2017 4th International Conference on Networking, Systems and Security (NSysS)最新文献

筛选
英文 中文
A performance analysis of backbone structures for static sink based Starfish routing in WSN WSN中基于静态sink的海星路由骨干结构性能分析
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-23 DOI: 10.1109/NSYSS2.2017.8267788
Md. Ahsan Habib, M. S. Hasan
{"title":"A performance analysis of backbone structures for static sink based Starfish routing in WSN","authors":"Md. Ahsan Habib, M. S. Hasan","doi":"10.1109/NSYSS2.2017.8267788","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267788","url":null,"abstract":"Time sensitive applications in Wireless Sensor Network (WSN) with a static sink are emerging rapidly. The main challenges of these applications are to achieve higher throughput with lower delay and less power consuming routing protocol development for realistic environment. To overcome the challenges, backbone based routing protocols are lucrative for guaranteed data delivery in WSN. The backbone of Starfish routing protocol with a ring and radial-canals employs more nodes to construct the backbone but suffers from congestion and interference within the network. It also leads to lower throughput and higher delay. In this paper, the basic Starfish routing is modified as Angular Starfish routing backbone structure and furthermore is improved to Parallel Starfish routing backbone structure. A realistic wireless signal propagation model has been used to implement the simulations. The results show that the Parallel Starfish routing protocol outperforms state-of-the-art works in terms of throughput, delay and energy consumption.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy efficient multiple sink placement in wireless sensor networks 无线传感器网络中高能效的多sink布局
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267787
Sanghita Bhattacharjee, K. Agarwal
{"title":"Energy efficient multiple sink placement in wireless sensor networks","authors":"Sanghita Bhattacharjee, K. Agarwal","doi":"10.1109/NSYSS2.2017.8267787","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267787","url":null,"abstract":"Minimizing energy consumption and maximizing network lifetime are two important challenges in battery operated Wireless Sensor Networks (WSNs). Sensor nodes sense the environment periodically and forward the collected data to a sink. In a single sink WSNs, nodes closer to the sink become overburdened for relaying excessive data. This may incur faster energy consumption by nodes and lead an energy hole around the sink. As a result, the network lifetime is shortened. Multiple sinks mitigate this problem, reduce energy consumption at nodes and prolong the network lifetime by distributing the traffic over multiple sinks. This paper focuses on multiple sink placement problem and proposes two local search technique based energy aware multiple sink placement strategies for WSNs. The lifetime oriented approach based sink placement takes into account the lifetime of nodes and places the sinks at suitable locations such that the average network lifetime is increased. While the energy oriented approach focuses on minimizing the average energy consumption of the network. We evaluate the performance of both the strategies via simulations and compare them with random sink placement strategy. Simulation results highlight that the lifetime oriented approach improves the lifetime significantly.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-time feedback-centric nurse calling system with archive monitoring using Raspberry Pi 实时反馈中心护士呼叫系统与档案监控使用树莓派
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267799
Mohammad Sakib Mahmud, M. Majumder, A. Tushar, Md. Mahtab Kamal, Akm Ashiquzzaman, Md. Rashedul Islam
{"title":"Real-time feedback-centric nurse calling system with archive monitoring using Raspberry Pi","authors":"Mohammad Sakib Mahmud, M. Majumder, A. Tushar, Md. Mahtab Kamal, Akm Ashiquzzaman, Md. Rashedul Islam","doi":"10.1109/NSYSS2.2017.8267799","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267799","url":null,"abstract":"The relationship between nurse and patient is vital as well as vulnerable on which a significant portion of well-being of patient depends. The recent growth of Internet of Things provides the opportunity to maintain this relationship in a more secure and efficient way. From this point of view, this paper presents a system of real-time nurse calling with focus centered on nurse feedback based on patient condition. The system also includes a robust archive monitoring system for review and trend analysis. In the proposed system, patients are able to call for assistance in time of emergency by pressing a designated button. After this, the device will send a real-time message containing information about the patients bed, room, and floor number to the appropriate nurse station. Nurse will respond as soon as the message is delivered, and optionally call for help by pressing designated buttons in the device. The proposed system reduces the delay in response of nurse. Additionally, the interactions are stored in Raspberry Pi database for future analysis to improve the quality of services. The proposed system uses low-cost hardware like ATMEGA328P microcontroller and ENC28J60 Ethernet controller, and Arduino Uno.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125985687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient UAV deployment strategy for reconnaissance 高效的无人机侦察部署策略
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267789
Ahamed Al Nahian, A. Islam
