首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs 基于宽带的多路径路由协议QoS增强机制
R. Zaghal, Saeed Salah, M. Ismail
Mobile Ad-hoc Networks (MANETs) usually suffer from high packet loss and high link failure rates. These challenges usually increase congestion on some links while other links are almost free. In this paper, we propose a novel mechanism to enhance QoS in multipath routing protocols in MANETs based on the InfiniBand (IB) QoS architecture. The basic idea of our approach is to enhance the load balancing and thus reduce congestion on overloaded links. This mechanism has enabled us to (1) give critical applications higher priority when routing their packets across the network, (2) effectively manage frequent connections and disconnections and thus reduce link failures and packet loss rates, and (3) reduce the overall power consumption as a consequence of the previous gains. We have tested the scheme on the (IBsim) simulator and achieved significant improvements in QoS parameters compared to two well- known routing protocols: AODV and AOMDV.
移动自组网(manet)存在丢包率高、链路故障率高的问题。这些挑战通常会增加某些链路的拥塞,而其他链路几乎是免费的。在本文中,我们提出了一种基于InfiniBand (IB) QoS架构的新型机制来增强manet中多路径路由协议的QoS。我们的方法的基本思想是增强负载平衡,从而减少超载链路上的拥塞。这种机制使我们能够(1)在通过网络路由数据包时为关键应用程序提供更高的优先级,(2)有效地管理频繁的连接和断开,从而减少链路故障和数据包丢包率,以及(3)由于先前的收益而降低总体功耗。我们已经在IBsim模拟器上对该方案进行了测试,与两种著名的路由协议AODV和AOMDV相比,该方案在QoS参数方面取得了显著的改进。
{"title":"An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs","authors":"R. Zaghal, Saeed Salah, M. Ismail","doi":"10.1109/NTMS.2018.8328681","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328681","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) usually suffer from high packet loss and high link failure rates. These challenges usually increase congestion on some links while other links are almost free. In this paper, we propose a novel mechanism to enhance QoS in multipath routing protocols in MANETs based on the InfiniBand (IB) QoS architecture. The basic idea of our approach is to enhance the load balancing and thus reduce congestion on overloaded links. This mechanism has enabled us to (1) give critical applications higher priority when routing their packets across the network, (2) effectively manage frequent connections and disconnections and thus reduce link failures and packet loss rates, and (3) reduce the overall power consumption as a consequence of the previous gains. We have tested the scheme on the (IBsim) simulator and achieved significant improvements in QoS parameters compared to two well- known routing protocols: AODV and AOMDV.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security 基于MapReduce的Top-k排序网络用户配置文件构建方法
A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes
Network-user profiling has been used as security technique to detect unknown or malicious behaviors. Top-k rankings of reached services is a new technique for building user profiles. This technique requires to keep in memory all the traffic data during a period of time to build the rankings. However, a single user can produce gigabytes of network traffic data, which may result in low execution performance and out-of memory errors. This work proposes a MapReduce approach that generates top-k rankings from huge network capture files.
网络用户分析已被用作检测未知或恶意行为的安全技术。对到达的服务进行Top-k排名是一种建立用户档案的新技术。这种技术需要在一段时间内将所有流量数据保存在内存中以构建排名。但是,单个用户可能产生千兆字节的网络流量数据,这可能导致低执行性能和内存不足错误。这项工作提出了一种MapReduce方法,可以从巨大的网络捕获文件中生成top-k排名。
{"title":"MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security","authors":"A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes","doi":"10.1109/NTMS.2018.8328702","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328702","url":null,"abstract":"Network-user profiling has been used as security technique to detect unknown or malicious behaviors. Top-k rankings of reached services is a new technique for building user profiles. This technique requires to keep in memory all the traffic data during a period of time to build the rankings. However, a single user can produce gigabytes of network traffic data, which may result in low execution performance and out-of memory errors. This work proposes a MapReduce approach that generates top-k rankings from huge network capture files.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phone Application for Indoor Localization Based on Ble Signal Fingerprint 基于Ble信号指纹的室内定位手机应用
B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák
Indoor position of devices and persons is a very valuable information for context-aware devices and human activity recognition. The need of such information grows bigger by the advancement of IoT technologies. In this paper, we discuss existing indoor positioning approaches and their applications, give specific interest to the signal strength fingerprint approaches, to which belongs the presented paper. Bluetooth Low Energy Beacons are used as the source of the signal, and the Radial Basis Functions method is employed to create a model that relates to signal strength and position. The proposed approach allows the possibility of making all the computation on a smartphone application, namely, offline data collection and model computation, and online position estimation. Besides, it allows updating the model later.
