2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Symmetrical and asymmetrical Microstrip Array Antenna 对称和非对称微带阵列天线
R. Yuwono, Oky Prana Wijaya
{"title":"Symmetrical and asymmetrical Microstrip Array Antenna","authors":"R. Yuwono, Oky Prana Wijaya","doi":"10.1109/CAIS.2019.8769502","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769502","url":null,"abstract":"The power efficiency of the antenna is aimed to reducing power loss (losses). Low Losses making optimal antenna performance in transmitting and receiving waves. Range of the antenna can also be optimized because of greater power can be transmitted, thus reducing the need transceiver devices that consume a lot of power. The author uses a microstrip antenna array with a number of patches to different made to find a different gain value. The results of the simulation of antenna gain antenna values obtained successively dBi 2.55, 3.08 dBi, 4.32 dBi, 5.05 dBi and 6.21 dBi. As for the antenna efficiency is obtained 0.98272323, 0.98395813, 0.9851897, 0.98815117 and 0.99053464. The results of the measurements obtain fabricated antenna consecutive obtained gain value −2.44 dBi, −2.05 dBi, −0.77 dBi, −0.63 dBi and 2.00 dBi. From measurements of the radiated power antenna efficiency values obtained third consecutive 0.3937, 0.4908, 0.5529, 0.57, and 0.6262. The results of this research concluded that the greater the value of the gain of the antenna, the higher the efficiency of the power.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Based Attack on Certain Encryption Schemes 基于机器学习的某些加密方案攻击
Anna Saif, M. R. Abidi
{"title":"Machine Learning Based Attack on Certain Encryption Schemes","authors":"Anna Saif, M. R. Abidi","doi":"10.1109/CAIS.2019.8769527","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769527","url":null,"abstract":"Machine learning provides a very promising approach to attack cryptographic implementations. In this paper, a machine learning based attack on text encrypted with public key encryption schemes like RSA and Elliptic Curve Cryptography (ECC) is shown. Decision Trees, a popular approach to perform classification are utilized as multi-class classifiers to learn the structure of the text from training examples so that an unknown similar text can be decrypted successfully. The attack is performed on a section of the Enron email dataset. Three different feature sets are created and then their individual performance is evaluated. Finally, their results are combined together to find out the total percentage of correct partial decrypted text in the test set.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynote Speaker 主讲人
Mohamed-Slim Alouini
{"title":"Keynote Speaker","authors":"Mohamed-Slim Alouini","doi":"10.1109/cais.2019.8769555","DOIUrl":"https://doi.org/10.1109/cais.2019.8769555","url":null,"abstract":"Dr. Alouini was born in Tunis, Tunisia. He received the Diplome d'Ingenieur from the École Nationale Supérieure des Télécommunications (TELECOM Paris Tech) and the Diplome d'Etudes Approfondies (D.E.A.) in Electronics with Highest Honors from the Université Pierre & Marie Curie in Paris, both in 1993. He received the M.S.E.E. degree from the Geor-gia Institute of Technology (Georgia Tech) in 1995, and a PhD in Electrical Engineering from California Institute of Technology (Caltech) in 1998. He also received the Habilitation degree from the Université Pierre & Marie Curie, Paris, France, in 2003.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"58 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design of Massive MIMO for 5G 28 GHZ 5G 28ghz大规模MIMO设计
T. Yuwono, M. Ismail, Ibnu Hajar
{"title":"Design of Massive MIMO for 5G 28 GHZ","authors":"T. Yuwono, M. Ismail, Ibnu Hajar","doi":"10.1109/CAIS.2019.8769515","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769515","url":null,"abstract":"The fifth generation communication (5G) will be run immediately. This generation will use mm-wave with frequency between 24.5 GHz and 86 GHz. The biggest candidate for the frequency used is 28 GHz. The 5G advantages are supporting IoT, M to M, and a high data rate (up to 1 GB/s). So this system requires large bandwidth. This paper will present antenna designs that support these requirements. Antenna type is a Massive MIMO patch antenna with 10x10 array. The performance of this antenna are average of S-parameter is - 14.29 dB, the average of VSWR is 1.43, the bandwidth is 450 MHz and the gain is 27.4 dB. So this antenna is suitable for 5G.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126095283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sentiment Classification and Prediction of Job Interview Performance 情绪分类与面试表现预测
Sarah S. Alduayj, Phillip Smith
{"title":"Sentiment Classification and Prediction of Job Interview Performance","authors":"Sarah S. Alduayj, Phillip Smith","doi":"10.1109/CAIS.2019.8769559","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769559","url":null,"abstract":"Attracting and hiring talented employees is a challenge for companies. The job interview process is a very critical step for both employer and candidate. Having a smooth hiring process in a company will increase future employees' satisfaction. Candidates tend to share their feedback and experience of interviews and company's hiring process with others. Having a negative experience can affect its brand image and reputation as an employer. This will make it hard to attract talented employees. In this research, machine learning and neural network models, such as support vector machines, logistic regression, Naïve Bayes, and long short–term memory (LSTM), were trained to predict the candidates' sentiments after a job interview. Each model was trained using several data representations and weighting approaches, such as term binary, term frequency, and term frequency–inverse document frequency (TF–IDF). As a result, training logistic regression with TF–IDF and unigram word representation achieved an F1-measure of 0.814.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Highly Selective Planar Microstrip Lowpass Filter Using Interdigital Hairpin Resonator (IHR) 基于数字间发夹谐振器(IHR)的高选择性平面微带低通滤波器
