2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

筛选
英文 中文
Information Fusion VIA Optimized KECA with Application to Audio Emotion Recognition 信息融合通过优化的KECA及其应用于音频情感识别
Lei Gao, L. Guan
{"title":"Information Fusion VIA Optimized KECA with Application to Audio Emotion Recognition","authors":"Lei Gao, L. Guan","doi":"10.1109/CYBERC.2018.00054","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00054","url":null,"abstract":"As a recent proposed information fusion tool, Kernel Entropy Component Analysis (KECA) has attracted more attentions from the research communities of multimedia. It utilizes descriptor of entropy estimation and achieves improved performance for information fusion. However, KECA roughly reduces to sorting the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis (KPCA), without extracting the optimal features retaining more entropy of the input data. In this paper, a novel approach Optimized Kernel Entropy Components Analysis (OKECA) is introduced to information fusion, which can be considered as an alternative method to KECA for information fusion. Since OKECA explicitly extracts the optimal features that retain most informative content, it leads to improving the final performance or classification accuracy. To demonstrate the effectiveness of the proposed solution, experiments are conducted on Ryerson Multimedia Lab (RML) and eNTERFACE emotion datasets. Experimental results show that the proposed solution outperforms the existing methods based on the similar principles, and the Deep Learning (DL) based method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud Data Center Virtual Machine Placement Scheme Based on Energy Optimization 一种基于能量优化的云数据中心虚拟机布局方案
Shuo Zhang, F. Meng, Zhongyi Zhang
{"title":"A Cloud Data Center Virtual Machine Placement Scheme Based on Energy Optimization","authors":"Shuo Zhang, F. Meng, Zhongyi Zhang","doi":"10.1109/CYBERC.2018.00049","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00049","url":null,"abstract":"In an Infrastructure as a Service (IaaS) environment, a key requirement is the rational placement of virtual machines that consumers apply for. In order to reduce the energy consumption of servers and switches in the data center, reduce the operating cost of data center, this paper proposes a virtual machine placement scheme based on energy optimization. Aiming at the shortcomings of genetic algorithm in intelligent algorithm which is easy to fall into local optimum, the immune algorithm is combined to generate an optimized immune genetic algorithm and a placement scheme is generated. In this paper, the data center structure is constructed, the energy consumption model of data center is constructed, and the simulation experiment is carried out. Through the experiment comparison, the proposed virtual machine placement scheme can effectively reduce data center energy consumption, and achieve effective results.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technical Program Committee 技术计划委员会
M. Abolhasan, S. Adibi, Deyun Gao
{"title":"Technical Program Committee","authors":"M. Abolhasan, S. Adibi, Deyun Gao","doi":"10.1109/cyberc.2018.00010","DOIUrl":"https://doi.org/10.1109/cyberc.2018.00010","url":null,"abstract":"Mohd Riduan Ahmad Universiti Teknikal Malaysia Melaka Malaysia Naoyuki Aikawa Tokyo University of Science Japan Annamalai Annamalai Prairie View A&M University USA Kaoru Arakawa Meiji University Japan Kunihiko Asakura Yonago National College of Technology Japan Akira Asano Kansai University Japan Rafael Asorey-Cacheda Technical University of Cartagena Spain Edward Au Huawei Technologies Co., Ltd. Canada Surapong Auwatanamongkol NIDA Thailand Vo Nguyen Quoc Bao Posts and Telecommunications Institute of Technology Vietnam Thibault Bernard University of Reims Champagne Ardenne France Huynh Thi Thanh Binh HUST Vietnam Huynh Thi Thanh Binh HUST Vietnam Smich Butcharoen King Mongkut's University of Technology North Bangkok Thailand Rhandley Cajote University of the Philippines Philippines Thuong Canh 2-8, Yamadaoka, Suita Japan KyungHi Chang Inha University Korea Shi-Chung Chang National Taiwan University Taiwan Su Fong Chien MIMOS Berhad Malaysia Jae-Kark Choi Hanwha Systems Korea Qimei Cui Beijing University of Posts and Telecommunications P.R. China Nguyen Cuong 102 Hung Vuong Tam Ky Quang Nam Vietnam Haibo Dai Nanjing University of Posts and Telecommunications P.R. China Nhu-Ngoc Dao University of Bern Switzerland Son Hoang Dau RMIT University Australia Mérouane Debbah Huawei France Hoang Dinh University of Technology Sydney (UTS) Australia Quang-Thang Duong Nara Institute of Science and Technology Japan Alban Duverdier Centre National D'Etudes Spatiales (CNES) France Tobias Eggendorfer Hochschule Ravensburg-Weingarten Germany Ulrich Engelke Commonwealth Scientific and Industrial Research Organisation (CSIRO) Australia","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) Techniques 基于ICC世界杯预测的数据分析和商业智能(BI)技术
A. Aburas, Muhammed Mehtab, Yusuf Mehtab
{"title":"ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) Techniques","authors":"A. Aburas, Muhammed Mehtab, Yusuf Mehtab","doi":"10.1109/CYBERC.2018.00056","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00056","url":null,"abstract":"The ICC 2019 Cricket World Cup is scheduled to be hosted by England and Wales. This research work aims to predict the winner of the 12th version of ICC world cup using Business Intelligent (BI) and K Nearest Neighbors KNN bigdata approach. The research works will start off with business intelligent (BI) case and the Big Data lifecycle. Machine Learning, KNN and R Language will be defined in depth. Then, it will give a detailed to extract all patterns that suitable for machine learning tool to predict the winner. Thereafter, data reduction algorithm will be presented. Additionally, explain in details all steps are taken to achieve the KNN classifications. The source and selected datasets required are given. Finally, the root of this paper, the prediction of the winner of the 2019 ICC Cricket World Cup is declared.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"427 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture 基于大数据管道架构的实时消息系统性能评估
