International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks 基于双层惩罚逻辑分类器的在线社交网络僵尸账户检测
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033349
Jing Deng, Xiaoli Gao, Chunyue Wang
{"title":"Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks","authors":"Jing Deng, Xiaoli Gao, Chunyue Wang","doi":"10.1145/3033288.3033349","DOIUrl":"https://doi.org/10.1145/3033288.3033349","url":null,"abstract":"The huge popularity of online social networks and the potential financial gain have led to the creation and proliferation of zombie accounts, i.e., fake user accounts. For considerable amount of payment, zombie accounts can be directed by their managers to provide pre-arranged biased reactions to different social events or the quality of a commercial product. It is thus critical to detect and screen these accounts. Prior arts are either inaccurate or relying heavily on complex posting/tweeting behaviors in the classification process of normal/zombie accounts. In this work, we propose to use a bi-level penalized logistic classifier, an efficient high-dimensional data analysis technique, to detect zombie accounts based on their publicly available profile information and the statistics of their followers' registration locations. Our approach, termed (B)i-level (P)enalized (LO)gistic (C)lassifier (BPLOC), is data adaptive and can be extended to mount more accurate detections. Our experimental results are based on a small number of SINA WeiBo accounts and have demonstrated that BPLOC can classify zombie accounts accurately.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Motion Image De-blurring System Based on the Effectiveness Parameters of Point Spread Function 基于点扩散函数有效性参数的运动图像去模糊系统
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033308
Chu-Hui Lee, Zhi-Yong Qiu
{"title":"Motion Image De-blurring System Based on the Effectiveness Parameters of Point Spread Function","authors":"Chu-Hui Lee, Zhi-Yong Qiu","doi":"10.1145/3033288.3033308","DOIUrl":"https://doi.org/10.1145/3033288.3033308","url":null,"abstract":"For the past many years, imaging technology has been flourishing innovation. There have developed a number of multimedia imaging equipment, such as vehicle driving recorders, smartphone photography, sport cameras, SLR cameras etc. Some multimedia imaging equipment was also generally begun to be widely used in public. But despite the advances in image processing technology and improved, there are still some of the issues have not been fully dealt with properly. Such as in the high speed moving, attempting to capture motion pictures, the objects are likely to cause the image blur. These potential challenges are worth to be studied and improved. In this paper, we will explore the influence of the dynamic camera motion blur reason and attempt to perform de-blurring on motion blurred image. During the experiment, we will set up the photographic equipment to record motion images at different speeds on sliding track, and combine inertial measurement unit to collect data of the triaxial accelerometer motion. In order to facilitate analysis of the next stage of the experiment, we use Kalman filtering to deal for noise reduction with data of the triaxial accelerometer motion. According to capture motion images at different speeds, building the motion image de-blurring system is based on the effectiveness parameters of point spread function.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Assessment of Information System in Hospital Environment 医院环境下信息系统安全评估
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033296
Suratose Tritilanunt, Surapol Ruaysungnoen
{"title":"Security Assessment of Information System in Hospital Environment","authors":"Suratose Tritilanunt, Surapol Ruaysungnoen","doi":"10.1145/3033288.3033296","DOIUrl":"https://doi.org/10.1145/3033288.3033296","url":null,"abstract":"The purpose of this paper is to propose the risk assessment for an IT security system used in a hospital. The process is developed based on the study of standard and best practices of security risk assessment used in information system. The security assessment includes key processes such as Risk Assessment and Vulnerability Verification along with other factors for supporting the development. Results from the experiment at sample hospitals, our tool was able to assess and rate the security risk which reflects the environment of the hospital's information system. This tool was able to simulate some examples of exploitation in order to test system flaws and generate a report to be used as a reference.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proposing a Sensor Fusion Technique Utilizing Depth and Ranging Sensors for Combined Human Following and Indoor Robot Navigation 提出了一种基于深度和测距传感器的人体跟随与室内机器人联合导航传感器融合技术
