首页 > 最新文献

2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)最新文献

英文 中文
IoT Sensor Data Consistency using Deep Learning 使用深度学习的物联网传感器数据一致性
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975955
I. Zualkernan, Nadeen Ahmed, A. Elmeligy, Adham Abdelnaby, Nouran Sheta
Sensor data consistency in Internet of Things (IoT) Applications is the problem of ensuring that large number of sensors in a system are providing mutually consistent values. Detection of data inconsistency can be used to detect unusual conditions like malicious intrusion and other anomalous situation. Machine learning-based anomaly detection approaches can be used to detect sensor data inconsistency. This paper studies the problem of sensor data consistency in the context of detecting hotspots in sensor data being generated in pairs of sensors embedded in a commercial IoT system deployed to monitor grain in large horizontal grain bins. The paper explores how well traditional anomaly detection machine learning algorithms like Location Factor, Isolation Forest, and One class support vector machine work in this environment. A memory efficient Long Short-Term Memory (LSTM) deep learning model was proposed that outperformed the traditional machine learning approaches.
物联网(IoT)应用中的传感器数据一致性是确保系统中大量传感器提供相互一致的值的问题。数据不一致检测可用于检测异常情况,如恶意入侵和其他异常情况。基于机器学习的异常检测方法可用于检测传感器数据不一致。本文研究了用于监测大型卧式粮仓粮食的商用物联网系统中嵌入的成对传感器产生的传感器数据热点检测背景下的传感器数据一致性问题。本文探讨了传统的异常检测机器学习算法,如定位因子、隔离森林和一类支持向量机在这种环境下的工作效果。提出了一种高效的长短期记忆深度学习模型,该模型优于传统的机器学习方法。
{"title":"IoT Sensor Data Consistency using Deep Learning","authors":"I. Zualkernan, Nadeen Ahmed, A. Elmeligy, Adham Abdelnaby, Nouran Sheta","doi":"10.1109/IoTaIS56727.2022.9975955","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975955","url":null,"abstract":"Sensor data consistency in Internet of Things (IoT) Applications is the problem of ensuring that large number of sensors in a system are providing mutually consistent values. Detection of data inconsistency can be used to detect unusual conditions like malicious intrusion and other anomalous situation. Machine learning-based anomaly detection approaches can be used to detect sensor data inconsistency. This paper studies the problem of sensor data consistency in the context of detecting hotspots in sensor data being generated in pairs of sensors embedded in a commercial IoT system deployed to monitor grain in large horizontal grain bins. The paper explores how well traditional anomaly detection machine learning algorithms like Location Factor, Isolation Forest, and One class support vector machine work in this environment. A memory efficient Long Short-Term Memory (LSTM) deep learning model was proposed that outperformed the traditional machine learning approaches.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123439666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Text-To-Speech Quality using Brain Activity 利用大脑活动预测文本到语音的质量
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975857
Rhenaldy, Ladysa Stella Karenza, Ivan Halim Parmonangan, F. Kurniadi
The perceived audio quality is one of the key factors that may determine a text-to-speech system’s success in the market. Therefore, it is important to conduct audio quality evaluation before releasing such system into the market. Evaluating the synthesized audio quality is usually done either subjectively or objectively with their own advantages and disadvantages. Subjective methods usually require a large amount of time and resources, while objective methods lack human influence factors, which are crucial for deriving the subjective perception of quality. These human influence factors are manifested inside an individual’s brain in forms such as electroencephalograph (EEG). Thus, in this study, we performed audio quality prediction using EEG data. Since the data used in this study is small, we also compared the prediction result of the augmented and the non-augmented data. Our result shows that certain method yield significantly better prediction with augmented training data.
