{"title":"Efficient High Performance FPGA based NoSQL Caching System for Blockchain Scalability and Throughput Improvement","authors":"A. I. Sanka, R. Cheung","doi":"10.1109/ICSENG.2018.8638204","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638204","url":null,"abstract":"Blockchain inspires many people across the globe and has started getting many adoptions after realizing its promising benefits through successful trials. Applications of blockchain range from cryptocurrency, smart contract, banking, healthcare and identity management, insurance, land registry to IoT industry. However, scalability and throughput issues are major challenges of blockchain and are less researched. Many lightweight nodes especially IoT devices depend and put much workload on blockchain servers since they cannot store the full blockchain due to its huge size. This paper investigates performance bottlenecks in blockchain and presents efficient high performance system for caching the blockchain data in the FPGA network interface controller (NIC) for improving scalability and throughput of blockchain applications. We design a customized SHA-256 hash core specific for efficient blockchain caching to save hashing executions and improve the performance. We built and use Jansson and Curl libraries to interface our system with real Bitcoin core. We finally evaluate the throughput performance of the Bitcoin core. The overall result revealed that our system improves the throughput performance by 103 times when cache hit. The design also offers small work area utilization, low power consumption and higher performance.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123630756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions: Measures, Policies, Tools and Applications","authors":"Hussain Aldawood, G. Skinner","doi":"10.1109/ICSENG.2018.8638166","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638166","url":null,"abstract":"Social engineering is one of the biggest threats organizations face today, as more and more companies are adopting digitalization. This study presents a critical review of the existing measures, tools, and policies for the protection of computer entities, particularly organizations, against cyber security social engineering. These factors were examined through a systematic review of recent studies published on the subject. Our analysis highlights the meaning of social engineering and the problem it poses, and outlines some of the previous efforts that necessitate an inquiry on the subject. There is an urgent need to provide training for employees of such digitalized companies to ensure they understand the risks and ways to avoid them. As socially engineered attacks depend on the human factor, employees’ awareness is the best practice that can be implemented to contain its threats. Other measures include training of non-technical members, awareness programs, new security network, software usage, and security protocols to tackle social engineering threats.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127533963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The optimum number of Principles ideal for Enterprise Architecture practice","authors":"S. Kempegowda, Z. Chaczko","doi":"10.1109/ICSENG.2018.8638237","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638237","url":null,"abstract":"Every organization defines Principles for Enterprise Architecture (EA) practice. As there is no set standard, the principles identified exceeds the recommended number 20 by TOGAF. More the number of Principles defined it will be ignored by the Enterprise Architects instead referring for their decision making. In this paper, we identify the ideal number of principles that will motivate Architects to refer to perform their task","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industry 4.0 Complemented with EA Approach: A Proposal for Digital Transformation Success","authors":"S. Kempegowda, Z. Chaczko","doi":"10.1109/ICSENG.2018.8638212","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638212","url":null,"abstract":"Manufacturing industry based on steam know as Industry 1.0 is evolving to Industry 4.0 a digital ecosystem consisting of an interconnected automated system with real-time data. This paper investigates and proposes, how the digital ecosystem complemented with Enterprise Architecture practice will ensure the success of digital transformation.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Light Path Establishment In switch Fabric Using OpenFlow","authors":"Sadia Qureshi, R. Braun","doi":"10.1109/ICSENG.2018.8638220","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638220","url":null,"abstract":"In today’s optical networks, Light paths are established through Network Management System and Element Management System, which is a manual and cumbersome process. Paths are computed and pre-setup according to the known traffic d emands, a nd p rovisioning a ny new service takes time. Several efforts have recently been made to make the path establishment process dynamic, including the Software Defined N etworking a pproach. H owever all of this work has assumed fully interconnected fabrics of the network devices which is generally not the case. The task of end to end path establishment between network elements and through fabric are interrelated, and this task remains incomplete, without consideration of the switch’s limitations. This work highlights for the first time the issue of path establishment dynamically through a switch fabric. The paper briefly e xplains t he p roblem a nd s uggests an SDN based solution using the OpenFlow protocol. This work contributes a represention of the basic framework which will be required to make the complete path setup process dynamic. The paper also includes an operational description.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117044735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yao Peng, Ye Lu, Mingyang Li, Pengfei Tan, Fan Gao, Chuanqi Li
