54 research outputs found
Gafor : Genetic algorithm based fuzzy optimized re-clustering in wireless sensor networks
Acknowledgments: The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing. Funding: This research was funded by King Saud University in 2020.Peer reviewedPublisher PD
The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia
The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year.
The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Fifteen papers were submitted from Australia and overseas, of which ten were accepted for final presentation and publication.
We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conferences.
To our sponsors also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference
International Conference on Computer Science
UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level.
This conference consists of sub conferences in different fields like:
Art and Digital Media Agriculture, Food Science and Technology Architecture and Spatial Planning Civil Engineering, Infrastructure and Environment Computer Science and Communication Engineering Dental Sciences Education and Development Energy Efficiency Engineering Integrated Design Information Systems and Security Journalism, Media and Communication Law Language and Culture Management, Business and Economics Modern Music, Digital Production and Management Medicine and Nursing Mechatronics, System Engineering and Robotics Pharmaceutical and Natural Sciences Political Science Psychology Sport, Health and Society Security Studies
This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event.
Edmond Hajrizi, President of UBT UBT – Higher Education Institutio
RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques
Construction waste disposal is an urgent issue
for protecting our environment. This paper proposes a
waste management system and illustrates the work
process using plasterboard waste as an example, which
creates a hazardous gas when land filled with household
waste, and for which the recycling rate is less than 10%
in the UK. The proposed system integrates RFID
technology, Rule-Based Reasoning, Ant Colony
optimization and knowledge technology for auditing
and tracking plasterboard waste, guiding the operation
staff, arranging vehicles, schedule planning, and also
provides evidence to verify its disposal. It h relies on
RFID equipment for collecting logistical data and uses
digital imaging equipment to give further evidence; the
reasoning core in the third layer is responsible for
generating schedules and route plans and guidance, and
the last layer delivers the result to inform users. The
paper firstly introduces the current plasterboard
disposal situation and addresses the logistical problem
that is now the main barrier to a higher recycling rate,
followed by discussion of the proposed system in terms
of both system level structure and process structure.
And finally, an example scenario will be given to
illustrate the system’s utilization
Personality Identification from Social Media Using Deep Learning: A Review
Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed
Proceedings of AUTOMATA 2010: 16th International workshop on cellular automata and discrete complex systems
International audienceThese local proceedings hold the papers of two catgeories: (a) Short, non-reviewed papers (b) Full paper
Transitioning power distribution grid into nanostructured ecosystem : prosumer-centric sovereignty
PhD ThesisGrowing acceptance for in-house Distributed Energy Resource (DER) installations at lowvoltage
level have gained much significance in recent years due to electricity market liberalisations
and opportunities in reduced energy billings through personalised utilisation
management for targeted business model. In consequence, modelling of passive customers’
electric power system are progressively transitioned into Prosumer-based settings where presidency
for Transactive Energy (TE) system framework is favoured. It amplifies Prosumers’
commitments into annexing TE values during market participations and optimised energy
management to earn larger rebates and incentives from TE programs. However, when dealing
with mass Behind-The-Meter DER administrations, Utility foresee managerial challenges
when dealing with distribution network analysis, planning, protection, and power quality
security based on Prosumers’ flexibility in optimising their energy needs.
This dissertation contributes prepositions into modelling Distributed Energy Resources
Management System (DERMS) as an aggregator designed for Prosumer-centered cooperation,
interoperating TE control and coordination as key parameters to market for both
optimised energy trading and ancillary services in a Community setting. However, Prosumers
are primarily driven to create a profitable business model when modelling their
DERMS aggregator. Greedy-optimisation exploitations are negative concerns when decisions
made resulted in detrimental-uncoordinated outcomes on Demand-Side Response (DSR)
and capacity market engagements. This calls for policy decision makers to contract safe (i.e.
cooperative yet competitive tendency) business models for Prosumers to maximise TE values
while enhancing network’s power quality metrics and reliability performances.
Firstly, digitalisation and nanostructuring of distribution network is suggested to identify
Prosumer as a sole energy citizen while extending bilateral trading between Prosumer-to-
Prosumer (PtP) with the involvements of other grid operators−TE system. Modelling of
Nanogrid environment for DER integrations and establishment of local area network infrastructure
for IoT security (i.e. personal computing solutions and data protection) are committed
for communal engagements in a decentralise setting. Secondly, a multi-layered Distributed
Control Framework (DCF) is proposed using Microsoft Azure cloud-edge platform that cascades energy actors into respective layers of TE control and coordination. Furthermore,
modelling of flexi-edge computing architecture is proposed, comprising of Contract-Oriented
Sensor-based Application Platform (COSAP) employing Multi-Agent System (MAS) to
enhance data-sharing privacy and contract coalition agreements during PtP engagements.
Lastly, the Agents of MAS are programmed with cooperative yet competitive intelligences
attributed to Reinforcement Learning (RL) and Neural Networks (NN) algorithms to solve
multimodal socio-economical and uncertainty problems that corresponded to Prosumers’
dynamic energy priorities within the TE framework. To verify the DERMS aggregator
operations, three business models were proposed (i.e. greedy-profit margin, collegial-peak
demand, reserved-standalone) to analyse comparative technical/physical and economic/social
dimensions. Results showed that the proposed TE-valued DERMS aggregator provides
participation versatility in the electricity market that enables competitive edginess when utilising
Behind-The-Meter DERs in view of Prosumer’s asset scheduling, bidding strategy, and
corroborative ancillary services. Performance metrics were evaluated on both domestic and
industrial NG environments against IEEE Standard 2030.7-2017 & 2030.8-2018 compliances
to ensure deployment practicability.