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033345
Mark Tee Kit Tsun, Lau Bee Theng, H. S. Jo, Sian Lun Lau
{"title":"Proposing a Sensor Fusion Technique Utilizing Depth and Ranging Sensors for Combined Human Following and Indoor Robot Navigation","authors":"Mark Tee Kit Tsun, Lau Bee Theng, H. S. Jo, Sian Lun Lau","doi":"10.1145/3033288.3033345","DOIUrl":"https://doi.org/10.1145/3033288.3033345","url":null,"abstract":"One of the main challenges faced in developing autonomous navigation for indoor robots is designing the strategy to account for a combination of obstacle avoidance while fulfilling additional maneuvering requirements. An existing child-following companion robot prototype called CARMI is used as a case study for this paper. CARMI's main function is to autonomously follow a child, maintaining her within the optimal detection zone of its vision-based activity tracking system, all the while navigating through furniture and obstructions. This paper examines CARMI's requirements and surveys the state-of-the-art of indoor navigation research, culminating in a design and proposal of a sensor-fusion technique combining the depth sensor, ranging sensor array and Active IR marker tracking system. The aim is to realize a robot navigation system for both person-following and obstacle avoidance using this novel method inspired by the Wandering Standpoint Algorithm and Potential Field Method.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bidirectional Diffusion Algorithm for Image Enhancement with Local Feature 基于局部特征的图像增强双向扩散算法
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033338
Zhonghua Wang, Faliang Huang, Shijie Hu
{"title":"Bidirectional Diffusion Algorithm for Image Enhancement with Local Feature","authors":"Zhonghua Wang, Faliang Huang, Shijie Hu","doi":"10.1145/3033288.3033338","DOIUrl":"https://doi.org/10.1145/3033288.3033338","url":null,"abstract":"To deal with the problem that the partial differential equation on image enhancement causes the edge blurring, block effect and ringing effect and so on, a new bidirectional diffusion model based on local features, which smooths the flat region and sharpens the edge in image, is presented. According to the edge features, the presented model chooses the different diffusion methods, that is to say, the non-edge is denoised by the forward diffusion in normal direction and the forward diffusion in tangential direction, while the edge is sharpened by the backward diffusion in normal direction and the forward diffusion in tangential direction. Through the simulation experiments, the model can not only better preserve the image feature, but also more obviously improve the defect contrast.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115048338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadcopter Based Localization with Archimedian Trajectory 基于阿基米德轨迹的四轴飞行器定位
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033291
Nadea Nabilla Putri, Arsla Khan, S. Shin
{"title":"Quadcopter Based Localization with Archimedian Trajectory","authors":"Nadea Nabilla Putri, Arsla Khan, S. Shin","doi":"10.1145/3033288.3033291","DOIUrl":"https://doi.org/10.1145/3033288.3033291","url":null,"abstract":"In this paper, we propose a way to solve GPS problems in the battlefield using quadcopter based localization. Information about troops positions on battlefield is essential but on the other hand the navigation using satellite system has many weaknesses such as jamming attacks, reception failure because of weather, etc. We also propose to use multicopter, quadcopter because they have been successfully used both in research and for commercial applications in recent years. Multi quadcopter during flight follow archimedian trajectory with different heights and starting points so that the coverage area will be great.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115045372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Wireless Sensor Network Using Improved Key Management 使用改进的密钥管理的安全无线传感器网络
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033351
Ibtisam J. Habeeb, Ra'ad A. Muhajjar
