S. Mallissery, M. M. Manohara Pai, A. Smitha, R. Pai, J. Mouzna
{"title":"Improvizmg the public key infrastructure to build trust architecture for VANET by using short-time certificate management and Merkle Signature Scheme","authors":"S. Mallissery, M. M. Manohara Pai, A. Smitha, R. Pai, J. Mouzna","doi":"10.1109/APCASE.2014.6924489","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924489","url":null,"abstract":"Applications in Vehicular Adhoc NETwork (VANET) require high security for end to end communication especially for sensitive information. It is necessary to restrict the unauthorized users from accessing the VANET services using a trusted infrastructure. In addition, messages exchanged should have minimum authentication delay and communication overhead. In this paper, a novel architecture is proposed for trusted infrastructure using combination of short time certificate and Merkle Signature Scheme. In this architecture, secure VANET communication is achieved using psuedo ID generated by the vehicle and the issue of short certificate by the trusted infrastructure that grants the private public key pairs according to the priority of the messages exchanged. Therefore the message dissemination offers reduced overhead and meets the requirement of VANET communication.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital multimedia archiving based on optimization steganography system","authors":"Raniyah Wazirali, Z. Chaczko, Anup Kale","doi":"10.1109/APCASE.2014.6924476","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924476","url":null,"abstract":"As soon as digital artifacts have become a part and parcel of everyday life, the need for digital media archives with the capacity of preserving the given metadata has risen impressively. The process of converting the digital metadata to archives, however, is fraught with a number of difficulties, the key one concerning the methodology for embedding high payload capacity information into the digital multimedia and at the same time retains high quality of the image. The given paper will consider steganography as a possible solution to the aforementioned issue. Allowing for detecting the genetic algorithm for boosting the PSNR value with the information of high capacity will help solve the issue regarding the digital multimedia archiving. Many sizes of data are embeded inside the images and the PSNR (Peak signal-to-noise ratio) is also taken for each of the images verified.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceptance in the deployment of blended learning as a learning resource in information technology and computer science program, Brawijaya university","authors":"F. A. Bachtiar, Aditya Rachmadi, F. Pradana","doi":"10.1109/APCASE.2014.6924486","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924486","url":null,"abstract":"This study aims, first, to propose a model and to test an acceptance model to identify the students' intention to use e-learning system and to identify the use of e-learning used as a supplementary tool in a conventional learning context. A TAM model proposed includes System Functionality (SF), System Interactivity (SI), Usability (U), Self-Efficacy (SE), Internet and Computer Experience (ICE), Socio-Environment Factor (SEF), Perceived Ease of Use (PEU), Perceived Usefulness (PU), Use of Supplementary Learning (USL), Use for Distance Learning (UDL) as the factors influencing the use of the system. The Technology Acceptance Model (TAM) is developed based on hypotheses and related factors. The result showed TAM can be used to examine the acceptance of blended learning. In this study Perceived of Usefulness (PU) is the main factor of the construct followed by Perceived Ease of Use (PEU) and Use of Supplementary Learning (USL) to explain the causal relation in TAM model.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124176675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shalvi Srivastava, Sweta Anmulwar, A. Sapkal, Tarun Batra, A. Gupta, Vinodh Kumar
{"title":"Evaluation of traffic generators over a 40Gbps link","authors":"Shalvi Srivastava, Sweta Anmulwar, A. Sapkal, Tarun Batra, A. Gupta, Vinodh Kumar","doi":"10.1109/APCASE.2014.6924469","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924469","url":null,"abstract":"In this paper we have compared the performance of three traffic generators (DITG, packETH, Ostinato) over a 40Gbps link. In our laboratory experiment, two computers with Linux operating systems are connected through a 40Gbps link. The payload size was varied from 64 to 8950 bytes and TCP and UDP traffic on the link was measured. To achieve the maximum throughput jumbo frames were used. The results showed significant changes in performance of tools for TCP and UDP traffic respectively. For both TCP and UDP traffic only PackETH was able to achieve the highest throughput of 39.8Gbps. D-ITG running in a single threaded mode was not able to utilize the full bandwidth so its performance is evaluated in multi-threaded mode with 16 threads.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes","authors":"Amirmohammad Sadeghian, M. Zamani","doi":"10.1109/APCASE.2014.6924468","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924468","url":null,"abstract":"Among various types of computer threats, botnet is the most serious one against cyber security as they provide several illegal activities such as denial of service attacks, spamming, click fraud and other type of espionage activities. A botnet is a network of infected computers called bots which are under the control of one person known as Botmaster. Botmaster will have full control over the compromised machines from the command and control (C&C) channels, which allow Botmaster to update and add new features to the botnet. Distributed Denial of Service is one of deadliest attacks in history of network security which is take place by botnets. Until now many different solutions against this attack are proposed. One of these techniques is the Remote Triggered black hole filtering for stopping DDoS attacks by botnets. The main drawback of this technique is that the trigger is located at the victim premises and in case of an attack the network between trigger and routers will be saturated by attack traffic. Therefore the trigger cannot effectively communicate with the router to ask them to stop the traffic from the source IP. This paper proposes an improved framework to do the black hole filtering on the edge of internet service provider without need of the trigger (Self Triggered). The most tangible improvements in our framework are stopping DDoS attacks before entering into victim premises, ease of tracking and reporting the compromised machines for further cleanings.