设备和人员的室内位置是环境感知设备和人类活动识别中非常有价值的信息。随着物联网技术的进步,对这些信息的需求越来越大。本文讨论了现有的室内定位方法及其应用,重点介绍了本文研究的信号强度指纹定位方法。采用Bluetooth Low Energy Beacons作为信号源,采用径向基函数(Radial Basis Functions)方法建立与信号强度和位置相关的模型。该方法允许在智能手机应用程序上进行所有计算,即离线数据收集和模型计算以及在线位置估计。此外,它允许稍后更新模型。
{"title":"Phone Application for Indoor Localization Based on Ble Signal Fingerprint","authors":"B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák","doi":"10.1109/NTMS.2018.8328729","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328729","url":null,"abstract":"Indoor position of devices and persons is a very valuable information for context-aware devices and human activity recognition. The need of such information grows bigger by the advancement of IoT technologies. In this paper, we discuss existing indoor positioning approaches and their applications, give specific interest to the signal strength fingerprint approaches, to which belongs the presented paper. Bluetooth Low Energy Beacons are used as the source of the signal, and the Radial Basis Functions method is employed to create a model that relates to signal strength and position. The proposed approach allows the possibility of making all the computation on a smartphone application, namely, offline data collection and model computation, and online position estimation. Besides, it allows updating the model later.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game 智能电网中的需求侧管理:一个Stackelberg多周期多供应商博弈
Hala Alsalloum, A. Masri, L. Merghem, Rana Rahim
In the smart grid context, with the growth of the energy demand, Demand Side Management (DSM) is a good solution to balance the power consumption and the power generation. Its main goal is to satisfy the two essential actors: the providers and the consumers, in order to improve the reliability and the efficiency of the smart grid. With the integration of renewable energies, the number of providers increases leading to introducing many challenges in the load control. In this paper, we propose a novel real time pricing algorithm based on Stackelberg game. It defines the consumers' energy consumption and the providers' price by taking advantages of the bidirectional communication infrastructure in such way to minimize the consumers' bills and maximize the providers' profit; these two concepts become nowadays a portfolio to work on. In this game, different active consumers (i.e. prosumers) negotiate with different energy providers. The performance of our algorithm is proved through extensive simulations. The coherence between the prices/demands deal is shown with two scenarios compared to the literature.
