Proceedings of the 2018 VII International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
A Compact Wideband Bandpass Filter Implemented with Triple-mode Stepped Impedance Stubs Resonator and Substrate Integrated Coaxial Line Technology 采用三模阶跃阻抗存根谐振器和基片集成同轴线技术实现的紧凑型宽带带通滤波器
Tingru Zhu, Z. Ren, Yan Zhang
{"title":"A Compact Wideband Bandpass Filter Implemented with Triple-mode Stepped Impedance Stubs Resonator and Substrate Integrated Coaxial Line Technology","authors":"Tingru Zhu, Z. Ren, Yan Zhang","doi":"10.1145/3301326.3305157","DOIUrl":"https://doi.org/10.1145/3301326.3305157","url":null,"abstract":"In this paper, a compact wideband bandpass filter is proposed using a stepped impedance stubs resonator and substrate integrated coaxial line (SICL) technology. The resonator produces three resonant frequencies and two attenuation poles near the edges of the passband, so a wide bandwidth and a high frequency selectivity transmission characteristic can be obtained. Employing multilayer printed circuit board (PCB) process, a filter prototype with compact size of 0.1 λ0×0.09 λ0 is fabricated. The measured results indicate that the proposed filter has a central frequency of 12.98 GHz with 28.1% fractional bandwidth, an insertion loss of 1.3 dB, and a wide stopband up to 28.5 GHz with a rejection better than 25 dB.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks 基于多路径的无线自组织网络合谋避免路由
Zhengping Zhang, Jian Wang
{"title":"MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc Networks","authors":"Zhengping Zhang, Jian Wang","doi":"10.1145/3301326.3301355","DOIUrl":"https://doi.org/10.1145/3301326.3301355","url":null,"abstract":"Collusion attack is a major concern in multi-path routing. A group of adversaries can collude together to pose a serious threat to multi-path-based routing system, especially in wireless ad-hoc networks. In this paper, a multi-path collusion avoidance routing (MCAR) scheme is proposed to avoid collusion, as well as other common attacks in wireless ad-hoc networks. By flooding RouteRequest packets into the network, MCAR is able to detect the potential adversaries and hence pick a secure and efficient path to route the messages. The XOR based encryption we adopted is proved to achieve perfect secrecy as long as adversaries do not have complete information regarding the message. The simulation results reveal that our scheme achieves significant improvements in delivery rate, only at a cost of negligible increasement of hop stretch.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123009142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Efficiency of Character-level Convolution Neuron Network and Long Short Term Memory on Malicious URL Detection 字符级卷积神经元网络和长短期记忆在恶意URL检测中的效率探索
Thuy Pham, Van-Nam Hoang, Thanh Ngoc Ha
{"title":"Exploring Efficiency of Character-level Convolution Neuron Network and Long Short Term Memory on Malicious URL Detection","authors":"Thuy Pham, Van-Nam Hoang, Thanh Ngoc Ha","doi":"10.1145/3301326.3301336","DOIUrl":"https://doi.org/10.1145/3301326.3301336","url":null,"abstract":"Machine learning techniques, especially deep learning neuron networks have been increasingly applied to solve the problems relating to information security and cybersecurity. Malicious URL (Uniform Resource Locator) detection is one of these. It is considered as a binary classification in machine learning, in which a URL or website address is classed as malign or benign. In this work, we implement the experiments on two different datasets to explore the efficiency of three proposed character-level deep neuron networks: (1) CNN (Convolution Neuron Network) based on VGG-16 architecture (Visual Geometry Group), (2) LSTM (Long Short Term Memory), and a fusion of CNN and LSTM for malicious URL detection. The experimental results are promising, especially for the fusion scheme of LSTM and CNN, with above 96% for precision and 98% for recall.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Method for Measuring Rotational Eye Movement by Tracking Eye Vascular Images Using luminance Gradient Information 利用亮度梯度信息跟踪眼球血管图像测量眼球转动的方法
Nayuta Ono, K. Hoshino
{"title":"Method for Measuring Rotational Eye Movement by Tracking Eye Vascular Images Using luminance Gradient Information","authors":"Nayuta Ono, K. Hoshino","doi":"10.1145/3301326.3301389","DOIUrl":"https://doi.org/10.1145/3301326.3301389","url":null,"abstract":"To estimate the angle of the rotational eye movement, the use of the vascular image of the white of the eye has an advantage of being less influenced by a change in its ambient environment unlike the use of iris patterns. However, it has a disadvantage of being hard to select any of eye vascular images as a template suitable for accurate tracking for the reasons; 1) a comparatively strong light source in its ambient environment is reflected on the eye surface and 2) the shape of the vessel in the white of the eye considerably vary with individuals. Accordingly, the present study proposes a method for estimating the rotational eye movement using a template image, which is obtained through the process involving the steps of; extracting image feature points from the white area of the eye in a captured image based on a luminance gradient and selecting, as a template image, the area of the image having a lot of feature points with less reflection from its ambient environment and less erroneous estimation because of no similar shape of vascular image in a search area. The result of the evaluation of the method showed the average value and standard deviation of all the errors of estimation were -0.69° and ±1.02°, respectively in various lighting environments.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115817661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using 3D Carbon Dioxide Slab Laser Printing Processing for Craft Teaching in Elementary School 三维二氧化碳平板激光打印加工在小学工艺教学中的应用