Subsequently, proposed in-house protection system for DER installation serves as an
add-on monitoring service which can be incorporated into existing Advance Distribution
Management System (ADMS) for Distribution Service Operator (DSO) and field engineers
use, ADMS aggregator. It provides early fault detections and isolation processes from allowing
fault current to propagate upstream causing cascading power quality issues across
the feeder line. In addition, ADMS aggregator also serves as islanding indicator that distinguishes
Nanogrid’s islanding state from unintentional or intentional operations. Therefore, a
Overcurrent Current Relay (OCR) is proposed using Fuzzy Logic (FL) algorithm to detect,
profile, and provide decisional isolation processes using specified OCRs. Moreover, the
proposed expert knowledge in FL is programmed to detect fault crises despite insufficient
fault current level contributed by DER (i.e. solar PV system) which conventional OCR fails
to trigger
Security in Distributed, Grid, Mobile, and Pervasive Computing
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security
Advances and Applications of Dezert-Smarandache Theory (DSmT) for Information Fusion (Collected Works), Vol. 4
The fourth volume on Advances and Applications of Dezert-Smarandache Theory (DSmT) for information fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics. The contributions (see List of Articles published in this book, at the end of the volume) have been published or presented after disseminating the third volume (2009, http://fs.unm.edu/DSmT-book3.pdf) in international conferences, seminars, workshops and journals.
First Part of this book presents the theoretical advancement of DSmT, dealing with Belief functions, conditioning and deconditioning, Analytic Hierarchy Process, Decision Making, Multi-Criteria, evidence theory, combination rule, evidence distance, conflicting belief, sources of evidences with different importance and reliabilities, importance of sources, pignistic probability transformation, Qualitative reasoning under uncertainty, Imprecise belief
structures, 2-Tuple linguistic label, Electre Tri Method, hierarchical proportional redistribution, basic belief assignment, subjective probability measure, Smarandache codification, neutrosophic logic, Evidence theory, outranking methods, Dempster-Shafer Theory, Bayes fusion rule, frequentist probability, mean square error, controlling factor, optimal assignment solution, data association, Transferable Belief Model, and others.
More applications of DSmT have emerged in the past years since the apparition of the third book of DSmT 2009. Subsequently, the second part of this volume is about applications of DSmT in correlation with Electronic Support Measures, belief function, sensor networks, Ground Moving Target and Multiple target tracking, Vehicle-Born Improvised Explosive Device, Belief Interacting Multiple Model filter, seismic and acoustic sensor, Support Vector Machines, Alarm
classification, ability of human visual system, Uncertainty Representation and Reasoning Evaluation Framework, Threat Assessment, Handwritten Signature Verification, Automatic Aircraft Recognition, Dynamic Data-Driven Application System, adjustment of secure communication trust analysis, and so on.
Finally, the third part presents a List of References related with DSmT published or presented along the years since its inception in 2004, chronologically ordered
SYNERGY OF BUILDING CYBERSECURITY SYSTEMS
The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies.
The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter.
The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter.
The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account.
In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print)
------------------------------------------------------------------------------------------------------------------
How to Cite: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2
------------------------------------------------------------------------------------------------------------------
Indexing:
Розвиток сучасної світової спільноти тісно пов’язаний з досягненнями в області обчислювальних ресурсів і кіберпростору. Формування та розширення асортименту послуг базується на досягненнях людства у галузі високих технологій. Однак стрімке зростання обчислювальних ресурсів, поява повномасштабного квантового комп’ютера посилює вимоги до систем безпеки не тільки інформаційно-комунікаційних, але і до кіберфізичних систем і технологій.
У першому розділі обговорюються методологічні основи побудови систем безпеки для об'єктів критичної інфраструктури на основі моделювання процесів поведінки антагоністичних агентів у систем безпеки.
У другому розділі пропонується концепція інформаційної безпеки в соціальних мережах, яка заснована на математичних моделях захисту даних, з урахуванням впливу конкретних параметрів соціальної мережі та наслідків для неї.
Враховуються нелінійні взаємозв'язки параметрів системи захисту, атак, соціальних мереж, а також вплив індивідуальних характеристик користувачів і характеру взаємовідносин між ними.
У третьому розділі розглядаються практичні аспекти методології побудови постквантових алгоритмів для асиметричних криптосистем Мак-Еліса та Нідеррейтера на алгебраїчних кодах (еліптичних та модифікованих еліптичних кодах), їх математичні моделі та практичні алгоритми. Запропоновано гібридні конструкції криптокоду Мак-Еліса та Нідеррейтера на дефектних кодах. Вони дозволяють істотно знизити енергетичні витрати на реалізацію, забезпечуючи при цьому необхідний рівень криптографічної стійкості системи в цілому. Запропоновано концепцію безпеки корпоративних інформаційних та освітніх систем, які засновані на побудові адаптивної системи захисту інформації.
ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print)
------------------------------------------------------------------------------------------------------------------
Як цитувати: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2
------------------------------------------------------------------------------------------------------------------
Індексація:
 
- …