A Fast Defect Detection Algorithm for Glass Tube Based on ROI Reduction
De Vitis, Gabriele Antonio; Foglia, Pierfrancesco; Prete, Cosimo Antonio (Italy)
ABSTRACT:
In this paper, we present an algorithm for defect detection in glass products that allows us to minimize the processing time. The main idea is based on the reduction of the size of the image area to investigate by using the features of glass images. The proposed solution doesn’t compromise the quality of detection and allows us to achieve a performance gain of 66% in terms of processing time, and 3 times in term of throughput (frames per second), in comparison with standard algorithms for defect detection.
A Methodology to Determine a Tolerance Parameter in the Calculation of the Entropy in Abnormal EEG Transients
Ramírez-Fuentes, C. A.; Barrera-Figueroa, V.; Tovar-Corona, B.; Silva-Ramírez, M. A.; Garay-Jiménez, L. I. (Mexico)
ABSTRACT:
In order to characterize abnormal behaviours related to epileptic seizures and other neurological disorders, in this paper it is described a methodology to find an optimum tolerance criterion r to estimate the entropy of abnormal transients with a duration of two seconds from electroencephalograms (EEG) recordings of patients diagnosed with partial epilepsy, attention deficit/hyperactivity disorder (ADHD), and conduct disorder (CD). The considered EEG signals come from patients with different ages diagnosed with these cerebral disorders. Approximate entropy (ApEn) and sampling entropy (SampEn) of the transients lead to the determination of an appropriate value for the parameter r. With the present approach it is possible to obtain an accurate identification of abnormal transients in EEG signals of small duration and reliable estimations of their entropies.
Adaptive Nearest Neighbors Phase Space Reconstruction for Short-Time Prediction in Chaotic Time-Series
Lopez-Farias, Rodrigo; Cedeño González, José R.; Delgadillo-Ruiz, Olivia; Flores, Juan J. (Mexico)
ABSTRACT:
This work presents a nearest neighbors time adaptive phase space reconstruction algorithm for non-linear time series prediction. The algorithm estimates the most suitable phase space reconstruction parameters and radius every discrete time step one step ahead with the aim of minimizing the prediction error. The algorithm is tested with theoretical and real pollution time series from a Metropolitan Area in Mexico.
Analysis of Values and Interests of Stake Holders: Case of MILZU!
Ence, Enno; Strausa, Evita (Latvia)
ABSTRACT:
Within the research the most effective way how to achieve the objective in a broad competitive environment was searched and the emotional attraction through values of directly involved stakeholders is defined as a key factor in long-term consumer loyalty.
Values and their priorities determine the choice of consumer. Analysing the importance of values in brand development, authors ascertain that values which customer and brand have in common create emotional attraction of customers and positive emotional attraction to brand leads to loyalty which means long-term relationship. [1; 14], therefore MILZU! focusses on interests of stakeholders, creating value added of products. MILZU! was made, creating innovative products in breakfast cereals market including in their composition rye and significantly reducing sugar amount, thereby forming a healthy alternative.
Methodology: In order to achieve the objective of the study, literature study and analysis are applied. Both in-depth interviews are conducted to identify the interests and demand of stakeholders, as well as quantitative surveys and focus groups organized within stakeholders. Stakeholders: children, their parents.
Scientific aim of the research is to determine the criteria that increases loyalty and value based stake holder retention in long term, while providing sensory education, education and promoting creative thinking.
Findings: Innovative constructor system is put forward as a solution for retention of stakeholders in long term. The created prototypes provide possibility to start innovative constructor system development.
Conclusions: Creating value added of a product, it is necessary to respond to values and on interests based stakeholders needs and interests in order to encourage repeat purchase.
API Security at A Glance
Chen, Wen; Sharieh, Salah; Blainey, Bob; Zheng, Bingzhou (Canada)
ABSTRACT:
RESTful API has gained tremendous popularity in recent years due to its reusability, flexibility and natural adaptation to modern web application, mobile application, micro-services and cloud computing. However, ensuring secure API/data access and hence mitigating reputational and/or financial damage to the organization is still in its early stage. Foundational security protection mechanisms include transport layer security, authentication/authorization of the consumer (either individual or application). To complete the spectrum of secure API access and provide advanced protection, there is much more to consider: mitigation of API specific vulnerabilities at design and implementation time; integration with external identity provider and proof of authenticity; fine-grained authorization with proper storage and use of users’ consent, entitlement and organization-wide polices; real-time attack detection with API consumption and attack pattern analysis; finally, further protection on API and confidential data (e.g., Personal Identifiable Information, financial sensitive data) being shared with external party accomplished by validating the content of API request and response.
