2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)最新文献

筛选
英文 中文
Design, development and testing an academic repository 设计、开发和测试一个学术知识库
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-06-08 DOI: 10.1109/LISAT.2018.8378017
Kevin M. Handeli, S. Robila
{"title":"Design, development and testing an academic repository","authors":"Kevin M. Handeli, S. Robila","doi":"10.1109/LISAT.2018.8378017","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378017","url":null,"abstract":"Technological advances, established best web development practices, and modern design of the 21st century have provided students, professors, researchers, etc., quasi-effortless access to academic documents encompassed within cleaner user interface and a higher level of usability. Access to and rigorous management of research publication and products is also mandated by funding agencies. Given these characteristics, we have developed an academic repository to maintain the student projects in a typical academic department. A repository of this nature is comprised of two major components: the database and the user interface. The key focus is to provide secure access to research materials (e.g. Master's projects and the like), similar to that of a community or university library's online catalogs, while sustaining a keen eye for contemporary front-end design. In addition to providing access to documentation, this repository uses collected data to present various citation styles, assisting users with easy composition of reference pages. Through a familiar search engine paradigm, information on projects, as well as the projects themselves, are discovered and queried using keywords and will be as if performing a Google search. The repository, while focused on single academic unit, can be expended as a campus wide tool, and provides an in house, easily expandable solution to off-the shelf repository solutions.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DOA-based localization algorithms under NLOS conditions NLOS条件下基于方位的定位算法
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-06-08 DOI: 10.1109/LISAT.2018.8378027
Jun Li, I. Lu, Jonathan S. Lu
{"title":"DOA-based localization algorithms under NLOS conditions","authors":"Jun Li, I. Lu, Jonathan S. Lu","doi":"10.1109/LISAT.2018.8378027","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378027","url":null,"abstract":"Localization schemes based on direction of arrival (DOA) in none-line-of-sight (NLOS) environments are developed. The proposed kernel-based machine learning method is innovative and can provide accurate position estimation under none-line-of sight (NLOS) conditions. The proposed kernel-based method is compared with the Weighted K-nearest neighborhood (WKNN) fingerprinting method using simulated DOA data in practical rural environment. It shows that the kernel-based method gives more accurate localization results.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123488794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Precoding based analog channel state information feedback scheme 基于预编码的模拟信道状态信息反馈方案
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-06-08 DOI: 10.1109/LISAT.2018.8378029
I. Lu, Juan Fang, H. Lou
{"title":"Precoding based analog channel state information feedback scheme","authors":"I. Lu, Juan Fang, H. Lou","doi":"10.1109/LISAT.2018.8378029","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378029","url":null,"abstract":"By exploiting the multiple-input-multiple-output (MIMO) channel estimation and precoding, a novel analog information transmission approach is employed for the user stations (STAs) to feedback channel state information (CSI) to the access point (AP) in downlink multi-user MIMO (DL MU-MIMO) systems. Feedback frame designs and simulation results based on IEEE 802.11ac system are presented. Comparing with the existing explicit compressed feedback approach, the proposed analog CSI feedback approach achieves the same bit error rate but requires a much smaller overhead for DL MU MIMO systems.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-node partial-mesh network communication via AT commands 通过AT命令进行多节点部分网状网络通信
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378013
Abdulmajeed Alyazidi, Mohamed Ben Haj Frej, Navarun Gupta
{"title":"Multi-node partial-mesh network communication via AT commands","authors":"Abdulmajeed Alyazidi, Mohamed Ben Haj Frej, Navarun Gupta","doi":"10.1109/LISAT.2018.8378013","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378013","url":null,"abstract":"AT commands tool Kit (ATK), used in mobile phones in the global system for mobile communication (GSM) to provide value-added services for the user and the operator. Today, this standard is in practice on many AT command cards. In this paper, we have used the concept of the AT commands to control various devices and send text, messages without creating a session between the two devices. This is a novel method to determine new communication protocols for simple messaging service like sending alerts and target command messages. Target command messages could be like turning on the Air-conditioning or the water heater. It could be used in developing nations were the data networks have yet to be established and thus we are achieving the seven layers communication model functions with the basic proposed three layers. This paper also describes, in brief, the background of smart card, AT commands card and AT commands tool Kit communication. By monitoring various metrics in the WSN, we can also show that the AT command Protocol over a mesh network topology is better in terms of network life-time.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of ping of death DoS and DDoS attacks ping死亡DoS和DDoS攻击分析
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378010
Fekadu Yihunie, Eman Abdelfattah, A. Odeh
{"title":"Analysis of ping of death DoS and DDoS attacks","authors":"Fekadu Yihunie, Eman Abdelfattah, A. Odeh","doi":"10.1109/LISAT.2018.8378010","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378010","url":null,"abstract":"Effects of ping of death attack from standalone and multiple attacking machines are compared with healthy network configuration by applying the attack to the Database and File Transfer Protocol (FTP) server. Riverbed Modeler Academic Edition 17.5 is used to design and analyze the performance of the network. A comparison of three scenarios is conducted. The first scenario is modeled with healthy and functional network topology. The second and third scenarios configured to attack the server from the standalone machine and multiple machines to simulate Denial of Service (DoS) attack and Distributed Denial of Service Attack (DDoS) respectively. The case studies are conducted based on the average response time, traffic received, traffic sent, upload and download response times. The DDoS attacks of the simulated network show dramatic declination of the performance and increase of the response time of the server.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Non-electromagnetic monitoring remote mental events 非电磁监测远程心理活动
