{"title":"Toward hardware support for a flexible sketch-based network traffic monitoring system","authors":"Theophilus Wellem, Yu-Kuen Lai, Chao-Yuan Huang, Wen-Yaw Chung","doi":"10.1109/TENCONSPRING.2016.7519369","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519369","url":null,"abstract":"Sketch-based data streaming algorithms are capable of summarizing high-speed network traffic in real-time without packet sampling. Therefore, they are used in many networking applications to make accurate estimates of traffic flow statistics. However, fixed hardware implementation of the sketch counters limits the flexibility of re-using the same data structure for various monitoring applications. In this paper, we propose a generic scheme for collecting flow-level data using high-speed memories on the NetFPGA-10G platform. The purpose is to enable sketch-based algorithms making statistics measurements in various network monitoring applications in a flexible manner. Experiments using real Internet traces are conducted for entropy estimation, superspreader detection, and change detection applications. The results show that the proposed scheme can support flexible selection of keys and counters for the monitoring applications achieving high measurement accuracy.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Paul C. Cempron, C. Salinas, Jonathan Benedict Gonzales, R. Uy, Y. Hayakawa
{"title":"A static transliteration approach for assembly language translation","authors":"Jonathan Paul C. Cempron, C. Salinas, Jonathan Benedict Gonzales, R. Uy, Y. Hayakawa","doi":"10.1109/TENCONSPRING.2016.7519428","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519428","url":null,"abstract":"Migration of software between systems requires the migrated software to be compatible with the new platform. The original machine code in the source machine cannot always be directly ported. The program's source code may not be available for compilation to the new platform or the machine code may not be compatible to the new platform due to architectural differences. An alternative solution to porting software can be achieved through assembly language translation. This study presents the essential considerations in assembly language translation such as handling of the registers, data segment, and code segment. Possible approaches towards are also discussed.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Absolute Value Principal Components Analysis (AVPCA) and Parameter Estimation (PE) to bearing fault detection using rotor speed signal monitoring — A comparative study","authors":"M. Hamadache, Dongik Lee","doi":"10.1109/TENCONSPRING.2016.7519434","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519434","url":null,"abstract":"In this paper, a comparative experimental study between the Parameter Estimation (PE) technique and the Absolute Value Principal Component Analysis (AVPCA) algorithm to bearing fault detection using rotor speed signal monitoring is represented. The PE technique relies on the residuals between the input/output (Voltage/Speed) signals of the real system and of the estimated model. AVPCA, in other hand base on the Sum Square Error (SSE) distance between the training-databases and the tested-databases from just only the output signal (Speed) and its minimum. The experimental results reveal that the AVPCA algorithm is more effective in detecting bearing faults than the PE technique using rotor speed signal monitoring.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mobile application of American sign language translation via image processing algorithms","authors":"Cheok Ming Jin, Z. Omar, M. Jaward","doi":"10.1109/TENCONSPRING.2016.7519386","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519386","url":null,"abstract":"Due to the relative lack of pervasive sign language usage within our society, deaf and other verbally-challenged people tend to face difficulty in communicating on a daily basis. Our study thus aims to provide research into a sign language translator applied on the smartphone platform, due to its portability and ease of use. In this paper, a novel framework comprising established image processing techniques is proposed to recognise images of several sign language gestures. More specifically, we initially implement Canny edge detection and seeded region growing to segment the hand gesture from its background. Feature points are then extracted with Speeded Up Robust Features (SURF) algorithm, whose features are derived through Bag of Features (BoF). Support Vector Machine (SVM) is subsequently applied to classify our gesture image dataset; where the trained dataset is used to recognize future sign language gesture inputs. The proposed framework has been successfully implemented on smartphone platforms, and experimental results show that it is able to recognize and translate 16 different American Sign Language gestures with an overall accuracy of 97.13%.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Datta, C. Bonnet, Rui Pedro Ferreira Da Costa, J. Harri
