Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks 基于区块链的新型车辆自组织网络信任管理协议
Ohoud Alboqomi, Tahani Gazdar, A. Munshi
{"title":"A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks","authors":"Ohoud Alboqomi, Tahani Gazdar, A. Munshi","doi":"10.1145/3440749.3442642","DOIUrl":"https://doi.org/10.1145/3440749.3442642","url":null,"abstract":"Trust establishment in Smart Transportation environments is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, the applications context requires that the lifetime of data messages be short, so the vehicles have to authenticate the reliability of the received messages timely to make decision accordingly. In this paper work, we conduct a comprehensive review of the recent schemes dealing with trust management in vehicular environments, particularly, blockchain-based ones. Besides, we propose a dependable trust management scheme based on blockchain aiming to calculate for each vehicle a unique and up-to-date trust metric available to all other vehicles to solve the cold-start problem.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Methodology for testing LPWAN networks with mesh topology 用网状拓扑测试LPWAN网络的方法学
Y. Avakyan, E. S. Kuznetsova, R. Kirichek
{"title":"Methodology for testing LPWAN networks with mesh topology","authors":"Y. Avakyan, E. S. Kuznetsova, R. Kirichek","doi":"10.1145/3440749.3442623","DOIUrl":"https://doi.org/10.1145/3440749.3442623","url":null,"abstract":"The paper presents a methodology for testing LPWAN network with a mesh topology. Network testing is essential to identify and resolve problems before deploying the network on a large scale. Deploying a network without preliminary testing increases the number of wasted resources and does not guarantee the expected network performance. The methodology provided in this article allows testing the network and determining the main parameters, which will allow identifying the faults of the network before implementation. The proposed methodology is based on the IETF RFC 2544 specification. Model-based testing allows automating the testing process. For this, a simulation model of an LPWAN network with mesh topology based on LoRaWAN was developed in the OMNeT++ simulation environment.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Canny edge detection towards deep learning Arabic document classification 面向深度学习阿拉伯语文档分类的精细边缘检测
Taghreed Alghamdi, S. Snoussi, L. Hsairi
{"title":"Canny edge detection towards deep learning Arabic document classification","authors":"Taghreed Alghamdi, S. Snoussi, L. Hsairi","doi":"10.1145/3440749.3442641","DOIUrl":"https://doi.org/10.1145/3440749.3442641","url":null,"abstract":"The paper describes the implementation of deep learning-based edge detection in image processing. A set of points in an image at which image brightness changes formally or sharply is called edge detection. Using edge detection filters, we can extract the feature of an object. In our work, we aim to develop a deep learning system to classify Arabic document images into four classes as follows: printed, handwritten, historical, and signboard and applying edge detection filters to extract features from document images. We will be using two edge detection methods namely Sobel, and Canny edge detection that are applied in 1000 Arabic document images to extract edges. Analyzing the performance factors are done in the terms of accuracy on the premise of Mean Squared Error (MSE) and python is employed for edge detection implementation. The experimental results show that the Canny edge detection technique results higher than the Sobel edge detection technique.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple Level Action Embedding for Penetration Testing 用于渗透测试的多级动作嵌入
Hoang Nguyen, H. Nguyen, T. Uehara
{"title":"Multiple Level Action Embedding for Penetration Testing","authors":"Hoang Nguyen, H. Nguyen, T. Uehara","doi":"10.1145/3440749.3442660","DOIUrl":"https://doi.org/10.1145/3440749.3442660","url":null,"abstract":"Penetration Testing (PT) is one of the most effective and widely used methods to increase the defence of a system by looking for potential vulnerabilities. Reinforcement learning (RL), a powerful type of machine learning in self-decision making, is demonstrated to be applicable in PT to increase automation as well as reduce implementation costs. However, RL algorithms are still having difficulty on PT problems which have large network size and high complexity. This paper proposes a multiple level action embedding applied with Wolpertinger architect (WA) to enhance the accuracy and performance of the RL, especially in large and complicated environments. The main purpose of the action embedding is to be able to represent the elements in the RL action space as an n-dimensional vector while preserving their properties and accurately representing the relationship between them. Experiments are conducted to evaluate the logical accuracy of the action embedding. The deep Q-network algorithm is also used as a baseline for comparing with WA using the multiple level action embedding.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reducing the Impact of Outliers on the One-Class Classification Decision Rule 减少离群值对单类分类决策规则的影响
A. Larin, O. Seredin, A. Kopylov