Thandar Aung, Hla Yin Min, A. Maw
{"title":"Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture","authors":"Thandar Aung, Hla Yin Min, A. Maw","doi":"10.1109/CYBERC.2018.00047","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00047","url":null,"abstract":"Nowadays, Real time messaging system is the essential thing in enabling time-critical decision making in many applications where it is important to deal with real-time requirements and reliability requirements simultaneously. For dependability reasons, we intend to maximize the reliability requirement of real time messaging system. To develop real time messaging system, we create real time big data pipeline by using Apache Kafka and Apache Storm. This paper focuses on analyzing the performance of producer and consumer in Apache Kafka processing. The performance of Kafka processing modify to be more reliable on the pipeline architecture. Then, the experiment will be conducted the processing time in the performance of the producer and consumer on various partitions. The performance evaluation of Kafka can impact on messaging system in real time big data pipeline architecture.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming 基于协同干扰的中继网络安全中断概率分析
Yan Zheng, Shou-yi Yang, Hao Fu, Tian Chen
{"title":"Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming","authors":"Yan Zheng, Shou-yi Yang, Hao Fu, Tian Chen","doi":"10.1109/CYBERC.2018.00021","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00021","url":null,"abstract":"In view of the security of the relay system with eavesdropping node, the secure outage probability of relay system under cooperative jamming mechanism is studied based on the theory of physical layer security. The method of transmitting jamming signals by the source node and destination node is proposed to make the receiving of eavesdropping node worse than the legal node, improving the secure performance of the system. Meanwhile, the self-interference caused by the relay node in the full-duplex is avoided. The theoretical derivation of the system's secure outage probability is also made. The simulation results show that compared with the traditional relay network, the proposed system's secure outage probability is significantly reduced by using cooperative jamming technology. In addition, with the cooperative jamming mechanism, the secure outage probability of the proposed half-duplex network is better than that of full-duplex network.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Word Representation with Word Pair Distributional Asymmetry 利用词对分布不对称改进词表示
Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong
{"title":"Improving Word Representation with Word Pair Distributional Asymmetry","authors":"Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong","doi":"10.1109/CYBERC.2018.00024","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00024","url":null,"abstract":"Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms 基于传统FPGA和LabVIEW FPGA平台的高效高速AES实现
M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe
{"title":"An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms","authors":"M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe","doi":"10.1109/CYBERC.2018.00028","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00028","url":null,"abstract":"The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Acquisition and Analysis Technology of Personalized Recommendation System Based on Case-Based Reasoning for Internet of Things 基于案例推理的物联网个性化推荐系统信息获取与分析技术
Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan
{"title":"Information Acquisition and Analysis Technology of Personalized Recommendation System Based on Case-Based Reasoning for Internet of Things","authors":"Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan","doi":"10.1109/CYBERC.2018.00031","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00031","url":null,"abstract":"In the paper, we discuss the theories of the information acquisition and analysis and the information quality of the case-based reasoning (CBR) personalized recommendation system. We also take a deep study of the key techniques of acquiring and analyzing information quality. With research results of this paper, combined with the content-based recommendation technology and recommendation results of collaborative filtering, a CBR-based personalized combinatorial recommendation algorithm is designed.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying 物理层安全双向中继的协同干扰与中继波束形成设计
Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang
{"title":"Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying","authors":"Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang","doi":"10.1109/CYBERC.2018.00066","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00066","url":null,"abstract":"In this work, physical layer secure transmission of a cooperative wireless communication system over a three-phase amplify-and-forward (AF) two-way relaying channels is studied. A cooperative jamming and multi-antenna relay beamforming scheme that improves physical layer security of the system is proposed. Specifically, it is suggested that in the first and second timeslots when the legitimate users transmit alternatively, a jamming signal can be transmitted by the legitimate party that is not transmitting information-bearing signals This scheme, compared with the approach using a dedicated jammer, achieves a similar jamming effect with reduced complexity. In the third time slot of the protocol, the relay uses two beamforming matrices to process the bidirectional information signals. The jamming signal components at the relay are projected onto the null space of the legitimate relay-destination channels such that they do not affect legitimate communications. Through joint optimization, the sum throughput of the legitimate communication is maximized. In the numerical examples, the proposed scheme is shown to improve the system's secrecy transmission performance.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信