T. A. Nisamol, P. Abdulla, V. Hamsakutty
{"title":"Highly Selective Planar Microstrip Lowpass Filter Using Interdigital Hairpin Resonator (IHR)","authors":"T. A. Nisamol, P. Abdulla, V. Hamsakutty","doi":"10.1109/CAIS.2019.8769446","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769446","url":null,"abstract":"Planar microstrip lowpass filter is designed using the inter-digital hairpin resonators (IHR) to achieve high selectivity and suppression is up to 17th order harmonics. The prototype is designed with 3 dB cut-off frequency of 0.82 GHz and obtain rolloff of 185 dB/GHz with 177% relative stopband width. The interdigital effect of cascaded combination of hairpin resonators along with suppressing cells give high end results with normalized cross section of $0.137 boldsymbol{lambda}_{text{g}}times 0.069 boldsymbol{lambda}_{text{g}}$.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of Things (IoT): Security and Privacy Threats 物联网(IoT):安全和隐私威胁
Eman Shaikh, Iman Mohiuddin, Ayisha Manzoor
{"title":"Internet of Things (IoT): Security and Privacy Threats","authors":"Eman Shaikh, Iman Mohiuddin, Ayisha Manzoor","doi":"10.1109/CAIS.2019.8769539","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769539","url":null,"abstract":"Internet of Things (IoT) is used for providing connectivity amongst numerous devices. It is a system where objects that are embedded with a detector technology acts with another object through a wireless communication medium to exchange and transfer information without human interaction. These devices are prone to vulnerable attacks due to the simple and open nature of their networks. Therefore, privacy and security are the biggest concern in this technology. The focus of the security and privacy threats on IoT is crucial to promote the development of IoT. The goal of the paper is to put forward the different security and privacy concerns that an IoT environment is facing and the existing mechanisms used for its protection. The paper mainly focuses on the IoT privacy and security features such as the IAS-octave security requirements, security and privacy threats and the solutions that need to be maintained to avoid these security and privacy threats.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Review on Real-time Detection of a Panic Behavior in Crowded Scenes 拥挤场景中恐慌行为的实时检测研究综述
Bahiya Aldissi, Heyfa Ammar
{"title":"Review on Real-time Detection of a Panic Behavior in Crowded Scenes","authors":"Bahiya Aldissi, Heyfa Ammar","doi":"10.1109/CAIS.2019.8769487","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769487","url":null,"abstract":"Due to the rapidly increasing number of requests from the surveillance and security industries, detecting a panic behavior in human crowd have become an active research in the field of computer vision in recent years. The automatic and real-time analysis of video sequences in order to detect a panic behavior is one of the most challenging tasks for computer vision experts. This stems from the fact that a panic is mostly defined as a sudden change in the pedestrian movements and that motion estimation is computationally expensive. The aim of this paper is to give an overview of the reported real-time techniques in the literature by focusing on how these techniques overcame the heavy computations of the motion estimation. Moreover, the present work summarizes the accuracy and the execution time of those techniques to highlight the direction to future studies.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124444455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organ Donation Decentralized Application Using Blockchain Technology 使用区块链技术的器官捐赠去中心化应用
Lama Abdulwahab Dajim, Sara Ahmed Al-Farras, Bushra Safar Al-Shahrani, Atheer Abdullah Al-Zuraib, Rincy Merlin Mathew
{"title":"Organ Donation Decentralized Application Using Blockchain Technology","authors":"Lama Abdulwahab Dajim, Sara Ahmed Al-Farras, Bushra Safar Al-Shahrani, Atheer Abdullah Al-Zuraib, Rincy Merlin Mathew","doi":"10.1109/CAIS.2019.8769459","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769459","url":null,"abstract":"The proposed system is an organ donation decentralized app using blockchain technology. It would be a web application for patients to register their information-most importantly medical ID, blood type, organ type and state. The system would work on a first-in, first-out basis unless a patient is in critical condition.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Automatic Patients' Vital Sign Monitoring by Single Board Computer (SBC) Based MPI Cluster 基于MPI集群的SBC患者生命体征自动监测
S. Misbahuddin, Malik Munjed Ibrahim, Ayman Mahmoud Alnajar, Basheer Qutaibah Alolabi, Abdullah Fahad Ammar
{"title":"Automatic Patients' Vital Sign Monitoring by Single Board Computer (SBC) Based MPI Cluster","authors":"S. Misbahuddin, Malik Munjed Ibrahim, Ayman Mahmoud Alnajar, Basheer Qutaibah Alolabi, Abdullah Fahad Ammar","doi":"10.1109/CAIS.2019.8769551","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769551","url":null,"abstract":"Periodic monitoring of patients' physiological data is important in order to maintain in-ward patients' wellbeing under control. However, such an approach is exhaustive and may not be suitable for patients, because a slight negligence from medicinal services staff may lead to serious ramifications for the patients. This paper proposes a Patients' Monitoring System (PMS) in which multiple patients' vital sign data may be monitored automatically or on demand without human intervention. The suggested system is designed around Single Board Computer (SBC) based Message Passing Interface (MPI) Cluster. Low-cost Raspberry Pis are used as SBC. A prototype of the proposed system has been presented. Development steps have been discussed.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信