blockchain, e-voting, Ethereum.
For More Details : https://aircconline.com/csit/papers/vol11/csit110805.pdff
Sunday, December 12, 2021
Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET
Author : Ruo Ando
Affiliation : National Institute of Informatics
Country : Japan
Category : Networks & Communications
Volume, Issue, Month, Year : 13, 6, November, 2021
Abstract :
Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.
Keyword : COVID-19 related IoC, traffic patterns, data flow pipeline, port filtering, SINET, high port application