感知到的音频质量是决定文本转语音系统在市场上是否成功的关键因素之一。因此,在将该系统投放市场之前进行音质评估是非常重要的。对合成音质的评价通常有主观上和客观上的两种,各有优缺点。主观方法通常需要大量的时间和资源,而客观方法缺乏人为的影响因素,而这些因素对于获得主观的质量感知至关重要。这些人为影响因素以脑电图(EEG)等形式在个体大脑中表现出来。因此,在本研究中,我们使用EEG数据进行音频质量预测。由于本研究使用的数据较少,我们还比较了增广数据和非增广数据的预测结果。我们的结果表明,某些方法对增强训练数据的预测效果明显更好。
{"title":"Predicting Text-To-Speech Quality using Brain Activity","authors":"Rhenaldy, Ladysa Stella Karenza, Ivan Halim Parmonangan, F. Kurniadi","doi":"10.1109/IoTaIS56727.2022.9975857","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975857","url":null,"abstract":"The perceived audio quality is one of the key factors that may determine a text-to-speech system’s success in the market. Therefore, it is important to conduct audio quality evaluation before releasing such system into the market. Evaluating the synthesized audio quality is usually done either subjectively or objectively with their own advantages and disadvantages. Subjective methods usually require a large amount of time and resources, while objective methods lack human influence factors, which are crucial for deriving the subjective perception of quality. These human influence factors are manifested inside an individual’s brain in forms such as electroencephalograph (EEG). Thus, in this study, we performed audio quality prediction using EEG data. Since the data used in this study is small, we also compared the prediction result of the augmented and the non-augmented data. Our result shows that certain method yield significantly better prediction with augmented training data.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video-Based Real-Time Heart Rate Detection for Drivers Inside the Cabin Using a Smartphone 基于视频的实时心率检测,用于驾驶舱内的智能手机
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975941
Walaa Othman, A. Kashevnik
Developing vehicles with the Internet of Thing technology including driver health monitoring systems, driver safety systems, and accident prevention has drawn the attention of researchers in the last few years. The monitoring system should prevent any dangerous situation and be comfortable for the driver inside the cabin. In this paper, we introduce a remote video-based method for detecting the heart rate in real-time using smartphone cameras, which can be used for the analysis of the driver’s physiological parameters to enhance driving safety. We propose to use 3DDFA for automatic facial landmarks detection to extract the driver’s face and a 3d-classification-based model for detecting the heart rate. The experiments showed good results with mean absolute error (MAE) equal to 6.8 on the LGI-PPGI dataset and 18.68 on our DriverMVT dataset that was recorded in the wild.
利用物联网技术开发车辆,包括驾驶员健康监测系统、驾驶员安全系统和事故预防系统,在过去几年引起了研究人员的关注。监控系统应防止任何危险情况,并使驾驶员在车内感到舒适。本文介绍了一种基于智能手机摄像头的远程视频实时心率检测方法,该方法可用于分析驾驶员的生理参数,以提高驾驶安全性。我们建议使用3DDFA进行自动面部地标检测来提取驾驶员的面部,并使用基于3d分类的模型来检测心率。实验结果表明,LGI-PPGI数据集的平均绝对误差(MAE)为6.8,我们的DriverMVT数据集的平均绝对误差为18.68。
{"title":"Video-Based Real-Time Heart Rate Detection for Drivers Inside the Cabin Using a Smartphone","authors":"Walaa Othman, A. Kashevnik","doi":"10.1109/IoTaIS56727.2022.9975941","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975941","url":null,"abstract":"Developing vehicles with the Internet of Thing technology including driver health monitoring systems, driver safety systems, and accident prevention has drawn the attention of researchers in the last few years. The monitoring system should prevent any dangerous situation and be comfortable for the driver inside the cabin. In this paper, we introduce a remote video-based method for detecting the heart rate in real-time using smartphone cameras, which can be used for the analysis of the driver’s physiological parameters to enhance driving safety. We propose to use 3DDFA for automatic facial landmarks detection to extract the driver’s face and a 3d-classification-based model for detecting the heart rate. The experiments showed good results with mean absolute error (MAE) equal to 6.8 on the LGI-PPGI dataset and 18.68 on our DriverMVT dataset that was recorded in the wild.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of PHY/MAC Cross-Layer Design for Next-Generation V2X Applications 面向下一代V2X应用的PHY/MAC跨层设计性能研究
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975999
Andy Triwinarko, S. Cherkaoui, I. Dayoub
This paper proposed the use of physical (PHY) and medium access control (MAC) cross-layer approach to obtain two goals outlined by the next-generation V2X (NGV) ’s project authorisation request (PAR) of IEEE 802.11bd group, namely having twice the MAC layer throughput and able to operate in a high mobility scenario of up to 500 km/h. At the PHY layer, we suggested utilising mid-ambles channel estimation (MCE), dual-carrier modulation (DCM), and multiple-input multiple-output space-time block coding (MIMO-STBC). At the MAC layer, we suggested an aggregate MAC protocol data unit (A-MPDU) aggregation technique, choosing an appropriate contention window (CW) value, and setting a limit for re-transmissions. We designed a model utilising a cross-layer approach then we simulated the performance of normalised system throughput for two types of V2X applications, namely safety-related (high reliability) and non-safety (high throughput) V2X applications. To better portray the high-mobility scenario, we used the enhanced highway line of sight (LOS) channel model. Our simulation results showed two times normalized throughput performance improvement for both V2X applications in a high mobility environment, as requested by the NGV standard’s PAR.
