2018 International Conference on Platform Technology and Service (PlatCon)最新文献

筛选
英文 中文
Analyzing Overhead from Security and Administrative Functions in Virtual Environment 虚拟环境中安全与管理功能的开销分析
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472755
Manjinder Singh, S. Butakov, Fehmi Jaafar
{"title":"Analyzing Overhead from Security and Administrative Functions in Virtual Environment","authors":"Manjinder Singh, S. Butakov, Fehmi Jaafar","doi":"10.1109/PLATCON.2018.8472755","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472755","url":null,"abstract":"The paper provides an analysis of the performance of an administrative component that helps the hypervisor to manage the resources of guest operating systems under fluctuation workload. The additional administrative component provides an extra layer of security to the guest operating systems and system as a whole. In this study, an administrative component was implemented by using Xen-hypervisor based para-virtualization technique and assigned some additional roles and responsibilities that reduce hypervisor workload. The study measured the resource utilizations of an administrative component when excessive input/output load passes passing through the system. Performance was measured in terms of bandwidth and CPU utilisation Based on the analysis of administrative component performance recommendations have been provided with the goal to improve system availability. Recommendations included detection of the performance saturation point that indicates the necessity to start load balancing procedures for the administrative component in the virtualized environment.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of C5.0 Algorithm to Flu Prediction Using Twitter Data C5.0算法在Twitter数据流感预测中的应用
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472737
LZ Albances, Beatrice Anne Bungar, Jannah Patrize Patio, Rio Jan Marty Sevilla, Donata D. Acula
{"title":"Application of C5.0 Algorithm to Flu Prediction Using Twitter Data","authors":"LZ Albances, Beatrice Anne Bungar, Jannah Patrize Patio, Rio Jan Marty Sevilla, Donata D. Acula","doi":"10.1109/PLATCON.2018.8472737","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472737","url":null,"abstract":"Since one's health is a factor considered, data coming from Twitter, one of the most popular social media platforms often used by millions of people, is beneficial for predictions of certain diseases. The researchers created a system that will improve the precision rate of the current system conducted by Santos and Matos using C5.0 algorithm instead of Naive Bayes algorithm for classifying tweets with flu or without flu. For the testing part, a total of 1000 tweets which is only limited within the Philippines were gathered to evaluate the system. Moreover, both English and Tagalog tweets are included in the dataset. The researchers found that the proposed system, after examination, has achieved a rate of 62.40% in terms of precision, and 66% in terms of accuracy. It was concluded that the C5.0 algorithm is less precise but more accurate than the Naive Bayes algorithm.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"64 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BER of Alamouti STBC MC-CDMA with Imperfect Channel State Information 信道状态信息不完全的阿拉穆蒂STBC MC-CDMA误码率
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472739
C. Kotchasarn
{"title":"BER of Alamouti STBC MC-CDMA with Imperfect Channel State Information","authors":"C. Kotchasarn","doi":"10.1109/PLATCON.2018.8472739","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472739","url":null,"abstract":"In this paper, we study the effect of channel estimation errors for the multiple input multiple output (MIMO) multi-carrier code division multiple access (MC-CDMA) system. The performance of Alamouti Space Time Block Code (STBC) together with MC-CDMA is derived by using moment generating functions (MGF) method. Finally, the closed form of bit error rate (BER) expression is presented. Without loss of generality, the scheme of two transmitting antennas and one receiving antenna is proposed, which could be straightforwardly extended to the more general cases. In the case of imperfect channel estimation, the simulation results demonstrate the BER performance for the MIMO MC-CDMA system is greatly depending on the errors in the channel estimation.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robot Soccer Using Deep Q Network 使用深度Q网络的机器人足球
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472776
Jin-Baek Kim, Bongsu Kim, J. Yoon, Marley Lee, Sunah Jung, Jae-Young Choi
{"title":"Robot Soccer Using Deep Q Network","authors":"Jin-Baek Kim, Bongsu Kim, J. Yoon, Marley Lee, Sunah Jung, Jae-Young Choi","doi":"10.1109/PLATCON.2018.8472776","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472776","url":null,"abstract":"Reinforcement Learning is one of brilliant way to develop intelligent agents in the field of Artificial Intelligence. This paper proposes a RL algorithm called Deep Q Network and presents applications of this algorithm to the decision-making problems challenged in the RoboCup. Four scenarios were defined to develop decision-making for a SSL in various situations using the proposed algorithm. Furthermore, a Convolutional Neural Network model was used as a function approximator in each application. The experimental results showed that the proposed Reinforcement Learning algorithm had effectively trained the Reinforcement Learning agent to acquire good decision making. The Reinforcement Learning agent showed good performance under specified experimental conditions.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121506468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment android物联网平台环境下应用升级前后的权限管理方法
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472749
In-kyu Park, Jin Kwak
{"title":"Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment","authors":"In-kyu Park, Jin Kwak","doi":"10.1109/PLATCON.2018.8472749","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472749","url":null,"abstract":"The Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google's infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user's consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Intelligent Character Recognition (ICR) Approach Using Diagonal Feature Extraction and Euler Number as Classifier with Modified One-Pixel Width Character Segmentation Algorithm 基于对角特征提取和欧拉数分类器的改进一像素宽度字符分割算法的增强智能字符识别方法
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472740
Yosuke R. Matsuoka, Gabriel Angelo R. Sandoval, Luis Paolo Q. Say, Jann Skvler Y. Teng, Donata D. Acula
