2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

筛选
英文 中文
A Mathematical Framework for Exploring Protein Folding Dynamics using Probabilistic Model Checking 利用概率模型检验探索蛋白质折叠动力学的数学框架
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00026
P. Biswas, Sarit Pal, S. Khatri
{"title":"A Mathematical Framework for Exploring Protein Folding Dynamics using Probabilistic Model Checking","authors":"P. Biswas, Sarit Pal, S. Khatri","doi":"10.1109/ICICT50521.2020.00026","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00026","url":null,"abstract":"Protein folding has always been a key problem in the field of computational biology. Several models have been proposed for protein folding in the past. The sequence via which a protein folds has a strong impact on the presence or absence of a disease in an organism. Given their significance to the health of an organism, in this paper, we present a Probabilistic Model Checking (PMC) based approach which provides statistical answers to questions that one may pose about the protein folding process. In such an approach, the protein folding model is represented as a probabilistic state transition system, and the questions are expressed formally in form of temporal properties. The PMC engine provides the probability of satisfying the property, which provides an insight into the protein folding process. Such properties are of several kinds - liveness properties, safety properties and fairness properties. We verify the properties on a probabilistic model checker. In this paper, we present our approach, and demonstrate its applicability by using the protein pro-insulin as our test case. We first express the dynamics of this protein using a probabilistic state transition system. Based on the state transition model we express several liveness, fairness and safety properties which target the folding steps/transitions. The probabilistic model checker tool (Prism [29-32]) is invoked to provide the probability of satisfying each of these queries. We have analyzed the change in the property satisfaction probability as a function of the change in the concentration level of the oxidation and reduction reagents. To the best of the authors’ knowledge, this is the first paper to model protein folding dynamics probabilistically, using Probabilistic Model Checking, a powerful technique from the domain of formal verification of state transition systems.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman 椭圆曲线Diffie Hellman水平相关分析
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00087
S. Karthikeyan, H. El-Razouk
{"title":"Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman","authors":"S. Karthikeyan, H. El-Razouk","doi":"10.1109/ICICT50521.2020.00087","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00087","url":null,"abstract":"The world is facing a new revolutionary technology transition, Internet of things (IoT). IoT systems requires secure connectivity of distributed entities, including in-field sensors. For such external devices, Side Channel Analysis poses a potential threat as it does not require complete knowledge about the crypto algorithm. In this work, we perform Horizontal Correlation Power Analysis (HCPA) which is a type of Side Channel Analysis (SCA) over the Elliptic Curve Diffie Hellman (ECDH) key exchange protocol. ChipWhisperer (CW) by NewAE Technologies is an open source toolchain which is utilized to perform the HCPA by using CW toolchain. To best of our knowledge, this is the first attempt to implemented ECDH on Artix-7 FPGA for HCPA. We compare our correlation results with the results from AES -128 bits provided by CW. Our point of attack is the Double and Add algorithm which is used to perform Scalar multiplication in ECC. We obtain a maximum correlation of 7% for the key guess using the HCPA. We also discuss about the possible cause for lower correlation and few potentials ways to improve it. In Addition to HCPA we also perform Simple Power Analysis (SPA) (visual) for ECDH, to guess the trailing zeros in the 128- bit secret key for different power traces.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kagawa University-Type Development Model and Its Practice of Information System for Regional Problem Solution by Open Innovation 香川大学式开发模式及其通过开放式创新解决地区问题的信息系统实践
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00035
T. Kunieda, Satoru Yamada, Tetsuya Ikeda, Yusuke Kometani, Naka Gotoda, Rihito Yaegashi
{"title":"Kagawa University-Type Development Model and Its Practice of Information System for Regional Problem Solution by Open Innovation","authors":"T. Kunieda, Satoru Yamada, Tetsuya Ikeda, Yusuke Kometani, Naka Gotoda, Rihito Yaegashi","doi":"10.1109/ICICT50521.2020.00035","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00035","url":null,"abstract":"Kagawa University has jointly developed a regional problem-solving information system with Ricoh Co., Ltd. These are Advertising Display Printer System (KadaPos), Travel Diary Generation/ Printing System (KaDiary) and Tourist Guidebook Generating/Printing System (KadaPam). These information systems were developed by combining Ricoh's image matching technology and print control technology with the information system development technology of Kagawa University. These systems were developed based on the \"Kagawa University-type development model\". The model is composed of \"extraction of regional problems\", \"planning solutions for problems\", \"development of prototype systems to verify solutions\" and \"demonstration experiments using prototype systems\". In this paper, we describe the practice of the \"Kagawa University-type development model\" in the development processes of KadaPos, KaDiary and KadaPam. The practice of regional problem-solving information system development based on \"Kagawa University-type development model\" shows that there is a certain effect in the development of regional problem-solving information system and technology verification in enterprises.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"4 2","pages":"177-182"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141226328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low Cost IoT-Based System for Monitoring and Remote Controlling Aviaries 基于物联网的低成本鸟舍监测和远程控制系统