本文提出使用物理(PHY)和介质访问控制(MAC)跨层方法来实现IEEE 802.11bd组下一代V2X (NGV)项目授权请求(PAR)概述的两个目标,即具有两倍的MAC层吞吐量并能够在高达500 km/h的高移动性场景中运行。在物理层,我们建议使用中间信道估计(MCE)、双载波调制(DCM)和多输入多输出空时分组编码(MIMO-STBC)。在MAC层,我们提出了聚合MAC协议数据单元(a - mpdu)聚合技术,选择适当的争用窗口(CW)值,并设置重传限制。我们利用跨层方法设计了一个模型,然后我们模拟了两种类型V2X应用的标准化系统吞吐量的性能,即安全相关(高可靠性)和非安全(高吞吐量)V2X应用。为了更好地描述高机动性场景,我们使用了增强型公路视线(LOS)通道模型。我们的模拟结果显示,在高移动性环境中,两种V2X应用程序的标准化吞吐量性能提高了两倍,符合NGV标准PAR的要求。
{"title":"Performance of PHY/MAC Cross-Layer Design for Next-Generation V2X Applications","authors":"Andy Triwinarko, S. Cherkaoui, I. Dayoub","doi":"10.1109/IoTaIS56727.2022.9975999","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975999","url":null,"abstract":"This paper proposed the use of physical (PHY) and medium access control (MAC) cross-layer approach to obtain two goals outlined by the next-generation V2X (NGV) ’s project authorisation request (PAR) of IEEE 802.11bd group, namely having twice the MAC layer throughput and able to operate in a high mobility scenario of up to 500 km/h. At the PHY layer, we suggested utilising mid-ambles channel estimation (MCE), dual-carrier modulation (DCM), and multiple-input multiple-output space-time block coding (MIMO-STBC). At the MAC layer, we suggested an aggregate MAC protocol data unit (A-MPDU) aggregation technique, choosing an appropriate contention window (CW) value, and setting a limit for re-transmissions. We designed a model utilising a cross-layer approach then we simulated the performance of normalised system throughput for two types of V2X applications, namely safety-related (high reliability) and non-safety (high throughput) V2X applications. To better portray the high-mobility scenario, we used the enhanced highway line of sight (LOS) channel model. Our simulation results showed two times normalized throughput performance improvement for both V2X applications in a high mobility environment, as requested by the NGV standard’s PAR.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selecting Resource-Efficient ML Models for Transport Mode Detection on Mobile Devices 为移动设备上的传输模式检测选择资源高效的ML模型
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9976004
Philipp Matthes, T. Springer
Processing data closer to the source to minimize latency and the amount of data to be transmitted is a major driver for research on the Internet of Things (IoT). Since data processing in many IoT scenarios heavily depends on machine learning (ML), designing ML models for resource constraint devices at the edge of IoT infrastructures is one of the big challenges. Which ML model performs best highly depends on the problem domain but also on the availability of resources. Thus, to find an appropriate ML model in the broad search space of options, the trade-off between accuracy and resource consumption in terms of memory, CPU, and energy needs to be considered. However, there are ML problems where most current research focuses on accuracy, and the resource consumption of applicable models is not well investigated yet. We show that transport mode detection (TMD) is such a problem and present a case study for designing an ML model running on smartphones. To transform the search for the needle in the haystack into a structured design process, we propose an engineering workflow to systematically evolve ML model candidates, considering portability and resource consumption in addition to model accuracy. At the example of the Sussex-Huawei-Locomotion (SHL) dataset, we apply this process to multiple ML architectures and find a suitable model that convinces with high accuracy and low measured resource consumption for smartphone deployment. We discuss lessons learned, enabling engineers and researchers to use our workflow as a blueprint to identify solutions for their ML problems systematically.
