2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)最新文献

筛选
英文 中文
Performance analysis of virtualized VPN endpoints 虚拟化VPN端点性能分析
D. Lackovic, Mladen Tomic
{"title":"Performance analysis of virtualized VPN endpoints","authors":"D. Lackovic, Mladen Tomic","doi":"10.23919/MIPRO.2017.7973470","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973470","url":null,"abstract":"Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances, such as firewalls or routers. In modern networks, which utilize Network Functions Virtualization (NFV), VPN endpoints can be virtualized on common servers. Because data encryption and decryption are CPU intensive operations, it is important to investigate limits of such setups so that feasibility of endpoint virtualization can be evaluated. In this paper, we analyze performance of two industry standard VPN implementations - IPSec and OpenVPN. We examine TCP throughput in relation to encryption algorithm used and packet size. Our experiments suggest that moving VPN endpoints from a specialized hardware appliance to a virtualized environment can be a viable and simple solution if traffic throughput requirements are not too demanding. However, it is still difficult to replace high-end appliances with large throughput capabilities.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132129665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A survey and evaluation of free and open source simulators suitable for teaching courses in wireless sensor networks 适用于无线传感器网络教学课程的免费和开源模拟器的调查与评估
Djordje Pesic, Z. Radivojević, M. Cvetanović
{"title":"A survey and evaluation of free and open source simulators suitable for teaching courses in wireless sensor networks","authors":"Djordje Pesic, Z. Radivojević, M. Cvetanović","doi":"10.23919/MIPRO.2017.7973549","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973549","url":null,"abstract":"This paper attempts to give a survey of some free software tools for wireless sensor networks. It targets teachers and students who might have the need for education in this area. As a first stage in creating this survey, a process of software collection is presented. First collection step is search through the Shanghai list for the first 50 universities. From these universities, available information about used software for wsn-related courses is collected. Additionally, other wsn software surveys are considered. Then, only free, open source and available software are kept, because they are the easiest for students to get it. Then evaluation based on topics coverage and software features is done. Topics are selected from IEEE Curriculum guidelines, while features give emphasis on practical usage from user aspect. Selected topics are embedded systems, computer networks, operating system and system resource management. Features used in the evaluation are support for GUI and command line, programming language learning overhead, ease of installation, extensibility, and platform portability. As a result, following software tools are described: TinyOS, Prowler, Riot, Castalia, Avrora, Shawn, TRMSim-WSN, and Shox.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security and privacy issues for an IoT based smart home 基于物联网的智能家居的安全和隐私问题
D. Geneiatakis, Ioannis Kounelis, R. Neisse, I. N. Fovino, G. Steri, G. Baldini
{"title":"Security and privacy issues for an IoT based smart home","authors":"D. Geneiatakis, Ioannis Kounelis, R. Neisse, I. N. Fovino, G. Steri, G. Baldini","doi":"10.23919/MIPRO.2017.7973622","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973622","url":null,"abstract":"Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable to well-known security and privacy threats. Until now various research works have studied security and privacy in IoT, validating this claim. However, to the best of our knowledge literature lacks research focusing on security and privacy flaws introduced in IoT through interactions among different devices supporting a smart home architecture. In particular, we set up the scene for a security and privacy threat analysis for a typical smart home architecture using off the shelf components. To do so, we employ a smart home IoT architecture that enables users to interact with it through various devices that support smart house management, and we analyze different scenarios to identify possible security and privacy issues for users.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 136
A dew computing solution for IoT streaming devices IoT流媒体设备的露水计算解决方案
M. Gusev
{"title":"A dew computing solution for IoT streaming devices","authors":"M. Gusev","doi":"10.23919/MIPRO.2017.7973454","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973454","url":null,"abstract":"Most people refer to modern mobile and wireless ubiquitous solutions as an IoT application. The advances of the technology and establishment of cloud-based systems emerge the idea of the connected world over Internet based on distributed processing sites. In this paper, we discuss the dew computing architectural approach for IoT solutions and give an organizational overview of the dew server and its connections with IoT devices in the overall cloud-based solutions. Dew servers act as another computing layer in the cloud-based architecture for IoT solutions, and we present its specific goals and requirements. This is compared to the fog computing and cloudlet solutions with an overview of the overall computing trends. The dew servers are analyzed from architectural and organizational aspect as devices that collect, process and offload streaming data from the IoT sensors and devices, besides the communication with higher-level servers in the cloud.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Smart farm computing systems for animal welfare monitoring 用于动物福利监测的智能农场计算系统
M. Caria, Jasmin Schudrowitz, A. Jukan, N. Kemper
{"title":"Smart farm computing systems for animal welfare monitoring","authors":"M. Caria, Jasmin Schudrowitz, A. Jukan, N. Kemper","doi":"10.23919/MIPRO.2017.7973408","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973408","url":null,"abstract":"Smart sensing and computing have become important concepts in the last few years, creating opportunities in the new sector of smart agriculture. A few commercial smart agriculture systems have been introduced to this end, and albeit closed for experimentation, are paving the way for high-tech innovations for crop and livestock agriculture. In this paper, we focus on open and low-cost concepts for smart fog (edge) computing systems to create a smart farm animal welfare monitoring system. We develop an open source system that enables networking and computing of edge devices but also processing of data in a server - all being a connected system that we refer to as smart farm computing system. We propose to use Raspberry Pis as edge devices to monitor the animals and the farm environment, and we let the edge devices communicate with a local farm controller. The proposed farm computing system conceptually creates a fog computing layer and is further connected with cloud computing systems and a mobile application. We demonstrate that a low-cost and open computing and sensing system can effectively monitor multiple parameters related to animal welfare.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Pothole detection: An efficient vision based method using RGB color space image segmentation 凹坑检测:一种高效的基于视觉的RGB彩色空间图像分割方法
