Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
Predicting RNA secondary structure based on machine learning and genetic algorithm 基于机器学习和遗传算法的RNA二级结构预测
Duy Binh Doan, Minh Tuan Pham, Duc Long Dang
{"title":"Predicting RNA secondary structure based on machine learning and genetic algorithm","authors":"Duy Binh Doan, Minh Tuan Pham, Duc Long Dang","doi":"10.1145/3440749.3442659","DOIUrl":"https://doi.org/10.1145/3440749.3442659","url":null,"abstract":"In recent years, RNA secondary structure prediction is an important issue in structural bioinformatics, and RNA pseudoknotted secondary structure prediction represents an NP-hard problem. Current RNA secondary structure prediction methods are mainly based on the minimum free energy algorithm. However, due to the complexity of biotic environment, a true RNA structure always keeps the balance of biological potential energy status, rather than the optimal folding status that meets the minimum energy. For short sequence RNA its equilibrium energy status for the RNA folding organism is close to the minimum free energy status. Nevertheless, in a longer sequence RNA, constant folding causes its biopotential energy balance to deviate far from the minimum free energy status. In this paper, we propose a novel RNA secondary structure prediction algorithm using a convolutional neural network model combined with a genetic algorithm method to improve the accuracy with large-scale RNA sequence and structure data...","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Analysis for DDOS Attack Detection 用于DDOS攻击检测的网络流量分析
Atheer Alharthi, A. Eshmawi, Azzah Kabbas, L. Hsairi
{"title":"Network Traffic Analysis for DDOS Attack Detection","authors":"Atheer Alharthi, A. Eshmawi, Azzah Kabbas, L. Hsairi","doi":"10.1145/3440749.3442637","DOIUrl":"https://doi.org/10.1145/3440749.3442637","url":null,"abstract":"Distributed Denial of Service attacks (DDoS) are one of the most prevalent attacks threatening systems and their security. In this paper, various models to categorize these attacks are presented, analyzed and compared on regards of their effectiveness for DDoS detection. Machine learning (ML) algorithms for classification are used after pre-processing DDoS dataset to classify network traffic. After analyzing the results of Naïve bayes, Decision Tree, Support Vector Machine, and Random Forest classifiers, we conclude that the most accurate results appeared when using the Random Forest classifier.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable Cities 面向可持续智慧城市传感器和执行器管理的混合无线网状网络
V. Pham, Anton Ovchinnikov, A. Zadorozhnaya, R. Kirichek, L. Myrova
{"title":"A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable Cities","authors":"V. Pham, Anton Ovchinnikov, A. Zadorozhnaya, R. Kirichek, L. Myrova","doi":"10.1145/3440749.3442624","DOIUrl":"https://doi.org/10.1145/3440749.3442624","url":null,"abstract":"In developing Smart Sustainable Cities (SSC), we consider providing communication networks to communicate with sensors and actuators. Internet of Things devices are expected to send data over a long distance and save energy consumption. Understanding the challenges of data transmission in the urban area, the authors propose a hybrid wireless mesh network as a network infrastructure for managing sensors and actuators deployed in the SSC. Studying wireless technologies proposed for IoT networks, the authors describe the hybrid network architecture within SSC systems. An experiment was performed using modules equipped with various wireless interfaces. As the experimental results, the nodes far from the gateway can exchange data with the remote server in the mesh network.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Salient Object Detection Technique Based on Color Divergence 基于颜色发散的显著目标检测技术
Sana Sahar Guia, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh
{"title":"A Salient Object Detection Technique Based on Color Divergence","authors":"Sana Sahar Guia, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh","doi":"10.1145/3440749.3442593","DOIUrl":"https://doi.org/10.1145/3440749.3442593","url":null,"abstract":"Nowadays, multimedia and visual computing advances in digital technology make a potential change in human life. Many applications exploit the captured images from autonomous entities as data sources for several goals. In fact, these captured images need to be interpreted in order to extract their external environment. The researchers of this domain will meet some challenges such as how to detect and interpret the images’ context. This paper is to propose an efficient technique that detects objects of a given image based on the color divergence. The results clearly show the accuracy and the computation speed of the proposed technique compared with other methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN Nodes 应用多维尺度法确定WSN节点空间坐标
I. Grishin, V. Pham, Darina Okuneva, R. Kirichek, L. Myrova
{"title":"Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN Nodes","authors":"I. Grishin, V. Pham, Darina Okuneva, R. Kirichek, L. Myrova","doi":"10.1145/3440749.3442645","DOIUrl":"https://doi.org/10.1145/3440749.3442645","url":null,"abstract":"Nowadays, wireless sensor networks (WSNs) are widely used for developing the Internet of Things applications, which provide services such as sensor data collection or monitor, actuator management. In some cases, there are many sensor nodes deployed randomly in the network. In this paper, we consider determining the coordinates of unknown nodes based on the multidimensional scaling method while assuming that the distances between nodes are estimated on the server. However, there are also data gaps about these distances. The article discusses a method for reducing the number of computations required to estimate the distances between nodes.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave range 提高微波范围内运动目标间无线通信系统的抗噪声能力
