2019 International Conference on Advanced Information Technologies (ICAIT)最新文献

筛选
英文 中文
Static Independent Task Scheduling on Virtualized Servers in Cloud Computing Environment 云计算环境下虚拟化服务器的静态独立任务调度
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920865
Yamin Thet Htar Hlaing, Tin Tin Yee
{"title":"Static Independent Task Scheduling on Virtualized Servers in Cloud Computing Environment","authors":"Yamin Thet Htar Hlaing, Tin Tin Yee","doi":"10.1109/AITC.2019.8920865","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920865","url":null,"abstract":"Cloud Computing is the advanced design of client-server computing, cluster computing and grid computing. The cloud providers provide cloud services mainly as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) to the users who can access publicly, privately or hybrid via the Internet. In Cloud computing, there are many research areas like task scheduling, allocation of resource, security and privacy etc. Task scheduling is a vital area in the cloud computing, and it must be optimized by considering different parameters. Nowadays, there are a lot of different scheduling algorithms to minimize execution time and cost, to improve the quality of service, system performance and to maximize resource utilization and load balancing, etc. This paper proposed a Static Independent Task Scheduling on Virtualized Servers in Cloud Computing Environment in which tasks are allocated to the suitable VM by measuring the availability of each resource with respect to its processing power, cost and the number of available processing elements and by grouping tasks according to their instruction length. This method is simulated on Cloud Simulator (Cloudsim toolkit) and results show the proposed method that maximizes total execution time and minimizes execution cost for all tasks than scheduling algorithms such as Shortest Job First (SJF) and First Come First Serve (FCFS) algorithms.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study of Temporally Coupled Framed Access Scheme in Slotted ALOHA 开槽ALOHA中时间耦合帧访问方案的研究
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921187
Khun Aung Thura Phyo, Yuto Lim, Yasuo Tan
{"title":"Study of Temporally Coupled Framed Access Scheme in Slotted ALOHA","authors":"Khun Aung Thura Phyo, Yuto Lim, Yasuo Tan","doi":"10.1109/AITC.2019.8921187","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921187","url":null,"abstract":"This paper presents a further study of the access scheme in framed slotted ALOHA. A random-access (RA) scheme is presented in the erasure channel where the collision happens and deploy the iterative decoding to cancel the interference. The contribution is to transmit the packets in a temporally coupled manner by limiting the constraint of the length of the time frame. The final result shows that the investigated access scheme can proceed well. The feasible number of user collision per slot and the number of frames in a superframe is described to obtain the achievable throughput with few packet loss rate of the scheme.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive Indoor-Localization using Echoes of Ultrasound Signals 利用超声信号回波进行被动室内定位
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921282
F. Hoeflinger, Addythia Saphala, D. Schott, L. Reindl, C. Schindelhauer
{"title":"Passive Indoor-Localization using Echoes of Ultrasound Signals","authors":"F. Hoeflinger, Addythia Saphala, D. Schott, L. Reindl, C. Schindelhauer","doi":"10.1109/AITC.2019.8921282","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921282","url":null,"abstract":"In this paper, we present our novel indoor-localization system. The system uses only short inaudible acoustic signals to locate acoustically passive objects in a room. Moving objects can be detected as well as resting objects. The localization device consists of a transmitter (speaker) and a multi-channel receiver with up to eight receivers (microphones). The total time-of-flight path from the speaker to the microphones is the round-trip-time of the signal from the speaker to the reflecting object and back to the microphones. Therefore, a localization algorithm is used to translate the timing into object coordinates. By using a simple approach of direct intersection, the 3D-coordinates of the reflecting surface of the target can be derived. In an experiment, we demonstrate the functionality of this approach.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of TCP 445 Attacks and Global Snapshot with Honeypot Analysis 基于蜜罐分析的TCP 445攻击分类及全局快照
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921162
Yinghui Luo, Zhiqing Zhang, H. Esaki, H. Ochiai
{"title":"Classification of TCP 445 Attacks and Global Snapshot with Honeypot Analysis","authors":"Yinghui Luo, Zhiqing Zhang, H. Esaki, H. Ochiai","doi":"10.1109/AITC.2019.8921162","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921162","url":null,"abstract":"This paper analyzes malicious activities collected in port 445 for 20 days by honeypot, by exposing our computer to malicious hosts and luring them to intrude it. We filtered the intrusion packets by Samba protocol and find their characteristics for classifying them into 3 types and processed them for their source IP address. The goal is obtaining the source country corresponding to each type of malicious activities in port 445 so that we could analyze their source country distribution.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Automated Software Size Measurement Tool based on Generation Model using COSMIC Function Size Measurement 基于COSMIC函数尺寸测量生成模型的自动化软件尺寸测量工具
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920991
Thandar Zaw, Swe Zin Hlaing, M. Lwin, K. Ochimizu
{"title":"An Automated Software Size Measurement Tool based on Generation Model using COSMIC Function Size Measurement","authors":"Thandar Zaw, Swe Zin Hlaing, M. Lwin, K. Ochimizu","doi":"10.1109/AITC.2019.8920991","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920991","url":null,"abstract":"At present, most of the software industries need the well-defined models and standard measurement methods to measure the size of software. They are useful in the estimation of effort and time that are extensively used at the early stage of software development. COSMIC Functional Size Measurement (FSM) is one of the recognized methods to estimate the size of software project. The several research initiatives have focused on COSMIC FSM procedure with specific design diagram notation by manually and automatically. However, manual measurement of the various diagrams is time-wasting and difficult to measure the accurate size of the software. Therefore, the automated measurement of function size which includes the generation model based on three different diagram notations such as UML, SysML and Petri net and general mapping rules between COSMIC FSM and generation model to measure the size of software is proposed in this paper. The manual measurement of cooker system by using the generation model and COSMIC concept is successfully done in our previous paper. This proposed automated tool can handle various types of diagramming and get the size of software correctly.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic License Plate Detection System for Myanmar Vehicle License Plates 缅甸车辆车牌自动检测系统
