首页 > 最新文献

2017 9th International Conference on Communication Systems and Networks (COMSNETS)最新文献

英文 中文
A firewall for Internet of Things 物联网防火墙
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945418
Naman Gupta, Vinayak Naik, Srishti Sengupta
With the advent of the Internet of Things (IoT), privacy and security of sensitive data has become a major concern. In general, sensors which are the enablers for IoT, send the sensed data to a cloud database over the internet. The communication to the cloud database may be compromised by an adversary, or the database maybe accessed by a curious database administrator, thereby raising security concerns. To solve this issue, we demonstrate a solution to safeguard IoT devices in a home network scenario from potential attacks. A firewall is set up using a Raspberry Pi as a gateway which secures their communication with the cloud database. Furthermore, we plan to build a location-aware (physical location in the home network scenario) heuristics and a signature based traffic detection dashboard running on the Raspberry Pi, in order to control the IoT devices and log their network behavior.
随着物联网(IoT)的出现,敏感数据的隐私和安全已成为一个主要问题。一般来说,传感器是物联网的推动者,通过互联网将感测数据发送到云数据库。与云数据库的通信可能被攻击者破坏,或者数据库可能被好奇的数据库管理员访问,从而引起安全问题。为了解决这个问题,我们展示了一种保护家庭网络场景中的物联网设备免受潜在攻击的解决方案。防火墙是使用树莓派作为网关来设置的,它可以保护它们与云数据库的通信。此外,我们计划在树莓派上构建位置感知(家庭网络场景中的物理位置)启发式和基于签名的流量检测仪表板,以控制物联网设备并记录其网络行为。
{"title":"A firewall for Internet of Things","authors":"Naman Gupta, Vinayak Naik, Srishti Sengupta","doi":"10.1109/COMSNETS.2017.7945418","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945418","url":null,"abstract":"With the advent of the Internet of Things (IoT), privacy and security of sensitive data has become a major concern. In general, sensors which are the enablers for IoT, send the sensed data to a cloud database over the internet. The communication to the cloud database may be compromised by an adversary, or the database maybe accessed by a curious database administrator, thereby raising security concerns. To solve this issue, we demonstrate a solution to safeguard IoT devices in a home network scenario from potential attacks. A firewall is set up using a Raspberry Pi as a gateway which secures their communication with the cloud database. Furthermore, we plan to build a location-aware (physical location in the home network scenario) heuristics and a signature based traffic detection dashboard running on the Raspberry Pi, in order to control the IoT devices and log their network behavior.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134365969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
SecPMS: An efficient and secure communication protocol for continuous patient monitoring system using body sensors SecPMS:一种高效、安全的通信协议,用于使用身体传感器的患者连续监测系统
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945393
Tanmoy Maitra, Sarbani Roy
Secure communication in a continuous patient monitoring system (PMS) through body sensors is required to keep privacy on user's and sensors' secret information and data respectively. This paper presents a secure communication protocol for PMS (SecPMS) in order to get efficient and secure services in such environment. Robustness of the proposed protocol is analyzed using random oracle and it shows that SecPMS provides strong security against possible known attacks. Furthermore, performance comparison is given as an evidence which establishes the efficiency of SecPMS than related existing protocols with respect to time complexity of computation.
