2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)最新文献

筛选
英文 中文
Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit 记忆电容神经形态回路多域尖峰编码的初步评价
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00026
Reon Oshio, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang, Y. Nakashima
{"title":"Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit","authors":"Reon Oshio, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang, Y. Nakashima","doi":"10.1109/CANDARW53999.2021.00026","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00026","url":null,"abstract":"Neuromorphic computing aims at both accelerating machine learning computation and reducing its power consumption by adopting the hardware architecture of Spiking Neural Network (SNN), which is more biologically plausible than Artificial Neural Network (ANN). Rate coded SNNs, which represent signals according to the frequency of spikes, are highly compatible with ANNs and can utilize the technology accumulated in recent years. However, rate coded SNNs using a large number of spikes suffer from long latency and increased power consumption, and the search for a more efficient coding method has become active. In this study, we propose a novel coding scheme that uses not only the frequency of spikes but also the voltage amplitude and time width of spikes, which are domains that have not been used in conventional SNNs. The proposed multi-domain neural coding can be expected to increase the amount of information that can be transmitted per spike compared to ordinary rate coding. In addition, conductance-based synaptic devices/circuits like memristor have been widely studied, but current-based synaptic operations consume a lot of power. In this work, we employed memcapacitor and charge-pump based synapse circuit, which is a voltage-domain synaptic operation that ideally consumes power only during switching. We have performed a preliminary evaluation for the proposed coding scheme on a synaptic/neuron circuit designed in a ROHM 180nm CMOS process by simulating the operation on HSPICE. Moreover it was demonstrated that the proposed circuit can successfully perform synaptic operations to allow the new coding scheme.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125385385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions over Monoids 一元群上具有2邻域局部函数的初等元胞自动机的交换性
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00045
Toshikazu Ishida, Shuichi Inokuchi
{"title":"Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions over Monoids","authors":"Toshikazu Ishida, Shuichi Inokuchi","doi":"10.1109/CANDARW53999.2021.00045","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00045","url":null,"abstract":"The local function of a cellular automaton with binary states can be expressed by a formula in propositional logic. The inverse function of a local function of any reversible cellular automation can also be expressed as a propositional logic formula, and using it as a local function then, we can define the cellular automation. The multiplication of these formulae in propositional logic is defined using the action of the cell space as a dynamical system and yields the local function of the composition of two cellular automata.In this study, we deal with logical formulae on a commutative monoid as local functions of elementary cellular automata. We focus on essentially 2-neighborhood local functions and the logical symbol \"Implication\" on commutative monoids. We discuss the commutativity of multiplication of the formulae and show some conditions for formulae to satisfy the commutativity of the composition of elementary cellular automata.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD) 将缓存功能移植到命名数据网络转发守护进程(NFD)
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00019
Takuya Mizushiro, T. Kitasuka
{"title":"Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD)","authors":"Takuya Mizushiro, T. Kitasuka","doi":"10.1109/CANDARW53999.2021.00019","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00019","url":null,"abstract":"The purpose of using the Internet has changed from \"connecting to computers\" to \"acquiring content\". So, the ICN (Information Centric Network) has been proposed to fit this purpose. In this research, we focus on the architecture of NDN (named data networking). The NFD (NDN forwarding daemon) is a network forwarder that implements the NDN protocol. The ndnSIM is a simulator of NDN. From ndnSIM version 2.8, a part of content store implementation has been removed from the simulator and it becomes to use content store implementation of NFD. In this poster, we select two caching functions, probabilistic caching and expired deletion, which are removed from ndnSIM 2.8 and not included in NFD. We port these functions to NFD for a more practical implementation. Under a certain network, we were able to confirm that previous and ported functions provided equivalent functions. It was also possible to simulate in version ndnSIM 2.8 using the ported functions.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single and Ensemble CNN Models with Out-Category Penalty in Cifar 10 具有类别外惩罚的单一和集成CNN模型
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00086
Yuta Suzuki, Daiki Kuyoshi, Satoshi Yamane