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00090
Adenilson Mumbelli, Robison Cris Brito, V. Pegorini, Luis Felipe Priester
{"title":"Low Cost IoT-Based System for Monitoring and Remote Controlling Aviaries","authors":"Adenilson Mumbelli, Robison Cris Brito, V. Pegorini, Luis Felipe Priester","doi":"10.1109/ICICT50521.2020.00090","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00090","url":null,"abstract":"These days, in order for the poultry farmers to be successful in their activities, it is necessary to control with precision all data related to the poultry management. Many times, such data are contained inside the own aviary, temperature, ventilation, level of feed, lighting, among others. These parameters exert influence directly on the chicken’s growth. The proposed model combines hardware and software in order to monitor and automatically control these environmental parameters, allowing the poultry farmer to configure predefined function standards, as well as control such data remotely through a smartphone application. Besides allowing the configuration of the control parameters, the proposed model allows to monitor the temperature values and actuators status in real time, creating logs of the sensors and alarms readings. Several of the concepts of Internet of Things (IoT) were applied in this work in order to build a systemic design with high scalability.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inkatán: A Game for Smart TV and Android with Ensemble Interactions Inkatán:智能电视和Android的集成交互游戏
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00043
Raphael Bravo Dedo, Juan Jesus Cueto Yabar, David Mauricio
{"title":"Inkatán: A Game for Smart TV and Android with Ensemble Interactions","authors":"Raphael Bravo Dedo, Juan Jesus Cueto Yabar, David Mauricio","doi":"10.1109/ICICT50521.2020.00043","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00043","url":null,"abstract":"Nowadays, the game industry related to the interaction of multiples devices is still incipient due the current limitations between specific attributes like connection, compatibility of different platforms and documentation for development. In this paper we proposed a multiplayer game called INKATAN that integrates ensemble interactions and cross device technologies between Smart TVs and Android devices. We use a library based on Web sockets that allow, based on server-client principle, the connection of multiple devices that share similar environment independently of the platform that it belongs. INKATAN is a cooperative strategy game that allow up to 4 players to play at the same time using Android devices and a Smart TV as an interaction chart. The tests performed to 30 users divided in groups of 2 and 4 players show that the experience, quality and satisfaction present between accord and totally accord of all participants.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133743644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deciding Backup Location Methods for Distributed Stream Processing System 分布式流处理系统备份定位方法的确定
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00047
Naoki Iijima, Koichiro Amemiya, J. Ogawa, H. Miyoshi
{"title":"Deciding Backup Location Methods for Distributed Stream Processing System","authors":"Naoki Iijima, Koichiro Amemiya, J. Ogawa, H. Miyoshi","doi":"10.1109/ICICT50521.2020.00047","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00047","url":null,"abstract":"A large amount of stream data are generated from some devices such as sensors and cameras. These stream data should be timely processed for real-time applications to satisfy the data latency requirements. To process a large amount of data in a short time, utilizing stream processing on edge/fog computing is a promising technology. In the stream processing system, a snapshot of processes and replications of the stream data are stored on another server, and when server fault or load spike of server occurs, the process is continued by using the stored snapshots and replicated data. Therefore, with edge computing environment, which has low bandwidth resource, process recovery takes a long time due to the transferring of restored data. In this paper, we propose a stream processing system architecture to decide servers to store snapshots and replication data and redeploy processes by considering the load of each server and the network bandwidth. We also propose a semi-optimal algorithm that reduces the computational cost by appropriately sorting servers and tasks according to the network bandwidth and server load. The algorithm can find a solution over 1000 times faster than the Coin or Branch and Cut (CBC) solver.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attempt to Utilize Surplus Storage Capacity as Distributed Storage 尝试利用剩余存储容量作为分布式存储
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00062
Toshiya Kawato, Masayuki Higashino, Kenichi Takahashi, T. Kawamura
