{"title":"Analyzing Overhead from Security and Administrative Functions in Virtual Environment","authors":"Manjinder Singh, S. Butakov, Fehmi Jaafar","doi":"10.1109/PLATCON.2018.8472755","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472755","url":null,"abstract":"The paper provides an analysis of the performance of an administrative component that helps the hypervisor to manage the resources of guest operating systems under fluctuation workload. The additional administrative component provides an extra layer of security to the guest operating systems and system as a whole. In this study, an administrative component was implemented by using Xen-hypervisor based para-virtualization technique and assigned some additional roles and responsibilities that reduce hypervisor workload. The study measured the resource utilizations of an administrative component when excessive input/output load passes passing through the system. Performance was measured in terms of bandwidth and CPU utilisation Based on the analysis of administrative component performance recommendations have been provided with the goal to improve system availability. Recommendations included detection of the performance saturation point that indicates the necessity to start load balancing procedures for the administrative component in the virtualized environment.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133390420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
LZ Albances, Beatrice Anne Bungar, Jannah Patrize Patio, Rio Jan Marty Sevilla, Donata D. Acula
{"title":"Application of C5.0 Algorithm to Flu Prediction Using Twitter Data","authors":"LZ Albances, Beatrice Anne Bungar, Jannah Patrize Patio, Rio Jan Marty Sevilla, Donata D. Acula","doi":"10.1109/PLATCON.2018.8472737","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472737","url":null,"abstract":"Since one's health is a factor considered, data coming from Twitter, one of the most popular social media platforms often used by millions of people, is beneficial for predictions of certain diseases. The researchers created a system that will improve the precision rate of the current system conducted by Santos and Matos using C5.0 algorithm instead of Naive Bayes algorithm for classifying tweets with flu or without flu. For the testing part, a total of 1000 tweets which is only limited within the Philippines were gathered to evaluate the system. Moreover, both English and Tagalog tweets are included in the dataset. The researchers found that the proposed system, after examination, has achieved a rate of 62.40% in terms of precision, and 66% in terms of accuracy. It was concluded that the C5.0 algorithm is less precise but more accurate than the Naive Bayes algorithm.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"64 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER of Alamouti STBC MC-CDMA with Imperfect Channel State Information","authors":"C. Kotchasarn","doi":"10.1109/PLATCON.2018.8472739","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472739","url":null,"abstract":"In this paper, we study the effect of channel estimation errors for the multiple input multiple output (MIMO) multi-carrier code division multiple access (MC-CDMA) system. The performance of Alamouti Space Time Block Code (STBC) together with MC-CDMA is derived by using moment generating functions (MGF) method. Finally, the closed form of bit error rate (BER) expression is presented. Without loss of generality, the scheme of two transmitting antennas and one receiving antenna is proposed, which could be straightforwardly extended to the more general cases. In the case of imperfect channel estimation, the simulation results demonstrate the BER performance for the MIMO MC-CDMA system is greatly depending on the errors in the channel estimation.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin-Baek Kim, Bongsu Kim, J. Yoon, Marley Lee, Sunah Jung, Jae-Young Choi
{"title":"Robot Soccer Using Deep Q Network","authors":"Jin-Baek Kim, Bongsu Kim, J. Yoon, Marley Lee, Sunah Jung, Jae-Young Choi","doi":"10.1109/PLATCON.2018.8472776","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472776","url":null,"abstract":"Reinforcement Learning is one of brilliant way to develop intelligent agents in the field of Artificial Intelligence. This paper proposes a RL algorithm called Deep Q Network and presents applications of this algorithm to the decision-making problems challenged in the RoboCup. Four scenarios were defined to develop decision-making for a SSL in various situations using the proposed algorithm. Furthermore, a Convolutional Neural Network model was used as a function approximator in each application. The experimental results showed that the proposed Reinforcement Learning algorithm had effectively trained the Reinforcement Learning agent to acquire good decision making. The Reinforcement Learning agent showed good performance under specified experimental conditions.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121506468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment","authors":"In-kyu Park, Jin Kwak","doi":"10.1109/PLATCON.2018.8472749","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472749","url":null,"abstract":"The Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google's infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user's consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yosuke R. Matsuoka, Gabriel Angelo R. Sandoval, Luis Paolo Q. Say, Jann Skvler Y. Teng, Donata D. Acula