Artificial Intelligence - Changing Humanism
Doherr, Detlev (Germany)
ABSTRACT:
More than 200 years ago, the scientist Alexander von Humboldt noted in his travel diaries that "everything is interconnectedness", when he was fascinated by nature and the phenomena observed. The view of nature has become much more detailed through the knowledge of phenomena and natural processes, which led to a more precise view of nature shaped by Humboldt. Technological progress and the artificial intelligence of highly developed computer systems are upsetting this view and changing the established world view through a new, unprecedented interaction between man and machinery.
Thus we need digital axioms and comprehensive rules and laws for such autonomous acting systems that determine human interaction between cybernetic systems and biological individuals. This digital humanism should encompass our relationship to nature, our handling of the complexity and diversity of nature and the technological influences on society in order to avoid technical colonialism through supercomputers.
Assignment of Resources in Distributed Systems with Strict Consensus Requirements
Agostini, Federico; La Red Martínez, David L.; Acosta, Julio C. (Argentina)
ABSTRACT:
It is important to establish a mechanism for allocating resources to processes in distributed systems. Since the resources are shared, this access must be achieved considering the mutual exclusion, and that the processes can be independent or be part of groups of processes, requiring or not synchronization. In order to favor the assignation of resources to processes, in this paper an aggregation operator is proposed that, through some consensus requirements, allows to establish the order of conferment of the resources requested by each process.
Augmented Reality Mobile Forensic Laboratory (AMFL)
Kaleem, Faisal; Kommera, Nikitha; Pusey, Portia (United States)
ABSTRACT:
In this paper, we discuss the potential of augmented reality technology-based teaching and learning approach to enhance cybersecurity and forensics education. Augmented Reality (AR) superimposes digital information directly in front of a user’s field of vision with enriching content to supplement real world experiences. We have developed an interactive Windows based Augmented Reality application for Microsoft HoloLens, which is aimed to enhance students’ learning and understanding of cybersecurity and forensics concepts. Our work focuses on the capacity of the unique features of AR via smart glasses to provide meaningful hands-on learning experiences. The application augments the step-by-step process of performing a forensics lab along with some 2D images and videos to assist students in successfully completing their labs with minimal or no help from the instructor. Augmented reality techniques allow students to experience sensations and explore learning experiences that, in some cases, may exceed those offered by traditional laboratory classes.
Automated Summarization of TV Series Using TV Metadata
Iwata, Masahiko; Ohwada, Hayato (Japan)
ABSTRACT:
In recent years, a large number of TV series has been broadcasted. This huge amount of video content does not match the viewer's busy lifestyle. In many cases, people do not have time to watch the entire program, catch up with the episodes of TV programs or re-watch forgotten video content. Therefore, techniques such as video summarization, that attempt to solve these problems, have been studied. TV series, unlike news and sports, do not have an underlying structure that can be useful for summaries. We propose an automated summarization framework for creating video summaries that preserving the story line to the level that user can watch the summary instead of the original content. We comprehensively used features characterizing videos such as semantic information and audiovisual information of the TV metadata. We create a model that assigns importance scores to each segment of the TV series by performing ranking learning using TV metadata. As a result of calculating the average area under the ROC curve for two titles was 0.612 and 0.582 for each title.
Critical Success Factors of Competence Based Synergy in Acquisition Processes: Latest Empirical Evidence from Global Cosmetic Industry
Čirjevskis, Andrejs (Latvia)
ABSTRACT:
The aim of this paper is to develop and empirically test an integrative research model assessing prerequisites of competence-based synergy in the acquisition process. Research question: How core competencies should be evaluated as sources of synergy in the acquisition process? Having answered this question analysis, I have researched the latest theoretical findings in antecedents of synergy in the merger and acquisition process and empirically tested by means of the illustrative case study. Illustrative case studies help me to explore six critical success factors of the competence transfer as main drivers of the successful and unsuccessful acquisition process, namely: internal advantages and external relatedness, the complexity of technologies, time of integration, cultural misfit and post-acquisition integration. Current paper contributes to the resource-based view (RBV) on competitive advantage.
