Okeke Stephen, U. J. Maduh, S. Ibrokhimov, Kueh Lee Hui, A. Al-Absi, M. Sain
{"title":"A Multiple-Loss Dual-Output Convolutional Neural Network for Fashion Class Classification","authors":"Okeke Stephen, U. J. Maduh, S. Ibrokhimov, Kueh Lee Hui, A. Al-Absi, M. Sain","doi":"10.23919/ICACT.2019.8701958","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701958","url":null,"abstract":"An improved multi-loss multi-output convolutional neural network method was deployed to extract features from a given set of disjointed data (Fashion and Color) with diverse convolutional chunks in a single network. The first convolution block extracts features from the first image dataset (Fashion) and determines the classes to which they belong. The second block is responsible for learning the information encoded in the second set of data (color), classify and append such to the features extracted from the first convolutional block. Each block possesses its loss function which makes the network a multi-loss convolutional neural network. A set of double fully connected output heads are generated at the network terminal; enabling the network to perform predictions on a combination of disjointed labels. To validate the classification ability of our network model, we conducted several experiments with different network parameters and variations of data sizes and obtained remarkable classification results of 98 and 95 on the fashion and color sets respectively.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Assured Vehicle Data Collection Platform by Blockchain: Service Provider’s Perspective","authors":"Sang-Oun Lee, Hyun-Chae Jung, Bosuk Han","doi":"10.23919/ICACT.2019.8701965","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701965","url":null,"abstract":"The advancements in information and communications technology have connected the disconnected, and changed the daily lives of everybody. The automobile industry is comparatively a laggard to connect its disconnected mobility, but new efforts are introduced to put the car on the network as so called connected cars. A single vehicle contains numerous parts to be assembled just as the numerous types of data which can be collected. Like all the connected things being exposed to a cybersecurity concern, the connected cars are also being exposed to cyber-attacks which can exploit your physical safety from privacy. This research proposes security-assured vehicle data platform through closed blockchain for the service provider who facilitates the data for business. The paper is composed of following. First, the paper identifies the type of data which contains the privacy concerns that can be collected from the vehicle. Second, the authors present how the data collected from the vehicle is valuable to multiple parties. Third, the study reviews why the blockchain is an appropriate technology to collect and redistribute the vehicle collected data. Last, the research proposes a vehicle data platform with a blockchain application which assures confidentiality, integrity and accessibility of the data. The expected contributions of this research are following: First, the research identifies and proposes the value of the vehicle collected data. Second, the study determines and tackles the potential exploits from cyber-attacks to the vehicle data platform. Third, the technical extensions from blockchain to the related industries and potential participants of the platform. The study also expects to extend the technical applications with actual vehicle collected data to closed blockchain.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput Analysis in Cooperative Spectrum Sensing Network using an Improved Energy Detector","authors":"M. Ranjeeth, S. Anuradha","doi":"10.23919/ICACT.2019.8701974","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701974","url":null,"abstract":"In this paper, we have analyzed the performance of an average channel throughput analysis using an improved energy detector (IED) under non-fading environment (AWGN channel) in cooperative spectrum sensing (CSS) network. The performance analysis is evaluated using different fusion rules (k=1+n and k=M-n) at fusion center (FC). The error rate is considered in reporting channel (R-channel) to show the effect of an error on the average channel throughput. Our simulation results gives the analysis of an average channel throughput for various values of detection thresholds, number of secondary users (M), and error rates in R-channel using different fusion rules at FC. The average channel throughput performance comparison between error free and error present in R-channel is provided using the MATLAB simulations. Finally, we have calculated an optimal number of secondary users to maximize the average channel throughput for different fusion rules.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seung Han Choi, Seok Bong Yoo, D. Jee, Mikyong Han
{"title":"The Service Scenario of Road Environment Improvement Based on Crowd Sourcing for Smart City","authors":"Seung Han Choi, Seok Bong Yoo, D. Jee, Mikyong Han","doi":"10.23919/ICACT.2019.8702028","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702028","url":null,"abstract":"This paper proposes the service scenario based crowd sourcing for improving the problems of city. The purpose of \"The service scenario of road environment improvement based on crowd sourcing\" collects and monitors diverse road environment information that is reported from mobile situations to civic participation, and provides immediate resolution to help prevent inconvenience to residents and secondary accidents.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sain, Amlan Jyoti Chaudhray, S. Aich, Hoon-Jae Lee
{"title":"Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network","authors":"M. Sain, Amlan Jyoti Chaudhray, S. Aich, Hoon-Jae Lee","doi":"10.23919/ICACT.2019.8701985","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701985","url":null,"abstract":"A wireless sensor network (WSN) based real-time application, both physical nodes (i.e., unguarded nodes) as well as open communication channels are accessible to the adversaries. Such channel openness and unguardedness of the WSN nodes may lead to various attacks to the application. Therefore an access control mechanism is essential for such WSNs that are deployed in the hostile environments. In this regards, recently, two practical access control protocols (PACPs) are being proposed for WSNs. The authors claimed that their proposed protocols are suitable for practical implementation and are secure against most of the known attacks. Unfortunately, PACPs have inherent security weaknesses and difficulty in real-time implementation. In this paper, we identify few security pitfalls. In addition, a new node addition phase is impractical in the real world deployment. In order to overcome the PACPs issues, we also proposed an enhanced practical access control protocol that provides more security features at low computation and communication costs.