在智能电网背景下,随着能源需求的增长,需求侧管理(DSM)是平衡电力消耗和发电的一个很好的解决方案。它的主要目标是满足两个基本参与者:供应商和消费者,以提高智能电网的可靠性和效率。随着可再生能源的整合,供应商数量的增加,给负荷控制带来了许多挑战。本文提出了一种基于Stackelberg博弈的实时定价算法。利用双向通信基础设施,确定消费者的能源消耗和供应商的价格,从而使消费者的账单最小化,供应商的利润最大化;这两个概念现在成为一个工作组合。在这个博弈中,不同的活跃消费者(即产消者)与不同的能源供应商进行谈判。通过大量的仿真验证了算法的性能。与文献相比,价格/需求交易之间的一致性用两种情景来显示。
{"title":"Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game","authors":"Hala Alsalloum, A. Masri, L. Merghem, Rana Rahim","doi":"10.1109/NTMS.2018.8328687","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328687","url":null,"abstract":"In the smart grid context, with the growth of the energy demand, Demand Side Management (DSM) is a good solution to balance the power consumption and the power generation. Its main goal is to satisfy the two essential actors: the providers and the consumers, in order to improve the reliability and the efficiency of the smart grid. With the integration of renewable energies, the number of providers increases leading to introducing many challenges in the load control. In this paper, we propose a novel real time pricing algorithm based on Stackelberg game. It defines the consumers' energy consumption and the providers' price by taking advantages of the bidirectional communication infrastructure in such way to minimize the consumers' bills and maximize the providers' profit; these two concepts become nowadays a portfolio to work on. In this game, different active consumers (i.e. prosumers) negotiate with different energy providers. The performance of our algorithm is proved through extensive simulations. The coherence between the prices/demands deal is shown with two scenarios compared to the literature.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS 基于区块链的高效分布式许可与撤销合作ITS
Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia
Cooperative Intelligent Transportation System (C- ITS) enables inter-networking of vehicles for alerts exchanging in order to improve road safety. While this technology is about to enter the market in the upcoming years, critical questions related to the communication security continue to be challenging research concerns. Current solutions to secure inter-vehicle communication depend mainly on the use of digital certificates for authentication. However, such an approach imposes significant overhead on vehicles since it is computationally demanding and requires validation of the certificate within a limited period. In addition, relying on a central node for deciding on issuing and revoking certificates introduces a single point of failure and could even risk the safety of motorists. In this paper, we propose the use of Blockchain to keep track of the certificate of each vehicle (valid or revoked) in distributed and immutable records. In essence we replace certificate verification with a lightweight blockchain-based authentication approach. In addition, we propose a fully distributed vehicle admission/revocation scheme. We show that our scheme could alleviate the computation overhead and enhance the response time while improving the overall system security.
协作式智能交通系统(C- ITS)使车辆联网,交换警报,以提高道路安全。虽然该技术即将在未来几年进入市场,但与通信安全相关的关键问题仍然是具有挑战性的研究关注点。目前确保车辆间通信安全的解决方案主要依赖于使用数字证书进行身份验证。然而,这种方法给车辆带来了巨大的开销,因为它在计算上要求很高,并且需要在有限的时间内验证证书。此外,依靠中心节点来决定颁发和撤销证书会引入单点故障,甚至可能危及驾驶员的安全。在本文中,我们建议使用区块链在分布式和不可变的记录中跟踪每个车辆的证书(有效或已撤销)。从本质上讲,我们用一种轻量级的基于区块链的身份验证方法取代了证书验证。此外,我们建议一个完全分布式的车辆准入/撤销计划。结果表明,该方案在降低计算开销和提高响应时间的同时,提高了系统的整体安全性。
{"title":"Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS","authors":"Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia","doi":"10.13016/M2SB3X16W","DOIUrl":"https://doi.org/10.13016/M2SB3X16W","url":null,"abstract":"Cooperative Intelligent Transportation System (C- ITS) enables inter-networking of vehicles for alerts exchanging in order to improve road safety. While this technology is about to enter the market in the upcoming years, critical questions related to the communication security continue to be challenging research concerns. Current solutions to secure inter-vehicle communication depend mainly on the use of digital certificates for authentication. However, such an approach imposes significant overhead on vehicles since it is computationally demanding and requires validation of the certificate within a limited period. In addition, relying on a central node for deciding on issuing and revoking certificates introduces a single point of failure and could even risk the safety of motorists. In this paper, we propose the use of Blockchain to keep track of the certificate of each vehicle (valid or revoked) in distributed and immutable records. In essence we replace certificate verification with a lightweight blockchain-based authentication approach. In addition, we propose a fully distributed vehicle admission/revocation scheme. We show that our scheme could alleviate the computation overhead and enhance the response time while improving the overall system security.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Multi-Provider Secure Virtual Network Embedding 多提供者安全虚拟网络嵌入
Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu
Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.