在离源更近的地方处理数据,以最大限度地减少延迟和要传输的数据量,这是物联网(IoT)研究的主要推动力。由于许多物联网场景中的数据处理严重依赖于机器学习(ML),因此为物联网基础设施边缘的资源约束设备设计ML模型是一大挑战。哪个ML模型表现最好高度依赖于问题领域,但也依赖于资源的可用性。因此,要在广泛的选项搜索空间中找到合适的ML模型,需要考虑在内存、CPU和能源方面的准确性和资源消耗之间的权衡。然而,目前大多数研究都集中在准确性上,并且尚未很好地研究适用模型的资源消耗。我们展示了传输模式检测(TMD)就是这样一个问题,并提出了一个在智能手机上设计ML模型的案例研究。为了将大海捞针的搜索转变为结构化的设计过程,我们提出了一个工程工作流来系统地发展ML候选模型,除了模型准确性外,还考虑了可移植性和资源消耗。以Sussex-Huawei-Locomotion (SHL)数据集为例,我们将此过程应用于多个机器学习架构,并找到适合智能手机部署的高精度和低测量资源消耗的模型。我们讨论了经验教训,使工程师和研究人员能够使用我们的工作流程作为蓝图,系统地确定他们的机器学习问题的解决方案。
{"title":"Selecting Resource-Efficient ML Models for Transport Mode Detection on Mobile Devices","authors":"Philipp Matthes, T. Springer","doi":"10.1109/IoTaIS56727.2022.9976004","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9976004","url":null,"abstract":"Processing data closer to the source to minimize latency and the amount of data to be transmitted is a major driver for research on the Internet of Things (IoT). Since data processing in many IoT scenarios heavily depends on machine learning (ML), designing ML models for resource constraint devices at the edge of IoT infrastructures is one of the big challenges. Which ML model performs best highly depends on the problem domain but also on the availability of resources. Thus, to find an appropriate ML model in the broad search space of options, the trade-off between accuracy and resource consumption in terms of memory, CPU, and energy needs to be considered. However, there are ML problems where most current research focuses on accuracy, and the resource consumption of applicable models is not well investigated yet. We show that transport mode detection (TMD) is such a problem and present a case study for designing an ML model running on smartphones. To transform the search for the needle in the haystack into a structured design process, we propose an engineering workflow to systematically evolve ML model candidates, considering portability and resource consumption in addition to model accuracy. At the example of the Sussex-Huawei-Locomotion (SHL) dataset, we apply this process to multiple ML architectures and find a suitable model that convinces with high accuracy and low measured resource consumption for smartphone deployment. We discuss lessons learned, enabling engineers and researchers to use our workflow as a blueprint to identify solutions for their ML problems systematically.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A proposal on the control mechanism among distributed MQTT brokers over wide area networks 广域网上分布式MQTT代理间控制机制的一种建议
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9976024
Yuto Noda, K. Ishibashi, T. Yokotani
MQTT for IoT communication requires the deployment of multiple brokers to aggregate traffic from localized areas. However, the routing mechanisms among these brokers in a large-scale environment have yet to be specified. In this paper, a routing suitable for up-scaling based on the distribute MQTT broker by data link look up for traffic reduction (DMLT) is proposed. In this study, several up-scaling methods are proposed and compared in terms of traffic volume, scalability, and resilience. As a result, we chose an improved version of DMLT. A prototype of a wide-area DMLT system was constructed and verified by combining the DMLT method with an approach that the authors judged to be the most suitable for large-scale deployment.