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Anomalous Network Traffic in IoT Networks","authors":"Dang-Hai Hoang, H. Nguyen","doi":"10.23919/ICACT.2019.8702032","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702032","url":null,"abstract":"Network operators need effective tools to quickly detect anomalies in traffic data for identifying network attacks. In contrast to traditional Internet, detection of anomalous network traffic in IoT (Internet of Things) networks is becoming a challenge task due to limited network resources and performance. Comprehensive detection methods are no longer effective for IoT networks, calling for developing lightweight solutions. Principal Component Analysis (PCA) techniques can help to reduce computing complexity, thus, anomaly detection techniques based on PCA received a lot of attention in the past. However, PCA techniques could not be directly applied to IoT networks with constrained resources and limited performance. This paper investigates PCA techniques for detecting anomalous network traffic in IoT networks. We propose a novel detection scheme with two levels using PCA techniques. The first level is for quick detection with few principal components while the second level is for detailed detection with a number of principal components. We investigate the selection of parameters in a distance calculation formula using several experiments to show the feasibility of our proposed scheme.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132131174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework","authors":"Halit Alptekin, Can Yildizli, E. Savaş, A. Levi","doi":"10.23919/ICACT.2019.8702030","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702030","url":null,"abstract":"In the realm of mobile devices, malicious applications pose considerable threats to individuals, companies and governments. Cyber security researchers are in a constant race against malware developers and analyze their new methods to exploit them for better detection. In this paper, we present TRAPDROID, a dynamic malware analysis framework mostly focused on capturing unified behavior profiles of applications by analyzing them on physical devices in real-time. Our framework processes events, which are collected from system calls, binder communications, process stats, and hardware performance counters and combines them into a simple, yet meaningful behavior format. We evaluated our framework’s detection rate and performance by analyzing an up-to-date malware dataset, which also contains specially crafted applications with malicious intent. The framework is easy to use, fast and providing high accuracy in malware detection with relatively low overhead.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang-Su Lee, Sweungwon Cheung, Seong-Soon Joo, H. Kahng
{"title":"Design and Implementation of Autonomous Collaboration System of Smart Things using accumulated Experience knowledge","authors":"Chang-Su Lee, Sweungwon Cheung, Seong-Soon Joo, H. Kahng","doi":"10.23919/ICACT.2019.8701947","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701947","url":null,"abstract":"With the advent of many IoTs, users need a common use environment to easily connect, search, and share various IoTs. In addition, as IoTs become increasingly intelligent, there is a growing demand for services that work together. However, a large number of IoTs can cause serious traffic to the network when they collaborate with each other in a common usage environment. In this paper, we have designed the structure of IoT to construct a distributed social network based on semantic web to solve this problem. We also designed and implemented an autonomous collaborative service of IoT that can find collaborative partners through social network and accumulate experience knowledge after collaboration. We defined IoT with this structure as Smart Thing and a unique Basic Identity Information (BII) that allows Smart Thing to identify each other. In addition, we defined Basic Response Rules (DRRFS) for Smart Thing to follow in the Query & Answer process for Collaboration. Smart Thing with basic identity information is an independent, autonomous IoT device. Smart Thing with a distributed social network finds collaborative partners though recursive queries and provides services. In addition, we have confirmed in the autonomous collaborative system that Smart Thing who has experienced collaborations can work faster and more accurately using the accumulated experience knowledge when the same thing is done again. If all IoTs have basic identity information and use semantic technology, the Internet will be a huge space where Smart Thing can collaborate.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128218494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Interactive Interface for Information Exchanging between QualNet and Virtual Machine for IP Based Network","authors":"Qi Meng, Peng Gong, Yu Liu, Huibo Li, Cheying Li, Dan Shan","doi":"10.23919/ICACT.2019.8701929","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701929","url":null,"abstract":"Recently, the hardware-in-the-loop simulation for protocol design, software testing, and device model testing has been widely considered for the IP-based communication network owning to a higher authenticity and accuracy. However, as the number of real devices increases, a huge testing cost becomes inevitable. In this paper, an interactive approach for information exchanging between network simulator and virtual machine for IP based network simulation is proposed. Together with the interactive interface, the data packets generated by the network software or the model of real network device, which is needed to be tested and is installed on the virtual machine, are transmitted from the corresponding node to the target node in QualNet based virtual network. Based on the proposed interactive approach, a large-scale network emulator, which effectively reduce the testing cost, can be composed by the network simulator and the virtual machine together with the network device image and software. Simulation results demonstrate that the interactive interface can realize the information exchanging between network simulator, i.e., QualNet, and virtual machine, with an acceptable delay and rare packet loss.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133313194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smart Android Based Parking System to Reduce the Traffic Congestion of Dhaka City","authors":"Nawsheen Promy, Sadman Islam","doi":"10.23919/ICACT.2019.8701935","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701935","url":null,"abstract":"Traffic congestion is a common phenomenon in developing countries like Bangladesh. This is the quotidian scenario in most of the metropolitan cities of the world. Because of heavy traffic, people lose their valuable time from their busy schedule. One of the prime reasons of this traffic congestion is parking on the roadside. So, a need arises to develop a parking system so that it can reduce the traffic congestion in near future. The paper focuses on a smart android based parking control application which will help you to find out a parking area in nearby your location. The mobile application will also help you to pay the parking charge by online payment system. A counter will be there in the application which will help you to count the amount of time your car have spent in the parking lot. This application will also track the entire process and all the previous records.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123831567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}