J. Lee, Shuo-fang Liu
{"title":"Using 3D Carbon Dioxide Slab Laser Printing Processing for Craft Teaching in Elementary School","authors":"J. Lee, Shuo-fang Liu","doi":"10.1145/3301326.3301346","DOIUrl":"https://doi.org/10.1145/3301326.3301346","url":null,"abstract":"Purpose: To provide the laser processing data of ceramic craft materials in elementary school. Method: Manufacturing and measuring samples of ceramic processing. Finding: Quickly hold the characteristics of ceramics materials Value: Providing CO2 laser data settings for teaching, and to reduce the difficulties of material processing data set. Range: Data collection of traditional glaze and laser processing","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133139991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for User Characterization based on Tweets Using Machine Learning Algorithms 使用机器学习算法的基于推文的用户表征框架
Kinza Zahra, F. Azam, Wasi Haider Butt, Fauqia Ilyas
{"title":"A Framework for User Characterization based on Tweets Using Machine Learning Algorithms","authors":"Kinza Zahra, F. Azam, Wasi Haider Butt, Fauqia Ilyas","doi":"10.1145/3301326.3301373","DOIUrl":"https://doi.org/10.1145/3301326.3301373","url":null,"abstract":"Twitter having more than three billion users is one of the most commercial and popular social networking sites. Twitter permits its users to post short messages and update their status. Tweets can be seen instantly by the followers of the users and other people with no twitter accounts. So by far most of the substance posted on the twitter is publicly accessible. Enormous number of political actors used twitter, who are interested in seeking extreme motives like radicalization, mobilization and recruiting activities. Twitters is used by large number of extremist organizations for press releases, public declaration and provide confirmation or motivation of their attacks. There have been several works looking at identifying extremist content based on twitter data but user identification using tweets has not been focused enough because of publication barrier and unavailability of data. In this research, a model is proposed which characterize a user into extremist and non-extremist categories. In this approach, pre-processing is done using natural language processing techniques and feature selection is performed using bag of words model. TF-IDF and word length is applied to obtain vector or feature to measure the significance of obtained vector in the whole document. We performed a methodology using classification through NB (Multinomial naïve Bayes) naïve Bayes on crises related tweets and Kaggle dataset related to tweets published by several Islamic State of Iraq and Sham to validate our proposed model. In this paper, a novel method is discussed for user characterization based on tweets posted by them. Evaluation results show that our suggested method gives best retrieval accuracies for word length feature extraction approach.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Enhanced technique of Self-Correcting Localization Algorithm for Vehicular Node Position Accuracy in the Distributed VANET 分布式VANET中提高车辆节点位置精度的自校正定位算法
H. Malki, Abdellatif I. Moustafa
{"title":"An Enhanced technique of Self-Correcting Localization Algorithm for Vehicular Node Position Accuracy in the Distributed VANET","authors":"H. Malki, Abdellatif I. Moustafa","doi":"10.1145/3301326.3301376","DOIUrl":"https://doi.org/10.1145/3301326.3301376","url":null,"abstract":"Applications for intelligent transportation utilize the Global Positioning Systems (GPS) signals on the Vehicular Ad-hoc Networks (VANETs) to improve road safety, traffic management and transportation system efficiency. However, Vehicular Nodes (VNs) using those applications may face the deterioration or complete loss of GPS signals due to many reasons such as changes in node velocity and/or positioning, dense foliage, compact high buildings and/or distance between vehicular nodes. Although several solutions have been developed to solve this issue through internal communication with surrounding vehicle nodes (i.e., beacons), the VNs remain to suffer the poor positioning accuracy or errors in localization estimation. In this paper, an Extended Self-Correcting Localization (ESCL-VNET) algorithm is developed to enhance the positioning accuracy and improve the localization estimation of a given VN over the distributed VANET. The technique integrates the use of Received Signal Strength Indication (RSSI) technique to enable the VNs to estimate their locations and the use of Signal to Interference Noise Ratio (SINR) values obtained through the Dedicated Short-Range Communications (DSRC) messaging by the other VNs to weight the localizations using the Weighted Centroid Localization (WCL) process. A simulation program was developed to conduct performance evaluation of the ESCL-VNET algorithm and to assess the given results. The simulation shows that the new ESCL-VNET algorithm can generate a more accurate position estimation or localization than in the case of the standard SCL-VNET. The ESCL-VNET algorithm may contribute to the development of better and more efficient localization applications as part of robust Intelligent Transportation System (ITS).","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speaker Recognition Based on Lip-reading: An Overview 基于唇读的说话人识别研究综述
