{"title":"Static Independent Task Scheduling on Virtualized Servers in Cloud Computing Environment","authors":"Yamin Thet Htar Hlaing, Tin Tin Yee","doi":"10.1109/AITC.2019.8920865","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920865","url":null,"abstract":"Cloud Computing is the advanced design of client-server computing, cluster computing and grid computing. The cloud providers provide cloud services mainly as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) to the users who can access publicly, privately or hybrid via the Internet. In Cloud computing, there are many research areas like task scheduling, allocation of resource, security and privacy etc. Task scheduling is a vital area in the cloud computing, and it must be optimized by considering different parameters. Nowadays, there are a lot of different scheduling algorithms to minimize execution time and cost, to improve the quality of service, system performance and to maximize resource utilization and load balancing, etc. This paper proposed a Static Independent Task Scheduling on Virtualized Servers in Cloud Computing Environment in which tasks are allocated to the suitable VM by measuring the availability of each resource with respect to its processing power, cost and the number of available processing elements and by grouping tasks according to their instruction length. This method is simulated on Cloud Simulator (Cloudsim toolkit) and results show the proposed method that maximizes total execution time and minimizes execution cost for all tasks than scheduling algorithms such as Shortest Job First (SJF) and First Come First Serve (FCFS) algorithms.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Temporally Coupled Framed Access Scheme in Slotted ALOHA","authors":"Khun Aung Thura Phyo, Yuto Lim, Yasuo Tan","doi":"10.1109/AITC.2019.8921187","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921187","url":null,"abstract":"This paper presents a further study of the access scheme in framed slotted ALOHA. A random-access (RA) scheme is presented in the erasure channel where the collision happens and deploy the iterative decoding to cancel the interference. The contribution is to transmit the packets in a temporally coupled manner by limiting the constraint of the length of the time frame. The final result shows that the investigated access scheme can proceed well. The feasible number of user collision per slot and the number of frames in a superframe is described to obtain the achievable throughput with few packet loss rate of the scheme.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Hoeflinger, Addythia Saphala, D. Schott, L. Reindl, C. Schindelhauer
{"title":"Passive Indoor-Localization using Echoes of Ultrasound Signals","authors":"F. Hoeflinger, Addythia Saphala, D. Schott, L. Reindl, C. Schindelhauer","doi":"10.1109/AITC.2019.8921282","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921282","url":null,"abstract":"In this paper, we present our novel indoor-localization system. The system uses only short inaudible acoustic signals to locate acoustically passive objects in a room. Moving objects can be detected as well as resting objects. The localization device consists of a transmitter (speaker) and a multi-channel receiver with up to eight receivers (microphones). The total time-of-flight path from the speaker to the microphones is the round-trip-time of the signal from the speaker to the reflecting object and back to the microphones. Therefore, a localization algorithm is used to translate the timing into object coordinates. By using a simple approach of direct intersection, the 3D-coordinates of the reflecting surface of the target can be derived. In an experiment, we demonstrate the functionality of this approach.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of TCP 445 Attacks and Global Snapshot with Honeypot Analysis","authors":"Yinghui Luo, Zhiqing Zhang, H. Esaki, H. Ochiai","doi":"10.1109/AITC.2019.8921162","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921162","url":null,"abstract":"This paper analyzes malicious activities collected in port 445 for 20 days by honeypot, by exposing our computer to malicious hosts and luring them to intrude it. We filtered the intrusion packets by Samba protocol and find their characteristics for classifying them into 3 types and processed them for their source IP address. The goal is obtaining the source country corresponding to each type of malicious activities in port 445 so that we could analyze their source country distribution.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automated Software Size Measurement Tool based on Generation Model using COSMIC Function Size Measurement","authors":"Thandar Zaw, Swe Zin Hlaing, M. Lwin, K. Ochimizu","doi":"10.1109/AITC.2019.8920991","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920991","url":null,"abstract":"At present, most of the software industries need the well-defined models and standard measurement methods to measure the size of software. They are useful in the estimation of effort and time that are extensively used at the early stage of software development. COSMIC Functional Size Measurement (FSM) is one of the recognized methods to estimate the size of software project. The several research initiatives have focused on COSMIC FSM procedure with specific design diagram notation by manually and automatically. However, manual measurement of the various diagrams is time-wasting and difficult to measure the accurate size of the software. Therefore, the automated measurement of function size which includes the generation model based on three different diagram notations such as UML, SysML and Petri net and general mapping rules between COSMIC FSM and generation model to measure the size of software is proposed in this paper. The manual measurement of cooker system by using the generation model and COSMIC concept is successfully done in our previous paper. This proposed automated tool can handle various types of diagramming and get the size of software correctly.