{"title":"Modeling and Computing Available Rights for Algorithmic Licensing of Movies based on Blockchain","authors":"A. Beckmann, João Santos, Indira Ananth","doi":"10.1145/3508072.3508224","DOIUrl":"https://doi.org/10.1145/3508072.3508224","url":null,"abstract":"We consider the challenge of determining which rights are available for licensing within the context of algorithmic licensing of movies using blockchain technology. We model the space of rights using set theory. We define algorithms within our modelling context that implement basic transactions for our use case, and argue for their correctness. We evaluate our algorithms through experiments within a multi-node Hyperledger Fabric network, and establish the feasibility of our algorithms for the intended use case.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Secure Consensus Mechanism for Peer-to-Peer Networks","authors":"Avinash Kshirsagar, V. Pachghare","doi":"10.1145/3508072.3508226","DOIUrl":"https://doi.org/10.1145/3508072.3508226","url":null,"abstract":"Bitcoin was proposed as an alternative to a centralized trust-based financial system in 2008 which uses distributed ledger called blockchain as the underlying technology. Bitcoin uses a peer-to-peer network without a third trusted party but still maintained trust in the network. The consensus mechanisms do the task of trust-building by executing certain algorithms to bring consensus to the peer nodes of the network. The consensus mechanism used in bitcoin is Proof of Work which involves a massive computation of hashes to validate a block and add it to the blockchain. As the applicability of blockchain increased, the computation-heavy consensus mechanisms were not suitable for real-time transactions. And so, there is a need for a new efficient and high throughput consensus mechanism. This paper proposes a new consensus mechanism using a scope index to mine a new block. This consensus mechanism deals with forking conditions, and the presence of malicious nodes in the network is also studied and compared with other consensus mechanisms.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. A. Ojerinde, Jonathan Salawu, O. A. Abisoye, Andrew A. Uduimoh
{"title":"Integration Of Consortium Blockchain Model In The Nigerian Banking Sector","authors":"O. A. Ojerinde, Jonathan Salawu, O. A. Abisoye, Andrew A. Uduimoh","doi":"10.1145/3508072.3508110","DOIUrl":"https://doi.org/10.1145/3508072.3508110","url":null,"abstract":"Conventionally, Nigerian banks rely on a less secure and time-consuming centralized clearinghouse where transactions are sorted out and balances are made. This paper presents a model for integrating permission DLT into the Nigerian banking sector. The proposed model has utilized Corda – permissioned DLT, to log transactions between parties on the chain such that those transactions are only visible to the participants of the transaction, thus, combatting fraudulent claims. Participants' details are also verified upon provision of their National Identification Number (NIN) and Bank Verification Number (BVN) as stipulated in the smart contract. This work has also avoided the problems inherent in the public blockchain that requires miners to spend gigantic computer resources and time validating and verifying blocks before being added to the chain. The result obtained is a developed DLT model for logging real-time transactions between banks and their clients.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Classification System for Cashew Plant Diseases using Convolutional Neural Network","authors":"Mathew Timothy, Ojo John, A. Aibinu, B. Adebisi","doi":"10.1145/3508072.3508107","DOIUrl":"https://doi.org/10.1145/3508072.3508107","url":null,"abstract":"Cashew (Anacardium occidentale L.) is an important cash crop which serves as a major source of food, income and industrial raw materials to many African countries. However, cashew crops are commonly infected with various diseases that cause significant loss in yield. Existing automatic disease identification techniques are foliar identification-based while other infections appear on the nut and stem. In this work Convolutional Neural Network (CNN) was deployed for the detection and classification of diseases in leaves, stem and nut of cashew plant. Local dataset was sourced from LAUTECH teaching and research farm cashew plantation using Sony alpha A-330 digital camera with resolution of 10.20 Megapixels. The dataset comprises of 1050 sample images from three different parts of the various cashew plants that includes leaf, nut and stem. The database was divided into three sets for training, validation and testing in the ratio 50%, 30% and 20% respectively. Each of these sample images were preprocessed using histogram equalization and de-noised, using median filter. Feature extraction with classification and detection was done using transfer learning with CNN (ResNet-50) pre-trained deep learning network. The developed system was implemented in MATLAB R (2018a). It was evaluated using specificity, sensitivity, accuracy and error rate on the validation and test sets. The average performance was also computed. The system gave specificity, sensitivity, accuracy and error rate of 97.22, 98.19, 97.22, 2.78% on validations set and 97.56, 98.82, 98.29, 1.71% on test set, respectively. The average performance obtained for specificity, sensitivity, accuracy and error rate, were 97.39, 97.55, 97.76 and 2.25%, respectively. The system detected and classified four categories of cashew plant diseases that commonly occur on the leave, nut and stem.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shayzak Kholmuminov, B. Tursunov, M. Saidova, Laylo Abduhalilova, Nigora Sadriddinova
{"title":"Improving the Analysis of Business Processes in Digital Era","authors":"Shayzak Kholmuminov, B. Tursunov, M. Saidova, Laylo Abduhalilova, Nigora Sadriddinova","doi":"10.1145/3508072.3508222","DOIUrl":"https://doi.org/10.1145/3508072.3508222","url":null,"abstract":"The purpose of this research paper is to determine the main directions and methods for assessing the state of a business, organize the collection of statistical data on small businesses, the main indicators for the collection of statistical data on small businesses, the main criteria for determining a small business to collect statistical data, as well as the use of world rankings data as a tool for analysis of the state of business in digital Era. Based on the results of the study, econometric research methods were generalized, the main directions and methods of collecting statistical information on small businesses to assess the state of small businesses in the country in the era of digitalization were determined.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125887779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Ishankhodjayev, M. Sultanov, Dilmurod Mirzaahmedov, D. Azimov
