2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)最新文献

筛选
英文 中文
Improvizmg the public key infrastructure to build trust architecture for VANET by using short-time certificate management and Merkle Signature Scheme 利用短时证书管理和默克尔签名方案对公钥基础设施进行改进,构建VANET的信任体系结构
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924489
S. Mallissery, M. M. Manohara Pai, A. Smitha, R. Pai, J. Mouzna
{"title":"Improvizmg the public key infrastructure to build trust architecture for VANET by using short-time certificate management and Merkle Signature Scheme","authors":"S. Mallissery, M. M. Manohara Pai, A. Smitha, R. Pai, J. Mouzna","doi":"10.1109/APCASE.2014.6924489","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924489","url":null,"abstract":"Applications in Vehicular Adhoc NETwork (VANET) require high security for end to end communication especially for sensitive information. It is necessary to restrict the unauthorized users from accessing the VANET services using a trusted infrastructure. In addition, messages exchanged should have minimum authentication delay and communication overhead. In this paper, a novel architecture is proposed for trusted infrastructure using combination of short time certificate and Merkle Signature Scheme. In this architecture, secure VANET communication is achieved using psuedo ID generated by the vehicle and the issue of short certificate by the trusted infrastructure that grants the private public key pairs according to the priority of the messages exchanged. Therefore the message dissemination offers reduced overhead and meets the requirement of VANET communication.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital multimedia archiving based on optimization steganography system 基于优化隐写系统的数字多媒体归档
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924476
Raniyah Wazirali, Z. Chaczko, Anup Kale
{"title":"Digital multimedia archiving based on optimization steganography system","authors":"Raniyah Wazirali, Z. Chaczko, Anup Kale","doi":"10.1109/APCASE.2014.6924476","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924476","url":null,"abstract":"As soon as digital artifacts have become a part and parcel of everyday life, the need for digital media archives with the capacity of preserving the given metadata has risen impressively. The process of converting the digital metadata to archives, however, is fraught with a number of difficulties, the key one concerning the methodology for embedding high payload capacity information into the digital multimedia and at the same time retains high quality of the image. The given paper will consider steganography as a possible solution to the aforementioned issue. Allowing for detecting the genetic algorithm for boosting the PSNR value with the information of high capacity will help solve the issue regarding the digital multimedia archiving. Many sizes of data are embeded inside the images and the PSNR (Peak signal-to-noise ratio) is also taken for each of the images verified.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Acceptance in the deployment of blended learning as a learning resource in information technology and computer science program, Brawijaya university 在信息技术和计算机科学课程中使用混合学习作为学习资源的接受度,布拉维贾亚大学
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924486
F. A. Bachtiar, Aditya Rachmadi, F. Pradana
{"title":"Acceptance in the deployment of blended learning as a learning resource in information technology and computer science program, Brawijaya university","authors":"F. A. Bachtiar, Aditya Rachmadi, F. Pradana","doi":"10.1109/APCASE.2014.6924486","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924486","url":null,"abstract":"This study aims, first, to propose a model and to test an acceptance model to identify the students' intention to use e-learning system and to identify the use of e-learning used as a supplementary tool in a conventional learning context. A TAM model proposed includes System Functionality (SF), System Interactivity (SI), Usability (U), Self-Efficacy (SE), Internet and Computer Experience (ICE), Socio-Environment Factor (SEF), Perceived Ease of Use (PEU), Perceived Usefulness (PU), Use of Supplementary Learning (USL), Use for Distance Learning (UDL) as the factors influencing the use of the system. The Technology Acceptance Model (TAM) is developed based on hypotheses and related factors. The result showed TAM can be used to examine the acceptance of blended learning. In this study Perceived of Usefulness (PU) is the main factor of the construct followed by Perceived Ease of Use (PEU) and Use of Supplementary Learning (USL) to explain the causal relation in TAM model.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124176675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evaluation of traffic generators over a 40Gbps link 评估40Gbps链路上的流量生成器
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924469
Shalvi Srivastava, Sweta Anmulwar, A. Sapkal, Tarun Batra, A. Gupta, Vinodh Kumar
{"title":"Evaluation of traffic generators over a 40Gbps link","authors":"Shalvi Srivastava, Sweta Anmulwar, A. Sapkal, Tarun Batra, A. Gupta, Vinodh Kumar","doi":"10.1109/APCASE.2014.6924469","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924469","url":null,"abstract":"In this paper we have compared the performance of three traffic generators (DITG, packETH, Ostinato) over a 40Gbps link. In our laboratory experiment, two computers with Linux operating systems are connected through a 40Gbps link. The payload size was varied from 64 to 8950 bytes and TCP and UDP traffic on the link was measured. To achieve the maximum throughput jumbo frames were used. The results showed significant changes in performance of tools for TCP and UDP traffic respectively. For both TCP and UDP traffic only PackETH was able to achieve the highest throughput of 39.8Gbps. D-ITG running in a single threaded mode was not able to utilize the full bandwidth so its performance is evaluated in multi-threaded mode with 16 threads.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes 利用自触发黑洞检测和防范僵尸网络中的DDoS攻击
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924468
Amirmohammad Sadeghian, M. Zamani