{"title":"Single and Ensemble CNN Models with Out-Category Penalty in Cifar 10","authors":"Yuta Suzuki, Daiki Kuyoshi, Satoshi Yamane","doi":"10.1109/CANDARW53999.2021.00086","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00086","url":null,"abstract":"In recent years, CNN have been used in many image recognition tasks. However, most of these CNN models learn only the features of the image, and do not learn the meta-information of the image. In this study, we proposed CNN models that can learn not only image features but also meta-information such as animals and vehicles by imposing an out-category penalty on the cifar10 dataset. As a result, our proposed model was found to be able to learn with meta-information and produce higher accuracy than existing CNN models.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs 蓝牙manet散射网配置中长跳环的抑制
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00013
Haruki Ishizaki, Eitaro Kohno, Y. Kakuda
{"title":"On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs","authors":"Haruki Ishizaki, Eitaro Kohno, Y. Kakuda","doi":"10.1109/CANDARW53999.2021.00013","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00013","url":null,"abstract":"Bluetooth MANETs are ad-hoc networks constructed by Bluetooth-enabled mobile terminals. As the adjacent nodes in the networks increased, the existing fast connection establishment method between terminals generate between slave terminal in piconets. As a result, the existing fast connection establishment method generates loops. Since Bluetooth MANETs utilize a flooding-based data packet forwarding method, the loops increase the number of data packet forwarding and the processing load on the terminals. To address this problem, a method of reducing loops by controlling excessive connections between slave terminals of a piconet in Bluetooth MANETs (hereinafter referred to as an existing loop reduction method) has been proposed. While the existing loop reduction method can reduce short-hop loops to zero, however, it only considers loops consisting of three terminals and does not consider loops consisting of four or more terminals (hereinafter referred to as LongLoop). In this paper, we firstly investigated the effect of \"LongLoop\" on data packet forwarding in Bluetooth MANETs and proposed a new method to suppress unnecessary data packet forwarding by LongLoop. In our proposed method, we employed functions such as TTL (Time To Live) to prevent duplicate data packets from being forwarded through the LongLoop. Therefore, our proposed method is concerned that the data packet forwarding time will become longer. Through evaluation experiments, we confirmed that our proposed method can reduce unnecessary data packet forwarding by loops including LongLoop while maintaining the latency until data packets are disseminated to all terminals at the same level as before loop reduction.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices FirmPot:一个使用物联网设备固件的智能交互蜜罐框架
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00074
Moeka Yamamoto, S. Kakei, S. Saito
{"title":"FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices","authors":"Moeka Yamamoto, S. Kakei, S. Saito","doi":"10.1109/CANDARW53999.2021.00074","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00074","url":null,"abstract":"IoT honeypots that mimic the behavior of IoT devices for threat analysis are becoming increasingly important. Existing honeypot systems use devices with a specific version of firmware installed to monitor cyber attacks. However, honeypots frequently receive requests targeting devices and firmware that are different from themselves. When honeypots return an error response to such a request, the attack is terminated, and the monitoring fails.To solve this problem, we introduce FirmPot, a framework that automatically generates intelligent-interaction honeypots using firmware. This framework has a firmware emulator optimized for honeypot generation and learns the behavior of embedded applications by using machine learning. The generated honeypots continue to interact with attackers by a mechanism that returns the best from the emulated responses to the attack request instead of an error response.We experimented on embedded web applications of wireless routers based on the open-source OpenWrt. As a result, our framework generated honeypots that mimicked the embedded web applications of eight vendors and ten different CPU architectures. Furthermore, our approach to the interaction improved the session length with attackers compared to existing ones.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126359229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic executable code generation for DNN accelerator ReNA DNN加速器ReNA的自动执行代码生成
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00025
Yuta Masuda, Yasuhiro Nakahara, M. Amagasaki, M. Iida
{"title":"Automatic executable code generation for DNN accelerator ReNA","authors":"Yuta Masuda, Yasuhiro Nakahara, M. Amagasaki, M. Iida","doi":"10.1109/CANDARW53999.2021.00025","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00025","url":null,"abstract":"We have been developing ReNA as a DNN accelerator for the edge, which is controlled by directly specifying control signals for each circuit by microcode instructions. The current control method is not efficient because of its low readability and manual generation of execution code. In addition, it requires a large amount of instructions and large SRAM size to store the control signals. In this paper, we try to solve this problem by abstracting the microcode instructions and reducing the amount of instructions. We also improve efficiency of model implementation by enabling automatic generation of the microcode. As a result, we were able to reduce the required SRAM capacity by about 86% and halve the area of the SRAM for storing instructions.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134232052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weight Least Square Filter for Improving the Quality of Depth Map on FPGA 加权最小二乘滤波器在FPGA上提高深度图质量