{"title":"Secured Wireless Sensor Network Using Improved Key Management","authors":"Ibtisam J. Habeeb, Ra'ad A. Muhajjar","doi":"10.1145/3033288.3033351","DOIUrl":"https://doi.org/10.1145/3033288.3033351","url":null,"abstract":"Wireless Sensor Network (WSN) consists of a numerous of small devices called sensor which has a limitation in resources such as low energy, memory, and computation. Sensors deployed in a harsh environment and vulnerable to various security issues and due to the resource restriction in a sensor, key management and provide robust security in this type of networks is a challenge. keys may be used in two ways in cryptography is symmetric or asymmetric, asymmetric is required more communication, memory, and computing when compared with symmetric, so it is not appropriate for WSN. In this paper, key management scheme based on symmetric keys has been proposed where each node uses pseudo-random generator (PRNG)to generate key that is shared with base station based on pre-distributed initial key and CBC - RC5 to reached to confidently, integrity and authentication.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construct Parity-check Matrix H of QC LDPC Codes via Arithmetic Progression 用等差数列构造QC LDPC码的校验矩阵H
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033344
Xue Zhang, Lu Peng, Chenyan Li, Qing Li
{"title":"Construct Parity-check Matrix H of QC LDPC Codes via Arithmetic Progression","authors":"Xue Zhang, Lu Peng, Chenyan Li, Qing Li","doi":"10.1145/3033288.3033344","DOIUrl":"https://doi.org/10.1145/3033288.3033344","url":null,"abstract":"In this correspondence, the construction of quasi-cyclic low-density parity-check(QC LDPC) codes via Arithmetic Progression(AP) is investigated. A mild necessary and sufficient condition is derived for the QC LDPC code to remove specifically circles whose girth equal to 6. Based on this condition, Arithmetic Progression method for constructing shift value matrix is proposed and it is also proved that the specifically circles do not exist. For given N,K,J and L, a family of QC LDPC code is obtained via AP method. The simulation results illustrate that code constructed via AP method can perform well.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Energy Balance Method for Wireless Sensor Networks with Small World Characteristics 小世界特性无线传感器网络的动态能量平衡方法
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033325
Peng Geng, Yan Liu, Jie Yang
{"title":"A Dynamic Energy Balance Method for Wireless Sensor Networks with Small World Characteristics","authors":"Peng Geng, Yan Liu, Jie Yang","doi":"10.1145/3033288.3033325","DOIUrl":"https://doi.org/10.1145/3033288.3033325","url":null,"abstract":"Wireless sensor networks are often used in harsh environments, such as military fields, the node energy is difficult to be added. How to design an energy efficient network model to achieve the balanced utilization of node energy and prolong the lifetime is an important challenge for the research of wireless sensor networks. Small world networks have short average path length and large clustering coefficient, which present the characteristics of high global data transmission efficiency and good local node connectivity. So the characteristics of small world networks provide a theoretical basis for building an energy efficient network. In this paper, the small world construction methods for wireless sensor networks are summarized. Wireless sensor networks with small world characteristics are constructed based on the hybrid mode, which can be divided into the stage of topology optimization, small world model construction and energy dynamic balance. The MSW-WSNs-A3 and MSW-WSNs-A3 Cov are formed based on hybrid model of small world wireless sensor networks. Based on Java platform, the new network modes are simulated and analyzed. The results show that MSW-WSNs-A3 and MSW-WSNs-A3 Cov have longer lifetime and better effectiveness.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Recognition System of Web Intrusion Detection Based on Storm 基于Storm的Web入侵检测识别系统研究
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033319
Bo Li, Jinzhen Wang, Ping Zhao, Zhongjiang Yan, Mao Yang
{"title":"Research of Recognition System of Web Intrusion Detection Based on Storm","authors":"Bo Li, Jinzhen Wang, Ping Zhao, Zhongjiang Yan, Mao Yang","doi":"10.1145/3033288.3033319","DOIUrl":"https://doi.org/10.1145/3033288.3033319","url":null,"abstract":"Based on Storm, a distributed, reliable, fault-tolerant real-time data stream processing system, we propose a recognition system of web intrusion detection. The system is based on machine learning, feature selection algorithm by TF-IDF(Term Frequency--Inverse Document Frequency) and the optimised cosine similarity algorithm, at low false positive rate and a higher detection rate of attacks and malicious behavior in real-time to protect the security of user data. From comparative analysis of experiments we find that the system for intrusion recognition rate and false positive rate has improved to some extent, it can be better to complete the intrusion detection work.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123535250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信