{"title":"Attempt to Utilize Surplus Storage Capacity as Distributed Storage","authors":"Toshiya Kawato, Masayuki Higashino, Kenichi Takahashi, T. Kawamura","doi":"10.1109/ICICT50521.2020.00062","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00062","url":null,"abstract":"High-performance computers have spread at a lower cost than in the past by technological advancement. Thus, the performance of computers may be excessive for its usage. In this case, resources of computers such as CPU, memory, and storage are not utilized fully and resulting in an idle state; that is, these idle resources are wasted despite use-value. We should utilize them effectively. For this reason, we attempt to utilize surplus storage capacity, one of the idle resources, as distributed storage. In this paper, we design a distributed storage using surplus storage capacity by considering characteristics of surplus storage capacity and computers with its capacity.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Homomorphic Message Authentication Code Scheme for Network Coding 一种新的网络编码同态消息认证码方案
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00088
A. Kamal, H. Dahshan, A. Elbayoumy
{"title":"A New Homomorphic Message Authentication Code Scheme for Network Coding","authors":"A. Kamal, H. Dahshan, A. Elbayoumy","doi":"10.1109/ICICT50521.2020.00088","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00088","url":null,"abstract":"Network coding (NC) can significantly increase network performance and make lossy networks more reliable. Since the middle nodes modify the packets during their path to destination, integrity of the original packets cannot be checked using classical methods (MACs, Signatures, etc). Though, pollution attacks are the most common threat to network coded systems, where an infected node can inject the data flow of a network with a number of false packets and ban the receiver from properly decoding the packets. A lot of work in the security of NC in resisting pollution attacks has been investigated in recent years, majority have the same security parameter 1/q. A Homomorphic MAC scheme is presented earlier to resist pollution attacks with a security level 1/q^l, In this paper, we will show that the mentioned scheme is subject to known-plaintext attacks. This is due to that part of the key can be revealed in an initial process. Also, the whole key could be revealed if the key is used more than once. Then, a modification to the mentioned scheme is proposed to overcome this issue. Besides, the MAC length is adjustable according to the required security level and not variable according to the vector's length which will accordingly increase the performance and efficiency of the scheme.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114950924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conspiracy and Rumor Correction: Analysis of Social Media Users' Comments 阴谋与谣言纠正:社交媒体用户评论分析
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00058
Gilang Maulana Majid, Anjan Pal
{"title":"Conspiracy and Rumor Correction: Analysis of Social Media Users' Comments","authors":"Gilang Maulana Majid, Anjan Pal","doi":"10.1109/ICICT50521.2020.00058","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00058","url":null,"abstract":"This study explores online users' comments in response to rumor corrections. Specifically, it considers a video rumor correction that was posted on YouTube and debunked a rumor in the wake of Indonesia's post-election protests and riots. Content analysis was employed on 500 comments that were posted in response to the rumor-corrections. This study finds that the volume of anti-correction comments (53.60%) was approximately five times greater than the volume of the pro-correction comments (10.80%). In-depth analysis of anti-correction comments revealed different voices, including rejection of evidence, distrust in authorities, critical inspection of evidence, and lack of sufficient evidence. Essentially, this study shows that rumor corrections must be followed-up in order to gain public trust.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115160173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel System for Ammonia Gas Control in Broiler Production Environment 一种新型的肉鸡生产环境氨气体控制系统
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00059
Robison Cris Brito, Carlos Vinícius Ferrareze, F. Favarim, J. T. Oliva, E. Todt
{"title":"A Novel System for Ammonia Gas Control in Broiler Production Environment","authors":"Robison Cris Brito, Carlos Vinícius Ferrareze, F. Favarim, J. T. Oliva, E. Todt","doi":"10.1109/ICICT50521.2020.00059","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00059","url":null,"abstract":"The broiler production in Brazil has been worldwide prominence, and it is fundamental for the development of the Brazilian economy. Chickens are intensively raised and confined into aviaries, in which all broilers are the same age and genetic origin. Most poultry farmers reuse the poultry manure for several consecutive batches in order to reduce costs. However, this practice can increase humidity and ammonia production. The excess of ammonia gas causes stress and diseases in broilers. Consequently, broiler production can be reduced and cause losses to poultry farmers. For this reason, the continuous monitoring of ammonia gas concentration in aviaries is necessary. Therefore, the cost of commercially available devices for the accomplishment of this task is considered high. In this work, a low-cost prototype for the monitoring of Ammonia gas in aviaries was developed. To do so, the NodeMCU module was used to measure, through sensors, the Ammonia gas concentration and send real-time information to an Android mobile application, which is available to poultry farmer. The data processed by the NodeMCU is sent to a Spring Boot server and stored into a cloud database. Also, the user can receive notifications when the Ammonia level is higher than a tolerated limit. As a result, the cost for the prototype development was approximately U$$ 30.00, considering only hardware components. In this, our prototype can be popularized among poultry farmers for a more affordable price concerning other commercially available devices.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信