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00056
Renzhi Mao, Kaijie Wei, H. Amano, Yukinori Kuno, M. Arai
{"title":"Weight Least Square Filter for Improving the Quality of Depth Map on FPGA","authors":"Renzhi Mao, Kaijie Wei, H. Amano, Yukinori Kuno, M. Arai","doi":"10.1109/CANDARW53999.2021.00056","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00056","url":null,"abstract":"The techniques based on measuring the distance between objects and the camera itself have made progress in recent years. Through this technology, the system used for 3D imaging will provide a great convenience for people’s lives. In this project, we focus on optimizing depth maps with better quality for the 3D scene display system on the car. During the 3D imaging process, to calculate the distance between a certain location and one of the specific points of the scene, it will produce two depth maps computed from two images as an intermediate product for 3D imaging processing. However, there is a great number of invalid pixels that distance cannot be measured. In dealing with such drawbacks, post-filtering has been introduced as a solution. In this project, we propose implementing the Weight Least Square (WLS) filter on FPGA, which can fill the invalid pixels by using the results of neighboring pixels. Through our approach, we can improve the quality of the depth map on M-KUBOS. Besides that, the optimized memory usage can successfully suit the size of the memory on-chip, and a 69.29% acceleration compared to the ARM core.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezoshika Deer 增强生物个体三重网络和独特目标分类可靠监测麋鹿
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00039
Yojiro Harie, S. B. Neupane, B. P. Gautam, N. Shiratori
{"title":"Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezoshika Deer","authors":"Yojiro Harie, S. B. Neupane, B. P. Gautam, N. Shiratori","doi":"10.1109/CANDARW53999.2021.00039","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00039","url":null,"abstract":"Wild Deer’s grazing in farmers and villager’s field has caused serious troubles for the residents and concerned authorities here in Northern Hokkaido of Japan. Furthermore, the number of deer in northern Japan is increasing rapidly leading to increment in road accidents which is also becoming a serious problem that needs to be handled. Several procedures have been followed to avoid or at least minimize the destruction caused by the white-tailed deer, but a solid solution is yet to be found. To this context, we are proposing a highly effective solutions to identify the individual wild deer and pinpoint the most trouble causing group of deer’s using augmented triplet network, a novel technique of computer vision. Initially the deer are recognized and classified individually which will help us track the deer and know the behavior of the deer in depth. Our research method identifies individual deer using several steps where we initially take video feed which is further divided into several frames. The extracted frames are then cleaned and processed for the training efficiency. The cleaned frames are then sent to the Convolution Network where the Nested triplet loss is calculated for the maximum accuracy.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of Hybrid NIDS Using Deep Learning for Practical Use 基于深度学习的混合NIDS改进
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2021-11-01 DOI: 10.1109/CANDARW53999.2021.00071
Kentaro Takeshita, M. Harayama
{"title":"Improvement of Hybrid NIDS Using Deep Learning for Practical Use","authors":"Kentaro Takeshita, M. Harayama","doi":"10.1109/CANDARW53999.2021.00071","DOIUrl":"https://doi.org/10.1109/CANDARW53999.2021.00071","url":null,"abstract":"The use of networks has been accelerated by social adaptations to the Covid-19 pandemic, such as remote work, online shopping, and online meetings. These trends increase the importance of network intrusion detection systems (NIDSs) to protect networks from malware and cyberattacks. Two major technical approaches to NIDS are largely employed: the use of signature matching discriminators and the use of anomaly detectors. Each approach has advantages and disadvantages. Hybrid NIDSs, which integrate aspects of both approaches, minimize the disadvantages and improve detection accuracy, although their detection speed is slow. On the other hand, deep learning methods have been gaining attention as intrusion detectors, including NIDS. Therefore, in this study we propose a two-stage hybrid NIDS that uses deep learning methods, a sparse auto-encoder (SAE), and a multilayer perceptron (MLP). In the first stage of the proposed system, an SAE detects malicious flows while minimizing interference to legitimate flows, and in the second stage an MLP detects malicious flows and precisely classifies each one. Our experimental results against the CICIDS2017 dataset showed that the proposed NIDS was fast and highly accurate. Here we report the architecture of our system and the evaluation of its results.","PeriodicalId":325028,"journal":{"name":"2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信