Proceedings of the 3rd International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
Detection of terrorist threats on Twitter using SVM 利用SVM检测Twitter上的恐怖威胁
K. Bedjou, F. Azouaou, Abdelouhab Aloui
{"title":"Detection of terrorist threats on Twitter using SVM","authors":"K. Bedjou, F. Azouaou, Abdelouhab Aloui","doi":"10.1145/3341325.3342011","DOIUrl":"https://doi.org/10.1145/3341325.3342011","url":null,"abstract":"Many people are exposed daily to different forms of terrorist threats on social networks, which make the control and detection of these contents paramount. We propose in this article, a system of detection of publications related to terrorism in the social network Twitter based on SVM (Simple Vector Machine). We established a 12-step process for analyzing, processing, and then detecting threatening tweets. We have developed 2 scenarios of use of this process, in the first scenario, we apply learning on 4000 tweets written in English, then 4000 tweets written in Arabic and finally 4000 tweets written in bilingual (in both languages). In the 2nd scenario, we apply learning on all the tweets at once (12000 tweets). These two scenarios allow us to compare the results obtained using SVM with results obtained using a syntactical approach.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sentiment Analysis on Arabic Content in Social Media: Hybrid Model of Dictionary Based and Fuzzy Logic 社交媒体中阿拉伯语内容的情感分析:基于词典和模糊逻辑的混合模型
Amjad Rattrout, A. Ateeq
{"title":"Sentiment Analysis on Arabic Content in Social Media: Hybrid Model of Dictionary Based and Fuzzy Logic","authors":"Amjad Rattrout, A. Ateeq","doi":"10.1145/3341325.3342024","DOIUrl":"https://doi.org/10.1145/3341325.3342024","url":null,"abstract":"In recent years, social networks become an information goldmine provides analyzes and inferences rich environment which can be exploited for the development of knowledge in various fields. Several algorithms used to reach the maximum possible accuracy in the semantic analysis of social networks; the most accurate results obtained by using the dictionary based and the fuzzy logic algorithms. In this paper, we worked to obtain better results by creating a hybrid system that fuses the dictionary based and the fuzzy logic to obtain better results rather than using each one of them independently. We end with a prototype that calculates the polarities of the collected sentences and classifies them into seven categories, which are Very Positive, Positive, Good, Neutral, Not Good, Negative, and Very Negative in continuous learning manner, the prototype is learning from the previously collected data, and changes its previous classifications, which proved in the results mathematically.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"105 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Based Share Economy Trust Point: Case Study Based Validation 基于区块链的共享经济信任点:基于案例研究的验证
M. R. Shahid, Sheraz Mehmood, S. Hafeez, Bilal Zahid, Sohail Jabbar, Rehan Ashraf
{"title":"Blockchain Based Share Economy Trust Point: Case Study Based Validation","authors":"M. R. Shahid, Sheraz Mehmood, S. Hafeez, Bilal Zahid, Sohail Jabbar, Rehan Ashraf","doi":"10.1145/3341325.3342026","DOIUrl":"https://doi.org/10.1145/3341325.3342026","url":null,"abstract":"Blockchain is attracting attention from academia and Industry as well due to its amalgamation of various characteristics; cryptography, public key infrastructure, and economic modeling, that is applied to peer-to-peer networking and decentralized consensus to achieve distributed database synchronization. Among other applications of Blockchain, secure and decentralized way of sharing economy is one of the most emergent ones. In this paper, we have proposed a Blockchain based share economy model. Blockchain Share Economy Trust point (SE-TP) mechanism is at the core of the idea for the lender and renter communication. Using SE_TP, the sharing economy communication environment provide effective data management along with data security and reliability. Also, the detail of every shared item can be accessed ubiquitously. A case study to validate the proposed idea is also presented.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116352166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combinatorial Testing of Web Services: A Systematic Mapping Web服务的组合测试:系统的映射
Bisma Rehman, Khubaib Amjad Alam, Mubashara Rehman, A. Jamil, Pariwish Touseef, Rimsha Asif
{"title":"Combinatorial Testing of Web Services: A Systematic Mapping","authors":"Bisma Rehman, Khubaib Amjad Alam, Mubashara Rehman, A. Jamil, Pariwish Touseef, Rimsha Asif","doi":"10.1145/3341325.3342009","DOIUrl":"https://doi.org/10.1145/3341325.3342009","url":null,"abstract":"Complete coverage of all possible test instances in the testing of integrated systems could achieve by using combinatorial testing (CT) strategies. Combinatorial testing has widely been studied in Web service testing research. Few studies related to testing basic web services while others focus on the composite service behavior of web services to generate minimum test cases or test data. This paper is a part of another larger paper that systematically map the available research work on combinatorial testing of web services. The paper presents a Classification scheme to structure the area and to report results based on the answers of three selected research questions. A classification scheme comprises combinatorial techniques algorithms and tools for testing and standard based SUT. This study exposes that even web service testing is getting noteworthy attention still very few approaches of CT applied to test web services.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis and Improvement of Identity-Based Multisignature Scheme 基于身份的多重签名方案的密码分析与改进
