首页 > 最新文献

2019 53rd Annual Conference on Information Sciences and Systems (CISS)最新文献

英文 中文
Authentication of IoT Devices for WiFi Connectivity from the Cloud 物联网设备云端WiFi连接认证
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693048
Wondimu K. Zegeye, F. Moazzami
The deployment of computing devices and machines that constitute the Internet of Things (IoT) had dramatically increased in this decade. To reduce the cost of pre-deployment effort, an already existing Wi-Fi infrastructure (Access Point) can be used to grant these devices access to Internet connectivity. This paper presents the use of standard tunneled based EAP (TEAP) protocol for authenticating IoT devices from the cloud using an EAP-AKA’ inner method EAP. It mainly focuses on the deployment architecture, security against MiTM attack by exploring different RFCs associated with those protocols.
构成物联网(IoT)的计算设备和机器的部署在这十年中急剧增加。为了减少预部署工作的成本,可以使用现有的Wi-Fi基础设施(接入点)来授予这些设备访问Internet连接的权限。本文介绍了使用基于标准隧道的EAP (TEAP)协议,使用EAP(又名“内部方法EAP”)对来自云的物联网设备进行身份验证。它主要通过探索与这些协议相关的不同rfc来关注部署体系结构、针对MiTM攻击的安全性。
{"title":"Authentication of IoT Devices for WiFi Connectivity from the Cloud","authors":"Wondimu K. Zegeye, F. Moazzami","doi":"10.1109/CISS.2019.8693048","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693048","url":null,"abstract":"The deployment of computing devices and machines that constitute the Internet of Things (IoT) had dramatically increased in this decade. To reduce the cost of pre-deployment effort, an already existing Wi-Fi infrastructure (Access Point) can be used to grant these devices access to Internet connectivity. This paper presents the use of standard tunneled based EAP (TEAP) protocol for authenticating IoT devices from the cloud using an EAP-AKA’ inner method EAP. It mainly focuses on the deployment architecture, security against MiTM attack by exploring different RFCs associated with those protocols.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength 从接收信号强度中提取秘密比特率的经验界
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693028
Sima Azizi, A. Komaee
Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmetric-key algorithms, the physical layer properties of the channel can be exploited for distribution of the secret keys. In this approach, the channel state provides a common randomness which is shared by the legitimate users but is mostly unknown to an eavesdropper. by means of signal processing techniques, this common randomness is extracted into random secret keys. This paper establishes an information theoretic upper bound on the rate at which the secret keys can be extracted. Instead of the conventional approach that relies on mathematical models for the wireless channel, this paper adopts an experimental approach to estimate this bound from empirical data. A set of signal processing techniques is developed here to numerically estimate this bound for a pair of received signal strength (RSS) recorded by indoor commercial radios.
对称密码学依赖于合法通信方共享的相同密钥对。要实现用于密码学的对称密钥算法,主要关注的是开发用于分发密钥的安全方法。在利用对称密钥算法保护无线衰落信道时,可以利用信道的物理层特性来分发密钥。在这种方法中,通道状态提供了合法用户共享的公共随机性,但窃听者大多不知道。通过信号处理技术,将这种常见的随机性提取为随机密钥。本文建立了密钥提取速率的信息论上界。与传统的依赖数学模型的无线信道方法不同,本文采用实验方法从经验数据中估计该边界。本文开发了一套信号处理技术,对室内商用无线电记录的一对接收信号强度(RSS)进行数值估计。
{"title":"Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength","authors":"Sima Azizi, A. Komaee","doi":"10.1109/CISS.2019.8693028","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693028","url":null,"abstract":"Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmetric-key algorithms, the physical layer properties of the channel can be exploited for distribution of the secret keys. In this approach, the channel state provides a common randomness which is shared by the legitimate users but is mostly unknown to an eavesdropper. by means of signal processing techniques, this common randomness is extracted into random secret keys. This paper establishes an information theoretic upper bound on the rate at which the secret keys can be extracted. Instead of the conventional approach that relies on mathematical models for the wireless channel, this paper adopts an experimental approach to estimate this bound from empirical data. A set of signal processing techniques is developed here to numerically estimate this bound for a pair of received signal strength (RSS) recorded by indoor commercial radios.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121068598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics 基于深度统计序列的GAN增强文本异常检测
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693024
Mariem Ben Fadhel, K. Nyarko
Anomaly detection is the process of finding data points that deviate from a baseline. In a real-life setting, anomalies are usually unknown or extremely rare. Moreover, the detection must be accomplished in a timely manner or the risk of corrupting the system might grow exponentially. In this work, we propose a two level framework for detecting anomalies in sequences of discrete elements. First, we assess whether we can obtain enough information from the statistics collected from the discriminator’s layers to discriminate between out of distribution and in distribution samples. We then build an unsupervised anomaly detection module based on these statistics. As to augment the data and keep track of classes of known data, we lean toward a semi-supervised adversarial learning applied to discrete elements.