{"title":"Efficient UAV deployment strategy for reconnaissance","authors":"Ahamed Al Nahian, A. Islam","doi":"10.1109/NSYSS2.2017.8267789","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267789","url":null,"abstract":"A common application of UAVs is to search an area for certain targets. Often UAVs miss targets in spite of sensing the target region with its sensors. Possible reasons of missing targets and their remedy is suggested in the paper. Designing a UAV deployment strategy optimizing search time along with the dependability of the search is the focus of this work. A strategy, where different UAVs in a group search at different heights, is proposed to increase dependability of the search. The strategy is implemented in real battlefield simulation software and a comparison is made between the proposed strategy and an existing one in respect of time, dependability and fuel consumption. Result shows that proposed strategy offers highly dependable result in reasonable time outperforming the existing strategy.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Availability in P2P based online social networks 基于P2P的在线社交网络的可用性
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267785
Nashid Shahriar, S. R. Chowdhury, Reaz Ahmed, Mahfuza Sharmin, R. Boutaba, B. Mathieu
{"title":"Availability in P2P based online social networks","authors":"Nashid Shahriar, S. R. Chowdhury, Reaz Ahmed, Mahfuza Sharmin, R. Boutaba, B. Mathieu","doi":"10.1109/NSYSS2.2017.8267785","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267785","url":null,"abstract":"Despite their tremendous success, centrally controlled cloud based solutions for social media networking have inherent issues related to privacy and user control. Alternatively, a decentralized approach can be used, but ensuring content availability will be the major challenge. In this work, we propose a time-based user grouping and replication protocol that ensures content availability for decentralized sharing of online social media. The protocol exploits cyclic diurnal patterns in user uptime behaviors to ensure content persistence with minimal replication overhead. We also introduce the concept of β-availability that represents the probability that at least β members of a replication group will be online at any given time. We present a mathematical model for measuring β-availability as a function of peer-uptime duration and replication group size. Simulation results show that our protocol achieves high content persistence without incurring significant network and storage overheads.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards perceiving and resolving the impediments to reporting for the developing countries 认识和解决发展中国家报告的障碍
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267790
S. Dutta, A. Tushar, M. Mamun, A. Ishmam, Sourav Mondal, Tarik Reza Toha, A. Islam
{"title":"Towards perceiving and resolving the impediments to reporting for the developing countries","authors":"S. Dutta, A. Tushar, M. Mamun, A. Ishmam, Sourav Mondal, Tarik Reza Toha, A. Islam","doi":"10.1109/NSYSS2.2017.8267790","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267790","url":null,"abstract":"Reporting of problems is one of the best approaches for the national development of a country. A proper reporting system can yield previously unknown, but critical information for combating human errors and ensuring smooth flow of operation. A one-stop generic reporting platform can be a useful collaborative tool between common people and responsible authority in a developing country. Although there are web-based systems to facilitate reporting, the response rate and volume from common people are not satisfactory. In this paper, we strive to know what impediments people face on the way to submit reports on a social reporting website or similar systems in the developing countries as the people of those countries are not well-educated. The attention of this research work is chiefly in identifying study-related problems and resolving them. For this purpose, we have conducted some surveys and focused group discussions with questions focusing on educative aspects and general improvements of reporting system. Survey responses are categorized, analyzed and presented in an appropriate format. By observing the result patterns and making comparison with existing systems, the barriers to reporting in a generic reporting platform is identified and an effective solution is proposed to increase people's participation to reporting. Based on the proposed solution, a system is implemented and demonstrated. Our findings also present some human behavioral pattern or characteristics which are not only effective to design a more credible and lucrative reporting platform, but also gives some psychological insights about fundamental human behavior. The identified barriers to reporting and proposed solutions will act as forerunner to successful reporting of various kinds of problems of the developing countries.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach towards greening the digital display system 数字显示系统绿色化的探讨
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267794
Tarik Reza Toha, A. Ishmam, Md. Hasanul Islam, M. A. A. Maruf, S. S. Nandi, Amit Chakraborty, Salman Estyak, M. Alamin, A. Islam
{"title":"An approach towards greening the digital display system","authors":"Tarik Reza Toha, A. Ishmam, Md. Hasanul Islam, M. A. A. Maruf, S. S. Nandi, Amit Chakraborty, Salman Estyak, M. Alamin, A. Islam","doi":"10.1109/NSYSS2.2017.8267794","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267794","url":null,"abstract":"Signage display, which is used to convey message or information, has evolved from conventional to digital display. Conventional signage which may be hand written or printed papers are being wiped out by digital displays used by industries because of its attractive features of efficient involvement of consumers. However, extensive use of digital signage displays contributes a notable amount of power consumption (about 1000W for a 14inch × 48inch display) of a region. In this literature, we have devised a novel approach for reducing power consumption of digital signage as well as satisfying human visibility by exploiting duty cycle. Our proposed technique is capable of relinquishing a significant amount (about 14.54% in comparison with existing display system) of power consumption occurred by digital display by keeping an eye on expected human vision.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"30 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132692677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and efficient data transmission technique using quantum key distribution 一种安全高效的量子密钥传输技术