Amila Akagic, E. Buza, S. Omanovic
{"title":"Pothole detection: An efficient vision based method using RGB color space image segmentation","authors":"Amila Akagic, E. Buza, S. Omanovic","doi":"10.23919/MIPRO.2017.7973589","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973589","url":null,"abstract":"The proper planning of repairs and rehabilitation of the asphalt pavement is one of the important tasks for safe driving. The most common form of distress on asphalt pavements are potholes, which can compromise safety, and result in vehicle damage. Timely repairing potholes is crucial in ensuring the safety, quality of driving, and reducing the cost of vehicle maintenance. Many of the existing methods for pothole detection often use sophisticated equipment and algorithms, which require substantial amount of data for filtering and training. Consequently, as a result of intensive computational processing, this can lead to long execution time and increased power consumption. In this paper, we propose an efficient unsupervised vision-based method for pothole detection without the process of training and filtering. Our method first extracts asphalt pavements by analysing RGB color space and performing image segmentation. When the asphalt pavement is detected, the search continues in detected region only. The method is tested on online image data set captured from different cameras and angles, with different irregular shapes and number of potholes. The results indicate that the method is suitable as a pre-processing step for other supervised methods.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Free and Open Source Software in the secondary education in Bosnia and Herzegovina
M. Pezer, N. Lazic, M. Odak
{"title":"Free and Open Source Software in the secondary education in Bosnia and Herzegovina","authors":"M. Pezer, N. Lazic, M. Odak","doi":"10.23919/MIPRO.2017.7973546","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973546","url":null,"abstract":"Significant benefits, like an IT cost savings, security, customability, knowledge sharing, can be achieved through the introduction and use of Free/Libre and Open Source Software (FLOSS) in high schools. By using FLOSS, level of students' innovation, computer literacy, knowledge and creativity could be increased. That benefit could be important for developing countries as a chance for strengthen local IT industry. This paper shows differences regarding FLOSS and proprietary source software treatment in a computer science classroom in high schools with curriculum in Croatian language in Bosnia and Herzegovina (BiH). In this paper survey of computer course teachers' interest and their knowledge regarding use of free and open source software was conducted by on-line questionnaire. The FLOSS presence regarding operating systems and office package at computer classrooms was also explored. An additional analysis of curriculum in secondary education in schools with curriculum in Croatian language in Bosnia and Herzegovina was performed.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"31 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of mobile phones in digital forensics 数字取证中的手机分析
S. Dogan, Erhan Akbal
{"title":"Analysis of mobile phones in digital forensics","authors":"S. Dogan, Erhan Akbal","doi":"10.23919/MIPRO.2017.7973613","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973613","url":null,"abstract":"Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of whether the crime is large or small. Among these devices, mobile phones take an important place in digital forensics because of their widely usages by every individual. The importance of examining of the data called as evidence in mobile phones has increased with advances in technology, operation capacity, storage capacity and functionality. In a forensics case, mobile phones must be examined by authorized persons and the data obtained from the device must be brought to standards that can be used forensically. In this study, examination and analysis of mobile phones in terms of digital forensics is evaluated. At the same time, data that can be obtained from mobile phones through a sample application has been investigated.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Complexity comparison of integer programming and genetic algorithms for resource constrained scheduling problems 资源约束调度问题的整数规划与遗传算法的复杂度比较
Rebeka Čorić, Mateja Dumic, D. Jakobović
{"title":"Complexity comparison of integer programming and genetic algorithms for resource constrained scheduling problems","authors":"Rebeka Čorić, Mateja Dumic, D. Jakobović","doi":"10.23919/MIPRO.2017.7973603","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973603","url":null,"abstract":"Resource constrained project scheduling problem (RCPSP) is one of the most intractable combinatorial optimization problems. RCPSP belongs to the class of NP hard problems. Integer Programming (IP) is one of the exact solving methods that can be used for solving RCPSP. IP formulation uses binary decision variables for generating a feasible solution and with different boundaries eliminates some of solutions to reduce the solution space size. All exact methods, including IP, search through entire solution space so they are impractical for very large problem instances. Due to the fact that exact methods are not applicable to all problem instances, many heuristic approaches are developed, such as genetic algorithms. In this paper we compare the time complexity of IP formulations and genetic algorithms when solving the RCPSP. We present two different solution representations for genetic algorithms, permutation vector and vector of floating point numbers. Two formulations of IP and and their time and convergence results are compared for the aforementioned approaches.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The struggle with academic plagiarism: Approaches based on semantic similarity 与学术剽窃的斗争:基于语义相似度的方法
T. Vrbanec, A. Meštrović
{"title":"The struggle with academic plagiarism: Approaches based on semantic similarity","authors":"T. Vrbanec, A. Meštrović","doi":"10.23919/MIPRO.2017.7973544","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973544","url":null,"abstract":"Academic plagiarism is a serious problem nowadays. Due to the existence of inexhaustible sources of digital information, today it is easier to plagiarize more than ever before. The good thing is that plagiarism detection techniques have improved and are powerful enough to detect attempts of plagiarism in education. We are now witnessing efficient plagiarism detection software in action, such as Turnitin, iThenticate or SafeAssign. In the introduction we explore software that is used within the Croatian academic community for plagiarism detection in universities and/or in scientific journals. The question is - is this enough? Current software has proven to be successful, however the problem of identifying paraphrasing or obfuscation plagiarism remains unresolved. In this paper we present a report of how semantic similarity measures can be used in the plagiarism detection task.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信