网络虚拟化使租户能够从一个或多个基础设施提供商(InP)那里租用计算和网络资源,就像基础设施即服务(IaaS)一样。因此,租户将其网络全部或部分外包,以减少资本支出,同时仍期望为客户提供相同质量的服务。然而,这些服务可能依赖于租户、租户的客户或法律认为敏感的数据,这些数据应该得到适当的保护。此外,个人数据保护法与提供最佳客户体验的目标相结合,可能会导致租户将其虚拟网络分布在多个inp上。然而,不同inp之间的互连应该尊重它们的安全策略。在本文中,我们的目标是通过保证租户和inp在创建虚拟网络时都执行其安全策略来简化网络虚拟化的采用。为此,我们在多提供者上下文中提出了一个虚拟网络嵌入解决方案,以及我们如何在用例中利用它。
{"title":"Multi-Provider Secure Virtual Network Embedding","authors":"Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu","doi":"10.1109/NTMS.2018.8328706","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328706","url":null,"abstract":"Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Small Transactions with Sustainable Incentives 可持续激励下的小额交易
Fabio Pianese, Matteo Signorini, Souradip Sarkar
The design of a successful distributed system for enabling payments and small transactions among Internet users has long been a major challenge in applied computer science. Bitcoin, the first cryptocurrency having reached world-wide popularity, suffers from sustainability problems such as inefficient energy expenditure for its network operation and from perverse incentives that foster speculative hoarding behavior. We propose a digital transfer system based on a variant of the Bitcoin ledger that is meant to support deterministic small payments with enforced proportional transaction fees: to achieve this property, we renounce the persistence of balances expected of a cryptocurrency, thus mitigating currency hoarding. We introduce at the same time a novel external incentive mechanism based on a verifiable third party with the goal of promoting long-term sustainability, adjusting the margins of profitability for contributors to the proof-of-work scheme without stifling the transaction rate.
长期以来,设计一个成功的分布式系统来实现互联网用户之间的支付和小额交易一直是应用计算机科学的一个主要挑战。比特币是第一个在全球范围内普及的加密货币,它面临着可持续性问题,比如网络运营的能源消耗效率低下,以及助长投机囤积行为的不正当激励措施。我们提出了一种基于比特币分类账变体的数字转账系统,旨在支持具有强制比例交易费的确定性小额支付:为了实现这一特性,我们放弃了加密货币预期的余额持久性,从而减少了货币囤积。同时,我们引入了一种基于可验证第三方的新型外部激励机制,其目标是促进长期可持续性,在不抑制交易率的情况下调整工作量证明方案贡献者的盈利空间。
{"title":"Small Transactions with Sustainable Incentives","authors":"Fabio Pianese, Matteo Signorini, Souradip Sarkar","doi":"10.1109/NTMS.2018.8328744","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328744","url":null,"abstract":"The design of a successful distributed system for enabling payments and small transactions among Internet users has long been a major challenge in applied computer science. Bitcoin, the first cryptocurrency having reached world-wide popularity, suffers from sustainability problems such as inefficient energy expenditure for its network operation and from perverse incentives that foster speculative hoarding behavior. We propose a digital transfer system based on a variant of the Bitcoin ledger that is meant to support deterministic small payments with enforced proportional transaction fees: to achieve this property, we renounce the persistence of balances expected of a cryptocurrency, thus mitigating currency hoarding. We introduce at the same time a novel external incentive mechanism based on a verifiable third party with the goal of promoting long-term sustainability, adjusting the margins of profitability for contributors to the proof-of-work scheme without stifling the transaction rate.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120824001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks 基于bsamziier曲线的IEEE 802.11无线局域网波束形成器标定新技术
Mehdi Guessous, L. Zenkouar
IEEE 802.11 WLAN networks face challenges for end- to-end service performance concerning new mobility applications: real-time interactive communications, analytics and business intelligence. In dense indoor deployments, co-channel interference is a major issue. One of Radio Resource Management (RRM) techniques that is used to tackle this issue and maximize transmit opportunity is beamforming. From a signal processing perspective, the related-work concentrates on array elements' signal weighting and phase shifting to achieve the desired angle of radiation, direction of arrival and gain. This work presents a novel beamformer's calibration technique that enhances related-work results in the context of indoor WLAN network with a considerably lessened processing time and an augmented transmission quality. Our solution model approach is based on concepts from Computed Aided Graphical Design (CAGD) especially Bézier curves, and takes advantage of now-a-day WLAN networks design and deployment characteristics.
