2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)最新文献

筛选
英文 中文
IoT Measuring of UDP-Based Distributed Reflective DoS Attack 基于udp的分布式反射式DoS攻击物联网测量
L. Huraj, M. Šimon, Tibor Horák
{"title":"IoT Measuring of UDP-Based Distributed Reflective DoS Attack","authors":"L. Huraj, M. Šimon, Tibor Horák","doi":"10.1109/SISY.2018.8524703","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524703","url":null,"abstract":"IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"66 1","pages":"000209-000214"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76983182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Log File Authentication and Storage on Blockchain Network 区块链网络上的日志文件认证与存储
David Janos Feher, Barnabás Sándor
{"title":"Log File Authentication and Storage on Blockchain Network","authors":"David Janos Feher, Barnabás Sándor","doi":"10.1109/SISY.2018.8524848","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524848","url":null,"abstract":"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"000243-000248"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77279088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile Phones Thermo-Ergonomic Analysis 手机热工效学分析
P. Hell, P. J. Varga, Zsolt Illési
{"title":"Mobile Phones Thermo-Ergonomic Analysis","authors":"P. Hell, P. J. Varga, Zsolt Illési","doi":"10.1109/SISY.2018.8524654","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524654","url":null,"abstract":"Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"9 1","pages":"000249-000254"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85392667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demonstrating the Options for Automated Advanced Selective Waste Gathering 示范先进的自动选择性废物收集方案
I. Lakatos, A. Titrik, János Hollósi
{"title":"Demonstrating the Options for Automated Advanced Selective Waste Gathering","authors":"I. Lakatos, A. Titrik, János Hollósi","doi":"10.1109/SISY.2018.8524707","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524707","url":null,"abstract":"Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"53 1","pages":"000167-000172"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91148579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-Capacities Based Pan-Integral 基于双容量的泛积分
Milos Todorov, Mirjana Strboja, B. Mihailovic
{"title":"Bi-Capacities Based Pan-Integral","authors":"Milos Todorov, Mirjana Strboja, B. Mihailovic","doi":"10.1109/SISY.2018.8524736","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524736","url":null,"abstract":"In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"5 1","pages":"000301-000304"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84308326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Role of Chatbots in Formal Education 聊天机器人在正规教育中的作用
G. Molnár, Zoltán Szűts
{"title":"The Role of Chatbots in Formal Education","authors":"G. Molnár, Zoltán Szűts","doi":"10.1109/SISY.2018.8524609","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524609","url":null,"abstract":"Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"10 1","pages":"000197-000202"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78476262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Diaspora Mapping and Collaboration Platform for Expatriates 侨民映射与侨民协作平台
Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon
{"title":"Diaspora Mapping and Collaboration Platform for Expatriates","authors":"Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon","doi":"10.1109/SISY.2018.8524836","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524836","url":null,"abstract":"In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 1","pages":"000027-000032"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88171225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications 用于态势感知应用的同轴转子/导管风扇TUAV单速率和双速率神经控制方法的比较
A. Pedai, I. Astrov, A. Udal
{"title":"Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications","authors":"A. Pedai, I. Astrov, A. Udal","doi":"10.1109/SISY.2018.8524720","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524720","url":null,"abstract":"Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"4 1","pages":"000063-000068"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91241937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services 微软性能分析。基于Net和java的REST Web服务实现
K. Munonye, P. Martinek
{"title":"Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services","authors":"K. Munonye, P. Martinek","doi":"10.1109/SISY.2018.8524705","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524705","url":null,"abstract":"REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"119 1","pages":"000191-000196"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems 危险可编程电子系统运行的分析与风险降低
D. Gabriska, M. Ölvecký
{"title":"Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems","authors":"D. Gabriska, M. Ölvecký","doi":"10.1109/SISY.2018.8524642","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524642","url":null,"abstract":"Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"67 1","pages":"000123-000126"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78345110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信