Hua Zhao, Ruofei Zou, H. Duan, Q. Zeng, C. Li, Xiuli Diao, Weijian Ni, N. Xie
{"title":"An online paper recommendation system driven by user's interest model and user group","authors":"Hua Zhao, Ruofei Zou, H. Duan, Q. Zeng, C. Li, Xiuli Diao, Weijian Ni, N. Xie","doi":"10.1145/3290420.3290472","DOIUrl":"https://doi.org/10.1145/3290420.3290472","url":null,"abstract":"How to recommend appropriate papers to researchers based on their research interest has already attracted lots of attentions. A research interest model based on several historical behaviors is proposed. A reduction function is proposed to adjust the different influences of the behaviors, and then the user group with similar interests is created based on the interest model. Two paper recommendation methods are finally explored, which based on the user's research interests and on the user group, respectively. Experiments show that the proposed research interest model performs well.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving multiclass classification and outlier detection method through ensemble technique","authors":"Dalton Ndirangu, W. Mwangi, L. Nderu","doi":"10.1145/3290420.3290450","DOIUrl":"https://doi.org/10.1145/3290420.3290450","url":null,"abstract":"Class imbalance problems in multiclass have attracted much research focus due to classification difficulty caused by imbalance class distribution, presence of outliers, and irrelevant features that degrades performance of classifiers. Most of the commonly used classification algorithms are developed for binary problem. Rare classes in the multiclass datasets may be treated as outlier classes. The study proposed development of an ensemble multiclass classification and outlier method using adaboost, random subspace algorithms with random forest as base classifiers and voting combination technique. Experimental results shows that the proposed method outperformed most of the commonly used classification algorithms such as KNN, bagging, Naive Bayes, and random forest. Using rare classes as the outlier classes, the proposed method performed better than outlier detection methods built using Naive Bayes, KNN, decision trees, and random forest algorithms. The study concludes that ensemble techniques leads to an improved multiclass classification and outlier detection method.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient spark analysis on incremental datasets","authors":"Wei Sheng, Zhao Cao, Dacheng Qu","doi":"10.1145/3290420.3290460","DOIUrl":"https://doi.org/10.1145/3290420.3290460","url":null,"abstract":"Distributed analysis platform such as Spark provides an unprecedented capacity on big data analysis processing, especially, for Extract-Transform-Load (ETL), which has won the wide recognition by academia and industry. The performance based on Spark, however, comes from immutable datasets losing flexibility of mutable ones with trivial changes. Therefore, there is an unmet demand on how to efficiently integrate distributed dynamical datasets between two or more autonomous computer systems or servers. Traditional data synchronization solutions detect changes and apply them to target datasets, which is impossible for Spark since the resilient distributed dataset (RDD) is invariant in nature. In this paper, we design a paradigm for integrating datasets from several data repositories by extending RDD mechanism to enable incremental processing. We use appended logs for each RDD component to avoid serious performance degradation caused by re-fetching full dataset. Furthermore, a cost model is proposed to evaluate the cost of merging these changes into an existing RDD or forming a new RDD from scratch, providing us a balance between incremental processing and re-fetching explicitly. Our experimental results demonstrate the necessity of incremental processing and the effectiveness of our cost model.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental study on speech enhancement using DNN with perceptual weighting","authors":"Wenhua Shi, Xiongwei Zhang, Xia Zou, Meng Sun","doi":"10.1145/3290420.3290465","DOIUrl":"https://doi.org/10.1145/3290420.3290465","url":null,"abstract":"Based on the phenomenon that auditory system is not easily distinguish quantization noise from high energy region of spectrum, an experimental study on speech enhancement using deep neural network with perceptual weighting is presented in this paper. The error criterion of auditory weighting, which is widely used in low bit rate vo-coder is employed by applying a filter on the error spectrum. The filter has a shape of the inverse spectrum with the original signal. Deep neural network is used to learn the nonlinear mapping form the noisy speech signal to the clean speech by minimizing the weighted error spectrum between the estimated speech and target speech. Experimental study is implemented on the TIMIT database corrupted by unmatched noise during training and test stage. The results demonstrate that the proposed method outperform baseline methods in terms of perceptual evaluation of speech quality, log-spectral distortion in most types of noise.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Per-bank refresh with adaptive early termination for high density DRAM","authors":"Hyunggyun Yang, Min-Kyu Lee, Ki-Seok Chung","doi":"10.1145/3290420.3290442","DOIUrl":"https://doi.org/10.1145/3290420.3290442","url":null,"abstract":"DRAM, which is mainly used as main memory, requires a refresh operation to maintain the integrity of stored data. Since memory read and write operations to a bank are not allowed while the bank is being refreshed, a lot of memory accesses may be blocked due to refresh, which may lead to significant performance degradation. Therefore, a lot of active studies to minimize this negative performance impact of refresh have been conducted. In a refresh scheme called per-bank refresh, the refresh unit will be one bank rather than all banks in a rank, allowing memory access to other banks while a certain bank in the same rank is refreshed. However, the per-bank refresh consumes more power than all-bank refresh. In this paper, we propose a per-bank refresh method with adaptive early termination, which allows both the refresh period and the size of each row group to be non-uniformly determined, to increase the efficiency of per-bank refresh and reduce energy consumption. By using this method, compared to the basic allbank refresh model, the average weighted speed increases by about 6.4% and the energy consumption is reduced by about 51%.