IEEE 802.11 WLAN网络面临着端到端服务性能的挑战,涉及新的移动应用:实时交互通信、分析和商业智能。在密集的室内部署中,同信道干扰是主要问题。用于解决此问题并最大化传输机会的无线电资源管理(RRM)技术之一是波束形成。从信号处理的角度来看,相关工作主要集中在阵列元件的信号加权和相移,以达到期望的辐射角、到达方向和增益。本工作提出了一种新的波束形成器校准技术,该技术在室内WLAN网络环境下提高了相关工作结果,大大缩短了处理时间,提高了传输质量。我们的解决方案模型方法基于计算机辅助图形设计(CAGD)的概念,特别是bsamzier曲线,并利用了当今WLAN网络的设计和部署特性。
{"title":"Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks","authors":"Mehdi Guessous, L. Zenkouar","doi":"10.1109/NTMS.2018.8328682","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328682","url":null,"abstract":"IEEE 802.11 WLAN networks face challenges for end- to-end service performance concerning new mobility applications: real-time interactive communications, analytics and business intelligence. In dense indoor deployments, co-channel interference is a major issue. One of Radio Resource Management (RRM) techniques that is used to tackle this issue and maximize transmit opportunity is beamforming. From a signal processing perspective, the related-work concentrates on array elements' signal weighting and phase shifting to achieve the desired angle of radiation, direction of arrival and gain. This work presents a novel beamformer's calibration technique that enhances related-work results in the context of indoor WLAN network with a considerably lessened processing time and an augmented transmission quality. Our solution model approach is based on concepts from Computed Aided Graphical Design (CAGD) especially Bézier curves, and takes advantage of now-a-day WLAN networks design and deployment characteristics.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems 研究半调色技术对无用人脸检测系统的影响
S. Dadkhah, M. Köppen, S. Sadeghi, Kaori Yoshida
Currently, automatic face detection systems are widely used in various social media. The improvement of the automated intelligent face recognition can easily result in the invasion of the user 's privacy if the predefined functions for their so- called artificial intelligent systems are designed with no respect to the user privacy, this means that users do not get the right to prevent these types of automatic face detection. The problem does not stop here, and recently some organization attempted to use automated face recognition system as a digital personal judgment tools. For instance, judging if a person is criminal only based on the attributes of his/her face. In the present technology, spreading the personal information such as individual digital images are fast and inevitable. Thus, in this paper, some of the techniques to evade automatic face recognition is investigated. The focused of this article is to highlight the advantages of different Half-Toning algorithms concerning avoiding unwanted automated face detection/recognition. In the experimental phase, the result of varying filtering and modification algorithms compared to the proposed filtering technique.