CYPHONIC: Overlay Network Technology for Cyber Physical Communication
Naito, Katsuhiro; Tanaka, Kohei; Tanaka, Kensuke (Japan)
ABSTRACT:
Cyber-Physical systems have been attracting interest according to an increase of Internet of Thing (IoT) devices. They are a mechanism to realize control or monitor systems by computer-based algorithms, integrated with the Internet and its users. Due to the requirement for the integration of distributed functions, communication among devices is strictly important to realize a target service. On the contrary, the current traditional Internet has some issues about inter-connectivity among devices due to Network Address Port Translation (NAPT), different IP standards, etc. Additionally, device mobility is also a new issue to realize continuous service over mobile devices. This paper proposes a new overlay network technology for cyber-physical communication called CYber PHysical Overlay Network over Internet Communication (CYPHONIC). CYPHONIC consists of CYPHONIC cloud service and end-nodes. It provides end-to-end accessibility and IP mobility over IPv4 and IPv6 networks and realizes secure inter-communication among nodes based on Fully Qualified Domain Name (FQDN). This paper describes the detail design of the CYPHONIC system.
Data Mining Application for Used-Car Market Analysis
Skribans, Valerijs *; Hegerty, Scott W. ** (* Latvia, ** United States)
ABSTRACT:
The monitoring of used-car markets began on January 3, 2018, when the Federal Administrative Court in Leipzig allowed cities and communities in Germany to impose bans on diesel cars in order to reduce the level of nitric oxide (NOx) in the air. This decision can radically change the used-car market in the EU, because Germany exports large quantities of used cars to Eastern Europe. This article analyses the influence of the German Court decision on the used-car market in Latvia, as part of the EU market. For this analysis, data for offers on 258,600 used cars in the Latvian market and nearly 800,000 cars in the German market were collected. Based on these data, an econometric model was developed to describe the relation between the price of these used cars and their main characteristics, which include 51 important elements such as issue year, mileage and so on. The model describes 89% of the variance in market prices (adjusted R2 = 0.89). This article concludes that in the short-run, the export of used cars is profitable for both Germany and Eastern Europe. However, Eastern European countries do not pay enough attention to this “recycling” of cars In the long run, which may lead to a request for financial assistance from the EU to solve environmental problems.
Design of a Packet-Based Interactive Network Fuzzer
Acosta, Jaime C.; Murga, Christian; Morales, Alberto; Zapata, Caesar (United States)
ABSTRACT:
Network security testing can be done at different levels of fidelity. This can involve simply scanning a network to identify any open ports for services and versions of services, to uncovering novel vulnerabilities in proprietary or undocumented services. The granularity of such an analysis depends not only on time and cost, but also on the availability of client software that can be used to closely interact with the different services. Complexity increases when the underlying protocol is undocumented or nontrivial. In this case, testers must first understand the protocols, and then develop software that can be used to interact; past the common handshake or initial connection behavior to uncover vulnerabilities. In this paper, we present an architecture that marries protocol reverse engineering and network fuzzing in a pseudo-interactive graphical interface. We have developed a proof of concept that is capable of intercepting packets between source and destination nodes; allowing analysts to use a graphical interface to interactively or pseudo-interactively (using hooks) observe, modify, drop, and/or forward the traffic during security tests. We report on performance using simple TCP-based protocols.
Developing an iOS App for Personalized Patient Care
Park, Alden T.; Kim, Hyunju (United States)
ABSTRACT:
It has been reported that a significant percentage of patients immediately forget given medical information for proper self-care. In order to help such patients, we designed and developed an iOS app that connects doctors and their patients. The patient user can receive the self-care information given by his/her doctor, and the doctor can add personalized notes for each patient. The app has been written in Swift 4 and utilizes Firebase and Google authentication, which allows us to quickly implement the functionality.
Do You Speak and Write in Informatics?
Csernoch, Maria (Hungary)
ABSTRACT:
End-user text management, the handling of digital text-based documents by non-professional end-users, is one of the most frequent and contradictory computer related activities. Most of these documents are loaded with errors, which originate both from the end-users’ lack of knowledge in the subject and by their ineffective problem-solving approaches. The aims of the paper are to clarify the theoretical background required to handle digital texts, to provide a definition of a correctly formatted and edited text, and to present a classification of errors. Based on error-related research, studies, and approaches in programming and spreadsheets, we define the classes of qualitative and quantitative errors and their sub-classes in digital texts. We further claim that end-user text management requires proper training and, in everyday usage, similar to other sciences and subjects, concept-based problem-solving approaches supported by firm reliable schemata in the background.
Does Corporate Governance Affect the Market Value and Risk of Czech Joint-Stock Companies?