异常检测是发现偏离基线的数据点的过程。在现实生活中,异常通常是未知的或极其罕见的。此外,检测必须及时完成,否则破坏系统的风险可能会呈指数级增长。在这项工作中,我们提出了一个两级框架来检测离散元素序列中的异常。首先,我们评估是否可以从判别器层收集的统计信息中获得足够的信息来区分分布外和分布内样本。然后,我们基于这些统计数据构建了一个无监督异常检测模块。为了增加数据并跟踪已知数据的类别,我们倾向于将半监督对抗性学习应用于离散元素。
{"title":"GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics","authors":"Mariem Ben Fadhel, K. Nyarko","doi":"10.1109/CISS.2019.8693024","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693024","url":null,"abstract":"Anomaly detection is the process of finding data points that deviate from a baseline. In a real-life setting, anomalies are usually unknown or extremely rare. Moreover, the detection must be accomplished in a timely manner or the risk of corrupting the system might grow exponentially. In this work, we propose a two level framework for detecting anomalies in sequences of discrete elements. First, we assess whether we can obtain enough information from the statistics collected from the discriminator’s layers to discriminate between out of distribution and in distribution samples. We then build an unsupervised anomaly detection module based on these statistics. As to augment the data and keep track of classes of known data, we lean toward a semi-supervised adversarial learning applied to discrete elements.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129309374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited Presentation 多址毫米波通信的自适应波束形成:邀请报告
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692879
Peter O. Taiwo, A. Cole-Rhodes
In this work we explore the use of adaptive beamforming for millimeter wave (mm-wave) communications. We apply a blind adaptive algorithm to blocks of signal data transmitted using 16-QAM modulation. We consider uplink transmission for both a single user and for multiple users, each equipped with a single antenna. The receiver is equipped with a uniform linear array (ULA) antenna. We estimate the effective channel and measure the performance of a blind millimeter wave combiner applied at the base station to received signal blocks, which have been corrupted by AWGN and inter-symbol interference (ISI). This is done by measuring error rates over varying SNR, and varying numbers of antenna at the base station.
在这项工作中,我们探讨了自适应波束形成在毫米波通信中的应用。我们对16-QAM调制传输的信号数据块采用盲自适应算法。我们考虑了单个用户和多个用户的上行传输,每个用户都配备了单个天线。接收机配备了均匀线性阵列(ULA)天线。我们估计了一种应用于基站的盲毫米波合成器的有效信道,并测量了该合成器对接收到的受AWGN和码间干扰(ISI)破坏的信号块的性能。这是通过测量不同信噪比下的错误率和基站中不同数量的天线来实现的。
{"title":"Adaptive Beamforming for Multiple-Access Millimeter Wave Communications : Invited Presentation","authors":"Peter O. Taiwo, A. Cole-Rhodes","doi":"10.1109/CISS.2019.8692879","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692879","url":null,"abstract":"In this work we explore the use of adaptive beamforming for millimeter wave (mm-wave) communications. We apply a blind adaptive algorithm to blocks of signal data transmitted using 16-QAM modulation. We consider uplink transmission for both a single user and for multiple users, each equipped with a single antenna. The receiver is equipped with a uniform linear array (ULA) antenna. We estimate the effective channel and measure the performance of a blind millimeter wave combiner applied at the base station to received signal blocks, which have been corrupted by AWGN and inter-symbol interference (ISI). This is done by measuring error rates over varying SNR, and varying numbers of antenna at the base station.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterization and Design of Generalized Convolutional Neural Network 广义卷积神经网络的表征与设计
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693021
Pan Zhong, Zhengdao Wang
The group convolution and representation theory give a strong support for generalized convolutional neural network. The generalized convolutional neural network (G-CNN) has been applied to learning problems and achieved the state-of-art performance. But a theoretical support for details of network architecture design is still lacking. In this work, we first analyze the necessary and sufficient condition for a neural network to be group equivariant when the group acts on the sub-domain of input/output. We then analyze the multiple equivariance case. After that, we show that the generalized convolution mapping to a quotient space is a projection of the image of a generalized convolution which maps to the maximum quotient space. This can be used to obtain guidelines for choosing the feature size of hidden layer.
