2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)最新文献

筛选
英文 中文
Validating information security framework for offloading from LTE onto D2D links 验证从LTE卸载到D2D链路的信息安全框架
A. Orsino, A. Ometov
{"title":"Validating information security framework for offloading from LTE onto D2D links","authors":"A. Orsino, A. Ometov","doi":"10.1109/FRUCT-ISPIT.2016.7561534","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561534","url":null,"abstract":"D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Side-channel attacks and machine learning approach 侧信道攻击和机器学习方法
A. Levina, D. Sleptsova, Oleg Zaitsev
{"title":"Side-channel attacks and machine learning approach","authors":"A. Levina, D. Sleptsova, Oleg Zaitsev","doi":"10.1109/FRUCT-ISPIT.2016.7561525","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561525","url":null,"abstract":"Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks with combination of statistical tools. Few studies cover using machine learning methods for pre-processing and key classification tasks. In this paper, we investigate applicability of machine learning methods and their characteristic. Following theoretical results, we examine power traces of AES encryption with Support Vector Machines algorithm and decision trees and provide roadmap for further research.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and implementation of the first aid assistance service based on Smart-M3 platform 基于Smart-M3平台的急救服务设计与实现
N. Lebedev, Ivan Timofeev, I. Zavialova
{"title":"Design and implementation of the first aid assistance service based on Smart-M3 platform","authors":"N. Lebedev, Ivan Timofeev, I. Zavialova","doi":"10.1109/FRUCT-ISPIT.2016.7561524","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561524","url":null,"abstract":"Smart technologies may be successfully applied in healthcare for creation of an IoT-enabled proactive pre-hospital and first aid assistance mobile services. A variety of smart services for the m-Health scenarios may be constructed by interaction of multiple knowledge processors (software agents) running on devices of the IoT environment. Thus, IoT-enabled m-Health applications should provide connection with smart space. It is possible to build such kind of services with Smart-M3 platform. The ontology describes interaction rules and the high-level design of the service. The first aid assistance scenario was chosen as a basic one. According to this scenario, sympathetic people provide first aid to patients in case of emergency. The study is focused on the implementation of the first aid assistance service consists of knowledge processors running on Linux servers and Android mobile devices. Such service should be scalable with adding new modules, sensors or participants. The purpose is to evaluate a possibility of application of a smart spaces approach for implementation mobile first aid services. Besides, implementation issues of server and client sides are discussed.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recommending tourist locations based on data from photo sharing service: Method and algorithm 基于照片分享服务数据的旅游地点推荐:方法与算法
A. Ponomarev
{"title":"Recommending tourist locations based on data from photo sharing service: Method and algorithm","authors":"A. Ponomarev","doi":"10.1109/FRUCT-ISPIT.2016.7561538","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561538","url":null,"abstract":"Tourists' information support is more actual than ever, objectively because tourism is one of the largest and fastest-growing economic sectors and subjectively because each tourist faces unfamiliar and dynamic environment, which he or she has to adapt to. One of the ways to deliver information support to tourist is various recommender systems. Classical way to build recommender systems requires either collection of ratings (collaborative filtering system) or extensive knowledge work on describing tourism domain and attractions of each area. However, there is another, more lightweight approach - to make recommendations based on social media analysis. This paper presents a method and an algorithm for identifying potentially interesting locations based on Flickr photo sharing site media stream. One of the particular problems addressed in this paper is to reduce the number of queries to the Flickr AFL.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133689837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smartphone-based identification of dangerous driving situations: Algorithms and implementation 基于智能手机的危险驾驶情况识别:算法与实现
A. Smirnov, A. Kashevnik, I. Lashkov, O. Baraniuc, V. Parfenov
{"title":"Smartphone-based identification of dangerous driving situations: Algorithms and implementation","authors":"A. Smirnov, A. Kashevnik, I. Lashkov, O. Baraniuc, V. Parfenov","doi":"10.1109/FRUCT-ISPIT.2016.7561543","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561543","url":null,"abstract":"In this paper, we demonstrate the concept of the situation analysis of dangerous driving events for smartphones to fully understand the driving situation in a given scenario in a real time and to undertake actions necessary to avoid road accidents. To fulfil these, we utilize a wide array of sensors for creating a consistent and extendable description of most common dangerous situations, a situation model and situation analysis. In the situation model, on-board smartphone sensing signals are used to build up a representation of the environment around and within the vehicle. On top of the situation model, a situation analysis is established to detect driver hazards, according to the given description of the driving situation, and provide a driving strategy to prevent such dangerous situations. The paper describes the details of the algorithms, following by simulation results, which show the feasibility of the proposed algorithm.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Face detection algorithm based on a cascade of ensembles of decision trees 基于决策树集合级联的人脸检测算法
A. Lebedev, V. Pavlov, V. Khryashchev, O. Stepanova
