The 5th International Conference on Future Networks & Distributed Systems最新文献

筛选
英文 中文
Modeling and Computing Available Rights for Algorithmic Licensing of Movies based on Blockchain 基于区块链的电影算法授权的可用权利建模与计算
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508224
A. Beckmann, João Santos, Indira Ananth
{"title":"Modeling and Computing Available Rights for Algorithmic Licensing of Movies based on Blockchain","authors":"A. Beckmann, João Santos, Indira Ananth","doi":"10.1145/3508072.3508224","DOIUrl":"https://doi.org/10.1145/3508072.3508224","url":null,"abstract":"We consider the challenge of determining which rights are available for licensing within the context of algorithmic licensing of movies using blockchain technology. We model the space of rights using set theory. We define algorithms within our modelling context that implement basic transactions for our use case, and argue for their correctness. We evaluate our algorithms through experiments within a multi-node Hyperledger Fabric network, and establish the feasibility of our algorithms for the intended use case.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient and Secure Consensus Mechanism for Peer-to-Peer Networks 一种高效、安全的对等网络共识机制
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508226
Avinash Kshirsagar, V. Pachghare
{"title":"An Efficient and Secure Consensus Mechanism for Peer-to-Peer Networks","authors":"Avinash Kshirsagar, V. Pachghare","doi":"10.1145/3508072.3508226","DOIUrl":"https://doi.org/10.1145/3508072.3508226","url":null,"abstract":"Bitcoin was proposed as an alternative to a centralized trust-based financial system in 2008 which uses distributed ledger called blockchain as the underlying technology. Bitcoin uses a peer-to-peer network without a third trusted party but still maintained trust in the network. The consensus mechanisms do the task of trust-building by executing certain algorithms to bring consensus to the peer nodes of the network. The consensus mechanism used in bitcoin is Proof of Work which involves a massive computation of hashes to validate a block and add it to the blockchain. As the applicability of blockchain increased, the computation-heavy consensus mechanisms were not suitable for real-time transactions. And so, there is a need for a new efficient and high throughput consensus mechanism. This paper proposes a new consensus mechanism using a scope index to mine a new block. This consensus mechanism deals with forking conditions, and the presence of malicious nodes in the network is also studied and compared with other consensus mechanisms.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration Of Consortium Blockchain Model In The Nigerian Banking Sector 尼日利亚银行业整合联盟区块链模式
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508110
O. A. Ojerinde, Jonathan Salawu, O. A. Abisoye, Andrew A. Uduimoh
{"title":"Integration Of Consortium Blockchain Model In The Nigerian Banking Sector","authors":"O. A. Ojerinde, Jonathan Salawu, O. A. Abisoye, Andrew A. Uduimoh","doi":"10.1145/3508072.3508110","DOIUrl":"https://doi.org/10.1145/3508072.3508110","url":null,"abstract":"Conventionally, Nigerian banks rely on a less secure and time-consuming centralized clearinghouse where transactions are sorted out and balances are made. This paper presents a model for integrating permission DLT into the Nigerian banking sector. The proposed model has utilized Corda – permissioned DLT, to log transactions between parties on the chain such that those transactions are only visible to the participants of the transaction, thus, combatting fraudulent claims. Participants' details are also verified upon provision of their National Identification Number (NIN) and Bank Verification Number (BVN) as stipulated in the smart contract. This work has also avoided the problems inherent in the public blockchain that requires miners to spend gigantic computer resources and time validating and verifying blocks before being added to the chain. The result obtained is a developed DLT model for logging real-time transactions between banks and their clients.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Classification System for Cashew Plant Diseases using Convolutional Neural Network 基于卷积神经网络的腰果病害检测与分类系统
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508107
Mathew Timothy, Ojo John, A. Aibinu, B. Adebisi