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic License Plate Detection System for Myanmar Vehicle License Plates","authors":"Khin Pa Pa Aung, K. Nwe, A. Yoshitaka","doi":"10.1109/AITC.2019.8921286","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921286","url":null,"abstract":"License Plate Detection is an intelligent system to find the exact license plate by analyzing image/video data for automatic license plate recognition (ALPR) system. The proposed system used image data. There is much early research has been done for ALPR purposes, however, it was still challenging tasks for accurately detect license plates in the open environment. The main difficulties lie in the diversity of plates such as language, font, color, and type of the number plates that differ across nations and conditional variations such as various background scenes and illumination when captured. The fundamental ALPR system consists of three processes: license plate detection, character segmentation, and character recognition. Proposed system focused on license plate detection based on image processing technology that is a crucial step for the whole ALPR system. A Myanmar License plate has a white boundary for every different color of plates, thus the proposed system applied an edge-based approach for any color of plates, and the plate region will remain because of its white boundary. After edge detection, morphological operation has been applied as it can add or remove pixels from/to the objects in an image. Thus the license plate can be extracted accurately. Finally, the bounding box technology was applied to extract only the number plate region properly.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Storage Structure of Student Record based on Hyperledger Fabric Blockchain","authors":"K. Wai, Ei Chaw Htoon, N. Thein","doi":"10.1109/AITC.2019.8921342","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921342","url":null,"abstract":"Student records (SR) are needed to be regularly protected for safe access and security control. The blockchain system can support security, confidentiality, unchangeable, transparency and access control service. Although Hyperledger Fabric blockchain is a scalability modular architecture, various configuration elements affect the performance of transaction access time. Moreover, it cannot provide an efficient indexing capability on the transaction. In this paper, a storage structure that provides better access time is presented. Firstly, the suitable block size is proposed for transactions based on the configuring parameter and the transaction arrival rate to reduce the latency of transaction storage time. Secondly, the metadata of the SR block is replicated on an off-chain database to overcome the limitation of indexing capability and performance issue. SR data will be accessed transparently with greater performance and lower the costs of manpower and time.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Voice Features for Criminal Case","authors":"Aie Su Su Kyi, K. Lin","doi":"10.1109/AITC.2019.8921212","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921212","url":null,"abstract":"Emotion detection research area is very popular in medical informatics and criminal technology. The voice is the one of the ways to detect the human inner emotions such as general feelings or psychiatric feelings. Humans has been expressed their emotions by varying different vocal features during speech generation. Voice and speech analysis help to become secure communications among people and human cannot easily lie their emotions to other. At the law court, emotion analysis can detect a culprit speak was lie or truth. The propose system is used to detect the emotions (normal, sad) of human through speech analysis by using Pitch, Mel Frequency Cepstral Coefficients (MFCC) and Short Time Energy (STE) feature extraction techniques to increase the accuracy and reliability. This system will help in court of law, when the lawyer questioning to the witness or plaintiff or defense to get the truth of the crime scene.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Articles Classification in Myanmar Language","authors":"Myat Sapal Phyu, K. Nwet","doi":"10.1109/AITC.2019.8920927","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920927","url":null,"abstract":"Article classification is a problem of text classification to assign the articles to their corresponding class or topic. According to this work, there are two main barriers to classify Myanmar text in deep learning model, to find the proper way of determining the word boundaries and to build the datasets for Myanmar text classification. This paper shows the empirical evidence on article classification in Myanmar language for both syllable-level and word-level by fine-tuning Convolutional Neural Networks. They are denoted as Syllable-Level Convolutional Neural Networks (SL-CNN) and Word-Level Convolutional Neural Networks (WL-CNN). Although there are few publicly available general-purpose pre-trained vectors for Myanmar language that can be further applied to transfer learning, it is still needed to construct large-scale datasets for classifying Myanmar articles. We construct six datasets to classify Myanmar articles and evaluation is measured by the comparative analysis of these vectors on SL-CNN and WL-CNN with Recurrent Neural Networks for both syllable and word level, SL-RNN and WL-RNN.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Clustering Techniques for Refining Large Data Set: Case Study on Malware","authors":"Yoon Myet Thwe, Mizuhito Ogawa, P. N. Dung","doi":"10.1109/AITC.2019.8921088","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921088","url":null,"abstract":"Malware databases have been unintentionally collecting garbage (incomplete malware) together with malware through the Internet. This paper focuses on finding garbage (incomplete malware) from large malware datasets using binary pattern matching and speed up the matching by using nested clustering as a preprocessing. To verify the effectiveness of our method, we conduct experiments on various malware datasets. The results show that our method works efficiently while maintaining high accuracy.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123463530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}