Mohamed Mohammedi, Mawloud Omar, Y. Challal, A. Bouabdallah
{"title":"Cryptanalysis and Improvement of Identity-Based Multisignature Scheme","authors":"Mohamed Mohammedi, Mawloud Omar, Y. Challal, A. Bouabdallah","doi":"10.1145/3341325.3342010","DOIUrl":"https://doi.org/10.1145/3341325.3342010","url":null,"abstract":"Public-key encryption is an efficient mechanism providing a panoply of fundamental security services as confidentiality, authentication, integrity and non-repudiation. Effective key management and digital signatures is one of the key factors for the successful widespread deployment of public-key encryption. The digital signature is considered as one of the important mechanisms providing, in most network-based applications, one of the well-required security services, namely the authentication. In this paper, we study the security of the identity-based multisignature scheme. The scheme is based on RSA and Shamir's identity-based encryption and the message signature is shared by a coalition of known signers. We demonstrate the vulnerability of this scheme to the forgery attack, which could be carried by compromised signers, and then we propose countermeasures through a more robust scheme.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scheduling Single-Task Jobs along with Bag-of-Task-Chains in Distributed Systems 基于任务袋链的分布式系统单任务调度
Georgios L. Stavrinides, H. Karatza
{"title":"Scheduling Single-Task Jobs along with Bag-of-Task-Chains in Distributed Systems","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1145/3341325.3342023","DOIUrl":"https://doi.org/10.1145/3341325.3342023","url":null,"abstract":"Distributed systems need to be used efficiently in order to achieve good performance. Particularly important in these systems are resource allocation and scheduling. In this paper we study the scheduling of complex workloads that include regular single-task jobs as well as bag-of-task-chains. Two algorithms are examined for the scheduling of the workload in a distributed system. Simulation is employed to evaluate their performance for various workload conditions. The results reveal that the performance of the scheduling techniques depends on the type of the workload and the system load.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131427937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-cities 基于WBS算法的智慧城市新领导人选举算法
Nabil Kadjouh, A. Bounceur, A. Tari, Loïc Lagadec, R. Euler, Madani Bezoui
{"title":"A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-cities","authors":"Nabil Kadjouh, A. Bounceur, A. Tari, Loïc Lagadec, R. Euler, Madani Bezoui","doi":"10.1145/3341325.3342014","DOIUrl":"https://doi.org/10.1145/3341325.3342014","url":null,"abstract":"One of the interesting techniques for leader election is used in the WBS (Wait Before Starting) algorithm, in which each node in the network will wait for a time corresponding to its value before starting to send the first message to neighbours. This means that the node with the smallest value becomes the leader and it also starts first. This approach is impracticable in the case of real values (case of GPS-coordinates). Also, if the values are very large, the waiting time becomes too long. In this paper, we propose a fast, fault-tolerant and low energy leader election algorithm dedicated to smart-cities, which is based on the technique of waiting before starting, with minimum complexity and in which every node sends one and only one message. Here, the leader is the node with the smallest x-coordinate and the total of sent and received messages is used to represent the global consumption in the network. We give a detailed description of the algorithm, prove its accuracy, discuss its complexity in terms of exchanged messages and evaluate its performance using the CupCarbon simulator. We show that our algorithm is well balanced in terms of energy consumption, it is efficient and adapts well to the increase of the nodes number in the network.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VANET's Security Concerns and Solutions: A Systematic Literature Review VANET的安全问题及其解决方案:系统的文献综述
Muhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam, A. Jamil, Muhammad Umar Sattar
{"title":"VANET's Security Concerns and Solutions: A Systematic Literature Review","authors":"Muhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam, A. Jamil, Muhammad Umar Sattar","doi":"10.1145/3341325.3342028","DOIUrl":"https://doi.org/10.1145/3341325.3342028","url":null,"abstract":"Context: Vehicular Ad-hoc network (VANET) is an emerging trend that originates from the field of Mobile Adhoc Network that gained significant attention from the past few years. The communication is realized through the On-Board Unit (OBU) equipped in vehicles. The concern of VANET is to provide a safe journey to the passengers. Although its significant high mobility of vehicles may cause a loss in connection or security attacks. Objective: The aim behind systematic literature review (SLR) is to identify the diverse type of security attacks in VANET and their respective solutions to handle those attack. This study mainly