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921286
Khin Pa Pa Aung, K. Nwe, A. Yoshitaka
{"title":"Automatic License Plate Detection System for Myanmar Vehicle License Plates","authors":"Khin Pa Pa Aung, K. Nwe, A. Yoshitaka","doi":"10.1109/AITC.2019.8921286","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921286","url":null,"abstract":"License Plate Detection is an intelligent system to find the exact license plate by analyzing image/video data for automatic license plate recognition (ALPR) system. The proposed system used image data. There is much early research has been done for ALPR purposes, however, it was still challenging tasks for accurately detect license plates in the open environment. The main difficulties lie in the diversity of plates such as language, font, color, and type of the number plates that differ across nations and conditional variations such as various background scenes and illumination when captured. The fundamental ALPR system consists of three processes: license plate detection, character segmentation, and character recognition. Proposed system focused on license plate detection based on image processing technology that is a crucial step for the whole ALPR system. A Myanmar License plate has a white boundary for every different color of plates, thus the proposed system applied an edge-based approach for any color of plates, and the plate region will remain because of its white boundary. After edge detection, morphological operation has been applied as it can add or remove pixels from/to the objects in an image. Thus the license plate can be extracted accurately. Finally, the bounding box technology was applied to extract only the number plate region properly.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Storage Structure of Student Record based on Hyperledger Fabric Blockchain 基于Hyperledger Fabric b区块链的学生记录存储结构
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921342
K. Wai, Ei Chaw Htoon, N. Thein
{"title":"Storage Structure of Student Record based on Hyperledger Fabric Blockchain","authors":"K. Wai, Ei Chaw Htoon, N. Thein","doi":"10.1109/AITC.2019.8921342","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921342","url":null,"abstract":"Student records (SR) are needed to be regularly protected for safe access and security control. The blockchain system can support security, confidentiality, unchangeable, transparency and access control service. Although Hyperledger Fabric blockchain is a scalability modular architecture, various configuration elements affect the performance of transaction access time. Moreover, it cannot provide an efficient indexing capability on the transaction. In this paper, a storage structure that provides better access time is presented. Firstly, the suitable block size is proposed for transactions based on the configuring parameter and the transaction arrival rate to reduce the latency of transaction storage time. Secondly, the metadata of the SR block is replicated on an off-chain database to overcome the limitation of indexing capability and performance issue. SR data will be accessed transparently with greater performance and lower the costs of manpower and time.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting Voice Features for Criminal Case 刑事案件语音特征检测
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921212
Aie Su Su Kyi, K. Lin
{"title":"Detecting Voice Features for Criminal Case","authors":"Aie Su Su Kyi, K. Lin","doi":"10.1109/AITC.2019.8921212","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921212","url":null,"abstract":"Emotion detection research area is very popular in medical informatics and criminal technology. The voice is the one of the ways to detect the human inner emotions such as general feelings or psychiatric feelings. Humans has been expressed their emotions by varying different vocal features during speech generation. Voice and speech analysis help to become secure communications among people and human cannot easily lie their emotions to other. At the law court, emotion analysis can detect a culprit speak was lie or truth. The propose system is used to detect the emotions (normal, sad) of human through speech analysis by using Pitch, Mel Frequency Cepstral Coefficients (MFCC) and Short Time Energy (STE) feature extraction techniques to increase the accuracy and reliability. This system will help in court of law, when the lawyer questioning to the witness or plaintiff or defense to get the truth of the crime scene.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Articles Classification in Myanmar Language 缅甸语冠词分类
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920927
Myat Sapal Phyu, K. Nwet
{"title":"Articles Classification in Myanmar Language","authors":"Myat Sapal Phyu, K. Nwet","doi":"10.1109/AITC.2019.8920927","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920927","url":null,"abstract":"Article classification is a problem of text classification to assign the articles to their corresponding class or topic. According to this work, there are two main barriers to classify Myanmar text in deep learning model, to find the proper way of determining the word boundaries and to build the datasets for Myanmar text classification. This paper shows the empirical evidence on article classification in Myanmar language for both syllable-level and word-level by fine-tuning Convolutional Neural Networks. They are denoted as Syllable-Level Convolutional Neural Networks (SL-CNN) and Word-Level Convolutional Neural Networks (WL-CNN). Although there are few publicly available general-purpose pre-trained vectors for Myanmar language that can be further applied to transfer learning, it is still needed to construct large-scale datasets for classifying Myanmar articles. We construct six datasets to classify Myanmar articles and evaluation is measured by the comparative analysis of these vectors on SL-CNN and WL-CNN with Recurrent Neural Networks for both syllable and word level, SL-RNN and WL-RNN.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying Clustering Techniques for Refining Large Data Set: Case Study on Malware 应用聚类技术提炼大数据集:以恶意软件为例
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921088
Yoon Myet Thwe, Mizuhito Ogawa, P. N. Dung
{"title":"Applying Clustering Techniques for Refining Large Data Set: Case Study on Malware","authors":"Yoon Myet Thwe, Mizuhito Ogawa, P. N. Dung","doi":"10.1109/AITC.2019.8921088","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921088","url":null,"abstract":"Malware databases have been unintentionally collecting garbage (incomplete malware) together with malware through the Internet. This paper focuses on finding garbage (incomplete malware) from large malware datasets using binary pattern matching and speed up the matching by using nested clustering as a preprocessing. To verify the effectiveness of our method, we conduct experiments on various malware datasets. The results show that our method works efficiently while maintaining high accuracy.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123463530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信