{"title":"Information Fusion VIA Optimized KECA with Application to Audio Emotion Recognition","authors":"Lei Gao, L. Guan","doi":"10.1109/CYBERC.2018.00054","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00054","url":null,"abstract":"As a recent proposed information fusion tool, Kernel Entropy Component Analysis (KECA) has attracted more attentions from the research communities of multimedia. It utilizes descriptor of entropy estimation and achieves improved performance for information fusion. However, KECA roughly reduces to sorting the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis (KPCA), without extracting the optimal features retaining more entropy of the input data. In this paper, a novel approach Optimized Kernel Entropy Components Analysis (OKECA) is introduced to information fusion, which can be considered as an alternative method to KECA for information fusion. Since OKECA explicitly extracts the optimal features that retain most informative content, it leads to improving the final performance or classification accuracy. To demonstrate the effectiveness of the proposed solution, experiments are conducted on Ryerson Multimedia Lab (RML) and eNTERFACE emotion datasets. Experimental results show that the proposed solution outperforms the existing methods based on the similar principles, and the Deep Learning (DL) based method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114724242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Data Center Virtual Machine Placement Scheme Based on Energy Optimization","authors":"Shuo Zhang, F. Meng, Zhongyi Zhang","doi":"10.1109/CYBERC.2018.00049","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00049","url":null,"abstract":"In an Infrastructure as a Service (IaaS) environment, a key requirement is the rational placement of virtual machines that consumers apply for. In order to reduce the energy consumption of servers and switches in the data center, reduce the operating cost of data center, this paper proposes a virtual machine placement scheme based on energy optimization. Aiming at the shortcomings of genetic algorithm in intelligent algorithm which is easy to fall into local optimum, the immune algorithm is combined to generate an optimized immune genetic algorithm and a placement scheme is generated. In this paper, the data center structure is constructed, the energy consumption model of data center is constructed, and the simulation experiment is carried out. Through the experiment comparison, the proposed virtual machine placement scheme can effectively reduce data center energy consumption, and achieve effective results.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical Program Committee","authors":"M. Abolhasan, S. Adibi, Deyun Gao","doi":"10.1109/cyberc.2018.00010","DOIUrl":"https://doi.org/10.1109/cyberc.2018.00010","url":null,"abstract":"Mohd Riduan Ahmad Universiti Teknikal Malaysia Melaka Malaysia Naoyuki Aikawa Tokyo University of Science Japan Annamalai Annamalai Prairie View A&M University USA Kaoru Arakawa Meiji University Japan Kunihiko Asakura Yonago National College of Technology Japan Akira Asano Kansai University Japan Rafael Asorey-Cacheda Technical University of Cartagena Spain Edward Au Huawei Technologies Co., Ltd. Canada Surapong Auwatanamongkol NIDA Thailand Vo Nguyen Quoc Bao Posts and Telecommunications Institute of Technology Vietnam Thibault Bernard University of Reims Champagne Ardenne France Huynh Thi Thanh Binh HUST Vietnam Huynh Thi Thanh Binh HUST Vietnam Smich Butcharoen King Mongkut's University of Technology North Bangkok Thailand Rhandley Cajote University of the Philippines Philippines Thuong Canh 2-8, Yamadaoka, Suita Japan KyungHi Chang Inha University Korea Shi-Chung Chang National Taiwan University Taiwan Su Fong Chien MIMOS Berhad Malaysia Jae-Kark Choi Hanwha Systems Korea Qimei Cui Beijing University of Posts and Telecommunications P.R. China Nguyen Cuong 102 Hung Vuong Tam Ky Quang Nam Vietnam Haibo Dai Nanjing University of Posts and Telecommunications P.R. China Nhu-Ngoc Dao University of Bern Switzerland Son Hoang Dau RMIT University Australia Mérouane Debbah Huawei France Hoang Dinh University of Technology Sydney (UTS) Australia Quang-Thang Duong Nara Institute of Science and Technology Japan Alban Duverdier Centre National D'Etudes Spatiales (CNES) France Tobias Eggendorfer Hochschule Ravensburg-Weingarten Germany Ulrich Engelke Commonwealth Scientific and Industrial Research Organisation (CSIRO) Australia","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICC World Cup Prediction Based Data Analytics and Business Intelligent (BI) Techniques","authors":"A. Aburas, Muhammed Mehtab, Yusuf Mehtab","doi":"10.1109/CYBERC.2018.00056","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00056","url":null,"abstract":"The ICC 2019 Cricket World Cup is scheduled to be hosted by England and Wales. This research work aims to predict the winner of the 12th version of ICC world cup using Business Intelligent (BI) and K Nearest Neighbors KNN bigdata approach. The research works will start off with business intelligent (BI) case and the Big Data lifecycle. Machine Learning, KNN and R Language will be defined in depth. Then, it will give a detailed to extract all patterns that suitable for machine learning tool to predict the winner. Thereafter, data reduction algorithm will be presented. Additionally, explain in details all steps are taken to achieve the KNN classifications. The source and selected datasets required are given. Finally, the root of this paper, the prediction of the winner of the 2019 ICC Cricket World Cup is declared.