{"title":"Optimization of Information Processes of Multilevel Intelligent Systems","authors":"G. Ishankhodjayev, M. Sultanov, Dilmurod Mirzaahmedov, D. Azimov","doi":"10.1145/3508072.3508212","DOIUrl":"https://doi.org/10.1145/3508072.3508212","url":null,"abstract":"The article provides a systematic analysis of the functioning of multilevel intelligent systems, information exchange processes between the levels of intelligent systems, and identifies existing shortcomings in the process of collecting and processing information. Using the methods of information processing and system analysis, a structural diagram of information support and a generalized information model of multilevel intelligent systems, as well as algorithms for solving functional tasks of operational collection, calculation, monitoring, analysis of information on indicators of production processes and making informed management decisions, have been developed. This article also shows the processes of creating an optimal unified information support system for multi-level intelligent systems and indicators that characterize the efficiency and quality of the system's functioning.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Important Aspects Related to Foreign Exchange Operations of Commercial Banks","authors":"Akram Tolliboevich Absalamov, Oybek Odilovich Xudoyorov, Sardor Umarovich Kholdorov","doi":"10.1145/3508072.3508208","DOIUrl":"https://doi.org/10.1145/3508072.3508208","url":null,"abstract":"This article provides analytical, critical and econometric analysis of the factors influencing the off-balance sheet operations of commercial banks of the Republic of Uzbekistan and that factors influencing documentary letters of credit, currency forward transactions, bank guarantee-related transactions, currency spot, currency futures and options from off-balance sheet operations, which are highly profitable for commercial banks, were studied.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Deep Learning Approach for Advanced Persistent Threat Attack Detection","authors":"Meaad Alrehaili, Adel Alshamrani, A. Eshmawi","doi":"10.1145/3508072.3508085","DOIUrl":"https://doi.org/10.1145/3508072.3508085","url":null,"abstract":"Advanced Persistent Threat (APT) attack is one of the most common and costly destructive attacks on the target system. This attack has become a challenge for companies, governments, and organizations’ information security systems. In recent years, methods for detecting and preventing APT attacks that use machine learning or deep learning algorithms to analyze indications and anomalous behaviors in network traffic have become popular. However, due to a lack of typical data from attack campaigns, the APT attack detection approach that uses behavior analysis and evaluation approaches encounter many issues. Network traffic analysis to detect a common APT attack is one of the solutions for dealing with this situation. This paper develops efficient and flexible deep learning models. To analyze huge network traffic, a hybrid deep learning approach that builds two models is used: Stacked Autoencoder with Long Short-Term Memory (SAE-LSTM) and Convolutional Neural Networks with Long Short-Term Memory Network (CNN-LSTM) to detect indications of APT attacks. A reliable dataset ’DAPT2020’ that covers all APT stages is used to evaluate the proposed approach. The experimental results demonstrate that the hybrid deep learning approach proved to give higher performance than the individual deep learning model in detecting malicious behavior in each APT stage.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olamide Jogunola, A. S. Ajagun, B. Adebisi, Craig Morley
{"title":"Effect of Variability of Orders in an Auction-based Local Energy Market","authors":"Olamide Jogunola, A. S. Ajagun, B. Adebisi, Craig Morley","doi":"10.1145/3508072.3508104","DOIUrl":"https://doi.org/10.1145/3508072.3508104","url":null,"abstract":"To achieve a community pool towards net-zero carbon, this study explores the variability of submitted bids and offers in an auction-based local energy market (LEM). As these variables are correlated with the economic and environmental benefit of the market participants, equilibrium is desired. Specifically, we performed a comparative study of a variety of submitted prices and demanded/supplied quantities in an auction-based LEM. The results show that the unitary benefit derived by prosumers increases when there is equal or a balance of quantity and price offerings in the market. However, a high asking price and an excessive amount of energy supply in the market requiring grid balancing resulted in higher cost, which is not a desirable scenario. Thus, to achieve equilibrium and community-pool towards net-zero carbon, a LEM with balanced bids and offers is desirable to attract more active participation.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in Internet of Things: RPL Attacks Taxonomy","authors":"Farag Azzedin, Hussah Albinali","doi":"10.1145/3508072.3512286","DOIUrl":"https://doi.org/10.1145/3508072.3512286","url":null,"abstract":"The limitations of storage and computation capabilities in IoT devices raise challenges to design scalable protocols for different network sizes and maintain the minimum network delay. The nature of IoT makes existing routing protocols not suitable for IoT. As a result, IETF introduced IPv6 routing protocol over low-power and lossy networks. Unfortunately, there is no official implementation of security mechanisms that are defined as standard. This gap led to the appearance of many routing attacks utilizing the absence of RPL security mechanisms. In this article, we propose novel taxonomy to categorize RPL attacks based on the attack’s mechanism. This taxonomy considers all RPL attacks whether inherited from WSN or resulted from exploiting RPL features. The taxonomy is evaluated to ensure usefulness and applicability.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}