{"title":"Detection and Classification System for Cashew Plant Diseases using Convolutional Neural Network","authors":"Mathew Timothy, Ojo John, A. Aibinu, B. Adebisi","doi":"10.1145/3508072.3508107","DOIUrl":"https://doi.org/10.1145/3508072.3508107","url":null,"abstract":"Cashew (Anacardium occidentale L.) is an important cash crop which serves as a major source of food, income and industrial raw materials to many African countries. However, cashew crops are commonly infected with various diseases that cause significant loss in yield. Existing automatic disease identification techniques are foliar identification-based while other infections appear on the nut and stem. In this work Convolutional Neural Network (CNN) was deployed for the detection and classification of diseases in leaves, stem and nut of cashew plant. Local dataset was sourced from LAUTECH teaching and research farm cashew plantation using Sony alpha A-330 digital camera with resolution of 10.20 Megapixels. The dataset comprises of 1050 sample images from three different parts of the various cashew plants that includes leaf, nut and stem. The database was divided into three sets for training, validation and testing in the ratio 50%, 30% and 20% respectively. Each of these sample images were preprocessed using histogram equalization and de-noised, using median filter. Feature extraction with classification and detection was done using transfer learning with CNN (ResNet-50) pre-trained deep learning network. The developed system was implemented in MATLAB R (2018a). It was evaluated using specificity, sensitivity, accuracy and error rate on the validation and test sets. The average performance was also computed. The system gave specificity, sensitivity, accuracy and error rate of 97.22, 98.19, 97.22, 2.78% on validations set and 97.56, 98.82, 98.29, 1.71% on test set, respectively. The average performance obtained for specificity, sensitivity, accuracy and error rate, were 97.39, 97.55, 97.76 and 2.25%, respectively. The system detected and classified four categories of cashew plant diseases that commonly occur on the leave, nut and stem.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Analysis of Business Processes in Digital Era 改进数字化时代的业务流程分析
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508222
Shayzak Kholmuminov, B. Tursunov, M. Saidova, Laylo Abduhalilova, Nigora Sadriddinova
{"title":"Improving the Analysis of Business Processes in Digital Era","authors":"Shayzak Kholmuminov, B. Tursunov, M. Saidova, Laylo Abduhalilova, Nigora Sadriddinova","doi":"10.1145/3508072.3508222","DOIUrl":"https://doi.org/10.1145/3508072.3508222","url":null,"abstract":"The purpose of this research paper is to determine the main directions and methods for assessing the state of a business, organize the collection of statistical data on small businesses, the main indicators for the collection of statistical data on small businesses, the main criteria for determining a small business to collect statistical data, as well as the use of world rankings data as a tool for analysis of the state of business in digital Era. Based on the results of the study, econometric research methods were generalized, the main directions and methods of collecting statistical information on small businesses to assess the state of small businesses in the country in the era of digitalization were determined.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125887779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of Information Processes of Multilevel Intelligent Systems 多层次智能系统的信息处理优化
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508212
G. Ishankhodjayev, M. Sultanov, Dilmurod Mirzaahmedov, D. Azimov
{"title":"Optimization of Information Processes of Multilevel Intelligent Systems","authors":"G. Ishankhodjayev, M. Sultanov, Dilmurod Mirzaahmedov, D. Azimov","doi":"10.1145/3508072.3508212","DOIUrl":"https://doi.org/10.1145/3508072.3508212","url":null,"abstract":"The article provides a systematic analysis of the functioning of multilevel intelligent systems, information exchange processes between the levels of intelligent systems, and identifies existing shortcomings in the process of collecting and processing information. Using the methods of information processing and system analysis, a structural diagram of information support and a generalized information model of multilevel intelligent systems, as well as algorithms for solving functional tasks of operational collection, calculation, monitoring, analysis of information on indicators of production processes and making informed management decisions, have been developed. This article also shows the processes of creating an optimal unified information support system for multi-level intelligent systems and indicators that characterize the efficiency and quality of the system's functioning.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Important Aspects Related to Foreign Exchange Operations of Commercial Banks 商业银行外汇业务的重要方面
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508208
Akram Tolliboevich Absalamov, Oybek Odilovich Xudoyorov, Sardor Umarovich Kholdorov
{"title":"Important Aspects Related to Foreign Exchange Operations of Commercial Banks","authors":"Akram Tolliboevich Absalamov, Oybek Odilovich Xudoyorov, Sardor Umarovich Kholdorov","doi":"10.1145/3508072.3508208","DOIUrl":"https://doi.org/10.1145/3508072.3508208","url":null,"abstract":"This article provides analytical, critical and econometric analysis of the factors influencing the off-balance sheet operations of commercial banks of the Republic of Uzbekistan and that factors influencing documentary letters of credit, currency forward transactions, bank guarantee-related transactions, currency spot, currency futures and options from off-balance sheet operations, which are highly profitable for commercial banks, were studied.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Deep Learning Approach for Advanced Persistent Threat Attack Detection 高级持续威胁攻击检测的混合深度学习方法