在通过身体传感器的患者连续监测系统(PMS)中,需要对用户和传感器的秘密信息和数据进行保密。为了在这种环境下获得高效、安全的服务,本文提出了一种面向PMS的安全通信协议(SecPMS)。使用随机oracle分析了协议的鲁棒性,结果表明SecPMS对可能的已知攻击提供了较强的安全性。此外,通过性能比较,证明了SecPMS在计算时间复杂度方面优于现有的相关协议。
{"title":"SecPMS: An efficient and secure communication protocol for continuous patient monitoring system using body sensors","authors":"Tanmoy Maitra, Sarbani Roy","doi":"10.1109/COMSNETS.2017.7945393","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945393","url":null,"abstract":"Secure communication in a continuous patient monitoring system (PMS) through body sensors is required to keep privacy on user's and sensors' secret information and data respectively. This paper presents a secure communication protocol for PMS (SecPMS) in order to get efficient and secure services in such environment. Robustness of the proposed protocol is analyzed using random oracle and it shows that SecPMS provides strong security against possible known attacks. Furthermore, performance comparison is given as an evidence which establishes the efficiency of SecPMS than related existing protocols with respect to time complexity of computation.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123974036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing a body sensor network 保护身体传感器网络
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945445
P. Kumari, T. Anjali
Health data is one of the most sensitive data available and its misuse can very easily endanger human lives. Ergo, each system and process in Body Sensor Network (BSN) which accesses this data needs to be secured well enough. In order to achieve this high security along with low energy consumption, a key management scheme named as Double Encryption has been proposed here. The proposed method uses two keys for encryption: a novel physiological feature based key and a pre-shared key between the communicating nodes. The feature and key generation, both are more economical than the existing algorithms in terms of computation, communication, storage, security and error. The features are exchanged with the help of simple addition and subtraction, instead of heavy computations like a vault or coffer creation, commitment, encryption or decryption. The another salient feature of the proposed algorithm is that if the key negotiation fails once, the protocol does not need to be restarted. The protocol is secure in various scenarios like Brute Force Attack, RCB (Remotely Capturing Biometric data) attack, Node Capture attack and Battery Depletion Attack.
卫生数据是最敏感的可用数据之一,滥用卫生数据很容易危及人的生命。因此,人体传感器网络(BSN)中访问这些数据的每个系统和过程都需要得到足够好的保护。为了实现高安全性和低能耗,本文提出了双重加密密钥管理方案。该方法使用两个密钥进行加密:一个新的基于生理特征的密钥和通信节点之间的预共享密钥。特征和密钥生成在计算、通信、存储、安全性和错误方面都比现有算法更经济。这些特性是通过简单的加法和减法来交换的,而不是像保险库或保险箱的创建、提交、加密或解密这样的繁重计算。该算法的另一个显著特征是,如果密钥协商失败一次,则不需要重新启动协议。该协议在蛮力攻击、RCB(远程捕获生物特征数据)攻击、节点捕获攻击和电池耗尽攻击等各种场景下都是安全的。
{"title":"Securing a body sensor network","authors":"P. Kumari, T. Anjali","doi":"10.1109/COMSNETS.2017.7945445","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945445","url":null,"abstract":"Health data is one of the most sensitive data available and its misuse can very easily endanger human lives. Ergo, each system and process in Body Sensor Network (BSN) which accesses this data needs to be secured well enough. In order to achieve this high security along with low energy consumption, a key management scheme named as Double Encryption has been proposed here. The proposed method uses two keys for encryption: a novel physiological feature based key and a pre-shared key between the communicating nodes. The feature and key generation, both are more economical than the existing algorithms in terms of computation, communication, storage, security and error. The features are exchanged with the help of simple addition and subtraction, instead of heavy computations like a vault or coffer creation, commitment, encryption or decryption. The another salient feature of the proposed algorithm is that if the key negotiation fails once, the protocol does not need to be restarted. The protocol is secure in various scenarios like Brute Force Attack, RCB (Remotely Capturing Biometric data) attack, Node Capture attack and Battery Depletion Attack.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of wireless OCDMA multi-user system based on new 2-D code in presence of atmospheric turbulence and various weather conditions 基于新二维码的无线OCDMA多用户系统在大气湍流和各种天气条件下的性能分析
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945365
A. Bharti, Subrat Kar, V. Jain
In this paper, we propose construction method of new two-dimensional (2-D) codes where one-coincidence frequency hopping code (OCFHC) is used for wavelength assignment and congruence codes (CCs) for time slot assignment. The performance evaluation of the OCFHC/quadratic congruence code (OCFHC/QCC) is made in presence of atmospheric turbulence and various weather conditions. Lognormal model is used for weak turbulence and gamma-gamma model for moderate and strong turbulence conditions. Various weather conditions like thick fog, light fog and very clear air are considered in the evaluation.