群卷积和表示理论为广义卷积神经网络提供了强有力的支持。广义卷积神经网络(G-CNN)已被应用于学习问题,并取得了先进的性能。但是对于网络架构设计细节的理论支持仍然缺乏。本文首先分析了当群作用于输入/输出子域时,神经网络是群等变的充要条件。然后分析多重等方差情况。然后,我们证明了映射到商空间的广义卷积是映射到最大商空间的广义卷积像的投影。这可以用来获得选择隐藏层特征大小的准则。
{"title":"Characterization and Design of Generalized Convolutional Neural Network","authors":"Pan Zhong, Zhengdao Wang","doi":"10.1109/CISS.2019.8693021","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693021","url":null,"abstract":"The group convolution and representation theory give a strong support for generalized convolutional neural network. The generalized convolutional neural network (G-CNN) has been applied to learning problems and achieved the state-of-art performance. But a theoretical support for details of network architecture design is still lacking. In this work, we first analyze the necessary and sufficient condition for a neural network to be group equivariant when the group acts on the sub-domain of input/output. We then analyze the multiple equivariance case. After that, we show that the generalized convolution mapping to a quotient space is a projection of the image of a generalized convolution which maps to the maximum quotient space. This can be used to obtain guidelines for choosing the feature size of hidden layer.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of dictionary learning methods for reverberation suppression in photoacoustic microscopy : Invited presentation 光声显微镜中混响抑制的字典学习方法的比较:特邀报告
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693042
Sushanth G. Sathyanarayana, Bo Ning, Song Hu, J. Hossack
Dictionary learning is an unsupervised learning method to abstract image data into a set of learned basis vectors. In prior work, the efficacy of the K-SVD dictionary learning algorithm in suppressing reverberation in volumetric photoacoustic microscopy (PAM) data was demonstrated. In this work, we compare the K-SVD algorithm against the method of optimal directions (MOD). The generalization error and reverberation suppression performance of the two algorithms were compared. The K-SVD was found to have a lower average generalization error (5.69x104 ±9.09x103 (a.u.)) when compared to the MOD (8.27x104 ±1.33x104 (a.u.)) for identical training data, initialization, sparsity (3 atoms per A-line) and number of iterations (5). Both algorithms were observed to suppress the reverberation to a similar extent (18.8 ± 1.12 dB for the K-SVD and 18.3 ± 1.2 dB for the MOD). Our data show that irrespective of the method used, sparse dictionary learning can significantly suppress reverberations in PAM.