I. Zharikov, V. Fadeenko, V. Davydov, A. Valov
{"title":"Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave range","authors":"I. Zharikov, V. Fadeenko, V. Davydov, A. Valov","doi":"10.1145/3440749.3442603","DOIUrl":"https://doi.org/10.1145/3440749.3442603","url":null,"abstract":"Currently, m-ary radio communication systems are gaining popularity for transferring information between motile objects. This paper describes a possible way to increase the noise immunity of such systems. This is especially true for cases of long distances in poor climatic conditions. In such a situation, the power of the transmitted signal decreases with increasing distance to the receiver. When using the proposed method of increasing noise immunity in the construction of m-ary communication systems, it is possible to reduce the loss of data during transmission over the radio channel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence 安全软件定义网络的机器学习方法:机器学习和人工智能
Afaf D. Althobiti, Rabab M. Almohayawi, O. Bamasag
{"title":"Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence","authors":"Afaf D. Althobiti, Rabab M. Almohayawi, O. Bamasag","doi":"10.1145/3440749.3442597","DOIUrl":"https://doi.org/10.1145/3440749.3442597","url":null,"abstract":"This paper proposes network security enhancement solution aiming to improving the level of performance in the detection of cyber-attacks on Software Defined Network (SDN) it will prevent against Denial of Service Attack. We are going to employ two solution and comparing on the SDN attack detection performance. The first approach is the performance accuracy of the SDN with IDS procedural, and the second approach is the integration of SDN with Machine Learning. The project serves the organization generally in the field of information security, network security and cybersecurity awareness. The system performance evaluation results prove the system is capable to provide the effective DDoS attack detection and provide security enhancement in Software Defined Network.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Flow Classification Model for Resource Distribution in SDN Networks SDN网络中资源分布的动态流分类模型
S. Muhizi, M. Al-Bahri
{"title":"Dynamic Flow Classification Model for Resource Distribution in SDN Networks","authors":"S. Muhizi, M. Al-Bahri","doi":"10.1145/3440749.3442613","DOIUrl":"https://doi.org/10.1145/3440749.3442613","url":null,"abstract":"As the number of networked devices and applications rapidly grows, particularly the Internet of Things applications, billions of devices are connected to the network and therefore managing the generated traffic becomes a needy task. Effectively managing these devices to support reliable, secure, and high-quality applications become challenging. The main solution to manage network traffic is the automatic classification of application aimed at identifying the semantic type of the application by analyzing its network traffic and wide range of new features. This article proposes a model for dynamic network traffic classification in Software-Defined Networks based on the modified k-means algorithm for network resources distribution to prioritized types of traffic, which allows network applications optimization","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Double Layer Steganography Technique Based on DNA Sequences 基于DNA序列的鲁棒双层隐写技术
Omnia Alharbi, Asia Othman Aljhadli, A. Manaf
{"title":"A Robust Double Layer Steganography Technique Based on DNA Sequences","authors":"Omnia Alharbi, Asia Othman Aljhadli, A. Manaf","doi":"10.1145/3440749.3442644","DOIUrl":"https://doi.org/10.1145/3440749.3442644","url":null,"abstract":"Security of information while transmitting between parties is an essential factor. The openness of the network increases the possibility of attacking information. Cryptography and steganography are the most significant methods that achieve secrecy. These mechanisms are different from each other, but both maintain data security, confidentiality, and integrity. A combination of cryptography and steganography or a combination of the same method leads to a secure data transmission by providing a multilevel of security. This paper aims to provide a new technique that focuses on achieving secrecy for data and robustness against attacks. The technique relies on the multilevel steganography approach by encrypting the data and then hiding it using an image-based and DNA-based steganography techniques.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experimental Study to Understand How Users Choose Password 了解用户如何选择密码的实验研究
Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani
{"title":"An Experimental Study to Understand How Users Choose Password","authors":"Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani","doi":"10.1145/3440749.3442643","DOIUrl":"https://doi.org/10.1145/3440749.3442643","url":null,"abstract":"End-users share various personal information with different types of websites such as governmental, social networking, or educational websites. Websites vary in importance to the user and sensitivity of the information they involved about users. The password is the access key to the user account on websites and the first defense against unauthorized access. Previous studies mostly focused on the strength and weaknesses of passwords. This paper focuses on the passwords and the password’s relevance to the website’s sensitivity based on the type of information shared on them. A survey and think-aloud experiment, and post-interview are conducted in our laboratory. The participants were asked to create passwords to register on three different websites while thinking aloud so experimenters can prove and reject some hypotheses. The study’s results confirm that the importance of a website affects users’ behaviors and passwords.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信