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"337 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131589245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process similarity computing by combining model structure and log behavior","authors":"Changhong Zhou, Q. Zeng, H. Duan, Cong Liu","doi":"10.1145/3290420.3290446","DOIUrl":"https://doi.org/10.1145/3290420.3290446","url":null,"abstract":"Traditional process similarity measures are not precise enough as they simply compare processes with respect to model structure or behavior separately. To address the problem, in this paper, we introduce a novel measure to quantify process similarity based on model structure and log behavior. The proposed measure first constructs a weighted process graph (WPG) from the process model and the process log, and then computes the weighted node adjacent relation similarity of two WPGs. The WPG that combines both model structure and process log behavior provides a comprehensive description of the underlying business processes for a more accurate similarity measure. By experimental evaluation, we demonstrate the effectiveness of the proposed approach comparing with existing process similarity measures.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"31 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast spectrum sensing and revocation testbed based on USRP and GNU radio for cognitive radio networks","authors":"Wen-Kang Jia, Yun Zheng, Tain-Sao Chang","doi":"10.1145/3290420.3290424","DOIUrl":"https://doi.org/10.1145/3290420.3290424","url":null,"abstract":"Since the use of wireless devices in the already overcrowded licensed and unlicensed bands had been further growing recently. Realization of wireless communications in Cognitive Radio (CR) is one of the most urgent research and development issues to accommodate rapidly increasing wireless access. In order to ensure avoidance of interference from Secondary Users (SUs) to Primary Users (PUs), adoption of White Space Database (WSDB) is one of the important strategies. In this paper, we have implemented the PAWS API and WSDB for spectrum allocation and show that mechanism operations with an experimental DSA network, which enables the SUs to share the White Space (WS) of PUs in a fine geolocation and timescale. In the experimental setup, the DSA network consists of the secondary transmitter node (STN) and secondary receiver node (SRN), a sensing node (SN), and primary transmitter node (PTN). The network is constructed by using the proposed spectrum sensing and revocation testbed. The testbed employs the Universal Software Radio Peripheral (USRP) devices and open source software, named GNU radio, to develop the spectrum sensing and revocation mechanism. We demonstrate the communication between the STN and the SRN, while avoiding interference to PTN which operates in the same spectrum. The experimental shows that the network is capable of detecting PTN in real time and revocation spectrum adaptively to avoid interference to primary receiver node (PRN). The experimental results are presented to show that the performance of proposed mechanism in terms of the expending time of sensing available channels and revocation spectrum.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130562297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved AODV routing protocol based on social relationship mining for VANET","authors":"Wanbin Zhang, Xiaoqiang Xiao, Jijin Wang, Peng Lu","doi":"10.1145/3290420.3290429","DOIUrl":"https://doi.org/10.1145/3290420.3290429","url":null,"abstract":"The growing development of VANET (Vehicular Ad-hoc Network) brings possibility to exploit various mobile applications which makes people's trips comfortable, safe and full of interests. Besides, the trajectory mining of vehicles can discover the implied social relationships among vehicles which can conduct the optimizing of VANET routing protocols. In this paper, we have analyzed the cons of typical AODV (Ad-hoc On Demand Vector) protocols and proposed a social AODV protocol (SAODV) in which social relationships among vehicles based on historical trajectories are investigated and the criterion of choosing routing paths is optimized. After constructing the simulator based on \"NS-3\", the simulation results show that the SAODV protocol has better performance in average transmission delay and packet delivery ratio.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of FPGA-based LDPC decoder using high-level synthesis","authors":"G. Choi, Kyeong-Bin Park, Ki-Seok Chung","doi":"10.1145/3290420.3290441","DOIUrl":"https://doi.org/10.1145/3290420.3290441","url":null,"abstract":"Low Density Parity Check (LDPC) codes are widely used in various communication and storage systems due to outstanding error correcting capability. In this paper, we present a Field Programmable Gate Array (FPGA) implementation of the LDPC decoder using High-Level Synthesis (HLS). Because HLS can synthesize a hardware implementation from a high-level description, it is very effective in reducing design time, and in exploring various design alternatives. One of the biggest advantages of FPGAs is flexibility, and therefore, HLS for FPGAs is widely adopted as a good hardware synthesis method. In this paper, we describe an LDPC decoder in high level language, and a HLS tool called SDSoC is used to synthesize the decoder. The proposed design is a serial LDPC decoder that requires smaller amount on hardware resource and power consumption than the conventional design. The major drawback of a serial decoder is slow speed. To overcome such drawback, optimization techniques such as array partitioning, loop unrolling, pipelining methods and fixed-point conversion are applied. With the application of these techniques, the decoding speed of the proposed implementation is 8.11 times and 2.79 times faster than that of a non-optimized implementation and that of a software-based LDPC decoder, respectively.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic and heterogeneous web application to defense webshell attacks by using diversified PHP code","authors":"Weichao Li, Zheng Zhang, Liqun Wang","doi":"10.1145/3290420.3290438","DOIUrl":"https://doi.org/10.1145/3290420.3290438","url":null,"abstract":"Malicious code injection attacks often bypass rules based filtering methods by various deformable methods. Based on the PHP web application environment, we proposed a method of using code diversification, and then defended the PHP webshell attack threat by constructing a dynamic and heterogeneous PHP web application which uses the redundancy adjudication and dynamic transformation method. Finally, this method is verified in cloud service environment.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}