2022 International Conference on Development and Application Systems (DAS)最新文献

筛选
英文 中文
Secure network architecture based on distributed firewalls 基于分布式防火墙的安全网络架构
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786092
Andrei-Daniel Tudosi, D. Balan, A. Potorac
{"title":"Secure network architecture based on distributed firewalls","authors":"Andrei-Daniel Tudosi, D. Balan, A. Potorac","doi":"10.1109/DAS54948.2022.9786092","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786092","url":null,"abstract":"Firewalls are essential for networking, because they are security devices designed to help protect an infrastructure from unwanted traffic, malicious attacks and outsiders that want to gain unauthorized access. These devices, hardware or software, can provide different levels of protection, depending on the situation where they are used and the entity's security policy. Because to the different network topologies and the evolution of exploits in different forms, classic firewalls can become inefficient. A low budget solution to these problems is a distributed firewall developed with open-source tools, which brings new features and improvements. Our approach in this paper is to propose a distributed firewall that solves problems and improves the overall results in network protection. We suggest the distribution of security policies of a firewall into distributed devices that work together and obtain better performance. The traffic is split between several firewalls that analyze and decide if the incoming packets will enter the network, be dropped, rejected, or redirected to a honeypot. Our proposed distributed firewall has the possibility to be scaled with different numbers of clients and network devices.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6 基于网络服务网格和IPv6分段路由的动态5G网络切片零信任网络安全方法
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786074
Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do
{"title":"Zero-Trust Cybersecurity Approach for Dynamic 5G Network Slicing with Network Service Mesh and Segment-Routing over IPv6","authors":"Bruno Dzogovic, Bernardo Santos, Ismail Hassan, Boning Feng, V. T. Do, Niels Jacot, Thanh van Do","doi":"10.1109/DAS54948.2022.9786074","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786074","url":null,"abstract":"As the 5G mobile networks become widely adopted across various industries and verticals, additional requirements for strengthening their security emerge. Traditional security approaches have been successful in preventing adversarial activities across generic networks and datacenters, but the complexity and extent of the 5G communication systems renders these insufficient. Therein the need for a stringent tactic to ensure the reduction of the attack surface within the 5G core networks. This paper examines the potential threat of Distributed Denial of Service (DDoS) and specifically, flooding attacks that can wreak havoc on the 5G mobile infrastructure as well as design a solution according to the zero-trust security model to ensure the continuity of the service in corresponding disaster scenarios.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115595883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ADLS Gen 2 for web server log data analysis ADLS Gen 2用于web服务器日志数据分析
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786071
Elisabeta Zagan, M. Danubianu
{"title":"ADLS Gen 2 for web server log data analysis","authors":"Elisabeta Zagan, M. Danubianu","doi":"10.1109/DAS54948.2022.9786071","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786071","url":null,"abstract":"Before the advent of Big Data, there were few possibilities for processing TB of data sets or more. As data generation capacity has grown, so has the need to store and process large volumes of data. The web server log files contain important and valuable information about events related to customer activities in the online environment, server activities and its response to customer requests, and much more. It is well known that web server log files are files that contain large volumes of data and grow very quickly in size, servers having to delete them once they reach a certain size. Thus, many valuable data are lost, data on which various analyzes can be made in order to obtain valuable information that will later lead to improvements on several levels. It is important to find cost-effective and easily accessible techniques for storing and analyzing these files, which are also considered to be of a high privacy level holding information classified as personal data. The main objective is the research for the development and implementation of an innovative solution for storing and analyzing large volumes of web server log files using cloud storage - ADLS Gen2.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128248260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tensor-Based and Projection-Based Methods for Dimensionality Reduction of Hyperspectral Images 基于张量和投影的高光谱图像降维方法
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786148
Laura-Bianca Bilius, S. Pentiuc
{"title":"Tensor-Based and Projection-Based Methods for Dimensionality Reduction of Hyperspectral Images","authors":"Laura-Bianca Bilius, S. Pentiuc","doi":"10.1109/DAS54948.2022.9786148","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786148","url":null,"abstract":"Inasmuch as the hyperspectral images are represented by large amounts of data it is necessary to adopt an appropriate method to reduce their size without affecting the quality of their processing results. This paper addresses the use of Tucker1 decomposition for tensor compression and dimensionality reduction, followed by a projection-based method, Principal Component Analysis (PCA). After dimensional reduction, some classifications were performed using the features extracted. Various supervised learning algorithms were used for which we calculated k-fold cross-validation loss. We made a comparison of these methods in terms of the classification results obtained. According to the results, at the same size of the transformed data, PCA features have led to lower accuracy than Tucker1 ones, and the original data.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of the fuzzy logic module to determine the expediency of event selection 开发模糊逻辑模块,确定事件选择的便捷性
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786119
Zakusylo M. Taras, V. Mesyura