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378021
M. Krinker, A. Trofimov
{"title":"Non-electromagnetic monitoring remote mental events","authors":"M. Krinker, A. Trofimov","doi":"10.1109/LISAT.2018.8378021","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378021","url":null,"abstract":"The paper deals with the results of recording the localized spinning field, (a Field Gyroscope), and structural changes in water, initiated by the remote mental activity, supported by Kozyrev Mirrors, said activity linked to the remote detectors with the coupling agent (the coupling information-based linkage agent), containing the attributes accompanying the remote mental activity. The recorded phenomena are explained by the quantum property of the information and the Field Gyroscope, both following the laws of the quantum world, including the nonlocality and the quantum entanglement.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123405933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of cryptographic algorithms for IoT devices 物联网设备的加密算法研究
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378034
S. Surendran, Amira Nassef, B. Beheshti
{"title":"A survey of cryptographic algorithms for IoT devices","authors":"S. Surendran, Amira Nassef, B. Beheshti","doi":"10.1109/LISAT.2018.8378034","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378034","url":null,"abstract":"The future of Internet is “Internet of Things” where trillions of physical objects, most of them with low or extremely low resources, communicate with each other without human intervention. Light weight cryptography includes cryptographic algorithms specifically meant for extremely constrained resources. They can be applied not only for encryption but also for hashing and authentication under environments that are highly constrained. □ In this paper, we first discuss the need of light weight cryptography and their design differences with normal block ciphers. An overview of some of the light weight cryptographic algorithms is discussed after that. Also, we look into different types of attacks that has been studied on some of these ciphers. Finally, we compare the performance of some of these ciphers on Windows and Embedded platform.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131167579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A study on penetration testing process and tools 渗透测试过程与工具的研究
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378035
Hessa Mohammed Zaher Al Shebli, B. Beheshti
{"title":"A study on penetration testing process and tools","authors":"Hessa Mohammed Zaher Al Shebli, B. Beheshti","doi":"10.1109/LISAT.2018.8378035","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378035","url":null,"abstract":"Information is more vulnerable than ever; and every technological advance raises new security threat that requires new security solutions. Penetration testing is conducted to evaluate the security of an IT infrastructure by safely exposing its vulnerabilities. It also helps in assessing the efficiency of the defense mechanisms tools and policy in place. The Penetration testing is conducted regularly to identify risks and manage them to achieve higher security standards. In this paper we discuss the importance of penetration testing, factors and components considered while conducting a penetration test, we present a survey of tools and procedures followed, role of penetration test while implementing in the IT governance in an organisation and finally the professional ethics to be possessed by the team involved in penetration test.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116323861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Analysis of routing protocols in an emergency communications center 应急通信中心路由协议分析
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378008
John A. Bucherati, Eman Abdelfattah
{"title":"Analysis of routing protocols in an emergency communications center","authors":"John A. Bucherati, Eman Abdelfattah","doi":"10.1109/LISAT.2018.8378008","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378008","url":null,"abstract":"In every network, routing protocols are used for determining the best paths to route packets to and from various hosts. This paper presents a logical network created for a proposed joint Emergency Communications Center (ECC) between two municipalities. The consolidation and centralization of the public safety network's core services requires an evaluation of which routing protocol provides the best performance and throughput in a mission critical environment. Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP), and Enhanced Interior Gateway Routing Protocol (EGIRP) are the routing protocols for which convergence, throughput, and queuing delay are measured. The network is simulated in Riverbed Modeler Academic Edition 17.5. An analysis of the results reveals which protocol should be implemented.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of American English corner vowels produced by Mandarin, Hindi, and American accented speakers and a baseline accent recognition system 分析普通话、印地语和美国口音的人所产生的美国英语角元音,并建立一个基本的口音识别系统
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) Pub Date : 2018-05-04 DOI: 10.1109/LISAT.2018.8378031
A. Patel, B. Barkana
{"title":"Analysis of American English corner vowels produced by Mandarin, Hindi, and American accented speakers and a baseline accent recognition system","authors":"A. Patel, B. Barkana","doi":"10.1109/LISAT.2018.8378031","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378031","url":null,"abstract":"Individuals' speaking styles such as their accent present challenges for designing speaker independent systems and affect the performance of the systems. Accent recognition systems can be used to improve voice activated systems and Automatic Speech Recognition (ASR) systems. In this paper, we focus on analyzing American English corner vowels produced by Mandarin, Hindi and American accented speakers by using Mel-frequency cepstral coefficients (MFCCs), Linear Predictive coding (LPC), and the first two F1-F2 formant frequencies. A baseline system is designed and tested. The vowel spaces of Mandarin and Hindi accented male speakers of American English are found to be smaller compared to the female L2 speakers' vowel spaces. A significant difference among the L1 and L2 speaker groups is observed for the back corner vowel /a/. In the baseline system, MFCCs feature set achieved higher classification accuracies than the LPCs set.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信