字典学习是一种将图像数据抽象为一组学习基向量的无监督学习方法。在之前的工作中,证明了K-SVD字典学习算法在抑制体积光声显微镜(PAM)数据混响方面的有效性。在这项工作中,我们比较了K-SVD算法和最优方向(MOD)方法。比较了两种算法的泛化误差和混响抑制性能。对于相同的训练数据、初始化、稀疏性(每a线3个原子)和迭代次数(5),K-SVD的平均泛化误差(5.69x104±9.09x103 (a.u))低于MOD (8.27x104±1.33x104 (a.u))。两种算法对混响的抑制程度相似(K-SVD为18.8±1.12 dB, MOD为18.3±1.2 dB)。我们的数据表明,无论使用哪种方法,稀疏字典学习都可以显著抑制PAM中的混响。
{"title":"Comparison of dictionary learning methods for reverberation suppression in photoacoustic microscopy : Invited presentation","authors":"Sushanth G. Sathyanarayana, Bo Ning, Song Hu, J. Hossack","doi":"10.1109/CISS.2019.8693042","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693042","url":null,"abstract":"Dictionary learning is an unsupervised learning method to abstract image data into a set of learned basis vectors. In prior work, the efficacy of the K-SVD dictionary learning algorithm in suppressing reverberation in volumetric photoacoustic microscopy (PAM) data was demonstrated. In this work, we compare the K-SVD algorithm against the method of optimal directions (MOD). The generalization error and reverberation suppression performance of the two algorithms were compared. The K-SVD was found to have a lower average generalization error (5.69x104 ±9.09x103 (a.u.)) when compared to the MOD (8.27x104 ±1.33x104 (a.u.)) for identical training data, initialization, sparsity (3 atoms per A-line) and number of iterations (5). Both algorithms were observed to suppress the reverberation to a similar extent (18.8 ± 1.12 dB for the K-SVD and 18.3 ± 1.2 dB for the MOD). Our data show that irrespective of the method used, sparse dictionary learning can significantly suppress reverberations in PAM.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Super-Resolution for Practical Automated Plant Disease Diagnosis System 实用植物病害自动诊断系统的超分辨率
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692855
Q. H. Cap, Hiroki Tani, H. Uga, S. Kagiwada, H. Iyatomi
Automated plant diagnosis using images taken from a distance is often insufficient in resolution and degrades diagnostic accuracy since the important external characteristics of symptoms are lost. In this paper, we first propose an effective preprocessing method for improving the performance of automated plant disease diagnosis systems using super-resolution techniques. We investigate the efficiency of two different super-resolution methods by comparing the disease diagnostic performance on the practical original high-resolution, low-resolution, and super-resolved cucumber images. Our method generates super-resolved images that look very close to natural images with 4 × upscaling factors and is capable of recovering the lost detailed symptoms, largely boosting the diagnostic performance. Our model improves the disease classification accuracy by 26.9% over the bicubic interpolation method of 65.6% and shows a small gap (3% lower) between the original result of 95.5%.
使用从远处拍摄的图像进行自动植物诊断通常分辨率不足,并且由于失去了症状的重要外部特征而降低了诊断准确性。在本文中,我们首先提出了一种有效的预处理方法,以提高使用超分辨率技术的植物病害自动诊断系统的性能。通过比较高分辨率、低分辨率和超分辨率黄瓜图像的疾病诊断性能,研究了两种不同的超分辨率方法的效率。我们的方法生成的超分辨率图像看起来非常接近自然图像,具有4倍的放大因子,并且能够恢复丢失的详细症状,大大提高了诊断性能。我们的模型在双三次插值法65.6%的基础上提高了26.9%的疾病分类准确率,与原始结果95.5%有很小的差距(降低了3%)。
{"title":"Super-Resolution for Practical Automated Plant Disease Diagnosis System","authors":"Q. H. Cap, Hiroki Tani, H. Uga, S. Kagiwada, H. Iyatomi","doi":"10.1109/CISS.2019.8692855","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692855","url":null,"abstract":"Automated plant diagnosis using images taken from a distance is often insufficient in resolution and degrades diagnostic accuracy since the important external characteristics of symptoms are lost. In this paper, we first propose an effective preprocessing method for improving the performance of automated plant disease diagnosis systems using super-resolution techniques. We investigate the efficiency of two different super-resolution methods by comparing the disease diagnostic performance on the practical original high-resolution, low-resolution, and super-resolved cucumber images. Our method generates super-resolved images that look very close to natural images with 4 × upscaling factors and is capable of recovering the lost detailed symptoms, largely boosting the diagnostic performance. Our model improves the disease classification accuracy by 26.9% over the bicubic interpolation method of 65.6% and shows a small gap (3% lower) between the original result of 95.5%.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm. 基于线性半径算法的高效蜂窝网络用户聚类。
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692919
H. B. Kassa, K. Kornegay, Ebrima N. Ceesay
This paper proposes an adaptive algorithm to maximize energy efficiency in cellular network considering a dynamic user clustering technique. First, a base station (BS) sleeping algorithm is designed, which minimizes the energy consumption to almost more than half. Then a Linear Radius User Clustering algorithm is modeled. Using feedback channel state information to the base station, the algorithm varies the mobile cell radius adaptively to minimize a total energy consumption of overall cellular network based on the threshold user density. The minimum distance where a Mobile Station can get a signal from the base station without a significant effect on human health can be located. Since the Base Station with modern scanner installed on its transmitter part can scan 390 times per second, the time scale to marginalize users from the coverage under threshold densities is in milliseconds. As a result, there is no significant effect on quality of services when the cell coverage is zoomed in/out periodically. Numerical results show that the proposed algorithm can considerably reduce energy consumption compared with the cases where a base station is always turned on with constant maximum transmit power.