Simberova, Iveta; Kocmanova, Alena; Pavlakova Docekalova, Marie; Škapa, Stanislav (Czech Republic)
ABSTRACT:
The paper analyses the relationships and impacts between Good Corporate Governance (GC and the Firm Market Value and the Firm Risk, including Financial Performance in the companies of the processing industry. Empirical research has been verified in 118 joint-stock companies in the Czech Republic with the number of employees over 250 according to the EU criterion. Data was acquired by empirical research in the Czech Republic which was completed in 2012-2016. The aim of the paper is to propose a suitable model of Good Corporate Governance for unlisted Czech companies in the Czech Republic and to identify its impacts on the Firm Market Value, the Firm Risk and the Financial Performance. The methodology of research is based on modelling, using the structural equation modelling (SEM) for modelling the interrelationships and impacts between the GCG performance, the Firm Market Value, the Firm Risk and the Financial Performance. The empirical research has shown that responsible corporate governance has an impact on the Firm Market Value, both through the financial performance and through the stable risk. The investors are thus suggested that if good corporate governance and regulatory measures are introduced, thereby strengthening the corporate financial performance and the stable Firm Risk, then it will have a significant impact on the Firm Market Value.
Effective Security Strategies for a Small Energy Plant
Shallal, Farid; Kaleem, Faisal (United States)
ABSTRACT:
The paper presents an application of risk-based assessment techniques on smaller-sized Energy Plants. Specifically, this paper seeks to identify and examine some of the major risks, threats and vulnerabilities associated with an energy plant or facility. It utilizes a combination of trusted methodologies, self-developed applications and cyber security frameworks to robustly assess a facility’s cyber security posture. This paper also identifies several higher risk issues, which are consistent to many other similar facilities within the power generation industry. Several methods of research were applied to conduct the analysis. Risk assessment tools were also utilized to better identify and quantify issues. A top down list of recommendations are proposed to mitigate against higher risk vulnerabilities. With minor changes, some the proposed recommendations can be applied to many other similarly structured energy plants. Finally, a security checklist, meant to be consumed by other energy plants was also developed.
Engineering Software Tools for Capturing the Complexity of the Water-Energy-Food Nexus: Lessons from the MAGIC Project
Staiano, Michele *; Nebot Medina, Rafael ** (* Italy, ** Spain)
ABSTRACT:
The MAGIC project (Moving toward Adaptive Governance In Complexity, funded by EU-Horizon 2020 programme) features a perspective rooted in bioeconomics directed at the accounting of technical and environmental resources required to ensure the living standards of EU societies. It aims at tackling in a suitable way the nexus of energy, food and water to assess sustainability as a complex predicate.
A software toolkit has to be developed as a key enabling technology to inform and steer the processes toward forthcoming UE policies; the toolkit is part of a Nexus Information System, aimed at supplying quantitative views of novel narratives about the various themes related to the nexus of water, energy and food, along with labour and land use, as well as opportunities and scenarios for innovations, by means of a rigorous and transparent approach to official data, domain knowledge and agreed models. The system is envisioned in a Nexus information space, where analysts, policy makers and stakeholders with different backgrounds, interests and perspectives could interact and iterate on suitable datasets and semantically relevant models toward the decision-making process of future EU common policies.
The challenges to be faced by NIS developers are twofold: to model the socio-ecological system (human society integrated in the environment) that behaves as a self-reproducing adaptive system, and to capture the sets of relationships expressing the nexus, a complex predicament in itself, which are relevant for the actors in the Nexus information space.
Entrepreneurs’ and Venture Capitalists’ Openness for Cooperation: Barriers and Drivers
Matisone, Anita; Lace, Natalja (Latvia)
ABSTRACT:
The paper presents a content analysis of factors influencing whether Venture Capitalists and entrepreneurs seek out and begin cooperating.
A considerable amount of public funding in the form of Venture Capital (VC) has been made available in Europe, especially in its least developed parts, to boost economic growth. Studies show that this support for small and medium enterprises only partly attains its goals. Instead of financing the earliest stages of the development Venture Capitalists (VCs) predominantly invest in later stages and instead of equity investment provide mezzanine loans. VCs state that deal flow and quality could be higher, while entrepreneurs complain about problems attracting capital necessary for growth.
The analysis suggests that a complex system of interdependent factors influences the willingness and readiness of entrepreneurs to partner with VCs, and the VCs valuation of such partnerships’ potential. It also appears that most important factors affecting the issue under study in Central and Eastern Europe (CEE) are different from those in the countries with a more mature VC industry. The lack of awareness about VC, both in general and in detail, is the main factor preventing entrepreneurs from approaching VCs in CEE. This has not been found to be a factor outside the region.