用于物联网通信的MQTT需要部署多个代理来聚合来自局部区域的流量。然而,在大规模环境中,这些代理之间的路由机制还没有被指定。本文提出了一种基于分布式MQTT代理的基于数据链路查找流量减少(DMLT)的适合扩展的路由。在本研究中,提出了几种扩展方法,并在流量、可扩展性和弹性方面进行了比较。因此,我们选择了DMLT的改进版本。通过将DMLT方法与作者认为最适合大规模部署的方法相结合,构建了广域DMLT系统的原型并进行了验证。
{"title":"A proposal on the control mechanism among distributed MQTT brokers over wide area networks","authors":"Yuto Noda, K. Ishibashi, T. Yokotani","doi":"10.1109/IoTaIS56727.2022.9976024","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9976024","url":null,"abstract":"MQTT for IoT communication requires the deployment of multiple brokers to aggregate traffic from localized areas. However, the routing mechanisms among these brokers in a large-scale environment have yet to be specified. In this paper, a routing suitable for up-scaling based on the distribute MQTT broker by data link look up for traffic reduction (DMLT) is proposed. In this study, several up-scaling methods are proposed and compared in terms of traffic volume, scalability, and resilience. As a result, we chose an improved version of DMLT. A prototype of a wide-area DMLT system was constructed and verified by combining the DMLT method with an approach that the authors judged to be the most suitable for large-scale deployment.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis Forwarding Strategies Based Sdn-Ndn 基于Sdn-Ndn的转发策略性能分析
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9976003
D. Pratama, L. V. Yovita, S. N. Hertiana
The integration of Software Defined Network (SDN) with Named Data Network (NDN) has the advantage of being able to save the time needed by consumers when receiving data. And the sender’s data was the producer, which is not known by the consumer. The integration of SDN and NDN can be developed to save resources in each company or in the field of education. Also, with SDN-NDN is a new architecture to make IP network integration with NDN.In this study, the author performed a performance analysis using the SDN-NDN based Best Route, Multicast, and Access Forwarding Strategy to measure Round Trip Time, Throughput, CPU Usage, and Memory Usage on the number of data packets sent. Based on the results obtained in this study, SDN-NDN has good performance compared to NDN during round trip time and throughput. But SDN-NDN uses more CPU and memory usage than NDN. Based on the implementation of the forwarding strategy, the Access Router strategy has a higher throughput and more round trip time than the Best-Route and Multicast forwarding strategies.
软件定义网络(SDN)与命名数据网络(NDN)的集成具有能够节省用户接收数据所需的时间的优点。而发送者的数据是生产者,这是消费者不知道的。可以开发SDN和NDN的集成,以节省每个公司或教育领域的资源。SDN-NDN是实现IP网络与NDN融合的一种新架构。在本研究中,作者使用基于SDN-NDN的最佳路由、组播和访问转发策略进行了性能分析,以测量发送的数据包数量的往返时间、吞吐量、CPU使用率和内存使用率。从本研究得到的结果来看,SDN-NDN在往返时间和吞吐量方面都比NDN有更好的性能。但是SDN-NDN比NDN使用更多的CPU和内存。基于转发策略的实现,Access Router策略比Best-Route和Multicast转发策略具有更高的吞吐量和更长的往返时间。
{"title":"Performance Analysis Forwarding Strategies Based Sdn-Ndn","authors":"D. Pratama, L. V. Yovita, S. N. Hertiana","doi":"10.1109/IoTaIS56727.2022.9976003","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9976003","url":null,"abstract":"The integration of Software Defined Network (SDN) with Named Data Network (NDN) has the advantage of being able to save the time needed by consumers when receiving data. And the sender’s data was the producer, which is not known by the consumer. The integration of SDN and NDN can be developed to save resources in each company or in the field of education. Also, with SDN-NDN is a new architecture to make IP network integration with NDN.In this study, the author performed a performance analysis using the SDN-NDN based Best Route, Multicast, and Access Forwarding Strategy to measure Round Trip Time, Throughput, CPU Usage, and Memory Usage on the number of data packets sent. Based on the results obtained in this study, SDN-NDN has good performance compared to NDN during round trip time and throughput. But SDN-NDN uses more CPU and memory usage than NDN. Based on the implementation of the forwarding strategy, the Access Router strategy has a higher throughput and more round trip time than the Best-Route and Multicast forwarding strategies.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT-based Experimental Aquarium Environment for Observing Crabs 基于物联网的实验水族螃蟹观察环境
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975886
Sota Nakajima, Daiki Sumiya, M. Morii, Nobuaki Mizutani, Akitsugu Shimano, M. Niswar, Shigeru Kashihara
There is a need to promote smart aquaculture using information science technologies such as ICT, IoT, and AI. Currently, smart aquaculture has been started in many species, such as oysters, mackerels, and shrimps. It is trying to improve work efficiency and secure appropriate production volume by converting what has been done by experienced and intuition into data. The paper focuses on crabs, especially Scylla Serrata, known as mud crab. Note that they have not yet been fully cultivated. To contribute to achieving the intelligent cultivation of these species, we first constructed an IoT-based experimental aquarium environment that can observe the ecology of these species on a laboratory scale. The sensing data and moving images acquired in the environment are displayed on the Web and can be easily checked remotely. The paper also introduces valuable examples through the operation and summarizes the future issues.