{"title":"Negative Refraction and Imaging Characteristics of Two - dimensional Hexagonal Air annular Photonic Crystal","authors":"Yao Peng, Ye Lu, Mingyang Li, Pengfei Tan, Fan Gao, Chuanqi Li","doi":"10.1109/ICSENG.2018.8638211","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638211","url":null,"abstract":"In this paper, a two-dimensional(2D) hexagonal lattice annular photonic crystal is designed. The band diagram of this photonic crystal is calculated by plane wave expansion method (PWE). The negative refraction phenomenon of photonic crystal is studied by analyzing the band diagram. The finite -difference time - domain method (FDTD) is used to simulate the imaging characteristics of the point light source. We have proved that this annular photonic crystal plate can realize negative refraction imaging.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Krömer, Michal Prauzek, Martin Stankus, Jaromír Konecny
{"title":"Adaptive Fuzzy Video Compression Control for Advanced Driver Assistance Systems","authors":"P. Krömer, Michal Prauzek, Martin Stankus, Jaromír Konecny","doi":"10.1109/ICSENG.2018.8638184","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638184","url":null,"abstract":"Modern advanced driver assistance systems (ADAS) combine dedicated hardware with novel algorithms to provide the driver with an efficient vehicle control support and represent an important element of the emerging ecosystem of intelligent transportation systems. Nowadays, they often use sophisticated methods and intelligent algorithms to achieve a high quality of service. Video–based systems are concerned with the acquisition of input data (video signal), its transmission inside the vehicle, and presentation to the driver in the cockpit. In this work, the design of an intelligent system for dynamic video compression control in ADAS is presented and evaluated.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Relay Routing Algorithm for Remote Concentrated Ammeter Reading based on Ant Colony Optimization","authors":"Senhui Qiu, Yexiu Zhong, Xiaoshu Luo, Junxiu Liu, Yuling Luo, Pinqun Jiang","doi":"10.1109/ICSENG.2018.8638217","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638217","url":null,"abstract":"The reliability of Power Line Communication (PLC) is an important index that affects the application of remote concentrated ammeter reading system. In this paper, the typical physical topology and characteristics of the low-voltage power distribution network are analyzed at first. Secondly, an encoding rule of communication nodes in the distribution network of remote concentrated ammeter reading is designed to improve the reliability of the ammeter reading and the efficiency of route search. Furthermore, an optimized relay routing algorithm is proposed based on ant colony optimization. Finally, the performance of the algorithm has been evaluated by analysis and extensive simulation. The results show that the proposed algorithm can improve the reliability of the ammeter reading, and route search of the algorithm has high-efficiency and strong anti-destruction.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"885 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covering 1.5D Terrain by Common Height Towers","authors":"L. Gewali, Binay Dahal","doi":"10.1109/ICSENG.2018.8638174","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638174","url":null,"abstract":"Finding the minimum number of towers to cover a 1.5D terrain is an intractable problem. We propose an easily implementable approximation algorithm for covering a 1.5D terrain by towers of given common height. We describe a technique of identifying potential input points where tower bases can be installed. We show how a small subset of these placement points can be computed so that towers placed on such points can cover the entire terrain.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework","authors":"Noman H. Chowdhury, M. Adam, G. Skinner","doi":"10.1109/ICSENG.2018.8638250","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638250","url":null,"abstract":"Cybersecurity is a growing concern for private individuals and professional entities. Thereby, reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind insecure HCS behavior. However, as our review reveals, studies on the role of time pressure in HCS are scant and there is no framework that can inform researchers and practitioners on this matter. In this paper, we present a conceptual framework consisting of contexts, psychological constructs, and boundary conditions pertaining to the role time pressure plays on HCS behavior. The framework is also validated and extended by findings from semi-structured interviews of different stakeholder groups comprising of cybersecurity experts, professionals, and general users. The framework will serve as a guideline for future studies exploring different aspects of time pressure in cybersecurity contexts and also to identify potential countermeasures for the detrimental impact of time pressure on HCS behavior.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}