Entrepreneurship and Innovation Development at Higher Education Institutions: Opportunities and Solutions
Ozoliņš, Modris; Gaile-Sarkane, Elīna; Ence, Enno; Štrausa, Evita (Latvia)
ABSTRACT:
Entrepreneurship plays an important role in the functioning of today's economy. Successful and fast-growing start-ups are major drivers for economic development and prosperity. Although it is true that inheritance is important to entrepreneurial abilities, the identification and development of entrepreneurial skills are not less important. In the last decade, universities have been given a special role in the development of entrepreneurial abilities. It is expected that, in parallel with the development of the specific skills and competences necessary for the profession, the educational institution will also ensure identification, assessment and development of entrepreneurial skills during the study process [2]. Scientific aim of the research is to study interdisciplinary teaching methodology for students' entrepreneurial and creative development and application of the same methodology for business. The same approach for creating a new product is used in the study process and in carrying out business needs (MILZU! case “Research and development of children’s toy ecosystem in MILZU! cereal flakes packaging to increase the value added of food products”, project no. 1.2.1.1/16/A/004). The new product development methodology under discussion is based on identification of customer values and needs followed by product development based on these values and needs.
Although the new product development methodology is based on the same ground, the application differs when used for studies or business purposes. The main differences are related to different motivation and interests of participants in the study process and business.
Ethics and the Protection of Personal Data
Fabiano, Nicola (Italy)
ABSTRACT:
The contribution provides some possible key points in the relationship among robotics, intelligent systems, Artificial Intelligence, Ethics, data protection and privacy. The starting point is the value of personal data belonging to a natural person. Ethics is one of the aspects that should be considered by everyone to have an excellent approach to the processing of personal data. The contribute of this paper presents some possible solutions to read the GDPR considering ethics and proposing other approaches to avoid misuses of personal information.
Impact of the Technological Means Imposed by the Mexican Tax Authorities to SMEs
Vivanco, Jesús; Martinez, Ma. Del Carmen (Mexico)
ABSTRACT:
The objective of this research is to identify the impact on SMEs of the Tax provisions established by Mexican Tax Authorities, related to electronic invoicing and electronic accounting, generating a change in SMEs administration culture since they had to learn how to handle the official programs established by the Mexican Authorities, as we can see in the research results, that the level of electronic invoicing has been increasing since 2011 to 2014 in an 799% what means that SMEs owners have been improving their knowledge on Tics handling, complying with the authorities requirements and enhancing the SMEs performance.
Impact of Transport and Storage Sector on Sustainable Development: Evaluation Using Input-Output Model
Auzina-Emsina, Astra; Pocs, Remigijs (Latvia)
ABSTRACT:
Transport and storage sector has high importance in any economy as it serves to all major economic agents – companies (supply of materials and deliveries of final goods), households (getting to planned destinations, supply of goods etc.), government. Nowadays the production of commodities demand components from all over the world and the production supply process diversifies more and more, the evaluation of the importance of transport is relevant issue to be researched and investigated. The research is devoted to the assessment and evaluation of impact of transport and storage sector on economy (monetary impact) and in respect to the sustainability in the European Union (EU). As the research method the input-output model is selected as it illustrated the sectoral interlinkages – both direct linkages and also indirect interlinkages. In the research, a special attention is paid to the EU member states with highest share of transport and storage sector in the economy, the case of Latvia is analyzed in more detail. Alternatives are to apply hybrid (monetary and physical) methods. The paper does not examine emission issues.
Information and Communication Technologies in Ecuador and their Contribution to the Construction of Good Living, Sumak Kawsay - Period 2008 – 2016
Sánchez Suárez, Elio E.; Ortiz Zambrano, Jenny A.; Sangacha Tapia, Lady M.; Varela Tapia, Eleanor A.; Avilés Mite, Karen del P.; Medina Correa, Segundo M. (Ecuador)
ABSTRACT:
The goal of this research work was to analyze the different variables that describe the behavior and evolution of the use and diffusion in the different strata of the Ecuadorian population of Information and Communication Technologies - ICTs, and how the consolidation of these will constitute the fundamental bases on which Good Living will be based, Sumak Kawsay. An objective review was carried out regarding the variables that explain these behaviors associated with the use, implementation and consolidation of TICs, among which are the use of the advanced mobile telephony service plus internet and data, advanced mobile service - national density of active lines and their percentage in relation to the population, domestic technological equipment at the national level in terms of the use of desktops, laptops, among others. For the analysis, descriptive statistical tools were used, performing a vertical and horizontal analysis throughout the study period, 2008 - 2016, evaluating the quality of the indicators and whether or not they are meeting the objectives set in the economic and social policies development of the country, evidencing after eight years of implementing the substantial improvement of connectivity, the reduction of the digital divide, digital illiteracy, among others, significantly improving the standard of living of the population in general.