目前,自动人脸检测系统被广泛应用于各种社交媒体。自动智能人脸识别技术的提高,如果其所谓人工智能系统的预定义功能在设计时不考虑用户的隐私,就很容易造成对用户隐私的侵犯,这意味着用户没有权利阻止这些类型的自动人脸检测。问题还不止于此,最近一些组织试图使用自动人脸识别系统作为数字个人判断工具。例如,仅根据一个人的面部特征来判断他/她是否犯罪。在目前的技术条件下,个人数字图像等个人信息的传播是快速而不可避免的。因此,本文对一些逃避自动人脸识别的技术进行了研究。本文的重点是强调不同的半调和算法在避免不必要的自动人脸检测/识别方面的优势。在实验阶段,将不同滤波和修正算法的结果与所提出的滤波技术进行了比较。
{"title":"Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems","authors":"S. Dadkhah, M. Köppen, S. Sadeghi, Kaori Yoshida","doi":"10.1109/NTMS.2018.8328726","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328726","url":null,"abstract":"Currently, automatic face detection systems are widely used in various social media. The improvement of the automated intelligent face recognition can easily result in the invasion of the user 's privacy if the predefined functions for their so- called artificial intelligent systems are designed with no respect to the user privacy, this means that users do not get the right to prevent these types of automatic face detection. The problem does not stop here, and recently some organization attempted to use automated face recognition system as a digital personal judgment tools. For instance, judging if a person is criminal only based on the attributes of his/her face. In the present technology, spreading the personal information such as individual digital images are fast and inevitable. Thus, in this paper, some of the techniques to evade automatic face recognition is investigated. The focused of this article is to highlight the advantages of different Half-Toning algorithms concerning avoiding unwanted automated face detection/recognition. In the experimental phase, the result of varying filtering and modification algorithms compared to the proposed filtering technique.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133194182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ProsocialLearn: A Prosocial Games Marketplace ProsocialLearn:亲社交游戏市场
F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras
ProsocialLearn is a digital pro-social games platform. The ProsocialLearn project has delivered a series of disruptive innovations for the production and distribution of pro-social digital games that engage children (7-10 years old). Additionally it has stimulated technology transfer from the games industry to the educational sector. ProsocialLearn fosters the creation of a new market for digital games aimed at increasing social inclusion and academic performance, as well as a distribution channel to deliver prosocial games to children and teachers in European schools. Furthermore, it provides a proven pro-social methodology to design digital games. The ProsocialLearn platform makes available a series of APIs, which game developers use to integrate many of the ProsocialLearn functions into games, i.e. emotion and engagement monitoring, in-game achievements, games adaptation based on Prosocial Learning Objectives (PLOs), and micro-transactions.
ProsocialLearn是一个数字亲社交游戏平台。ProsocialLearn项目为7-10岁儿童参与的亲社会数字游戏的制作和发行提供了一系列颠覆性创新。此外,它还刺激了游戏产业向教育领域的技术转移。ProsocialLearn为数字游戏创造了一个新的市场,旨在提高社交包容性和学习成绩,并为欧洲学校的儿童和教师提供了一个推广亲社交游戏的渠道。此外,它还为设计数字游戏提供了一种行之有效的亲社会方法论。ProsocialLearn平台提供了一系列api,游戏开发者可以使用这些api将ProsocialLearn的许多功能整合到游戏中,例如情绪和参与度监测、游戏内成就、基于Prosocial学习目标(PLOs)的游戏调整以及微交易。
{"title":"ProsocialLearn: A Prosocial Games Marketplace","authors":"F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras","doi":"10.1109/NTMS.2018.8328715","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328715","url":null,"abstract":"ProsocialLearn is a digital pro-social games platform. The ProsocialLearn project has delivered a series of disruptive innovations for the production and distribution of pro-social digital games that engage children (7-10 years old). Additionally it has stimulated technology transfer from the games industry to the educational sector. ProsocialLearn fosters the creation of a new market for digital games aimed at increasing social inclusion and academic performance, as well as a distribution channel to deliver prosocial games to children and teachers in European schools. Furthermore, it provides a proven pro-social methodology to design digital games. The ProsocialLearn platform makes available a series of APIs, which game developers use to integrate many of the ProsocialLearn functions into games, i.e. emotion and engagement monitoring, in-game achievements, games adaptation based on Prosocial Learning Objectives (PLOs), and micro-transactions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1