本文提出了用单重合跳频码(OCFHC)进行波长分配,用同余码(CCs)进行时隙分配的二维新码的构造方法。在大气湍流和各种天气条件下,对OCFHC/二次同余码(OCFHC/QCC)进行了性能评价。对弱湍流采用对数正态模型,对中、强湍流采用伽马-伽马模型。各种天气条件,如浓雾,轻雾和非常晴朗的空气在评估中被考虑。
{"title":"Performance analysis of wireless OCDMA multi-user system based on new 2-D code in presence of atmospheric turbulence and various weather conditions","authors":"A. Bharti, Subrat Kar, V. Jain","doi":"10.1109/COMSNETS.2017.7945365","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945365","url":null,"abstract":"In this paper, we propose construction method of new two-dimensional (2-D) codes where one-coincidence frequency hopping code (OCFHC) is used for wavelength assignment and congruence codes (CCs) for time slot assignment. The performance evaluation of the OCFHC/quadratic congruence code (OCFHC/QCC) is made in presence of atmospheric turbulence and various weather conditions. Lognormal model is used for weak turbulence and gamma-gamma model for moderate and strong turbulence conditions. Various weather conditions like thick fog, light fog and very clear air are considered in the evaluation.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
End to end performance analysis of M2M cooperative communication over cascaded α-μ channels 级联α-μ信道中M2M协同通信的端到端性能分析
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945366
A. Bhowal, R. S. Kshetrimayum
In this paper, relay based mobile to mobile (M2M) system employing amplify and forward (AF) protocol has been considered and its end to end performance over N-α-μ fading channels has been explored. The closed form expressions for probability density function (PDF), cumulative distribution function (CDF) of cascaded α-μ fading channels and lower bound on average symbol error probability (ASEP) have been obtained. The analytical results have been confirmed by means of Monte Carlo simulations. The variation of the performance due to change in fading coefficients, relative geometrical gain, power allocation and number of cascaded components is also reported in this paper.
本文研究了采用放大转发(AF)协议的基于中继的移动到移动(M2M)系统,并对其在N-α-μ衰落信道上的端到端性能进行了研究。得到了级联α-μ衰落信道的概率密度函数(PDF)、累积分布函数(CDF)和平均符号误差概率(ASEP)下界的封闭表达式。通过蒙特卡罗模拟验证了分析结果。本文还报道了衰落系数、相对几何增益、功率分配和级联元件数量的变化对系统性能的影响。
{"title":"End to end performance analysis of M2M cooperative communication over cascaded α-μ channels","authors":"A. Bhowal, R. S. Kshetrimayum","doi":"10.1109/COMSNETS.2017.7945366","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945366","url":null,"abstract":"In this paper, relay based mobile to mobile (M2M) system employing amplify and forward (AF) protocol has been considered and its end to end performance over N-α-μ fading channels has been explored. The closed form expressions for probability density function (PDF), cumulative distribution function (CDF) of cascaded α-μ fading channels and lower bound on average symbol error probability (ASEP) have been obtained. The analytical results have been confirmed by means of Monte Carlo simulations. The variation of the performance due to change in fading coefficients, relative geometrical gain, power allocation and number of cascaded components is also reported in this paper.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Suitability of NoSQL systems — Cassandra and ScyllaDB — For IoT workloads NoSQL系统的适用性- Cassandra和ScyllaDB -物联网工作负载
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945437
Ashraf Y. Mahgoub, S. Ganesh, Folker Meyer, A. Grama, S. Chaterji
Motivated by the increasing trend of storing data for web applications in fast NoSQL systems, in this paper, we experiment with the leading NoSQL datastore — Cassandra — and a latest generation re-design of Cassandra — ScyllaDB — meant to deliver bleeding-edge performance on modern multicore machines. We evaluate the scalability claim of ScyllaDB, in terms of the number of clients, and provide diagnostic evidence through OS-level metrics, such as, disk utilization and cache-miss rates. Specifically we are motivated by the need to store large amounts of IoT-generated data in nearby datastores. Our evaluation is the first in the line of objective benchmarking of these two technologies that are finding widespread adoption in data centers and other modern computing platforms. For example, we find hitherto unreported performance instability of ScyllaDB when the servers are replicated while we identify the root cause of improved read performance of ScyllaDB compared to Cassandra.