IoT and Satellite Assets Integration for Forest Fire Emergency Management: TALED, a Demonstration Project Co-Funded by ESA Artes IAP Program
Schiano lo Moriello, Salvatore; Aurigemma, Renato; Marsella, Stefano; Marzoli, Marcello; Ferrucci, Frabrizio; Punzo, Francesco (Italy)
ABSTRACT:
Fires are very real problem in Campania, an Italian region in south Italy. A group of companies and bodies with heterogeneous skills integrated a fire-fighting system using different technologies. The most important element is the sharing of the information obtained using shared protocols, terrestrial and satellite technologies. Another important element is the information processing for the decisions support: report maps and forecasting. The system has been tested and used during the 2018 fire season.
Neural Network Approach to Grammatical Error Correction Without Annotated Data
Uekado, Kazuya; Mori, Susumu; Harada, Taku; Ohwada, Hayato (Japan)
ABSTRACT:
Grammatical Error Correction (GEC) is an important role for English Learners. In recent years, the competitions of this task were held. Therefore, researches about automatic GEC are very active. Many research about this task uses a machine translation method. Although machine translations output a high performance, training and parameter tuning need a large amount of annotated data. Generally, collecting annotated data is very expensive. We should avoid using annotated datasets. This paper proposes a method without annotated data. Our method uses only native data because obtaining native data is easier from websites. Language model and classification correct errors. The language model can correct multiple errors and a classification method improves the performance of corrections. For training model, we use neural networks because these methods achieved success in various natural language processing tasks. As a result, our approach got the decent performance on CoNLL-2014 test datasets. We show an effectivity of automated GEC without annotated data.
On the Cost of Security Compliance in Information Systems
Hofbauer, David; Ivkic, Igor; Maksuti, Silia; Aldrian, Andreas; Tauber, Markus (Austria)
ABSTRACT:
The onward development of information and communication technology has led to a new industrial revolution called Industry 4.0. This revolution involves Cyber-Physical Production Systems (CPPS), which consist of intelligent Cyber-Physical Systems that may be able to adapt themselves autonomously in a production environment. At the moment, machines in industrial environments are often not connected to the internet, which thus needs a point-to-point connection to access the device if necessary. Through Industry 4.0, these devices should enable remote access for smart maintenance through a connection to the outside world. However, this connection opens the gate for possible cyber-attacks and thus raises the question about providing security for these environments. Therefore, this paper used an adapted approach based on SixSigma to solve this security problem by investigating security standards. Security requirements were gathered and mapped to controls from well known security standards, formed into a catalog. This catalog includes assessment information to check how secure a solution for a use case is and also includes a link to an estimation method for implementation cost. Thus this paper’s outcome shows how to make Industry 4.0 use cases secure by fulfilling security standard controls and how to estimate the resulting implementation costs.
Performance Analysis of the IEEE 802.11p for Different Packet Length in VANETs
Toker, Osman; Shah, A. F. M. Shahen; Tureli, M. S. Ufuk (Turkey)
ABSTRACT:
The IEEE 802.11p standard defines the specification of Medium Access Control (MAC) and physical layer (PHY) of Vehicle Ad Hoc Networks (VANETs) which uses the Enhanced Distributed Channel Access Function (EDCAF) to support contention-based prioritized Quality of Service (QoS) in the MAC layer. The EDCA (Enhanced Distributed Channel Access) mechanism defines four access categories (ACs). Each AC queue works as an independent DCF station (STA) with Enhanced Distributed Channel Access Function to contend for Transmission Opportunities (TXOP) using its own EDCA parameters. This paper provides an analytical model to compute the performance of the IEEE 802.11p Enhanced Distributed Channel Access Function for Vehicular Network and provides an analytical model to compute the performance of the IEEE 802.11p EDCAF for vehicular network based on packet size. The derived performance model is verified by simulation.
Proactive Network Configuration Analysis for Human Errors
Mushi, Magreth *; Dutta, Rudra ** (* Tanzania, ** United States)
ABSTRACT:
Human operators are an important aspect of any computing system or infrastructure; however, human errors in configuring systems pose reliability and security issues, which are increasingly serious as such systems grow ever more complex. In particular, numerous studies have shown that errors by human administrators have contributed significantly to misconfigurations of networks. The research community has reacted with development of solutions for improving traditional network infrastructure to identify and correct misconfigurations. However, such solutions reduce the impact of, rather than eliminate, misconfigurations. Automated tools that abstract complex sets of network administration tasks have also been seen as a potential solution. On the other hand, such tools simply remove the possibility of human error one step, to the development of the workflow, and can actually have the effect of magnifying the risk of such mistakes due to their speed of operation. Also, the fear of an administrator using the wrong tool continues to exist. Rather, the need is for a proactive system that can examine the consequences of a proposed configuration before it is implemented.