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508085
Meaad Alrehaili, Adel Alshamrani, A. Eshmawi
{"title":"A Hybrid Deep Learning Approach for Advanced Persistent Threat Attack Detection","authors":"Meaad Alrehaili, Adel Alshamrani, A. Eshmawi","doi":"10.1145/3508072.3508085","DOIUrl":"https://doi.org/10.1145/3508072.3508085","url":null,"abstract":"Advanced Persistent Threat (APT) attack is one of the most common and costly destructive attacks on the target system. This attack has become a challenge for companies, governments, and organizations’ information security systems. In recent years, methods for detecting and preventing APT attacks that use machine learning or deep learning algorithms to analyze indications and anomalous behaviors in network traffic have become popular. However, due to a lack of typical data from attack campaigns, the APT attack detection approach that uses behavior analysis and evaluation approaches encounter many issues. Network traffic analysis to detect a common APT attack is one of the solutions for dealing with this situation. This paper develops efficient and flexible deep learning models. To analyze huge network traffic, a hybrid deep learning approach that builds two models is used: Stacked Autoencoder with Long Short-Term Memory (SAE-LSTM) and Convolutional Neural Networks with Long Short-Term Memory Network (CNN-LSTM) to detect indications of APT attacks. A reliable dataset ’DAPT2020’ that covers all APT stages is used to evaluate the proposed approach. The experimental results demonstrate that the hybrid deep learning approach proved to give higher performance than the individual deep learning model in detecting malicious behavior in each APT stage.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of Variability of Orders in an Auction-based Local Energy Market 基于拍卖的局部能源市场中订单可变性的影响
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3508104
Olamide Jogunola, A. S. Ajagun, B. Adebisi, Craig Morley
{"title":"Effect of Variability of Orders in an Auction-based Local Energy Market","authors":"Olamide Jogunola, A. S. Ajagun, B. Adebisi, Craig Morley","doi":"10.1145/3508072.3508104","DOIUrl":"https://doi.org/10.1145/3508072.3508104","url":null,"abstract":"To achieve a community pool towards net-zero carbon, this study explores the variability of submitted bids and offers in an auction-based local energy market (LEM). As these variables are correlated with the economic and environmental benefit of the market participants, equilibrium is desired. Specifically, we performed a comparative study of a variety of submitted prices and demanded/supplied quantities in an auction-based LEM. The results show that the unitary benefit derived by prosumers increases when there is equal or a balance of quantity and price offerings in the market. However, a high asking price and an excessive amount of energy supply in the market requiring grid balancing resulted in higher cost, which is not a desirable scenario. Thus, to achieve equilibrium and community-pool towards net-zero carbon, a LEM with balanced bids and offers is desirable to attract more active participation.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Internet of Things: RPL Attacks Taxonomy 物联网安全:RPL攻击分类
The 5th International Conference on Future Networks & Distributed Systems Pub Date : 2021-12-15 DOI: 10.1145/3508072.3512286
Farag Azzedin, Hussah Albinali
{"title":"Security in Internet of Things: RPL Attacks Taxonomy","authors":"Farag Azzedin, Hussah Albinali","doi":"10.1145/3508072.3512286","DOIUrl":"https://doi.org/10.1145/3508072.3512286","url":null,"abstract":"The limitations of storage and computation capabilities in IoT devices raise challenges to design scalable protocols for different network sizes and maintain the minimum network delay. The nature of IoT makes existing routing protocols not suitable for IoT. As a result, IETF introduced IPv6 routing protocol over low-power and lossy networks. Unfortunately, there is no official implementation of security mechanisms that are defined as standard. This gap led to the appearance of many routing attacks utilizing the absence of RPL security mechanisms. In this article, we propose novel taxonomy to categorize RPL attacks based on the attack’s mechanism. This taxonomy considers all RPL attacks whether inherited from WSN or resulted from exploiting RPL features. The taxonomy is evaluated to ensure usefulness and applicability.","PeriodicalId":315315,"journal":{"name":"The 5th International Conference on Future Networks & Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信