International Conference on Computers and Their Applications最新文献

筛选
英文 中文
A Multi-Stage Detection Technique for DNS-Tunneled Botnets dns隧道僵尸网络的多阶段检测技术
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/C4WJ
Tirthankar Ghosh, E. El-Sheikh, Wasseem Jammal
{"title":"A Multi-Stage Detection Technique for DNS-Tunneled Botnets","authors":"Tirthankar Ghosh, E. El-Sheikh, Wasseem Jammal","doi":"10.29007/C4WJ","DOIUrl":"https://doi.org/10.29007/C4WJ","url":null,"abstract":"Botnet communications are obfuscated within legitimate network protocols to avoid detection and remediation. Domain Name Service (DNS) is a protocol of choice to hide communication with Command & Control (C&C) servers, where botmasters tunnel these communications within DNS request and response. Since botnet communications are characterized by different features, botmasters may evade detection methods by modifying some of these features. This paper proposes a multi-staged detection approach for Domain Generation Algorithm (DGA) using domain fluxing, Fast Flux Service Network (FFSN), and encrypted DNS tunneled-based botnets using BRO Network Security Monitor. This approach is able to detect DNS-tunneled botnet communications by analyzing different techniques used to find C&C servers, and also using signature matching technique to detect DNS-tunneled SSH handshake between bots and C&C servers.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning 基于机器学习的运动和位置数据预测奶牛的分娩
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/BKSQ
Yusuke Ono, Ryo Hatano, H. Ohwada, Hiroyuki Nishiyama
{"title":"Predicting Cow's Delivery Using Movement and Position Data Based on Machine Learning","authors":"Yusuke Ono, Ryo Hatano, H. Ohwada, Hiroyuki Nishiyama","doi":"10.29007/BKSQ","DOIUrl":"https://doi.org/10.29007/BKSQ","url":null,"abstract":"One of the major problem farmers face is that of a parturition accident. A parturition accident result in the death of the calf when the cow gives birth. In addition, it reduces the milk yield. The farmer must keep the cow under close observation for the last few days of pregnancy. A novel method to predict a cow’s delivery time automatically using time-series acceleration data and global position data by machine learning is proposed. The required data was collected by a small sensor device attached to the cow’s collar. An inductive logic programming (ILP) method was employed for a machine learning model as it can generate readable results in terms of a formula for first-order logic (FOL). To apply the machine learning technique, the collected data was converted to a logical form that includes predefined predicates of FOL. Using the obtained results, one can classify whether the cows are ready for delivery. Data was collected from 31 cows at the NAMIKI Dairy Farm Co. Ltd. Using the method described above, 130 readings were obtained. The five-fold cross-validation process verified the accuracy of the model at 56.79%.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123872434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030 在沙特阿拉伯采用和实施政府云,这是愿景2030的组成部分
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/848Q
Mohammed O. Alannsary, Yasser M. Hausawi
{"title":"Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030","authors":"Mohammed O. Alannsary, Yasser M. Hausawi","doi":"10.29007/848Q","DOIUrl":"https://doi.org/10.29007/848Q","url":null,"abstract":"Cloud computing is a relatively mature and robust technology that has promised its users with several proven advantages, such as cost reduction, immediate scalability, and resource sharing. The Cloud is built based on providing resources as services, such as providing Infrastructure, Platform, and Software as a Service. Such approach enables Cloud users to access these services based on their demand. In the government sector of Saudi Arabia, adoption and utilization of the Cloud is minimal. Despite being adopted officially, the Cloud has not been yet implemented properly. In our work we introduce how the government sector in Saudi Arabia can adopt and implement a Cloud Solution through utilizing its services and while considering issues related to its security.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smooth Trajectory Planning for Autonomous Leader-Follower Robots 自主Leader-Follower机器人的平滑轨迹规划
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/N6KT
K. Cheok, K. Iyengar, Sami Oweis
{"title":"Smooth Trajectory Planning for Autonomous Leader-Follower Robots","authors":"K. Cheok, K. Iyengar, Sami Oweis","doi":"10.29007/N6KT","DOIUrl":"https://doi.org/10.29007/N6KT","url":null,"abstract":"Path planning is a key factor that determines how well a robotic vehicle performs in executing automated formations and maneuvers as in multi-vehicle platooning and selforganizing leader following with safe and graceful movements. Many types of pathplanning schemes have been employed in the autonomous robotics and driving systems. In this paper, we will focus on the application of a smooth path-planning (SPP) algorithm that produces simple-to-implement robotic maneuvers. The algorithm is derived from using a well-established Lyapunov stability criterion and a clever dynamical control synthesis. We show that the SPP can be adapted to many autonomous guidance scenarios. Simulations show that the SPP resulted in autonomous behaviors similar to that parallel those of human or animal actions. The paper presents results using Matlab simulations as well as Gazebo animation. The results will provide a foundation for an implementation of SPP on actual robotic vehicles.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115814225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Virtual Reality Physics Lab 虚拟现实物理实验室
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/8S9W
Andrew Munoz, Christopher Lewis, Nicholas Bolling, William Zandbergen, Connor Scully-Allison, Vinh D. Le, S. Dascalu, Benjamin Brown