有必要利用信息通信技术、物联网和人工智能等信息科学技术促进智能水产养殖。目前,智能水产养殖已经开始在许多物种,如牡蛎,鲭鱼和虾。它试图通过将经验和直觉所做的事情转化为数据来提高工作效率并确保适当的产量。本文的重点是螃蟹,特别是Scylla Serrata,被称为泥蟹。请注意,它们还没有完全培育出来。为了实现这些物种的智能养殖,我们首先构建了一个基于物联网的实验水族环境,可以在实验室规模上观察这些物种的生态。在环境中获取的传感数据和运动图像显示在Web上,可以方便地远程查看。通过实际操作,介绍了有价值的实例,并对今后需要解决的问题进行了总结。
{"title":"IoT-based Experimental Aquarium Environment for Observing Crabs","authors":"Sota Nakajima, Daiki Sumiya, M. Morii, Nobuaki Mizutani, Akitsugu Shimano, M. Niswar, Shigeru Kashihara","doi":"10.1109/IoTaIS56727.2022.9975886","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975886","url":null,"abstract":"There is a need to promote smart aquaculture using information science technologies such as ICT, IoT, and AI. Currently, smart aquaculture has been started in many species, such as oysters, mackerels, and shrimps. It is trying to improve work efficiency and secure appropriate production volume by converting what has been done by experienced and intuition into data. The paper focuses on crabs, especially Scylla Serrata, known as mud crab. Note that they have not yet been fully cultivated. To contribute to achieving the intelligent cultivation of these species, we first constructed an IoT-based experimental aquarium environment that can observe the ecology of these species on a laboratory scale. The sensing data and moving images acquired in the environment are displayed on the Web and can be easily checked remotely. The paper also introduces valuable examples through the operation and summarizes the future issues.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Feature Detection Through Thermal Imaging: An Extension of PiBase 通过热成像验证特征检测:PiBase的扩展
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975939
Anthony Atkinson, Venkat Margapuri, Michael L. Neilsen
PiBase is a low-cost, Internet-of-Things-capable security systems. It offers users an integrated system of hardware and software in the form of a basic smart camera made from a Raspberry Pi and off-the-shelf parts, an Android app, and a backend built for Google Firebase. Using Haar-feature cascade classifiers and Linear Binary Pattern Histograms, it attempts to provide comprehensive detection and recognition of potential security threats. Being only a prototype there are some vulnerabilities in the initial design. This new design addresses one security threat, namely the possibility of mimicking an authorized user’s appearance. This is achieved through the integration of thermal imaging alongside the original camera used in the system. Some challenges with this approach include maintaining low-cost and part accessibility, working within limitations of the hardware, and choosing an effective method of integration. The proposed solution addresses each of these, in addition to the original issue, by transforming the output of a low-resolution thermal sensor array into a kind of clipping-mask to filter out non-human objects from the input image before performing its other operations.