在快速NoSQL系统中存储web应用程序数据的趋势日益增长的推动下,在本文中,我们试验了领先的NoSQL数据存储- Cassandra -以及Cassandra的最新一代重新设计- ScyllaDB -旨在在现代多核机器上提供尖端性能。我们根据客户端数量评估ScyllaDB的可伸缩性声明,并通过操作系统级别的指标(如磁盘利用率和缓存丢失率)提供诊断证据。具体来说,我们的动机是需要将大量物联网生成的数据存储在附近的数据存储中。我们的评估是对这两种技术进行客观基准测试的第一步,这两种技术在数据中心和其他现代计算平台中得到了广泛采用。例如,当服务器被复制时,我们发现ScyllaDB迄今未报告的性能不稳定,而我们确定了ScyllaDB与Cassandra相比读取性能提高的根本原因。
{"title":"Suitability of NoSQL systems — Cassandra and ScyllaDB — For IoT workloads","authors":"Ashraf Y. Mahgoub, S. Ganesh, Folker Meyer, A. Grama, S. Chaterji","doi":"10.1109/COMSNETS.2017.7945437","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945437","url":null,"abstract":"Motivated by the increasing trend of storing data for web applications in fast NoSQL systems, in this paper, we experiment with the leading NoSQL datastore — Cassandra — and a latest generation re-design of Cassandra — ScyllaDB — meant to deliver bleeding-edge performance on modern multicore machines. We evaluate the scalability claim of ScyllaDB, in terms of the number of clients, and provide diagnostic evidence through OS-level metrics, such as, disk utilization and cache-miss rates. Specifically we are motivated by the need to store large amounts of IoT-generated data in nearby datastores. Our evaluation is the first in the line of objective benchmarking of these two technologies that are finding widespread adoption in data centers and other modern computing platforms. For example, we find hitherto unreported performance instability of ScyllaDB when the servers are replicated while we identify the root cause of improved read performance of ScyllaDB compared to Cassandra.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126623332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Use of ECDF-based features and ensemble of classifiers to accurately detect mobility activities of people using accelerometers 使用基于ecdf的特征和分类器集合来准确地检测使用加速度计的人的移动活动
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945356
Megha Vij, Vinayak Naik, Venkata M. V. Gunturi
We look at the problem of using accelerometer in smartphones to detect mobility activities of users. The activities are internally composed of several simple activities. One can perform the task of distinguishing the activities using classic classification techniques with two different data representations namely, statistical features and ECDF-based features. Our recommendation in this paper is to use the latter as it suits better for mobility activities. Our major contribution is to explore the challenge of class imbalance in detecting mobility activities. To handle that challenge, we propose use of an ensemble of a classification model. It improves accuracy of detection over standalone classification models. To evaluate performance of the recommended technique, we use transportation by a metro train as a running case study. We consider two activities during the metro train travel. They are (a) whether user is at a metro train station or (b) in a metro train. Our recommended technique results in precision of 98% for the case study. It is significantly more than the state-of-the-art value of 70% for a similar case study. This case study finds its applications in the area of smart city analytics, for instance, our solution could be used to estimate rush at metro stations. In the long run, it can also be used to enhance navigation services to account for delays at metro stations into their algorithms.