{"title":"Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes","authors":"Amirmohammad Sadeghian, M. Zamani","doi":"10.1109/APCASE.2014.6924468","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924468","url":null,"abstract":"Among various types of computer threats, botnet is the most serious one against cyber security as they provide several illegal activities such as denial of service attacks, spamming, click fraud and other type of espionage activities. A botnet is a network of infected computers called bots which are under the control of one person known as Botmaster. Botmaster will have full control over the compromised machines from the command and control (C&C) channels, which allow Botmaster to update and add new features to the botnet. Distributed Denial of Service is one of deadliest attacks in history of network security which is take place by botnets. Until now many different solutions against this attack are proposed. One of these techniques is the Remote Triggered black hole filtering for stopping DDoS attacks by botnets. The main drawback of this technique is that the trigger is located at the victim premises and in case of an attack the network between trigger and routers will be saturated by attack traffic. Therefore the trigger cannot effectively communicate with the router to ask them to stop the traffic from the source IP. This paper proposes an improved framework to do the black hole filtering on the edge of internet service provider without need of the trigger (Self Triggered). The most tangible improvements in our framework are stopping DDoS attacks before entering into victim premises, ease of tracking and reporting the compromised machines for further cleanings.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A cloud platform for distributed spectrum sensing 分布式频谱感知云平台
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924462
Zhenghua Lv, H. Meng, Tianyu Zhang
{"title":"A cloud platform for distributed spectrum sensing","authors":"Zhenghua Lv, H. Meng, Tianyu Zhang","doi":"10.1109/APCASE.2014.6924462","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924462","url":null,"abstract":"This paper describes the architecture and the implementation of a spectrum sensing platform based on cloud computing. The system collects information from distributed sensors scattered around a specific area for further analysis. The system is designed in layers, including layers of sensor device, console terminal, cloud server management, application development and consumers from bottom to up. Data-directed method is taken to ensure the extendibility of the system. The TCP/IP is wrapped by AMQP for simple and reliable network connection. Finally, we introduce some practical applications running on the cloud platform.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKOSYN: Simple Knowledge Organization System for synonym search on content management system SKOSYN:用于内容管理系统中同义词搜索的简单知识组织系统
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924466
Novianti, Hargyo Tri, Nugroho I
{"title":"SKOSYN: Simple Knowledge Organization System for synonym search on content management system","authors":"Novianti, Hargyo Tri, Nugroho I","doi":"10.1109/APCASE.2014.6924466","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924466","url":null,"abstract":"The development of Content Management System (CMS) technology undoubtedly eases website content organization. Creative writing is a common challenge in producing written content. One solution is to use synonyms, which conventionally can be found in a thesaurus. In this research, Simple Knowledge Organization System (SKOS) data model, which is suitable for organizing knowledge such as thesauri, is implemented as a plugin for searching synonyms in Bahasa Indonesia. This plugin will complement the default text editor on CMS to edit the written content in a convenient way. This plugin also provides a feature for getting definitions using the XML web service from Kateglo, so that users can understand exactly the meaning of synonyms they use. Based on experiments done in this research, SKOS data can be loaded into triplestore by ARC2 in shorter time than the regular MySQL database which uses integrity constraints. Moreover, the experiments have also shown that time stability for getting synonyms from triplestore using ARC2 can be more maintained than obtaining synonyms from XML document.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation-based capacity analysis for a future airport 基于模拟的未来机场容量分析
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-10-16 DOI: 10.1109/APCASE.2014.6924479
M. Mota, P. Scala, Geert Boosten
{"title":"Simulation-based capacity analysis for a future airport","authors":"M. Mota, P. Scala, Geert Boosten","doi":"10.1109/APCASE.2014.6924479","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924479","url":null,"abstract":"The current article deals with the problem of assessing the practical capacity of an airport network. This problem is approached using simulation techniques taking into account not only the different mandatory variables which are imposed by the current legislation but also other factors that affect the practical capacity of the airport such as weather conditions. The model will be used for assessing the potential capacity problems that will be faced by the future airport. The article put focus on one airport of the North Holland region which is a good example of a region that struggles for allocating the growing traffic in the coming years.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Audio detection (Audition): Android based sound detection application for hearing-impaired using AdaBoostM1 classifier with REPTree weaklearner 音频检测(Audition):基于Android的听障人士声音检测应用,使用AdaBoostM1分类器和REPTree弱学习器
2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE) Pub Date : 2014-02-01 DOI: 10.1109/APCASE.2014.6924487
Ayu Indah Shekar Melati Ayu, K. Karyono
{"title":"Audio detection (Audition): Android based sound detection application for hearing-impaired using AdaBoostM1 classifier with REPTree weaklearner","authors":"Ayu Indah Shekar Melati Ayu, K. Karyono","doi":"10.1109/APCASE.2014.6924487","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924487","url":null,"abstract":"AudiTion is an application that will help the hearing-impaired people to detect sound around them and to recognize the sound. The algorithms used in this application for Machine Learning are AdaBoostM1 functioning as a classifier and REPTree as weak learner, and it's built for Android operating system. Machine Learning is a study of computer algorithms which can improve its learning ability automatically through experience. AdaBoostM1 is one of the algorithms with Boosting method. Boosting uses all instances in each repetition, but keeping the load on any instance in the training set. REPTree is a fast decision tree learner which builds a decision/regression tree using information gain as the splitting criterion and prunes it using reduced-error pruning. Testing processes are done in four environment conditions to determine the sound prediction accuracy level. The four conditions are environments with low and high noise, far and near sound sources. AudiTion has two sound databases, the first database is indoor sounds and the second database is outdoor sounds with a total of 23 sounds. The results show that the average level of accuracy is relatively low at around 26.25% for the detection in the four conditions using both sound databases. Due to the low accuracy, we conducted trials by reducing indoor databases only for five sounds. This trial shows the accuracy of 40%. Since the accuracy results are still less than 50%, we conclude that AudiTion applications need to use another approach.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信