2015 Long Island Systems, Applications and Technology最新文献

筛选
英文 中文
Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database 利用NoSQL数据库增强Hadoop和MapReduce对科学数据的性能
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160180
Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee
{"title":"Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database","authors":"Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee","doi":"10.1109/LISAT.2015.7160180","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160180","url":null,"abstract":"Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Trojan Horses by the analysis of system behavior and data packets 通过分析系统行为和数据包来检测特洛伊木马
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160176
Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid
{"title":"Detection of Trojan Horses by the analysis of system behavior and data packets","authors":"Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid","doi":"10.1109/LISAT.2015.7160176","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160176","url":null,"abstract":"Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Motion model binary switch for MonoSLAM MonoSLAM运动模型二进制开关
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160210
Akin Tatoglu, K. Pochiraju
{"title":"Motion model binary switch for MonoSLAM","authors":"Akin Tatoglu, K. Pochiraju","doi":"10.1109/LISAT.2015.7160210","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160210","url":null,"abstract":"Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125755254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-sensor based collision avoidance algorithm for mobile robot 基于多传感器的移动机器人避碰算法
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160181
Abrar Alajlan, M. Almasri, K. Elleithy
{"title":"Multi-sensor based collision avoidance algorithm for mobile robot","authors":"Abrar Alajlan, M. Almasri, K. Elleithy","doi":"10.1109/LISAT.2015.7160181","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160181","url":null,"abstract":"Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Extending XACML to express and enforce laws and regulations privacy policies 扩展XACML以表达和执行法律法规隐私策略
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160190
Tariq Alshugran, J. Dichter, A. Rusu
{"title":"Extending XACML to express and enforce laws and regulations privacy policies","authors":"Tariq Alshugran, J. Dichter, A. Rusu","doi":"10.1109/LISAT.2015.7160190","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160190","url":null,"abstract":"Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hadoop eco system for big data security and privacy Hadoop生态系统的大数据安全和隐私
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160211
Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang
{"title":"Hadoop eco system for big data security and privacy","authors":"Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang","doi":"10.1109/LISAT.2015.7160211","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160211","url":null,"abstract":"Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Selective forwarding detection (SFD) in wireless sensor networks 无线传感器网络中的选择性转发检测(SFD)
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160207
Naser Alajmi, K. Elleithy
{"title":"Selective forwarding detection (SFD) in wireless sensor networks","authors":"Naser Alajmi, K. Elleithy","doi":"10.1109/LISAT.2015.7160207","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160207","url":null,"abstract":"Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Initiated decoy states in quantum key distribution protocol by 3 ways channel 量子密钥分配协议中由三路信道发起的诱饵状态
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160178
Abdulbast A. Abushgra, K. Elleithy
{"title":"Initiated decoy states in quantum key distribution protocol by 3 ways channel","authors":"Abdulbast A. Abushgra, K. Elleithy","doi":"10.1109/LISAT.2015.7160178","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160178","url":null,"abstract":"After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An empirical fingerprint framework to detect Rogue Access Points 一个经验指纹框架,以检测流氓接入点
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160206
Bandar Alotaibi, K. Elleithy
{"title":"An empirical fingerprint framework to detect Rogue Access Points","authors":"Bandar Alotaibi, K. Elleithy","doi":"10.1109/LISAT.2015.7160206","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160206","url":null,"abstract":"The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
IPLMS: An intelligent parking lot management system IPLMS:智能停车场管理系统
2015 Long Island Systems, Applications and Technology Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160219
Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar
{"title":"IPLMS: An intelligent parking lot management system","authors":"Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar","doi":"10.1109/LISAT.2015.7160219","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160219","url":null,"abstract":"In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信