In this paper, we propose and present the design for SanityChecker – an SDN based proactive solution for intercepting incoming configurations and inspecting them for human errors before configurations are committed to the devices. We developed a prototype integrated with OpenDaylight, a popular SDN controller platform and invited apprentice and experienced real-world network administrators to work with it. Our results show that SanityChecker can successfully improve network operation by overseen incoming configuration for human errors.
Promoting Health Topics: A Case Study of #SaludAmerica on Twitter
Gomez-Vasquez, Lina *; Pujols-Bernabel, Aileen **; Pujols-Bernabel, Raldirys ** (* United States, ** Puerto Rico)
ABSTRACT:
Traditional media (e.g., press, radio, TV) have been used for public health prevention and communication, showing positive results in terms of reach and public acceptance. Despite extensive research on health communication, few studies have analyzed the importance of using social media for health communication, especially about conveying and sharing health experiences and information. Social media presents a low-cost opportunity for disseminating health information due to its influential, transparent, genuine, and authentic characteristics and unique interactive features. Social media also permits interaction among users about health issues, providing social support and peer-to-peer support. In this respect, these platforms provide an opportunity to engage users in public health actions. Research then is needed for answering and examining the impact of social media on health communication. Therefore, this work examines how social media, particularly Twitter, is used for health communication. Using the hashtag #SaludAmerica, this study examines the network properties of this health community and how different types of users play a key role in the discussion of health issues on Twitter.
Security Star Certification Framework for IoT Devices
Ismail, Sahar M.; Kaleem, Faisal (United States)
ABSTRACT:
This paper describes a three-phased approach for establishing a certification framework called “Security Star” which can be used to evaluate the intrinsic security of an IoT device and provide consumers with an indication of the same. The phases include performing an in-depth IoT categorization based on similar system components, network and data; identifying threat vectors and associated attack narratives; and creating penetration tests suites for each IoT category. Aligning IoT categories with harmonized security profiles is the foundation of the proposed Security Star framework. A governing body and an academic talent pool will promote optimal adoption of this framework within the IoT security community. A manifestation of this proposal will provide an optimal scenario for multiple demographic by providing consumers’ security and privacy protection, students with much needed real-word experience before entering the job market, and impacted parties (including vendors) with the support and information needed to introduce security early into the IoT device lifecycle.
Spontaneous Facial Expression Recognition Through Fusion of Geometric and Appearance Features and Deep Network Based Classification
Hussein, Hayfaa; Naqvi, Syed Mohsen; Chambers, Jonathon A. (United Kingdom)
ABSTRACT:
In this paper, we present a novel automatic facial expression recognition system using a fusion of three types of features with a descriptor-based deep network framework to recognize human emotions from individual video frames for real-time applications. We concentrate on the fusion of geometric features with two different types of appearance features that are based on a local binary pattern (LBP) and local phase quantization (LPQ) of important parts of the face that are automatically cropped. Then, we use fusion together with one of the most attractive approaches for classification in the field of neural networks, namely, deep network with self-organizing map (SOM)-based classifier. Our system consists of the following: extracting the important facial regions in which most expressions appear by using some of the geometric landmark points; extracting LBP features in the spatial domain by applying the LBP operator and extracting LPQ features in the frequency domain by using the LPQ operator. The performance of the proposed system is validated on three types of spontaneous databases, namely, MMI facial expression database, Video Database of Moving Faces and People (VDMFP), and Belfast Induced Natural Emotion Database (BINED). Average recognition accuracies of 98.1% for the MMI database, 96.1% for the VD-MFP database and 94.8% for the Belfast database are obtained using the proposed method. The recognition results obtained from the fusion of three features are found to be clearly superior from recognition using the fusion of one or two features.