Dongpeng Shang, Xinman Zhang, Xuebin Xu, Xiangyang Peng
{"title":"Speaker Recognition Based on Lip-reading: An Overview","authors":"Dongpeng Shang, Xinman Zhang, Xuebin Xu, Xiangyang Peng","doi":"10.1145/3301326.3301388","DOIUrl":"https://doi.org/10.1145/3301326.3301388","url":null,"abstract":"As a dynamic feature, lip-reading is not easy to imitate, and it can collect face information and voice information at the same time, so it has high convenience. The individuality of lip-reading can be used as the basis of speaker's identification. We can also integrate lip-reading and face information, lip-reading and voice information, which can greatly enhance the anti-counterfeiting ability of the recognition system while improving the accuracy of the recognition system. This paper mainly introduces the application of lip-reading technology in speaker recognition, introduces in detail the content and method of lip-reading technology, and the characteristics of lip-reading technology in speaker recognition, aiming to arouse people's attention and interest in this research direction and promote the progress of relevant issues..","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133596395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Estimating Task Granularity for Automating GPU Cycle Sharing 一种GPU周期共享自动化任务粒度估计方法
Keishi Tsukada, Fumihiko Ino
{"title":"A Method for Estimating Task Granularity for Automating GPU Cycle Sharing","authors":"Keishi Tsukada, Fumihiko Ino","doi":"10.1145/3301326.3301386","DOIUrl":"https://doi.org/10.1145/3301326.3301386","url":null,"abstract":"In this paper, we propose a method for estimating task granularity to reduce guest's effort in graphics processing unit (GPU) cycle sharing systems. A cycle sharing system should maximize both the frame rate for resource donators (i.e., hosts) and the acceleration effect for scientific job submitters (i.e., guests). This can be realized by selecting the appropriate granularity for guest tasks. However, a previous cooperative multitasking method requires manual interactions to find the appropriate task granularity. To avoid such interactions, the proposed method automatically estimates the appropriate granularity by measuring the length of idle periods on the host. We show how this measurement can be realized on donated resources, where the host program cannot be instrumented due to the lack of code availability. In experiments, the proposed method automatically estimated the appropriate task granularity, which not only maintained the frame rate for an image filter (i.e., host task) but also maximized the performance of matrix multiplication (i.e., guest task).","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Deep Neural Network Approach for Parking Violation Detection 停车违规检测的轻量级深度神经网络方法
Chin-Kit Ng, S. Cheong, Yee-Loo Foo
{"title":"Lightweight Deep Neural Network Approach for Parking Violation Detection","authors":"Chin-Kit Ng, S. Cheong, Yee-Loo Foo","doi":"10.1145/3301326.3301387","DOIUrl":"https://doi.org/10.1145/3301326.3301387","url":null,"abstract":"Routine patrolling and inspection of parking violations is a time-consuming and labour-intensive process. As such, a lightweight deep neural network approach is developed to automate parking violation detection in outdoor parking areas. An IP camera is utilized to continuously capture outdoor parking image covering multiple illegal parking regions and feed it to Raspberry Pi. Detection is performed on the Raspberry Pi by fusing the lightweight image classification model with sliding window search program to locate illegally parked vehicles. The system is able to detect double parking violations and vehicles that parked illegally in unmarked area. Multithreading processing is employed to speed up the detection process. An Android-based smartphone application known as the Enforcer App is developed to translate the detection results stored in server into graphical user interface. The application displays live parking violation information at parking areas as well as the position of each illegally parked vehicle to ease parking enforcement. An initial prototype was implemented at an outdoor parking lot of Multimedia University, Malaysia to study its detection performance. Experimental results demonstrate high reliability and robustness of the proposed system with no missed detection and 98.7% precision rate. The parking violation detection in three illegal parking regions are completed within a minimum time of 3.46 seconds.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信