本文提出了一种考虑动态用户聚类技术的蜂窝网络能量效率最大化的自适应算法。首先,设计了一种基站休眠算法,使能耗降至一半以上。然后建立了一种线性半径用户聚类算法。该算法利用反馈给基站的信道状态信息,根据阈值用户密度自适应地改变移动小区半径,使整个蜂窝网络的总能耗最小。可以确定移动站从基站获得信号而不会对人体健康产生重大影响的最小距离。由于在发射机部分安装了现代扫描仪的基站每秒可以扫描390次,因此在阈值密度下将用户从覆盖范围中边缘化的时间尺度以毫秒为单位。因此,当小区覆盖范围定期放大/缩小时,对服务质量没有显著影响。数值计算结果表明,与最大发射功率恒定的情况相比,该算法能显著降低能耗。
{"title":"Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm.","authors":"H. B. Kassa, K. Kornegay, Ebrima N. Ceesay","doi":"10.1109/CISS.2019.8692919","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692919","url":null,"abstract":"This paper proposes an adaptive algorithm to maximize energy efficiency in cellular network considering a dynamic user clustering technique. First, a base station (BS) sleeping algorithm is designed, which minimizes the energy consumption to almost more than half. Then a Linear Radius User Clustering algorithm is modeled. Using feedback channel state information to the base station, the algorithm varies the mobile cell radius adaptively to minimize a total energy consumption of overall cellular network based on the threshold user density. The minimum distance where a Mobile Station can get a signal from the base station without a significant effect on human health can be located. Since the Base Station with modern scanner installed on its transmitter part can scan 390 times per second, the time scale to marginalize users from the coverage under threshold densities is in milliseconds. As a result, there is no significant effect on quality of services when the cell coverage is zoomed in/out periodically. Numerical results show that the proposed algorithm can considerably reduce energy consumption compared with the cases where a base station is always turned on with constant maximum transmit power.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation 异构物联网网络中区块链的安全评估:特邀报告
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8693034
Jay Jemal, K. Kornegay
As Blockchain technology become more understood in recent years and its capability to solve enterprise business use cases become evident, technologist have been exploring Blockchain technology to solve use cases that have been daunting industries for years. Unlike existing technologies, one of the key features of blockchain technology is its unparalleled capability to provide, traceability, accountability and immutable records that can be accessed at any point in time. One application area of interest for blockchain is securing heterogenous networks. This paper explores the security challenges in a heterogonous network of IoT devices and whether blockchain can be a viable solution. Using an experimental approach, we explore the possibility of using blockchain technology to secure IoT devices, validate IoT device transactions, and establish a chain of trust to secure an IoT device mesh network, as well as investigate the plausibility of using immutable transactions for forensic analysis.