The Impact of Region on the Perception of Psychological Well-Being: Comparative Study in Russian Federation
Shilko, Roman S.; Shaigerova, Ludmila A.; Zinchenko, Yury P.; Dolgikh, Alexandra G.; Vakhantseva, Olga V. (Russian Federation)
ABSTRACT:
In recent decades much research effort has focused on the different factors contributing to psychological well-being, but much less attention was paid to study such a factor as ethnocultural identity. The impact of ethnocultural identity on psychological wellbeing is considered within the framework of psychological functioning in general and in relation to more specific issues such as identity clarity, minority population life quality, and harmonious self-concept formation of immigrants. The aim of the research is clarifying the role of regional specificity in the psychological well-being. The study was conducted in eleven constituent territories of six Federal Districts of Russia: Central, Southern, North Caucasian, Volga, Siberian, and Northwestern (1,322 people). After analysis of objective indicators of well-being and social situation in the different regions of Russia the authors have measured the subjective experience of the social situation and psychological well-being by the population, relied on the following values: subjective assessment of social stability in general, subjective assessment of physical health and emotional state, assessment of safety degree in various life spheres. The results of the study showed that in general, Russians feel quite protected, and the level of their subjective safety is quite high. However, there can be some differences between objective indicators of well-being of the region and the subjective experience by the population. These differences were divided into 3 categories. Thus, the level of mental well-being can in some cases be higher than the level of objective well-being, while in other cases it can in general reflect the level of objective values, or they can be in general lower than the level of objective wellbeing. For example, citizens of Crimea and the city of Sevastopol demonstrate positive assessment of Russian society condition, high level of psychological safety and average satisfaction with the emotional state despite the fact that most parts of objective values are lower compared with other of the Russian Federation. Herewith, the population of Moscow and the Republic of Dagestan illustrates a lower level of subjective well-being compared with the level of objective well-being and in general with the positive social situation. Consequently, mental well-being as a personal feeling is ethnoculturally mediated perception of the social situation and need to be measured not only with objective well-being values on a scale of a country, but in relation on the subjective experience of the population.
The Use of Flow Features in Lossy Network Traffic Compression for Network Intrusion Detection Applications
Smith, Sidney; Hammell II, Robert J. (United States)
ABSTRACT:
In distributed network intrusion detection applications, it is necessary to transmit data from the remote sensors to the central analysis systems (CAS). Transmitting all the data captured by the sensor would place an unacceptable demand on the bandwidth available to the site. Most applications address this problem by sending only alerts or summaries; however, these alone do not always provide the analyst with enough information to truly understand what is happening on the network. Lossless compression techniques alone are not sufficient to address the bandwidth demand; therefore, some form of lossy compression must be employed. Working on the theory that a network flow that is malicious will manifest this maliciousness early, we explore the impact of compressing network traffic by stopping the transmission of packets in a flow once a given threshold either in number of packets or number of bytes have been transmitted.
To Trust or Not to Trust – The Million Dollar Question in IoT Security
Soceanu, Alexandru *; Vasylenko, Maksym *; Goga, Nicolae ** (* Germany, ** Romania)
ABSTRACT:
This work-in-progress report addresses the issue of trust in Internet of Things (IoT) systems. By 2020, 30 billion devices (things) will be networked within IoT systems in support of various applications. However, one of the greatest customer concerns is the degree of protection against security attacks. An analysis of attacks on generic computer networks reveals: protection tools are not properly set up or not used at all. Similarly, numerous IoT systems do not harness all the embedded protection offered by the standards. No wonder that networks are often hacked and customers lose trust in deploying such systems. The central question is: How to engender greater trust in IoT systems? We therefore analyzed (1) to what extent security protections embedded into the standard specifications offer effective and satisfactory protection and (2) to what extent this may foster trust in deploying IoT systems for non-critical applications. To investigate this, we simulated experimental IoT applications using the open source platform ContikiOS and the Cooja simulator. The purpose of this research is to foster an understanding of the concept of trust in IoTs where trust evaluation metrics cannot be implemented.
Topic Modeling of Significant Concepts and Terminologies in Cybersecurity and Data Science and their Potential Guidance to Seed Future Research Direction
Bechor, Tamir; Jung, Bill (United States)
ABSTRACT:
Arguably, the two domains closely related to information technology recently gaining the most attention are ‘cybersecurity’ and ‘data science’. Yet, the intersection of both domains often faces the conundrum of discussions intermingled with illunderstood concepts and terminologies. A topic model is desired to illuminate significant concepts and terminologies, straddling in cybersecurity and data science. Also, the hope exists to knowledge-discover under-researched topics and concepts, yet deserving more attention for the intersection crossing both domains. Motivated by these, this study attempts to take on a challenge to model cybersecurity and data science topics clustered with significant concepts and terminologies, grounded on a text-mining approach based on the recent scholarly articles published between 2012 and 2018. As the means to the end of modeling topic clusters, the research is approached with a text-mining technique, comprised of key-phrases extraction, topic modeling, and visualization. The trained LDA Model in the research analyzed and generated significant terms from the text-corpus from 48 articles and found that six latent topic clusters comprised the key terms. Afterwards, the researchers labeled the six topic clusters for future cybersecurity and data science researchers as follows: Advanced/Unseen Attack Detection, Contextual Cybersecurity, Cybersecurity Applied Domain, Data-Driven Adversary, Power System in Cybersecurity, and Vulnerability Management. The subsequent qualitative evaluation of the articles found the LDA Model supplied the six topic clusters in unveiling latent concepts and terminologies in cybersecurity and data science to enlighten both domains.