{"title":"Performance Analysis of POX and Ryu with Different SDN Topologies","authors":"Jehad Ali, Seungwoon Lee, B. Roh","doi":"10.1145/3209914.3209931","DOIUrl":"https://doi.org/10.1145/3209914.3209931","url":null,"abstract":"This paper deals with the performance comparison of two python-based Software Defined Network (SDN) controllers i.e. POX and Ryu under different network topologies such as Single, Linear, Tree, Dumbbell, Data Center Networks (DCN) and Software-Defined naval networks which use satellite communication systems (SATCOM) i.e. SDN-SAT [1]. Experimental results, validated through Mininet has clearly indicated that Ryu has superior performance i.e. A TCP throughput increase of 25.56%, 282.54%, 44.85%, 19.88%, 45.45% and latency decrease of 93.48%, 99.96%, 99.90%, 97.08%, 99.33% in single, linear, tree, dumbbell and DCN topologies respectively. Similarly, in SDN-SAT topology Ryu has 0.21% increase in TCP throughput and 34.62% decrease in latency as compared to POX controller.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124886454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Feature Vector for Optical Character Recognition","authors":"Ariyan Zarei, Arman Yousefzadeh Shooshtari","doi":"10.1145/3209914.3209942","DOIUrl":"https://doi.org/10.1145/3209914.3209942","url":null,"abstract":"The extraction of the written text in an image has always been an important application of computer vision since it was introduced. It is widely used in automatic number plate recognition, handwriting recognition, extracting data from scanned documents such as passports, ID cards, banking forms, etc. There exist a wide variety of approaches to the general problem of optical character recognition such as Template Matching, Structural Classification, Artificial Neural Networks, etc. In this paper we introduced a new feature vector for optical character recognition and we tested its accuracy by using a Nearest Neighbor classifier. The new feature vector is a sequence generated by putting together the orientations of each pixel to a base point. The classifier then, is simply Longest Common Subsequence algorithm. In other words, a new image contains a character if and only if the corresponding sequence of the image has the longest common subsequence with the feature vector or sequence of that character among all the characters available. The experiments provided us with satisfying results which can be definitely better under better classifiers such as RNN or SVM.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123028931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross-Layer Optimization Scheme for Energy-Saving MAC Protocol Based on Wireless Ad-Hoc Network","authors":"J. Wang, Yushu Zhang, Jian Wang","doi":"10.1145/3209914.3226164","DOIUrl":"https://doi.org/10.1145/3209914.3226164","url":null,"abstract":"In order to save energy and prolong the network lifetime for wireless ad-hoc network, this paper focuses on a cross-layer optimization design for energy-saving MAC protocol. As a consequence, Traffic Adaptive Energy-saving MAC protocol (TAE-MAC), as a new MAC protocol, is proposed. To the end for energy conservation, This protocol using multi-technique methods, such as multiple users low power detection (MUD-LPD), orthogonal frequency division multiplexing and code division multiple access (OFDM-CDMA), reduces the possibility of collision, bit error rate(BER), packet loss, excessive idle listening to channel and improves the success probability of data transmission. Eventually the simulation results show that the propose TAE-MAC outperforms CSMA/CA or TDMA in saving energy and energy efficiency for wireless ad-hoc network.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Algorithm for Improving the Accuracy of Data Acquisition System","authors":"Shujing Su, Nannan Lv, W. Han","doi":"10.1145/3209914.3226152","DOIUrl":"https://doi.org/10.1145/3209914.3226152","url":null,"abstract":"In order to improve the measurement accuracy of various acquisition parameters in harsh environment, put forward of a new calibration algorithm. This design takes the AD7606 chip as the core, the hardware is designed to configure the filter as a 4-order Butterworth filter, and using high precision external reference voltage. In view of the complex data structure and large amount of data, using LabWindows and ActiveX technology to calculate the average and error of the data. The performance tests show that when the input range of the acquisition system designed using the above scheme is 0~5V and sampling rate is 50kbps, anti-aliasing filters work properly and perform well, the calibration algorithm reduces the data error and sampling precision is better than 1‰.