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"427 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture","authors":"Thandar Aung, Hla Yin Min, A. Maw","doi":"10.1109/CYBERC.2018.00047","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00047","url":null,"abstract":"Nowadays, Real time messaging system is the essential thing in enabling time-critical decision making in many applications where it is important to deal with real-time requirements and reliability requirements simultaneously. For dependability reasons, we intend to maximize the reliability requirement of real time messaging system. To develop real time messaging system, we create real time big data pipeline by using Apache Kafka and Apache Storm. This paper focuses on analyzing the performance of producer and consumer in Apache Kafka processing. The performance of Kafka processing modify to be more reliable on the pipeline architecture. Then, the experiment will be conducted the processing time in the performance of the producer and consumer on various partitions. The performance evaluation of Kafka can impact on messaging system in real time big data pipeline architecture.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming","authors":"Yan Zheng, Shou-yi Yang, Hao Fu, Tian Chen","doi":"10.1109/CYBERC.2018.00021","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00021","url":null,"abstract":"In view of the security of the relay system with eavesdropping node, the secure outage probability of relay system under cooperative jamming mechanism is studied based on the theory of physical layer security. The method of transmitting jamming signals by the source node and destination node is proposed to make the receiving of eavesdropping node worse than the legal node, improving the secure performance of the system. Meanwhile, the self-interference caused by the relay node in the full-duplex is avoided. The theoretical derivation of the system's secure outage probability is also made. The simulation results show that compared with the traditional relay network, the proposed system's secure outage probability is significantly reduced by using cooperative jamming technology. In addition, with the cooperative jamming mechanism, the secure outage probability of the proposed half-duplex network is better than that of full-duplex network.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Word Representation with Word Pair Distributional Asymmetry","authors":"Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong","doi":"10.1109/CYBERC.2018.00024","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00024","url":null,"abstract":"Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe
{"title":"An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms","authors":"M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe","doi":"10.1109/CYBERC.2018.00028","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00028","url":null,"abstract":"The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan
{"title":"Information Acquisition and Analysis Technology of Personalized Recommendation System Based on Case-Based Reasoning for Internet of Things","authors":"Jieli Sun, Yao Zhai, Yanxia Zhao, Jianke Li, Naishi Yan","doi":"10.1109/CYBERC.2018.00031","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00031","url":null,"abstract":"In the paper, we discuss the theories of the information acquisition and analysis and the information quality of the case-based reasoning (CBR) personalized recommendation system. We also take a deep study of the key techniques of acquiring and analyzing information quality. With research results of this paper, combined with the content-based recommendation technology and recommendation results of collaborative filtering, a CBR-based personalized combinatorial recommendation algorithm is designed.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang
{"title":"Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying","authors":"Zonghao Ma, Yanhui Lu, Lingfeng Shen, Yili Liu, Ning Wang","doi":"10.1109/CYBERC.2018.00066","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00066","url":null,"abstract":"In this work, physical layer secure transmission of a cooperative wireless communication system over a three-phase amplify-and-forward (AF) two-way relaying channels is studied. A cooperative jamming and multi-antenna relay beamforming scheme that improves physical layer security of the system is proposed. Specifically, it is suggested that in the first and second timeslots when the legitimate users transmit alternatively, a jamming signal can be transmitted by the legitimate party that is not transmitting information-bearing signals This scheme, compared with the approach using a dedicated jammer, achieves a similar jamming effect with reduced complexity. In the third time slot of the protocol, the relay uses two beamforming matrices to process the bidirectional information signals. The jamming signal components at the relay are projected onto the null space of the legitimate relay-destination channels such that they do not affect legitimate communications. Through joint optimization, the sum throughput of the legitimate communication is maximized. In the numerical examples, the proposed scheme is shown to improve the system's secrecy transmission performance.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}