{"title":"A behavior-based mobile malware detection model in software-defined networking","authors":"Tri-Hai Nguyen, Myungsik Yoo","doi":"10.1109/ICISCT.2017.8188590","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188590","url":null,"abstract":"In recent years, the number of mobile devices is increasing rapidly. Meanwhile, the amount of malicious software is rising almost exponentially, alongside the diversity and complexity of malware. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop a malware detection model in more efficient and flexible manner. In this paper, we propose a network behavior-based malware detection system for mobile devices in SDN which is composed of three algorithms including IP Blacklist, Connection Success Ratio, Connection Rate algorithms. The experiment demonstrates that the proposed system is feasible and effective.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The realization of high-speed multivalued multifunctional elements of computer technology and control systems","authors":"F. K. Tursunbayev, A. Kuvnakov, N. Mahamatov","doi":"10.1109/ICISCT.2017.8188578","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188578","url":null,"abstract":"This paper considers the concept of building a high speed multivalued elements and structures, where the characteristics are defined by the basis vectors. Has been showed that any real device can be interpreted as a multi-valued electronic circuit, and can be explained by differential equations system in the most comprehensive view and allows exploring all aspects of the behavior of the device or the system. The application of the principle of such methodology allowed creating a single family multivalued elements, along with having a high reliability of operation and properties of hybrid, versatility and wide invariance to underpin the construction of highperformance multi-valued information and computing structures.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy efficient new protocol for wireless sensor networks with multiple mobile sinks","authors":"Saeed Ebadi, Kambiz Koosheshi","doi":"10.1109/ICISCT.2017.8188592","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188592","url":null,"abstract":"Energy hole is regarded as one of the challenging issues in wireless sensor networks (WSNs). According to this problem, nodes that are closer to the sink lose their energy earlier than other nodes. Consequently, it leads to the early breakdown of the network. One approach for preventing this problem is to use mobile sink rather than one or more sinks with fixed positions. Also, using fuzzy logic and unequal clustering, some other studies have somehow managed to handle this problem. In this paper, we used an unequal network clustering via fuzzy logic using three parameters: distance from the closest RN, sensors' density, remaining energy and also mobile sink, we developed and proposed a method for the smart selection of mobile sink route. In this way, we tried to sort out energy hole problem. Results of simulating the proposed method indicated that it could significantly enhance sensors' lifetime and solve the energy hole problem.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system architecture for faceted querying","authors":"A. Agostini, Shahabuddin Muhammad","doi":"10.1109/ICISCT.2017.8188568","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188568","url":null,"abstract":"This paper presents a system architecture that designs a querying refinement method. The method employs the general principles of facet analysis in a particular paradigm, as well as the notion of ‘focus’, which is a sort of context for a user query. The method provides the user with contextual information about the query, which is computed by using the user documents provided that the documents are organized according to a polyhierarchical classification. The method is situated within the formal framework of the smallest propositionally closed description logic ALC, thereby betting that ALC provides an efficient SAT solver that can be used to design and implement the main two components of the method.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended model of access control for the library information systems","authors":"S. Normatov, M. Rakhmatullaev","doi":"10.1109/ICISCT.2017.8188584","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188584","url":null,"abstract":"In this article were analyzed existing models of access control in information systems, and was explored an extended model of building access control for an automated information and library system. As the operating factor on the proposed model, operators and their functions were chosen. In addition, the generalized structure and algorithm of the proposed model is given.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy harvesters wireless charging technology","authors":"Sh. Pulatov, U. T. Aliev, J. Isroilov","doi":"10.1109/ICISCT.2017.8188566","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188566","url":null,"abstract":"The article deals with the technology of wireless charging using alternative energy sources based on electromagnetic induction.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic properties of multivalued multifunctional elements of information technology","authors":"F. K. Tursunbayev, N. Mahamatov, A. Kuvnakov","doi":"10.1109/ICISCT.2017.8188582","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188582","url":null,"abstract":"This article discusses the dynamic characteristics of static multi-valued elements and structures that characterize the quality of operation. Obtained an equation of the dynamics of multi-valued closed systems, determining the dynamic properties of static multivalued memory element in the vicinity of the equilibrium states of a closed system and allows clarifying the issues of system stability, oscillation process, manageability and performance. The result shows that the number of linear equations for the dynamics of multi-valued static memory cells equal to the number of values of slope steepness.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case study: Matched molecular pairs approach in QSAR modelling","authors":"F. Adilova, Alisher Ikramov","doi":"10.1109/ICISCT.2017.8188583","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188583","url":null,"abstract":"Modern drug discovery organizations generate large volumes of SAR data. A promising methodology that can be used to mine this chemical data to identify novel structure-activity relationships is the matched molecular pair (MMP) methodology. However, before the full potential of the MMP methodology can be utilized, a MMP identification method that is capable of identifying all MMPs in large chemical data sets on modest computational hardware is required.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130526665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware structure using Local Dynamic Map within its environment","authors":"Khajiev Nizomjon, Ryumduck Oh","doi":"10.1109/ICISCT.2017.8188564","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188564","url":null,"abstract":"Nowadays, vehicles have become a very significant role in transport system which a significant issue in various cities around the world, especially in developing countries resulting in turn traffic congestion, massive delays, increased fuel wastage. There are many alternative systems, such as parking places, building bridges. However at the present time, Intelligent Transport System is becoming more debatable topic among the experts. Creating cooperative safety driving systems can solve the issues which are mentioned above. ITS using V2I (vehicle-to-infrastructure) and V2V (vehicle-to-vehicle) communications. Local Dynamic Map (LDM) is essential technology to increase availability of cooperative ITS with dynamic, static and temporary information in geographical context. In this work, to provide to future cooperative traffic services and applications with traffic collection of data data fusion middleware and data processing belongs on public infrastructure and sensor nodes. There are various components assist to supporting Middleware features which are reusable and reconfigurable data processing components, interfaces to the system and dynamic component, and modular component based architecture.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods and algorithms of determination of complexity of test questions for formation a database system of the adaptive test-control of knowledge","authors":"Ch. M. Khidirova","doi":"10.1109/ICISCT.2017.8188572","DOIUrl":"https://doi.org/10.1109/ICISCT.2017.8188572","url":null,"abstract":"In given paper offered methods and algorithms of determination of complexity of test questions for formation a database system of the adaptive test control for objective estimation of knowledge of students (pupils) in the course of training learning systems.","PeriodicalId":173523,"journal":{"name":"2017 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127410775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}