Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 9
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Phishing has been one of the most successful attacks in recent years. Criminals are motivated by increasing financial gain and constantly improving their email phishing methods. A key goal, therefore, is to develop effective detection methods to cope with huge volumes of email data. In this paper, a solution using BLSTM neural network and FastText word embeddings has been proposed. The solution uses preprocessing techniques like stop-word removal, tokenization, and padding. Two datasets were used in three experiments: balanced and imbalanced, whereas in the imbalanced dataset, the effect of maximum token size was investigated. Evaluation of the model indicated the best metrics: 99.12% accuracy, 98.43% precision, 99.49% recall, and 98.96% f1-score on the imbalanced dataset. It was compared to an existing solution that uses the DL model and word embeddings. Finally, the model and solution architecture were implemented as a browser plug-in.
Go to article

Authors and Affiliations

Rafał Wolert
1
Mariusz Rawski
1

  1. Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

In the paper experimental investigation results of three elements are presented. Two of them were made of reinforced concrete. The strengthened bracket had the steel accessory mounted to cracked loaded corbel (while it was loaded to half ultimate force of the reference element), the reference one was tested without any accessory. The third corbel was the steel accessory mounted to the concrete column. Full scale corbels were 450 mm deep and 250 mm wide, steel accessory was 320 mm high. The aim of the research was to verify the following thesis: short corbels (shear slenderness ac /h ≈ 0,3) can be strengthened by a steel accessory. Load carrying capacity of strengthened member increased by 40 %. The ultimate force obtained for the steel accessories mounted to concrete column was 66 % of reference value. While testing some observations and measurements (strain of reinforcement and concrete, development of cracking) were made which allowed to describe corbel behaviour under increasing load.

Go to article

Authors and Affiliations

T. Urban
Ł. Krawczyk
M. Gołdyn
Download PDF Download RIS Download Bibtex

Abstract

Based on the theory of computer vision, a new method for extracting ore from underground mines is proposed. This is based on a combination of RGB images collected by a color industrial camera and a point cloud generated by a 3D ToF camera. Firstly, the mean-shift algorithm combined with the embedded confidence edge detection algorithm is used to segment the RGB ore image into different regions. Secondly, the effective ore regions are classified into large pieces of ore and ore piles consisting of a number of small pieces of ore. The method applied in the classification process is to embed the confidence into the edge detection algorithm which calculates edge distribution around ore regions. Finally, the RGB camera and the 3D ToF camera are calibrated and the camera matrix transformation of the two cameras is obtained. Point cloud fragments are then extracted according to the cross-calibration result. The geometric properties of the ore point cloud are then analysed in the subsequent procedure.
Go to article

Authors and Affiliations

Feng Jin
1
ORCID: ORCID
Kai Zhan
2
Shengjie Chen
2
Shuwei Huang
2
ORCID: ORCID
Yuansheng Zhang
2

  1. BGRIMM Technology Group University of Science and Technology Beijing, China
  2. BGRIMM Technology Group, China
Download PDF Download RIS Download Bibtex

Abstract

The paper investigates the mechanisms behind the formation and maintenance of those migrants’ social ties which translate into a particular composition of the network and become a source of social capital. Based on a number of in-depth interviews with Ukrainian migrants in Warsaw, we find that Ukrainian migrants’ networks are based primarily on ties homogenous in regard to nationality, level of education and character of work. The institutional context of social interaction determines with whom migrants form relations and whether these ties become a source of social advancement. The studied migrants do form bridging ties with more experienced, as well as socially and legally embedded persons, mainly other migrants, receiving both instrumental and emotional support.

Go to article

Authors and Affiliations

Marta Kindler
Katarzyna Wójcikowska-Baniak
Download PDF Download RIS Download Bibtex

Abstract

Current networks are designed for peak loads leading to low utilization of power resources. In order to solve this problem, a heuristic energy-saving virtual network embedding algorithm based on the Katz centrality (Katz-VNE) is proposed. For solving an energy-saving virtual network embedding problem, we introduce the Katz centrality to represent the node influence. In order to minimize the energy consumption of the substrate network, the energy-saving virtual network embedding problem is formulated as an integer linear program, and the Katz-VNE is used to solve this problem. The Katz-VNE tries to embed the virtual nodes onto the substrate nodes with high Katz centrality, which is effective, and uses the shortest paths offering the best factor of bandwidths to avoid the hot nodes. The simulation results demonstrate that the long-term average energy consumption of the substrate network is reduced significantly, and the long-term revenue/cost ratio, the acceptance rate of virtual network requests, and the hibernation rate of substrate nodes as well as links are improved significantly.