{"title":"Enhanced Intelligent Character Recognition (ICR) Approach Using Diagonal Feature Extraction and Euler Number as Classifier with Modified One-Pixel Width Character Segmentation Algorithm","authors":"Yosuke R. Matsuoka, Gabriel Angelo R. Sandoval, Luis Paolo Q. Say, Jann Skvler Y. Teng, Donata D. Acula","doi":"10.1109/PLATCON.2018.8472740","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472740","url":null,"abstract":"In this technological age, handwriting communication is still an essential aspect in the lives of people and relating to each other. This study was created to identify the most suitable set of algorithms that can be used and determine how effective it would be in recognizing cursive handwritten texts. The proponents created a system that accepts a handwritten text image as input, undergoes processing stages and outputs a text based on the features extracted per character using the Diagonal Feature Extraction, and classification using Euler Number with the use of the Modified One-Pixel Width Character Segmentation Algorithm. A total of 100 handwritten text images are used in evaluating the system. The system achieved a character recognition rate of 88.7838% and word recognition rate of 50.4348%.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dae-Hwan Park, Kyeong-Mi Kim, Seung-Taek Oh, Jae-Hyun Lim
{"title":"Design of Band-type Device to Measure UV Index and UVB Irradiance in Everyday","authors":"Dae-Hwan Park, Kyeong-Mi Kim, Seung-Taek Oh, Jae-Hyun Lim","doi":"10.1109/PLATCON.2018.8472735","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472735","url":null,"abstract":"UV (Ultraviolet) is known to negatively affect human body. Especially UV A promotes skin aging, and UVB enhances skin cancer prevalence. UVB, however, offers a useful function to support vitamin D production within human body. Therefore it is needed for people to be exposed to UV through proper outdoor activities and to acquire UV environmental information surrounding them. In this regard, this study devises a band-type device to measure UV irradiance in everyday life. The proposed device consists of a band to wear the device on user's wrist, arduino-based micro controller, and a UV sensor measuring UV irradiance. The proposed band-type device is expected to induce appropriate outdoor activities in the UV environment that does not harm human body by offering precise information on UV index and UVB irradiance surrounding users.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117337622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wonseok Chae, Halim Choi, Baek Seob Kim, Jonghee Sang, Junwoo Lee
{"title":"A Case Study for the Approach of Converting a Mobile RPG to a Multiplayer VR Game","authors":"Wonseok Chae, Halim Choi, Baek Seob Kim, Jonghee Sang, Junwoo Lee","doi":"10.1109/PLATCON.2018.8472753","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472753","url":null,"abstract":"In recent years, multiplayer VR contents have been developed and are in service in which a number of users cooperate or confront each other in the same physical space. This type of content should be provided in a first-person view. In addition, the positions of the users' HMDs in the real space where the actual users are playing must be reflected in the virtual space in real-time. In this paper, we propose a solution to consider when creating these VR contents. We also explain a case where a mobile RPG in service is converted directly into a multiplayer VR game.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125903535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seulgi Lee, Hyeisun Cho, Nakhyun Kim, Byungik Kim, Junhyung Park
{"title":"Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns","authors":"Seulgi Lee, Hyeisun Cho, Nakhyun Kim, Byungik Kim, Junhyung Park","doi":"10.1109/platcon.2018.8472752","DOIUrl":"https://doi.org/10.1109/platcon.2018.8472752","url":null,"abstract":"Efforts to cope jointly with the ever-increasing number of breach incidents have resulted in the establishment of the standard format and protocol and given birth to many consultative groups. In addition, various channels that distribute Cyber Threat Intelligence information free of charge have emerged, and studies on utilizing such channels have spread. As the market for sharing information professionally is expanding, the need to manage the shared information in various ways in order to achieve better result has arisen. This paper proposes a standardized management structure and method based on the standardized format and a meaning and standard of Cyber Threat Intelligence that can be shared outside when loading OSINT information collected from various channels into the graph database. This paper also proposes a method of supporting the detection provided by existing security equipment with the information saved in the graph database and an effective method of analysis. Lastly, the paper discusses the advantages that can be expected from saving cyber threat information in the graph database developed using information collected from the outside.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyunki Kim, Seunghwan Yun, Jae-Hoon Lee, Okyeon Yi
{"title":"Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps","authors":"Hyunki Kim, Seunghwan Yun, Jae-Hoon Lee, Okyeon Yi","doi":"10.1109/PLATCON.2018.8472774","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472774","url":null,"abstract":"Recently, as the age of the Internet of Things is approaching, there are more and more devices that communicate data with each other by incorporating sensors and communication functions in various objects. If the IoT is miniaturized, it can be regarded as a sensor having only the sensing ability and the low performance communication ability. Low-performance sensors are difficult to use high-quality communication, and wireless security used in expensive wireless communication devices cannot be applied. Therefore, this paper proposes authentication and key Agreement that can be applied in sensor networks using communication with speed less than 1 Kbps and has limited performances.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131504596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}