{"title":"Virtual Reality Physics Lab","authors":"Andrew Munoz, Christopher Lewis, Nicholas Bolling, William Zandbergen, Connor Scully-Allison, Vinh D. Le, S. Dascalu, Benjamin Brown","doi":"10.29007/8S9W","DOIUrl":"https://doi.org/10.29007/8S9W","url":null,"abstract":"","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations O(nlogn/√logn)运算中实数排序的NC算法
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/2S4G
Yijie Han, M. Sneha, Md Usman Gani Syed
{"title":"An NC Algorithm for Sorting Real Numbers in O(nlogn/√loglogn) Operations","authors":"Yijie Han, M. Sneha, Md Usman Gani Syed","doi":"10.29007/2S4G","DOIUrl":"https://doi.org/10.29007/2S4G","url":null,"abstract":"We apply the recent important result of serial sorting of n real numbers in time to the design of a parallel algorithm for sorting real numbers in time and operations. This is the first NC algorithm known to take operations for sorting real numbers. \u0000 \u0000 √loglogn","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114519050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Magnet Shapes on Metal Contamination Removal 磁体形状对金属污染去除的影响
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/9PVG
T. Ohnishi, T. Okamoto, K. Watanuki
{"title":"Effect of Magnet Shapes on Metal Contamination Removal","authors":"T. Ohnishi, T. Okamoto, K. Watanuki","doi":"10.29007/9PVG","DOIUrl":"https://doi.org/10.29007/9PVG","url":null,"abstract":"Takashi Ohnishi, Takashi Okamoto, and Keiichi Watanuki *1 Advanced Institute of Innovative Technology, Saitama University, Japan 255 Shimo-okubo, Sakura-ku, Saitama-shi, Saitama 338-8570 Japan *2 Magnetec Japan Ltd. 5-521-1, Mikajima, Tokorozawa-shi, Saitama 359-1164 Japan {ohnishi, okamoto}@magnetec.co.jp *3 Graduate School of Science and Engineering, Saitama University 255 Shimo-okubo, Sakura-ku, Saitama-shi, Saitama 338-8570 Japan watanuki@mech.saitama-u.ac.jp","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data 基于实时车辆数据的神经模糊电子制动系统建模
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/Q7PR
Ana Farhat, Kyle Hagen, K. Cheok, Balaji Boominathan
{"title":"Neuro-fuzzy-based Electronic Brake System Modeling using Real Time Vehicle Data","authors":"Ana Farhat, Kyle Hagen, K. Cheok, Balaji Boominathan","doi":"10.29007/Q7PR","DOIUrl":"https://doi.org/10.29007/Q7PR","url":null,"abstract":"Electronic Brake System (EBS) is considered as one of the most complicated systems whose performance depends on the subsystems parameters. Usually these parameters are difficult to predict. Based on the task to improve the EBS performance, this article presents a mathematical modeling approach based on neuro-fuzzy network method to model a subsystem of EBS. For the model parameters identification, a neuro-fuzzy network has been implemented based on Least Square Error (LSE) and LevenbergMarquardt Algorithm (LMA) as the optimization algorithms. Finally, the performance of identified model has been evaluated.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing JavaScript Programs Using Octagon Domain 使用八边形域分析JavaScript程序
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/6HC2
Nabil Almashfi, Lunjin Lu
{"title":"Analyzing JavaScript Programs Using Octagon Domain","authors":"Nabil Almashfi, Lunjin Lu","doi":"10.29007/6HC2","DOIUrl":"https://doi.org/10.29007/6HC2","url":null,"abstract":"Static analyzers for JavaScript use constant propagation and interval domains to discover numerical properties of program variables. These domains are non-relational and incapable of tracking relationships between variables, leading to imprecise analysis. This paper presents a static analyzer for the full language of JavaScript that employs the octagon domain to capture numerical properties of the program. Our work is built on top of TAJS (type analyzer for JavaScript) which employs a constant propagation domain for numerical properties. We reengineered TAJS’s abstract domain for abstractions of primitive values and its abstract domain for object abstractions and related transfer functions, resulting in an analyzer that is much more precise. Our experiments show an improvement in analysis precision of JavaScript programs with an acceptable increase in cost.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud TrustedDW:一个安全托管云数据仓库的新框架
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/Q3WD
Kawthar Karkouda, Ahlem Nabli, F. Gargouri
{"title":"TrustedDW: A New Framework to Securely Hosting Data Warehouse in the Cloud","authors":"Kawthar Karkouda, Ahlem Nabli, F. Gargouri","doi":"10.29007/Q3WD","DOIUrl":"https://doi.org/10.29007/Q3WD","url":null,"abstract":"Nowadays cloud computing become the most popular technology in the area of IT industry. It provides computing power, storage, network and software as a service. While building, a data warehouse typically necessitates an important initial investment. With the cloud pay-as-you-go model, BI system can benefit from this new technology. But, as every new technology, cloud computing brings its own risks in term of security. Because some security issues are inherited from classical architectures, some traditional security solutions are used to protect outsourced data. Unfortunately, those solutions are not enough and cannot guarantee the privacy of sensitive data hosted in the Cloud. In particular, in the case of data warehouse, using traditional encryption solutions cannot be practical because those solutions induce a heavy overhead in terms of data storage and query performance. So, a suitable schema must be proposed in order to balance the security and the performance of data warehouse hosted in the cloud. In this paper, we propose (TrustedDW) a homomorphic encryption schema for securing and querying a data warehouse hosted in the cloud.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信