PiBase是一款低成本、具有物联网功能的安全系统。它为用户提供了一个硬件和软件的集成系统,包括一个由树莓派和现成部件制成的基本智能摄像头、一个安卓应用程序和一个为谷歌Firebase构建的后端。使用haar特征级联分类器和线性二进制模式直方图,它试图提供对潜在安全威胁的全面检测和识别。作为一个原型,在初始设计中存在一些漏洞。这种新设计解决了一个安全威胁,即模仿授权用户外观的可能性。这是通过将热成像与系统中使用的原始相机集成来实现的。这种方法的一些挑战包括保持低成本和部件可及性,在硬件的限制下工作,以及选择有效的集成方法。除了原始问题之外,提出的解决方案还解决了这些问题,通过将低分辨率热传感器阵列的输出转换为一种剪切掩模,在执行其他操作之前从输入图像中滤除非人类物体。
{"title":"Verification of Feature Detection Through Thermal Imaging: An Extension of PiBase","authors":"Anthony Atkinson, Venkat Margapuri, Michael L. Neilsen","doi":"10.1109/IoTaIS56727.2022.9975939","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975939","url":null,"abstract":"PiBase is a low-cost, Internet-of-Things-capable security systems. It offers users an integrated system of hardware and software in the form of a basic smart camera made from a Raspberry Pi and off-the-shelf parts, an Android app, and a backend built for Google Firebase. Using Haar-feature cascade classifiers and Linear Binary Pattern Histograms, it attempts to provide comprehensive detection and recognition of potential security threats. Being only a prototype there are some vulnerabilities in the initial design. This new design addresses one security threat, namely the possibility of mimicking an authorized user’s appearance. This is achieved through the integration of thermal imaging alongside the original camera used in the system. Some challenges with this approach include maintaining low-cost and part accessibility, working within limitations of the hardware, and choosing an effective method of integration. The proposed solution addresses each of these, in addition to the original issue, by transforming the output of a low-resolution thermal sensor array into a kind of clipping-mask to filter out non-human objects from the input image before performing its other operations.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Adaptive Cybersecurity for Green IoT
Pub Date : 2022-11-24 DOI: 10.1109/IoTaIS56727.2022.9975990
Talal Halabi, Martine Bellaïche, B. Fung
The Internet of Things (IoT) paradigm has led to an explosion in the number of IoT devices and an exponential rise in carbon footprint incurred by overburdened IoT networks and pervasive cloud/edge communications. Hence, there is a growing interest in industry and academia to enable the efficient use of computing infrastructures by optimizing the management of data center and IoT resources (hardware, software, network, and data) and reducing operational costs to slash greenhouse gas emissions and create healthy environments. Cybersecurity has also been considered in such efforts as a contributor to these environmental issues. Nonetheless, most green security approaches focus on designing low-overhead encryption schemes and do not emphasize energy-efficient security from architectural and deployment viewpoints. This paper sheds light on the emerging paradigm of adaptive cybersecurity as one of the research directions to support sustainable computing in green IoT. It presents three potential research directions and their associated methods for designing and deploying adaptive security in green computing and resource-constrained IoT environments to save on energy consumption. Such efforts will transform the development of data-driven IoT security solutions to be greener and more environment-friendly.
物联网(IoT)范式导致了物联网设备数量的爆炸式增长,以及负担过重的物联网网络和无处不在的云/边缘通信导致的碳足迹呈指数级增长。因此,工业界和学术界越来越有兴趣通过优化数据中心和物联网资源(硬件、软件、网络和数据)的管理以及降低运营成本来减少温室气体排放和创造健康的环境,从而有效利用计算基础设施。在这些努力中,网络安全也被认为是造成这些环境问题的一个因素。尽管如此,大多数绿色安全方法侧重于设计低开销的加密方案,而不是从体系结构和部署的角度强调节能安全性。本文阐明了自适应网络安全作为支持绿色物联网可持续计算的研究方向之一的新兴范式。提出了在绿色计算和资源受限的物联网环境中设计和部署自适应安全以节省能源消耗的三个潜在研究方向及其相关方法。这些努力将使数据驱动的物联网安全解决方案的发展变得更绿色、更环保。
{"title":"Towards Adaptive Cybersecurity for Green IoT","authors":"Talal Halabi, Martine Bellaïche, B. Fung","doi":"10.1109/IoTaIS56727.2022.9975990","DOIUrl":"https://doi.org/10.1109/IoTaIS56727.2022.9975990","url":null,"abstract":"The Internet of Things (IoT) paradigm has led to an explosion in the number of IoT devices and an exponential rise in carbon footprint incurred by overburdened IoT networks and pervasive cloud/edge communications. Hence, there is a growing interest in industry and academia to enable the efficient use of computing infrastructures by optimizing the management of data center and IoT resources (hardware, software, network, and data) and reducing operational costs to slash greenhouse gas emissions and create healthy environments. Cybersecurity has also been considered in such efforts as a contributor to these environmental issues. Nonetheless, most green security approaches focus on designing low-overhead encryption schemes and do not emphasize energy-efficient security from architectural and deployment viewpoints. This paper sheds light on the emerging paradigm of adaptive cybersecurity as one of the research directions to support sustainable computing in green IoT. It presents three potential research directions and their associated methods for designing and deploying adaptive security in green computing and resource-constrained IoT environments to save on energy consumption. Such efforts will transform the development of data-driven IoT security solutions to be greener and more environment-friendly.","PeriodicalId":138894,"journal":{"name":"2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125844111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1