Go to article

Authors and Affiliations

Qiang Zhu
Qing-Jun Wang
Mu-Jun Zang
Zhen-Dong Wang
Chang Xiao
Download PDF Download RIS Download Bibtex

Abstract

International standards from IEC and IEEE regulate power grid parameters such as theRMSvalue, frequency, harmonic and interharmonic distortion, unbalance or the presence of transients, that are important to assure the quality of distributed power. Standard IEC 61000-4-30 suggests the zero crossing algorithm for the measurement of the power grid frequency, but also states that different algorithms can be used. This paper proposes a new algorithm, the Fractional Interpolated Discrete Fourier Transform, FracIpDFT, to estimate the power grid frequency, suitable for implementation in resource limited embedded measurement systems. It is based on the non-integer Goertzel algorithm followed by interpolation at non-integer multiples of the DFT frequency resolution. The proposed algorithm is validated and its performance compared with other algorithms through numerical simulations. Implementation details of the FracIpDFT in an ARM Cortex M4 processor are presented along with frequency measurement results performed with the proposed algorithm in the developed system.
Go to article

Authors and Affiliations

Nuno M. Rodrigues
1
Fernando M. Janeiro
2
Pedro M. Ramos
1

  1. Instituto de Telecomunicações, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa, Portugal
  2. Instituto de Telecomunicações, Universidade de Évora, 7000-671 Évora, Portugal
Download PDF Download RIS Download Bibtex

Abstract

The problem of effective gas extraction from Polish shale rocks is an interesting research subject for scientists. A properly selected proppant, which protects cracks from closing during the fracturing process, inestimably contributes to an increase of extraction. Grains of proppant are transported along with a fracturing medium to reach the deepest regions of the crack. The proper support of the crack provides an easy flow of gas, therefore it is important in terms of extraction efficiency. This paper shows the interactions of a proppant grain with the crack surface in shale rock. FEM analysis was conducted to observe the stress region, which is generated as a result of pressing the grain into the crack surface. A model of a sphere which was pressed into the rock model with constant velocity was applied. The received results of stress depend on material properties and a range of proppant grain pressing.

Go to article

Authors and Affiliations

M. Kwietniewski
D. Miedzińska
T. Niezgoda
Download PDF Download RIS Download Bibtex

Abstract

The power distribution internet of things (PD-IoT) has the complex network architecture, various emerging services, and the enormous number of terminal devices, which poses rigid requirements on substrate network infrastructure. However, the traditional PD-IoT has the characteristics of single network function, management and maintenance difficulties, and poor service flexibility, which makes it hard to meet the differentiated quality of service (QoS) requirements of different services. In this paper, we propose the software-defined networking (SDN)- enabled PD-IoT framework to improve network compatibility and flexibility, and investigate the virtual network function (VNF) embedding problem of service orchestration in PD-IoT. To solve the preference conflicts among different VNFs towards the network function node (NFV) and provide differentiated service for services in various priorities, a matching-based priorityaware VNF embedding (MPVE) algorithm is proposed to reduce energy consumption while minimizing the total task processing delay. Simulation results demonstrate that MPVE significantly outperforms existing matching algorithm and random matching algorithm in terms of delay and energy consumption while ensuring the task processing requirements of high-priority services.
Go to article