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267797
Md. Armanuzzaman, K. R. Alam, M. Hassan, Y. Morimoto
{"title":"A secure and efficient data transmission technique using quantum key distribution","authors":"Md. Armanuzzaman, K. R. Alam, M. Hassan, Y. Morimoto","doi":"10.1109/NSYSS2.2017.8267797","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267797","url":null,"abstract":"This paper proposes a new data transmission technique that uses Quantum Key Distribution (QKD) method, One Time Pad (OTP) encryption technique and Huffman encoding compression algorithm to transmit the data more securely and efficiently. While data is transmitted, requirements like secrecy, less overhead through compression etc are crucial issues. QKD is one of the most promising methods which provide unconditional security. It relies upon the immutable laws of quantum physics rather than computational complexity as the basis of its secrecy. To establish the trust between the sender and the receiver, this paper considers a trusted center that distributes and verifies the key. Also it uses Huffman encoding-a lossless compression algorithm to compress the transmitted data over the classical channel that reduces the data transmission overhead. Moreover for data encryption, it applies OTP technique with the key randomly generated by the QKD method that ensures the secrecy of the transmitted data over the classical channel. Thus the overhead of both quantum and classical channels are reduced. Finally the time requirements for encoding-decoding and encryption-decryption for the proposed technique are evaluated.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114071854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EGAGP: An enhanced genetic algorithm for producing efficient graph partitions EGAGP:用于生成高效图分区的增强型遗传算法
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267792
Fahim Shahriar, Aakib Bin Nesar, Naweed Mohammad Mahbub, Swakkhar Shatabda
{"title":"EGAGP: An enhanced genetic algorithm for producing efficient graph partitions","authors":"Fahim Shahriar, Aakib Bin Nesar, Naweed Mohammad Mahbub, Swakkhar Shatabda","doi":"10.1109/NSYSS2.2017.8267792","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267792","url":null,"abstract":"Graph partitioning is a well-known problem which has varied applications such as scientific computing, distributed computing, social network analysis, task scheduling in multi-processor systems, data mining, cloud computing and many other domains. In this paper, we propose EGAGP, an enhanced genetic algorithm for producing efficient graph partitions. Keeping real world applications in mind, our algorithm takes into account the capacity limitations of individual partitions to ensure balanced partitioning. This approach enables a large variety of applications for this algorithm, the most significant of which is in mobile cloud computing. Our algorithm can be used in efficient deployment of software components in cloud architecture as it is efficient and fast and it also ensures feasibility by only allowing partition sizes up to designated limits. We have achieved significant improvement over the previous state-of-the-art methods in terms of runtime and objective of graph partitioning cost. Our method is based on dividing the total execution time among primary and secondary populations and it resulted in an efficient algorithm. Several standard benchmark graph instances were used in our work to compare the performance of the algorithm. Our proposed method EGAGP is able to produce feasible and good quality results and outperforms the state-of-the-art methods in terms of time and quality of the solutions generated.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated cost reduction while using multiple SIMs in a single mobile device 在单个移动设备中使用多个sim卡时自动降低成本
2017 4th International Conference on Networking, Systems and Security (NSysS) Pub Date : 2017-12-01 DOI: 10.1109/NSYSS2.2017.8267800
Partha Chakraborty, Salsabil Arabi, A. Siddiqua, Tahrina Tasnim, Md. Sazzad Hossain, Ishtiaque Ahmed, S. Dutta, A. Ishmam, Tarik Reza Toha, A. Islam
{"title":"Automated cost reduction while using multiple SIMs in a single mobile device","authors":"Partha Chakraborty, Salsabil Arabi, A. Siddiqua, Tahrina Tasnim, Md. Sazzad Hossain, Ishtiaque Ahmed, S. Dutta, A. Ishmam, Tarik Reza Toha, A. Islam","doi":"10.1109/NSYSS2.2017.8267800","DOIUrl":"https://doi.org/10.1109/NSYSS2.2017.8267800","url":null,"abstract":"According to statistics, the number of active Android device user is approximately two billion and 25% of Android devices are dual SIM(Subscriber Identification Module) supportive throughout the world. For this huge number of dual SIM users, it is quite difficult to remember which SIM package offers the cheapest rate for calling. In this study, we propose an automatic cost reduction application which assists in reducing cost of outgoing call by selecting the best available SIM. This app selects the best cost-effective SIM and automatically transfers call to the particular SIM. If the selected SIM does not have enough money for calling, the call is automatically transferred to the other SIM. Our app is an approach towards saving the additional amount of money that is being spent by the dual SIM users. User evaluation of partial implementation of our system confirms around 45 percent saving of money while using this app.","PeriodicalId":144799,"journal":{"name":"2017 4th International Conference on Networking, Systems and Security (NSysS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信