{"title":"Development of the fuzzy logic module to determine the expediency of event selection","authors":"Zakusylo M. Taras, V. Mesyura","doi":"10.1109/DAS54948.2022.9786119","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786119","url":null,"abstract":"To ensure personal success it is important to maintain balance between professional achievements, health, family wellbeing, etc. It is never an easy task. But that is where the essence of effectiveness lies, balance is the key to efficiency of the short term plans and long term goals. An approach is offered to find balance between the wish to see a child clean, and the building of relationship with said child in which he or she maintains own hygiene without the need for reminders. Unfortunately such an approach may cause an issue of overload, when the desire of accomplishing everything negatively affects the ability to focus, and causes burnout. To avoid the issue of overload it is recommended to use the software that will give advice on even selection based on the rules of balance and the matrix of Eisenhower. To automate the process of decision making in terms of the expediency of even selection and their inclusion in the long term plans on the basis of the matrix of Eisenhower it is suggested to use Mamdani fuzzy model. Representation of the individual interests of the users, their preferences and expectations by use of linguistic variables, allows the opportunity to build the most effective route to success. The linguistic variables for the indicator of expediency of event selection such as urgency, importance, overload, rest, motivation are reviewed. Examples of rules for determining the task expediency indicator and the part of the knowledge base of the fuzzy system are presented. An example of the application of fuzzy logic to the event of employee training is given and it is shown that the event corresponds to a sufficient level of expediency of the event selection.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129865333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phase Shift Effects Analysis on Radiation Pattern of a Ground Plane Antenna Array 地平面天线阵辐射方向图的相移效应分析
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786221
Cezar-Ion Adomnitei, C. Lesanu, Adrian Done, M. Dimian, Iuliana Chiuchisan, A. Yu
{"title":"Phase Shift Effects Analysis on Radiation Pattern of a Ground Plane Antenna Array","authors":"Cezar-Ion Adomnitei, C. Lesanu, Adrian Done, M. Dimian, Iuliana Chiuchisan, A. Yu","doi":"10.1109/DAS54948.2022.9786221","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786221","url":null,"abstract":"This paper presents an analysis on the effect of the controlled phase shift introduced between feeding signals of an antenna array elements on modifying its radiation pattern shape. Following the idea of increasing measurements accuracy on phased antenna arrays, it was designed and built an antenna array containing two radiating telescopic elements located on a contiguous metal ground plane. All the hardware related to the functionality of the phased array was placed on the bottom of the ground plane. Even though the array was designed for the 915 MHz band, allocated to various useful satellite services, it is easily tunable in a wide range of other frequencies and also easily modifiable in a multi-element array, due to the design of the ground plane. This paper also shows a good agreement between the experimental results and those obtained from numerical simulations.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"30 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131805080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a new spectrum sensing technique for Internet of Things: An AI approach 一种新的物联网频谱传感技术评估:一种人工智能方法
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786101
Partemie-Marian Mutescu, A. Lavric, A. Petrariu, V. Popa
{"title":"Evaluation of a new spectrum sensing technique for Internet of Things: An AI approach","authors":"Partemie-Marian Mutescu, A. Lavric, A. Petrariu, V. Popa","doi":"10.1109/DAS54948.2022.9786101","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786101","url":null,"abstract":"In the last decade we observed a great demand for wireless sensor applications as the connectivity of objects related to the Internet of Things concept increased. The growing number of wireless sensors leads to more spectrum demand and eventually to collisions due to overcrowding, causing a decrease in their performance level. Thus, to avoid collisions, detailed knowledge of the radio spectrum is required such as the degree of spectrum occupancy and the radio modulations used. This paper presents an analysis of the impact of different radio signal representations (I/Q coordinates, polar coordinates, and Fast Fourier Transform) on the performance level of machine learning algorithms in spectrum sensing classification. Our results shown that machine learning algorithms achieve a higher classification accuracy when the FFT representation of the radio signal is used, with a classification accuracy of 98.6%. When using the time series, the I/Q representation of the radio signal obtained an accuracy of 68.6% on the test dataset meanwhile the polar coordinates achieved an accuracy of 90%, respectively.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CPU Execution Time Analysis based on RISC-V ISA Simulators: A Survey 基于RISC-V ISA模拟器的CPU执行时间分析综述
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786163
Nicolai Iuga, I. Zagan, V. Gaitan
{"title":"CPU Execution Time Analysis based on RISC-V ISA Simulators: A Survey","authors":"Nicolai Iuga, I. Zagan, V. Gaitan","doi":"10.1109/DAS54948.2022.9786163","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786163","url":null,"abstract":"Multiple components affect the behavior of CPU execution tasks, mainly mutual exclusion during access to the shared resources and synchronous transmissions between tasks that require specific priorities. Referring to real-time task scheduling, the most important issues addressed are monitoring the deadline of the tasks, the probability of non-compliance with the deadline and ensuring that they are completed within the deadline imposed by the controlled system. This leads to the fact that a tasks set is feasible if the system has adequate resources to execute the tasks without losing any deadlines. To approach this challenge, this article addresses the feasibility analysis of runtime for real-time tasks to be performed in a virtual space before applying to a real embedded device. These processes take place offline, even before a system executes a set of tasks. In order to perform the feasibility analysis of the system, efforts are being made to provide virtual environments and simulators, such as the RISC-V ISA simulator and the WCET (Worst Case Execution Time) measurement, subsequently. These simulators have application-specific requirements, with their own advantages.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Section method for monitoring the surface shape of a radiation spot in real time 实时监测辐射点表面形状的切片方法
2022 International Conference on Development and Application Systems (DAS) Pub Date : 2022-05-26 DOI: 10.1109/DAS54948.2022.9786114
L. Tymchenko, N. Kokriatska, Volodymyr Tverdomed, Yurii Kutaev, Dmytro Zhuk
{"title":"Section method for monitoring the surface shape of a radiation spot in real time","authors":"L. Tymchenko, N. Kokriatska, Volodymyr Tverdomed, Yurii Kutaev, Dmytro Zhuk","doi":"10.1109/DAS54948.2022.9786114","DOIUrl":"https://doi.org/10.1109/DAS54948.2022.9786114","url":null,"abstract":"An approach to solving the problem of monitoring the surface shape of a radiation spot in real life. The analysis of the use of the section method for monitoring the shape of the surface of the radiation spot in real time is carried out. Considered the possibility of using aspect ratio to solve a given problem. Experimental studies of the method of sections and form factor.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126119344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信