Bibliography

[1] Z. Zhou, J. Bai, Z. Sheng, ”A Stackelberg Game Approach for Energy Management in Smart Distribution Systems with Multiple Microgrids”, in IEEE ISADS 2015 workshop on Smart Grid Communications and Networking Technologies. Taiwan, China, 2015.
[2] A. Dadashzade, F. Aminifar, M. Davarpanah, ”Unbalanced Source Detection in Power Distribution Networks by Negative Sequence Apparent Powers”, IEEE Trans. Power Deliv. 36(5), 481-483 (2021).
[3] Z. Lv, W. Xiu, ”Interaction of Edge-Cloud Computing Based on SDN and NFV for Next Generation IoT”, IEEE Internet Things J. 7 (4), 5706-5712 (2020) .
[4] Z. Zhou, X. Chen, B. Gu, ”Multi-Scale Dynamic Allocation of Licensed and Unlicensed Spectrum in Software-Defined HetNets”, IEEE Netw. 33 (6), 9-15 (2019).
[5] G. Wang, S. Zhou, S. Zhang, Z. Niu, X. Shen, ”SFC-Based Service Provisioning for Reconfigurable Space-Air-Ground Integrated Networks”, IEEE J. Sel. Areas Commun. 38 (3), 1478-1489 (2020) .
[6] J. Li, W. Shi, N. Zhang, X. Shen, ”Delay-Aware VNF Scheduling: A Reinforcement Learning Approach With Variable Action Set”, IEEE Trans. Cogn. Commun. Netw. 7 (2), 304-318 (2021).
[7] G. Faraci, G. Schembra, ”An Analytical Model to Design and Manage a Green SDN/NFV CPE Node” IEEE Trans. Netw. Service Manag. 12 (4), 435-450 (2015).
[8] B. R.Al-Kaseem, ”Al-Raweshidy, H.S. SD-NFV as an Energy Efficient Approach for M2M Networks Using Cloud-Based 6LoWPAN Testbed”, IEEE Internet Things J. 4 (2), 1787-1797 (2017).
[9] Z. Zhou, J. Gong, Y. He, Y. Zhang, ”Software Defined Machineto- Machine Communication for Smart Energy Management”, IEEE Commun. Mag. 55(7), 52-60 ( 2017).
[10] C. Mouradian, N. T. Jahromi, R. H.Glitho, ”NFV and SDN-Based Distributed IoT Gateway for Large-Scale Disaster Management”, IEEE Internet Things J., 5 (2), 4119-4131 ( 2018).
[11] L. You, B. Tuncer, R. Zhu, H. Xing, C. Yuen, ”A Synergetic Orchestration of Objects, Data and Services to Enable Smart Cities”, IEEE Internet Things J. 6(2), 10496-10507 ( 2019).
[12] B. Cheng, S. Hou, M.Wang, S. Zhao, J. Chen, ”HSOP: A Hybrid Service Orchestration Platform for Internet-Telephony Networks”, IEEE/ACM Trans. Netw. 28 (5), 1102-1115 (2020).
[13] G. Castellano, F. Esposito, F. Risso, ”A Service-Defined Approach for Orchestration of Heterogeneous Applications in Cloud/Edge Platforms”, IEEE Trans. Netw. Service Manag. 16(3), 1404-1418 (2019).
[14] B. Kar, E. H.-K.Wu, Y. D .Lin, ”Energy cost optimization in dynamic placement of virtualized network function chains”, IEEE Trans. Netw. Service Manag. 15 (4), 372–386 (2018).
[15] M. M.Tajiki, S. Salsano, L. Chiaraviglio, M. Shojafar, B. Akbari, ”Joint Energy Efficient and QoS-Aware Path Allocation and VNF Placement for Service Function Chaining”, IEEE Trans. Netw. Serv. 16 (6), 374-388 (2019) .
[16] L. Ruiz, et al. ”Genetic Algorithm for Holistic VNF-Mapping and Virtual Topology Design”, IEEE Access. 8 (3), 55893-55904 (2020).
[17] K. S. Ghaia, S. Choudhurya, A. Yassineb, ”A stable matching based algorithm to minimize the end-to-end latency of edge nfv”, Procedia Computer Science. 151 (9), 377-384 (2019).
[18] C. Pham, N. H.Tran, C. S. Hong, ”Virtual Network Function Scheduling: A Matching Game Approach”, IEEE Commun. Lett. 22 (5), 69-72 (2018) .
[19] C. Pham, N. H.Tran, S. Ren, W. Saad, C. S. Hong, ”Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach”, IEEE Trans. Serv. Comput. 13 (9), 172-185 (2020).
[20] Z. Zhou et al. Context-Aware Learning-Based Resource Allocation for Ubiquitous Power IoT. IEEE Internet Things Mag. 4(1), 46-52 (2020) .
[21] Z. Zhou, H. Liao, H. Zhao, B. Ai, M. Guizani, ”Reliable Task Offloading for Vehicular Fog Computing Under Information Asymmetry and Information Uncertainty”, IEEE Trans. Veh. Technol.68 (6), 8322-8335 (2019).
[22] Z. Xu, X. Zhang, S. Yu, J. Zhang, ”Energy-Efficient Virtual Network Function Placement in Telecom Networks”, in 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018.
[23] M. C. Luizelli, L. R. Bays, L. S.Buriol, M. P. Barcellos, L. P. Gaspary, ”Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions”, in 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 2015.
[24] X. Fei, F. Liu, H. Xu, H. Jin, ”Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction”, in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, HI, USA, 2018.
[25] M. Chen, Y. Hao, ”Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network”, IEEE J. Sel. Areas Commun. 36 (2), 587-597 (2018).
[26] D. Yuan, X. Yang, Y. Jiang, Y. Meng, ”An Energy-Delay Trade-Off in Wireless Visual Sensor Networks Based on Two-Sided Matching”, IEEE Sensors J. 19 (6), 10099-10110 (2019).
[27] J. Xu, M. Li, J. Fan, X. Zhao, Z. Chang, ”Self-Learning Super- Resolution Using Convolutional Principal Component Analysis and Random Matching”, IEEE Trans. Multimedia21 (5), 1108-1121 (2018)
Go to article

Authors and Affiliations

Xiaoyue Li
1
Xiankai Chen
1
Chaoqun Zhou
1
Zilong Liang
1
Shubo Liu
1
Qiao Yu
1

  1. State Grid Qingdao Power Supply Company, China
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland

This page uses 'cookies'. Learn more