{"title":"Enhanced Intelligent Character Recognition (ICR) Approach Using Diagonal Feature Extraction and Euler Number as Classifier with Modified One-Pixel Width Character Segmentation Algorithm","authors":"Yosuke R. Matsuoka, Gabriel Angelo R. Sandoval, Luis Paolo Q. Say, Jann Skvler Y. Teng, Donata D. Acula","doi":"10.1109/PLATCON.2018.8472740","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472740","url":null,"abstract":"In this technological age, handwriting communication is still an essential aspect in the lives of people and relating to each other. This study was created to identify the most suitable set of algorithms that can be used and determine how effective it would be in recognizing cursive handwritten texts. The proponents created a system that accepts a handwritten text image as input, undergoes processing stages and outputs a text based on the features extracted per character using the Diagonal Feature Extraction, and classification using Euler Number with the use of the Modified One-Pixel Width Character Segmentation Algorithm. A total of 100 handwritten text images are used in evaluating the system. The system achieved a character recognition rate of 88.7838% and word recognition rate of 50.4348%.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of Band-type Device to Measure UV Index and UVB Irradiance in Everyday 波段式日常紫外指数和UVB辐照度测量装置的设计
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472735
Dae-Hwan Park, Kyeong-Mi Kim, Seung-Taek Oh, Jae-Hyun Lim
{"title":"Design of Band-type Device to Measure UV Index and UVB Irradiance in Everyday","authors":"Dae-Hwan Park, Kyeong-Mi Kim, Seung-Taek Oh, Jae-Hyun Lim","doi":"10.1109/PLATCON.2018.8472735","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472735","url":null,"abstract":"UV (Ultraviolet) is known to negatively affect human body. Especially UV A promotes skin aging, and UVB enhances skin cancer prevalence. UVB, however, offers a useful function to support vitamin D production within human body. Therefore it is needed for people to be exposed to UV through proper outdoor activities and to acquire UV environmental information surrounding them. In this regard, this study devises a band-type device to measure UV irradiance in everyday life. The proposed device consists of a band to wear the device on user's wrist, arduino-based micro controller, and a UV sensor measuring UV irradiance. The proposed band-type device is expected to induce appropriate outdoor activities in the UV environment that does not harm human body by offering precise information on UV index and UVB irradiance surrounding users.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117337622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Case Study for the Approach of Converting a Mobile RPG to a Multiplayer VR Game 将手机RPG转化为多人虚拟现实游戏的案例研究
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472753
Wonseok Chae, Halim Choi, Baek Seob Kim, Jonghee Sang, Junwoo Lee
{"title":"A Case Study for the Approach of Converting a Mobile RPG to a Multiplayer VR Game","authors":"Wonseok Chae, Halim Choi, Baek Seob Kim, Jonghee Sang, Junwoo Lee","doi":"10.1109/PLATCON.2018.8472753","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472753","url":null,"abstract":"In recent years, multiplayer VR contents have been developed and are in service in which a number of users cooperate or confront each other in the same physical space. This type of content should be provided in a first-person view. In addition, the positions of the users' HMDs in the real space where the actual users are playing must be reflected in the virtual space in real-time. In this paper, we propose a solution to consider when creating these VR contents. We also explain a case where a mobile RPG in service is converted directly into a multiplayer VR game.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125903535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns 在图形数据库中管理网络威胁情报:分析入侵集、威胁参与者和活动的方法
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/platcon.2018.8472752
Seulgi Lee, Hyeisun Cho, Nakhyun Kim, Byungik Kim, Junhyung Park
{"title":"Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns","authors":"Seulgi Lee, Hyeisun Cho, Nakhyun Kim, Byungik Kim, Junhyung Park","doi":"10.1109/platcon.2018.8472752","DOIUrl":"https://doi.org/10.1109/platcon.2018.8472752","url":null,"abstract":"Efforts to cope jointly with the ever-increasing number of breach incidents have resulted in the establishment of the standard format and protocol and given birth to many consultative groups. In addition, various channels that distribute Cyber Threat Intelligence information free of charge have emerged, and studies on utilizing such channels have spread. As the market for sharing information professionally is expanding, the need to manage the shared information in various ways in order to achieve better result has arisen. This paper proposes a standardized management structure and method based on the standardized format and a meaning and standard of Cyber Threat Intelligence that can be shared outside when loading OSINT information collected from various channels into the graph database. This paper also proposes a method of supporting the detection provided by existing security equipment with the information saved in the graph database and an effective method of analysis. Lastly, the paper discusses the advantages that can be expected from saving cyber threat information in the graph database developed using information collected from the outside.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps 物联网网络与无线传感器网络的轻量级互认证与密钥协议无线通信差小于1kbps的物联网网络与传感器网络认证与密钥协议方案
2018 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472774
Hyunki Kim, Seunghwan Yun, Jae-Hoon Lee, Okyeon Yi
{"title":"Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps","authors":"Hyunki Kim, Seunghwan Yun, Jae-Hoon Lee, Okyeon Yi","doi":"10.1109/PLATCON.2018.8472774","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472774","url":null,"abstract":"Recently, as the age of the Internet of Things is approaching, there are more and more devices that communicate data with each other by incorporating sensors and communication functions in various objects. If the IoT is miniaturized, it can be regarded as a sensor having only the sensing ability and the low performance communication ability. Low-performance sensors are difficult to use high-quality communication, and wireless security used in expensive wireless communication devices cannot be applied. Therefore, this paper proposes authentication and key Agreement that can be applied in sensor networks using communication with speed less than 1 Kbps and has limited performances.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131504596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信