{"title":"DataTweet: An architecture enabling data-centric IoT services","authors":"S. K. Datta, C. Bonnet, Rui Pedro Ferreira Da Costa, J. Harri","doi":"10.1109/TENCONSPRING.2016.7519430","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519430","url":null,"abstract":"This work proposes a data driven IoT architecture to mitigate the fragmentation and data silos in consumer IoT ecosystem. IoT data cycle is explored to understand data transformation from generation to processing, storage and dissemination. We have developed a framework called DataTweet focusing on data cycle based IoT services. The DataTweet architecture is presented along with its subsystems, services, requirements and common service functions necessary to implement the services. The main novelty of DataTweet is in creating a ubiquitous consumer data service for transmitting short messages to any computing platforms to generate actionable intelligence that is disseminated to consumers.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An observation attacks resistant PIN-entry scheme using localized haptic feedback","authors":"Hao-Jun Xu, W. Ku, Y. Dan","doi":"10.1109/TENCONSPRING.2016.7519378","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519378","url":null,"abstract":"Common PIN-entry schemes are vulnerable to observation attacks. To enhance the resistance to observation attacks, some observation attacks resistant PIN-entry schemes for mobile devices based on audios and/or haptics have been proposed. However, none of existing observation attacks resistant PIN-entry schemes can achieve both good security and high usability. Herein, we propose a new observation attacks resistant PIN-entry scheme, Loc-HapPIN, for touchscreen devices providing localized haptic feedback. By using the technology of localized haptic feedback, the usability and the resistance to observation attacks are improved. Furthermore, the user can choose the efficiency-security setting suitable for him.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High speed 3D object retrieval using skewness value","authors":"Vicky Sintunata, T. Aoki","doi":"10.1109/TENCONSPRING.2016.7519435","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519435","url":null,"abstract":"A novel high-speed 3D object retrieval system is presented here. Since creating a 3D model as an input to the retrieval system is not trivial, a 2D image (photos, sketches, etc.) of the object is usually used instead. We present a new high-speed retrieval method by using skewness information. The images in the database will be represented by a skewness function. By using the proposed method, comparison between the query and all images in the database can be avoided. From the experiment, the proposed method performs 60 times faster than using only SURF method in retrieval system.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130728905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kayvan Atefi, S. Yahya, Amirali Rezaei, Siti Hazyanti Binti Mohd Hashim
{"title":"Anomaly detection based on profile signature in network using machine learning technique","authors":"Kayvan Atefi, S. Yahya, Amirali Rezaei, Siti Hazyanti Binti Mohd Hashim","doi":"10.1109/TENCONSPRING.2016.7519380","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519380","url":null,"abstract":"Within the last couple of years, a lot of IDSs have already been developed, both as research prototypes and as commercial systems. The aim of Intrusion Detection would be to positively identify all true attacks and adversely identify all non-attacks. Through the study of the procedure and signature of intrusion behaviors, IDS can produce a real-time reaction to intrusion occasions and invasion processes. The objective of this study is to work with appropriate algorithms for intrusion detection and hybrid them to find acceptable results and investigate on new hybrid techniques of intrusion detecting system with high accuracy. Moreover, it also aims to minimize a false positive and false negative alarms in networks.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web page access prediction using hierarchical clustering based on modified levenshtein distance and higher order Markov model","authors":"B T Harish Kumar, L. Vibha, K R Venugopal","doi":"10.1109/TENCONSPRING.2016.7519368","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519368","url":null,"abstract":"Web Page access prediction is a challenging task in the current scenario, which draws the attention of many researchers. Predictions need to keep track of history data to analyze the usage behavior of the users. Web Usage behavior of a user can be analyzed using the web log file of a specific website. User behavior can be analyzed by observing the navigation patterns. This approach requires user session identification, clustering the sessions into similar clusters and developing a model for prediction using the current and earlier accesses. Most of the previous works in this field have used K-Means clustering technique with Euclidean distance for computation. The drawbacks of K-Means is that deciding on the number of clusters, choosing the initial random center are difficult and the order of page visits are not considered. The proposed research work uses hierarchical clustering technique with modified Levenshtein distance, Page Rank using access time length, frequency and higher order Markov model for prediction. Experimental results prove that the proposed approach for prediction gives better accuracy over the existing techniques.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernie S. Fabito, Francis F. Balahadia, Jade Devin N. Cabatlao
{"title":"AppLERT: A mobile application for incident and disaster notification for Metro Manila","authors":"Bernie S. Fabito, Francis F. Balahadia, Jade Devin N. Cabatlao","doi":"10.1109/TENCONSPRING.2016.7519420","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519420","url":null,"abstract":"The Philippines is battered by different natural and man-made disasters. It cannot be disputed that despite its magnificent and natural beauty, the country suffers from these devastations. Although the government has set in mitigation and prevention plans, little is put into consideration when the disaster happens. The paper focuses on the application of Information Communications Technology (ICT) in a form of an android based mobile application that gives victims the capability to seek help when a disaster or incident strikes. In addition, people can notify others of the danger ahead through AppLERT and Facebook so that they can avoid the area where the danger is through crowdsourcing. It seeks to help expedite the response time of the responding unit using the user's mobile phone built-in GPS.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}