{"title":"Face detection algorithm based on a cascade of ensembles of decision trees","authors":"A. Lebedev, V. Pavlov, V. Khryashchev, O. Stepanova","doi":"10.1109/FRUCT-ISPIT.2016.7561522","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561522","url":null,"abstract":"Face detection algorithm based on a cascade of ensembles of decision trees (CEDT) is presented. The new approach allows detecting faces other than the front position through the use of multiple classifiers. Each classifier is trained for a specific range of angles of the rotation head. The results showed a high rate of productivity for CEDT on images with standard size. The algorithm increases the area under the ROC-curve of 13% compared to a standard Viola-Jones face detection algorithm. To test the applicability of the algorithm in the real world have been conducted research on a robustness. Robustness research shown that the algorithm based on the CEDT show that Gaussian noise, impulsive “salt-and-pepper” noise exert a strong influence on the algorithm (in the worst case decrease in the area under the ROC-curve of 21.2% with a decrease in PSNR metric to 17.99 dB). At the same time blurring, JPEG-compression and JPEG2000 algorithms distortion have little effect on the proposed face detection algorithm (reduction of the area under the ROC-curve by 3.5% while reducing PSNR metric to 21.58 dB).","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid automated line workstations interaction scenario for optical devices assembly 用于光学设备装配的混合自动化工作站交互方案
A. Kashevnik, N. Teslya, E. Yablochnikov, V. Arckhipov, K. Kipriyanov
{"title":"Hybrid automated line workstations interaction scenario for optical devices assembly","authors":"A. Kashevnik, N. Teslya, E. Yablochnikov, V. Arckhipov, K. Kipriyanov","doi":"10.1109/FRUCT-ISPIT.2016.7561513","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561513","url":null,"abstract":"The paper propose a scenario for interaction of workstations in the hybrid automated assembly line. Presented scenario is a part of optical devices assembly process. For the interaction of workstations an ontology-based publish / subscribe self-organizing mechanism is used. For the scenario implementation, an appropriate 3D model has been developed with help of DELMIA modelling system. For modelling workstation interaction the services have been developed based on Smart-M3 information sharing platform that provides possibilities for information sharing and ontology-based publish / subscribe mechanism between different services in a common space.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131348460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices 面向物联网的远程网络技术:支持alljoin的设备基于云的访问
Pavel Mašek, R. Fujdiak, Krystof Zeman, Jiri Hosek, A. Muthanna
{"title":"Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices","authors":"Pavel Mašek, R. Fujdiak, Krystof Zeman, Jiri Hosek, A. Muthanna","doi":"10.1109/FRUCT-ISPIT.2016.7561528","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561528","url":null,"abstract":"The Internet of Things (IoT) represents a vision of a future communication between users, systems, and daily objects performing sensing and actuating capabilities with the goal to bring unprecedented convenience and economical benefits. Today, a wide variety of developed solutions for IoT can be seen through the all industry fields. Each of the developed systems is based on the proprietary SW implementation unable (in most cases) to share collected data with others. Trying to offer common communication platform for IoT, AllSeen Alliance introduced Alljoyn framework - interoperable platform for devices (sensors, actuators, etc.) and applications to communicate among themselves regardless of brands, transport technologies, and operating systems. In this paper, we discuss an application for remote management of light systems built as an extension of Alljoyn Framework - developed application is independent on communication technologies (e.g., ZigBee or WiFi). Besides provided communication independence, the presented framework can run on both major SoC architectures ARM and MIPS. To this end, we believe that our application (available as open source on GitHub) can serve as building block in future IoT / Smart home implementations.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Remote photoplethysmography application to the analysis of time-frequency changes of human heart rate variability 远距离光电容积脉搏图在人体心率变异性时频变化分析中的应用
K. Purtov, V. Kublanov, A. Petrenko, T. Petrenko
{"title":"Remote photoplethysmography application to the analysis of time-frequency changes of human heart rate variability","authors":"K. Purtov, V. Kublanov, A. Petrenko, T. Petrenko","doi":"10.1109/FRUCT-ISPIT.2016.7561539","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561539","url":null,"abstract":"In this article we present the possibilities of using remote photoplethysmography (rPPG or imaging PPG) technology to estimate time-frequency changes of human heart rate variability. We propose improvements for algorithm presented in our recent study. Algorithm modification allows to exclude skin areas with highly variable levels of lighting, thus reducing noise level and increasing duration of signal suitable for processing. Twenty healthy volunteers (males and females) aged from 20 to 25 took part in this investigation. The blood volume pulse rate estimated from the rPPG rhythmogram and cardiac pulse rate estimated from the electrocardiogram are compared. The results showed that the very low frequency hemodynamic oscillations of blood volume pulse rate estimated from the rPPG rhythmogram in the [0.04-0.003] Hz frequency band can be used to monitor functional changes of a human.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SystemC NoC simulation as the alternative to the HDL and high-level modeling SystemC NoC仿真作为HDL和高级建模的替代
A. Romanov, A. Ivannikov
{"title":"SystemC NoC simulation as the alternative to the HDL and high-level modeling","authors":"A. Romanov, A. Ivannikov","doi":"10.1109/FRUCT-ISPIT.2016.7561540","DOIUrl":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561540","url":null,"abstract":"Actual trends of networks-on-chip research and known approaches to their modeling are considered. The characteristics of analytic and high-/low-level simulation are given. The programming language SystemC as an alternative solution to create models of networks-on-chip is proposed, and SystemC models speed increase methodic is observed.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信