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cloud platform for distributed spectrum sensing","authors":"Zhenghua Lv, H. Meng, Tianyu Zhang","doi":"10.1109/APCASE.2014.6924462","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924462","url":null,"abstract":"This paper describes the architecture and the implementation of a spectrum sensing platform based on cloud computing. The system collects information from distributed sensors scattered around a specific area for further analysis. The system is designed in layers, including layers of sensor device, console terminal, cloud server management, application development and consumers from bottom to up. Data-directed method is taken to ensure the extendibility of the system. The TCP/IP is wrapped by AMQP for simple and reliable network connection. Finally, we introduce some practical applications running on the cloud platform.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SKOSYN: Simple Knowledge Organization System for synonym search on content management system","authors":"Novianti, Hargyo Tri, Nugroho I","doi":"10.1109/APCASE.2014.6924466","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924466","url":null,"abstract":"The development of Content Management System (CMS) technology undoubtedly eases website content organization. Creative writing is a common challenge in producing written content. One solution is to use synonyms, which conventionally can be found in a thesaurus. In this research, Simple Knowledge Organization System (SKOS) data model, which is suitable for organizing knowledge such as thesauri, is implemented as a plugin for searching synonyms in Bahasa Indonesia. This plugin will complement the default text editor on CMS to edit the written content in a convenient way. This plugin also provides a feature for getting definitions using the XML web service from Kateglo, so that users can understand exactly the meaning of synonyms they use. Based on experiments done in this research, SKOS data can be loaded into triplestore by ARC2 in shorter time than the regular MySQL database which uses integrity constraints. Moreover, the experiments have also shown that time stability for getting synonyms from triplestore using ARC2 can be more maintained than obtaining synonyms from XML document.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-based capacity analysis for a future airport","authors":"M. Mota, P. Scala, Geert Boosten","doi":"10.1109/APCASE.2014.6924479","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924479","url":null,"abstract":"The current article deals with the problem of assessing the practical capacity of an airport network. This problem is approached using simulation techniques taking into account not only the different mandatory variables which are imposed by the current legislation but also other factors that affect the practical capacity of the airport such as weather conditions. The model will be used for assessing the potential capacity problems that will be faced by the future airport. The article put focus on one airport of the North Holland region which is a good example of a region that struggles for allocating the growing traffic in the coming years.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio detection (Audition): Android based sound detection application for hearing-impaired using AdaBoostM1 classifier with REPTree weaklearner","authors":"Ayu Indah Shekar Melati Ayu, K. Karyono","doi":"10.1109/APCASE.2014.6924487","DOIUrl":"https://doi.org/10.1109/APCASE.2014.6924487","url":null,"abstract":"AudiTion is an application that will help the hearing-impaired people to detect sound around them and to recognize the sound. The algorithms used in this application for Machine Learning are AdaBoostM1 functioning as a classifier and REPTree as weak learner, and it's built for Android operating system. Machine Learning is a study of computer algorithms which can improve its learning ability automatically through experience. AdaBoostM1 is one of the algorithms with Boosting method. Boosting uses all instances in each repetition, but keeping the load on any instance in the training set. REPTree is a fast decision tree learner which builds a decision/regression tree using information gain as the splitting criterion and prunes it using reduced-error pruning. Testing processes are done in four environment conditions to determine the sound prediction accuracy level. The four conditions are environments with low and high noise, far and near sound sources. AudiTion has two sound databases, the first database is indoor sounds and the second database is outdoor sounds with a total of 23 sounds. The results show that the average level of accuracy is relatively low at around 26.25% for the detection in the four conditions using both sound databases. Due to the low accuracy, we conducted trials by reducing indoor databases only for five sounds. This trial shows the accuracy of 40%. Since the accuracy results are still less than 50%, we conclude that AudiTion applications need to use another approach.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}