近年来,随着区块链技术越来越被人们所理解,其解决企业业务用例的能力也越来越明显,技术专家们一直在探索区块链技术来解决多年来一直让行业望而生畏的用例。与现有技术不同,区块链技术的关键特征之一是其无与伦比的可追溯性、可问责性和不可变记录的能力,这些记录可以在任何时间点访问。区块链感兴趣的一个应用领域是保护异构网络。本文探讨了物联网设备异构网络中的安全挑战,以及区块链是否可以成为可行的解决方案。通过实验方法,我们探索了使用区块链技术来保护物联网设备、验证物联网设备交易、建立信任链来保护物联网设备网状网络的可能性,并研究了使用不可变交易进行取证分析的可行性。
{"title":"Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation","authors":"Jay Jemal, K. Kornegay","doi":"10.1109/CISS.2019.8693034","DOIUrl":"https://doi.org/10.1109/CISS.2019.8693034","url":null,"abstract":"As Blockchain technology become more understood in recent years and its capability to solve enterprise business use cases become evident, technologist have been exploring Blockchain technology to solve use cases that have been daunting industries for years. Unlike existing technologies, one of the key features of blockchain technology is its unparalleled capability to provide, traceability, accountability and immutable records that can be accessed at any point in time. One application area of interest for blockchain is securing heterogenous networks. This paper explores the security challenges in a heterogonous network of IoT devices and whether blockchain can be a viable solution. Using an experimental approach, we explore the possibility of using blockchain technology to secure IoT devices, validate IoT device transactions, and establish a chain of trust to secure an IoT device mesh network, as well as investigate the plausibility of using immutable transactions for forensic analysis.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-dataset Low-rank Matrix Factorization 多数据集低秩矩阵分解
Pub Date : 2019-03-01 DOI: 10.1109/CISS.2019.8692932
Hossein Valavi, P. Ramadge
Low-rank matrix factorization can reveal fundamental structure in data. For example, joint-PCA on multi-datasets can find a joint, lower-dimensional representation of the data. Recently other similar matrix factorization methods have been introduced for multi-dataset analysis, e.g., the shared response model (SRM) and hyperalignment (HA). We provide a comparison of these methods with joint-PCA that highlights similarities and differences. Necessary and sufficient conditions under which the solution set to SRM and HA can be derived from the joint-PCA are identified. In particular, if there exists a common template and a set of generalized rotation matrices through which datasets can be exactly aligned to the template, then for any number of features, SRM and HA solutions can be readily derived from the joint-PCA of datasets. Not surprisingly, this assumption fails to hold for complex multi-datasets, e.g., multi-subject fMRI datasets. We show that if the desired conditions are not satisfied, joint-PCA can easily over-fit to the training data when the dimension of the projected space is high (~> 50). We also examine how well low-dimensional matrix factorization can be computed using gradient descent-type algorithms using Google’s TensorFlow library.
低秩矩阵分解可以揭示数据的基本结构。例如,多数据集上的联合pca可以找到数据的联合、低维表示。最近,其他类似的矩阵分解方法也被引入到多数据集分析中,例如共享响应模型(SRM)和超校准(HA)。我们提供了这些方法与联合pca的比较,突出了相似性和差异性。给出了由联合主成分分析得到SRM和HA解集的充分必要条件。特别是,如果存在一个通用模板和一组广义旋转矩阵,数据集可以通过该模板精确对齐,那么对于任意数量的特征,可以很容易地从数据集的联合主成分分析中导出SRM和HA解决方案。不足为奇的是,这一假设在复杂的多数据集(如多主体fMRI数据集)中不成立。我们发现,如果不满足期望条件,当投影空间的维数很高(~> 50)时,联合pca很容易过度拟合训练数据。我们还研究了使用谷歌的TensorFlow库使用梯度下降型算法计算低维矩阵分解的效果。
{"title":"Multi-dataset Low-rank Matrix Factorization","authors":"Hossein Valavi, P. Ramadge","doi":"10.1109/CISS.2019.8692932","DOIUrl":"https://doi.org/10.1109/CISS.2019.8692932","url":null,"abstract":"Low-rank matrix factorization can reveal fundamental structure in data. For example, joint-PCA on multi-datasets can find a joint, lower-dimensional representation of the data. Recently other similar matrix factorization methods have been introduced for multi-dataset analysis, e.g., the shared response model (SRM) and hyperalignment (HA). We provide a comparison of these methods with joint-PCA that highlights similarities and differences. Necessary and sufficient conditions under which the solution set to SRM and HA can be derived from the joint-PCA are identified. In particular, if there exists a common template and a set of generalized rotation matrices through which datasets can be exactly aligned to the template, then for any number of features, SRM and HA solutions can be readily derived from the joint-PCA of datasets. Not surprisingly, this assumption fails to hold for complex multi-datasets, e.g., multi-subject fMRI datasets. We show that if the desired conditions are not satisfied, joint-PCA can easily over-fit to the training data when the dimension of the projected space is high (~> 50). We also examine how well low-dimensional matrix factorization can be computed using gradient descent-type algorithms using Google’s TensorFlow library.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 53rd Annual Conference on Information Sciences and Systems (CISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1