{"title":"Reducing the Impact of Outliers on the One-Class Classification Decision Rule","authors":"A. Larin, O. Seredin, A. Kopylov","doi":"10.1145/3440749.3442662","DOIUrl":"https://doi.org/10.1145/3440749.3442662","url":null,"abstract":"A modified version of one-class classification criterion reducing the impact of outliers on the one-class classification decision rule is proposed based on support vector data description (SVDD) by D. Tax. The optimization method utilizes the substitution of nondifferentiable objective function by the smooth one. A comparative experimental study of existing one-class methods shows the superiority of the proposed criterion in anomaly detection.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123626258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction 基于联合透射图估计和大气光提取的雾霾去除方法
A. Filin, I. Gracheva, A. Kopylov
{"title":"Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction","authors":"A. Filin, I. Gracheva, A. Kopylov","doi":"10.1145/3440749.3442663","DOIUrl":"https://doi.org/10.1145/3440749.3442663","url":null,"abstract":"This paper proposes a new computationally effective method of haze removal based on joint transmission map estimation and atmospheric-light extraction using the probabilistic gamma-normal model. The enhanced version of universal atmospheric light extractor allows reducing the influence of localized light sources to result of processing. Experimental results show that the proposed method has comparable quality results and lower computation time than other haze removal methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes 基于ITU-T Q.3961建议书和ITU-T Q.3056建议书的基于探针的固定和移动通信网网速和网络参数测量系统的开发
Nikita Shustov, V. Zelenov, R. Kirichek
{"title":"Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes","authors":"Nikita Shustov, V. Zelenov, R. Kirichek","doi":"10.1145/3440749.3442608","DOIUrl":"https://doi.org/10.1145/3440749.3442608","url":null,"abstract":"Today, the work of many organizations directly depends on the quality of the Internet connection. Using the method of measuring the speed of the Internet network and network parameters based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 using probes will allow monitoring the quality of the services provided. There are solutions for measuring the bandwidth of Internet connection such as Speedtest, 2IP, Netflix Fast, but they are not based on the international standard, hence measurements of these systems cannot be considered trusted. Therefore, to control the quality of the Internet connection using a trusted source, there is a need in the trusted method, which is discussed in this article. This article discusses developed methods for throughput, network latency, jitter. Measurement results of the methods shows reliability in testing conditions.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121528098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Enabled Healthcare: Benefits, Issues and Challenges‏ 物联网医疗:好处、问题和挑战
Bassam Al-Shargabi, Simak Abuarqoub
{"title":"IoT-Enabled Healthcare: Benefits, Issues and Challenges‏","authors":"Bassam Al-Shargabi, Simak Abuarqoub","doi":"10.1145/3440749.3442596","DOIUrl":"https://doi.org/10.1145/3440749.3442596","url":null,"abstract":"The Internet of Things (IoT) technology found many applications in the healthcare sector. Through the collection of vital data, IoT plays a crucial role are automating manual tasks and improving patient outcomes. This paper provides an overview of the impact and challenges of IoT architectures and applications in healthcare. The paper identifies the key benefits and key drivers behind the development of IoT-enabled healthcare systems. Then, we focus on security and privacy issues as real threats and obstacles facing the wide adoption of IoT in healthcare applications. Finally, we outline the key challenges and opportunities with specific reference to the unique requirements of healthcare applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain 采用物联网和区块链的先进环境监测解决方案
Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen
{"title":"Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain","authors":"Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen","doi":"10.1145/3440749.3442655","DOIUrl":"https://doi.org/10.1145/3440749.3442655","url":null,"abstract":"Currently, the quality of the environment in urban areas is a matter of concern of countries in particular and the world in general. The application of new technology for this field is becoming increasingly urgent in the context of severe environmental pollution, environmental monitoring systems need to be upgraded to be able to effectively manage and evaluate the environment of a large geographic area. Transparency, accuracy and real time of data must be at the forefront to provide timely solutions when environmental pollution occurs to minimize socio-economic impacts.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem 基于多项式重构问题的同态数字碎片加密方案
Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh
{"title":"A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem","authors":"Mostefa Kara, A. Laouid, R. Euler, Mohammed Amine Yagoub, A. Bounceur, Mohammad Hammoudeh, S. Medileh","doi":"10.1145/3440749.3442592","DOIUrl":"https://doi.org/10.1145/3440749.3442592","url":null,"abstract":"In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow’s systems secure. Many efforts are focused on addressing the computation speed and the massive data size requirements of today’s systems. Significant research efforts are targeting the computational complexity by focusing on the number of cryptographic operations or the scope of application. In this paper, we present an asymmetric homomorphic encryption scheme that relies on converting base numbers to a given base in such a way that Leveled Fully Homomorphic Encryption (LFHE) is performed. This lightweight technique is easy to implement and applicable in many fields, especially those that require high speed and safety.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信