focuses on VANET centric security attacks and categorizes them along with the solutions to handle these attacks. Method: By using kitchenham guideline for systematic review and PRISMA flow for study selection to ensure coverage of all relevant studies we initially came up with 403 articles. Among these studies, 84 studies were qualified to be relevant according to 4 defined research questions. After identification and categorization of VANET centric attacks, proposed solutions a mapping between attacks and solution is provided. Results: Result of this systematic literature review suggest that identifies Access Management is a major concern in VANET with 44% of selected studies followed by Privacy 28% and Sybil attack 5%. Similarly, numerous security concerns such as Message Authentication 3%, Trust Management 4% and Black Hole attack 3% receives considerably lesser attention by the research community. Conclusions: In the context of security-related solutions which technique found to be most widely used to resolve the problem. The contribution of this study is considered important because there is no such study that has provided such an extensive overview of VANET security attacks and their perspective solutions.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122044149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud Computing With Kubernetes Cluster Elastic Scaling 基于Kubernetes集群弹性扩展的云计算
Brandon Thurgood, Ruth G. Lennon
{"title":"Cloud Computing With Kubernetes Cluster Elastic Scaling","authors":"Brandon Thurgood, Ruth G. Lennon","doi":"10.1145/3341325.3341995","DOIUrl":"https://doi.org/10.1145/3341325.3341995","url":null,"abstract":"Cloud computing and artificial intelligence (AI) technologies are becoming increasingly prevalent in the industry, necessitating the requirement for advanced platforms to support their workloads through parallel and distributed architectures. Kubernetes provides an ideal platform for hosting various workloads, including dynamic workloads based on AI applications that support ubiquitous computing devices leveraging parallel and distributed architectures. The rationale is that Kubernetes can be used to support backend services running on parallel and distributed architectures, hosting ubiquitous cloud computing workloads. These applications support smart homes and concerts, providing an environment that automatically scales based on demand. While Kubernetes does offer support for auto scaling of Pods to support these workloads, automated scaling of the cluster itself is not currently offered. In this paper we introduce a Free and Open Source Software (FOSS) solution for autoscaling Kubernetes (K8s) worker nodes within a cluster to support dynamic workloads. We go on to discuss scalability issues and security concerns both on the platform and within the hosted AI applications.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
VANETs Embedded Novel Traffic Management Paradigm for Smart City Milieu 面向智慧城市环境的嵌入式交通管理新范式
S. Arshad, Q. Raza, M. Hussain
{"title":"VANETs Embedded Novel Traffic Management Paradigm for Smart City Milieu","authors":"S. Arshad, Q. Raza, M. Hussain","doi":"10.1145/3341325.3342038","DOIUrl":"https://doi.org/10.1145/3341325.3342038","url":null,"abstract":"In the existing milieu of contemporarily smart cities, the traffic situation is very saturated explicitly in the advanced industrial and populated cities that becomes worst at the rush hours. As population and correspondingly required number of vehicles are also increasing in cities, it is problematic for citizens at the major traffic points of these big cities. It is not only causing travelling delays, accidents and their corresponding emergency response services, traffic jams, parking availability but also contributing heavily to environmental air and noise pollution as well as health threats due to pollution produced by vehicle combustion. Many urban societies are now actualizing smart frameworks for traffic control that work on the standards of traffic automation with prevention of the previously mentioned issues, to keep away from such serious problems but, as per best of our knowledge, no single model deals with such issues comprehensively. The prime idea lies in collecting the current locations of vehicles immediately and suggesting the optimal route to the vehicle from departure node to destination node using optimal path finding algorithm before starting the journey, mainly focusing on reducing the Congestion, greenhouse gases emission and fuel expenditure and also providing the alternate plan to vehicles at any point of journey. In this context, a smart traffic monitoring and controlling framework has been proposed that can perform fast information communication and their concerning actions. In the said model, under a VANET (Vehicular Ad-hoc Network) scenario, the proposed Traffic management paradigm implements a smart signaling system along with optimal path finding algorithm to control congestion to regularly unify the traffic flow by avoiding the congestion at the smart township zones. The Paradigm includes other unique modules such as prevention of accidents, signaling control module, smart car parking module, Law Enforcement and Emergency response services controlling module those all collectively contribute to reduce carbon emission rate.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123731721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信