{"title":"Deep Learning-based Algorithm for Detecting Counterfeit Domain Names","authors":"Zhao Wang, Wenhui Yang","doi":"10.1109/ICMCT57031.2022.00020","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00020","url":null,"abstract":"To address the two major problems of machine learning: the high cost of manually extracting features and the requirement for reasonable and high relevance of feature set input, this paper will use the ability of deep learning to automatically characterize and learn data to build a lightweight counterfeit domain name deep learning grid-based detection model based only on domain name strings, and conduct comparison experiments with edit distance-based detection models and visual feature-based detection models by testing on public datasets to verify the effectiveness of this deep learning-based counterfeit domain name detection model for counterfeit domain name detection.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BP Neural Network-Based Security Management System Design for College Students","authors":"Xuanyuan Gu","doi":"10.1109/ICMCT57031.2022.00021","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00021","url":null,"abstract":"With the continuous development of network technology and the continuous expansion of network scale, the security of the network has suffered more threats, and the attacks faced are becoming more and more extensive. The frequent occurrence of network security incidents has caused huge losses, facing more and more severe situation, it is necessary to adopt various network security technologies to solve the problem. In network security, the most commonly used technology is firewall. The firewall has a certain blocking effect on attacks from outside the network, but it has a weak defense effect on the attacks in the internal network, and it is easy to be bypassed. Intrusion detection technology can detect both internal and external network attacks. Responses are generated before the intrusion behavior occurs, and alarm information is issued for timely and effective processing. In recent years, China's campus security incidents are still happening, seriously threatening the lives of students and disrupting the normal teaching order of schools. At present, there are still many loopholes in campus security operations. Campus security management system has become an important task in campus security construction. On this basis, relevant personnel are required to analyze the existing problems of campus safety and the needs of the safety management system, and find the main technology of a more advanced intelligent safety management system.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Blancaflor, Sofia Samantha Beltran, John Eduard Jayag, Aiko D. Obog, Frances Ericka Salem, Marck Daniel G. Sungahid
{"title":"A Security Assessment on Malwares Disguised as Children's Applications","authors":"E. Blancaflor, Sofia Samantha Beltran, John Eduard Jayag, Aiko D. Obog, Frances Ericka Salem, Marck Daniel G. Sungahid","doi":"10.1109/ICMCT57031.2022.00012","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00012","url":null,"abstract":"Technological advancements have paved the way for children to be exposed to various technologies and applications at a very young age. Learning and playing among children are affected by technology, especially in the pandemic wherein technology is already integrated into our daily lives, mainly because children are tuning into the online world for school and entertainment. Children especially enjoy the benefits of being able to download any applications through the internet. However, these circumstances pose viable security risks. This case study aims to assess various security threats that can be easily found in children's mobile applications. Moreover, distinguish ways on how to mitigate the risks of the threats present in children's applications is a target in this study.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133332495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Weighted Iterative Refinement Algorithm for Angle Estimation in 5G Millimeter-Wave Positioning","authors":"Yuanxin Wang, W. Liu, Mao Li, Can Li","doi":"10.1109/ICMCT57031.2022.00017","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00017","url":null,"abstract":"Currently, high-precision positioning has become an urgent need in 5G vertical industries. In this paper, an improved angle estimation method based on a certain weighted iterative refinement algorithm is proposed under a single base station (BS) with 5G millimeter-wave systems. Furthermore, by utilizing the angle estimation parameters given by the above method, more accurate position estimation of user equipment (UE) can be obtained in both line-of-sight (LOS) and multipath scenarios. Simulation results show that the proposed algorithm achieves significant improvement of angle estimation, and obtains higher positioning accuracy compared to present similar methods.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Method Research of Device Physical Layer test Based on A High-Speed Train Communication Network Standard Protocol","authors":"Zhiqiang Guo, Xiaodan Feng","doi":"10.1109/ICMCT57031.2022.00018","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00018","url":null,"abstract":"For the less study of TCN physical test, and lack of physical test certification test system or test method, according to the research for physical characteristics of TCN network, and the analysis of TCN network test the physical demand, this article puts forward the design scheme based on the test automation of TCN network test system, and does the comparative analysis with traditional TCN network physical test system. This paper design a conformance test system based on MVB protocol, TCN network physical test system has been carried on the design and development, and gives the overall structure of the system, hardware and software design, and test set optimization model, including the underlying control software design, the upper test software design and human-computer interaction interface design. And based on the test system of TCN network, we design the physical test methods of MVB device, including four types of methods and steps of direct sampling test, signal waveform test, signal acceptance test and sine wave waveform test. For each protocol description design realizes the integrated test system and test method, to realize the physical layer conformance test of MVB about EMD and ESD. Practical operation shows that the MVB test system on the premise of guarantee the reliability can improve the test efficiency, reduce the MVB conformance test costs, and has a certain application value.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual Ethnic Musical Instrument Platform Based on Web App","authors":"Siying Zhou, Cheng Du","doi":"10.1109/ICMCT57031.2022.00011","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00011","url":null,"abstract":"When it comes to the musical instrument, an important part in traditional Chinese Intangible Cultural Heritage, the inheritance and promotion still leave much to be desired. As things stand, the inheritance and protection of musical instruments of ethnic minorities are in urgent need of improvement. Hence, in this project, a virtual instrument platform is designed and put in to use, where users can learn to play ethnic musical instruments. This project is expected to develop an APP compatible with both Android & iOS, with illustrations of 3D models of ethnic musical instruments, by using standard HTML5 or AVm. JS technology; Mysql database is created after which access to database through APP pages is possible. This mobile app, centering on ethnic musical instruments-the intangible culture, is developed featuring multi-simulation human-computer interaction and science promotion function, in which users can play virtual musical instruments with mobile phone soft keyboard. Nowadays, the cost of ethnic musical instruments is generally expensive, and some are so exorbitant that a trial in person is not available and not suitable for all. Meanwhile, there are few such display platforms, which makes the aforementioned experience even harder to reach. This project combines musical instruments with the Internet, which virtualizes the operation as if users were playing the real instruments, thus bringing convenience to them. The main purpose is to publicize the ethnic musical instruments and to carry forward ethnic culture.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizing Committee: ICMCT 2022","authors":"","doi":"10.1109/icmct57031.2022.00006","DOIUrl":"https://doi.org/10.1109/icmct57031.2022.00006","url":null,"abstract":"","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Web Cloud Application for Dealing with Various Emergency Situations","authors":"Edward Salib, Nadia Abd-Alsabour","doi":"10.1109/ICMCT57031.2022.00015","DOIUrl":"https://doi.org/10.1109/ICMCT57031.2022.00015","url":null,"abstract":"Disasters usually spread rapidly. Good instructions and efficient communication is essential as these are considered the main portion of the required response and can highly improve the public safety. This article proposes a comprehensive web cloud notification application that can handle various emergency situations. It sends real-time alerts and instructions to all the affected and needed people through their mobile phones and all computer screens within a given organization, no matter where they are (inside or outside the given organization). Moreover, these people do not necessarily have to have a mobile phone with a specific operating system, such as an Android smartphone as was much of the previous work. This is because the proposed system only requires any browser that runs on any device with any operating system including cell phones. The reason for this is that the proposed system is a cloud application, which means no installation is required to use it.","PeriodicalId":447227,"journal":{"name":"2022 7th International Conference on Multimedia Communication Technologies (ICMCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121732076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}