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"33 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Separation of Fatigue Content in sEMG Signals Using High Definition Electrodes","authors":"M. Al-Mulla, F. Sepulveda","doi":"10.1145/3209914.3209947","DOIUrl":"https://doi.org/10.1145/3209914.3209947","url":null,"abstract":"SEMG electrodes are applied in numerous studies on muscle fatigue, utilised to detect the fatigue in various muscle groups analysed by a range of feature extraction methods. Newer research are applying multi-channel electrodes with the aim of increasing the quality of the signal emanating from the studied muscle. This research is comparing the use of 4 and 6 multi-channel electrodes to determine the separation between fatigue and non-fatigue segments of the recorded signals from the biceps brachii. Subjects performed isometric biceps brachii arm curl exercises until fatiguing. The signals were analysed using power spectrum density, and the Davies-Bouldin index calculated the separation between the classes. The results show separation was successful for sEMG signals using both 4 and 6 channel electrodes; however, better separation was achieved for signals with 4-channel electrodes.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127618291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Miniaturized Circularly Polarized Horn Antenna with a Single-Arm Spiral Structure for X-band","authors":"Xiao-kun Chen, Jiaao Yu, Shirui Peng","doi":"10.1145/3209914.3226168","DOIUrl":"https://doi.org/10.1145/3209914.3226168","url":null,"abstract":"a miniature circularly polarized horn antenna is designed and implemented. The radiation part of the antenna is a single-arm spiral (SAS) structure, which is directly fed by 50Ω coaxial line through a small disc/ground-plane, and this feeding method replaces the traditional balun which often used in conventional two-arm balanced-mode spiral antenna. The gain of the antenna is increased by the back cavity and the conical horn, the beam width is controlled, and the phenomenon of beam pointing deviation is improved. It is revealed that the designed antenna has a good circularly polarized (CP) radiation performance over a design frequency range of 8 GHz to 12 GHz, and the overall dimension of the antenna is 40×40×24mm.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on MTSP Problem based on Simulated Annealing","authors":"Caifeng Liu, Yanxia Zhang","doi":"10.1145/3209914.3234638","DOIUrl":"https://doi.org/10.1145/3209914.3234638","url":null,"abstract":"Multiple Traveling Salesman Problem (MTSP) is the extension of Traveling Salesman Problem (TSP). In reality, lots of problems are similar with MTSP, for example, Last-mile Express Deliver Problem can be viewed as a MTSP which takes time as optimal objective, Vehicle Routing Problem (VRP) can be viewed as MTSP which takes distance as optimal objective, travel routes planning problem can be viewed as a MTSP which takes time or expense as the objective. So in this paper, we focus on a kind of MTSP that takes time as only optimal objective to build the model, and we solve it by using Simulated Annealing Algorithm (SA). Also we analyse the performance of SA in different parameters. The algorithm is realized under MATLAB environment.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security Vulnerabilities of NFC Technology and Improvement Programs","authors":"Zining Wang","doi":"10.1145/3209914.3226165","DOIUrl":"https://doi.org/10.1145/3209914.3226165","url":null,"abstract":"NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131728889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expert Recommendation Based on Collaborative Filtering in Subject Research","authors":"Gaochao Li, Xin Jin, Zhonghua Wang, Xunxun Chen, Xiao Wu","doi":"10.1145/3209914.3209939","DOIUrl":"https://doi.org/10.1145/3209914.3209939","url":null,"abstract":"This article implements a method for expert recommendation based on collaborative filtering. The recommendation model extracts potential evaluation experts from historical data, figures out the relevance between past subjects and current subjects, obtains the evaluation experience index and personal ability index of experts, calculates the relevance of research direction between experts and subjects and finally recommends the most proper experts.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Wireless Sensor Networks in Multi-target Intelligent Tracking System","authors":"Rongcao Xu","doi":"10.1145/3209914.3226163","DOIUrl":"https://doi.org/10.1145/3209914.3226163","url":null,"abstract":"Wireless sensor has many advantages, such as small size, low power consumption and strong wireless communication ability, so it is widely used in target tracking field. Multi-target tracking is a key problem in the research and application of wireless sensor networks. For specific area intrusion detection, this paper designs a localization and tracking prototype system based on wireless Sensor Networks, to achieve the functions including target real-time monitoring, target location tracking, target state prediction, target status information query.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}