我们着眼于在智能手机中使用加速计来检测用户移动活动的问题。这些活动在内部由几个简单的活动组成。可以使用具有两种不同数据表示(即统计特征和基于ecdf的特征)的经典分类技术来执行区分活动的任务。我们在本文中的建议是使用后者,因为它更适合流动性活动。我们的主要贡献是探索阶级不平衡在检测流动性活动中的挑战。为了应对这一挑战,我们建议使用分类模型的集成。它比独立的分类模型提高了检测的准确性。为了评估所推荐的技术的性能,我们使用地铁列车作为运行案例研究。我们考虑地铁旅行中的两种活动。它们是(a)用户是否在地铁火车站或(b)在地铁列车上。我们推荐的技术在案例研究中精度达到98%。这远远超过了一个类似案例研究中70%的最先进的价值。本案例研究发现了其在智慧城市分析领域的应用,例如,我们的解决方案可用于估计地铁站的高峰。从长远来看,它还可以用来增强导航服务,将地铁站的延误考虑到算法中。
{"title":"Use of ECDF-based features and ensemble of classifiers to accurately detect mobility activities of people using accelerometers","authors":"Megha Vij, Vinayak Naik, Venkata M. V. Gunturi","doi":"10.1109/COMSNETS.2017.7945356","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945356","url":null,"abstract":"We look at the problem of using accelerometer in smartphones to detect mobility activities of users. The activities are internally composed of several simple activities. One can perform the task of distinguishing the activities using classic classification techniques with two different data representations namely, statistical features and ECDF-based features. Our recommendation in this paper is to use the latter as it suits better for mobility activities. Our major contribution is to explore the challenge of class imbalance in detecting mobility activities. To handle that challenge, we propose use of an ensemble of a classification model. It improves accuracy of detection over standalone classification models. To evaluate performance of the recommended technique, we use transportation by a metro train as a running case study. We consider two activities during the metro train travel. They are (a) whether user is at a metro train station or (b) in a metro train. Our recommended technique results in precision of 98% for the case study. It is significantly more than the state-of-the-art value of 70% for a similar case study. This case study finds its applications in the area of smart city analytics, for instance, our solution could be used to estimate rush at metro stations. In the long run, it can also be used to enhance navigation services to account for delays at metro stations into their algorithms.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CommBox: Utilizing sensors for real-time cricket shot identification and commentary generation CommBox:利用传感器进行实时板球镜头识别和评论生成
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945426
Ashish Sharma, Jatin Arora, Pritam Khan, Sidhartha Satapathy, S. Agarwal, Satadal Sengupta, S. Mridha, Niloy Ganguly
Online cricket commentary has become very popular as the internet provides access to a large number of sports websites. A key challenge for them is to offer their readers an insightful and fast paced live commentary. In this paper, we propose a framework to automate cricket shot identification and commentary generation using sensor data as features for machine learning models.
由于互联网提供了访问大量体育网站的途径,在线板球评论已经变得非常流行。对他们来说,一个关键的挑战是为他们的读者提供一个富有洞察力和快节奏的现场评论。在本文中,我们提出了一个框架,使用传感器数据作为机器学习模型的特征来自动识别板球镜头和生成评论。
{"title":"CommBox: Utilizing sensors for real-time cricket shot identification and commentary generation","authors":"Ashish Sharma, Jatin Arora, Pritam Khan, Sidhartha Satapathy, S. Agarwal, Satadal Sengupta, S. Mridha, Niloy Ganguly","doi":"10.1109/COMSNETS.2017.7945426","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945426","url":null,"abstract":"Online cricket commentary has become very popular as the internet provides access to a large number of sports websites. A key challenge for them is to offer their readers an insightful and fast paced live commentary. In this paper, we propose a framework to automate cricket shot identification and commentary generation using sensor data as features for machine learning models.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative energy detection using dempster-shafer theory under noise uncertainties 噪声不确定条件下dempster-shafer理论的协同能量检测
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945398
P. B. Gohain, S. Chaudhari
Cooperative spectrum sensing (CSS) is one of the efficient scheme that helps in improving the spectrum sensing performance of a cognitive radio network. In this paper we propose a Dempster-Shafer theory (DST) based CSS for cognitive radio network. The fusion rule is the D-S combination rule which is well known for its ability to handle uncertainty and has been used in quite a different number of fields. Noise uncertainty, which is unavoidable in practical field, can gravely limit the detection performance of CSS. In this paper we specially investigate sensor nodes undergoing uncertainty in noise power when the detection scheme is based on energy of the received signal and use DS theory to minimize such effects. Simulation results reveal significant improvement in CSS gain as compared to previous traditional methods.
协同频谱感知(CSS)是提高认知无线网络频谱感知性能的有效方案之一。本文提出了一种基于Dempster-Shafer理论的认知无线网络CSS。融合规则是D-S组合规则,以其处理不确定性的能力而闻名,并已被用于许多不同的领域。噪声的不确定性在实际应用中不可避免,严重限制了CSS的检测性能。本文特别研究了基于接收信号能量的检测方案中存在噪声功率不确定性的传感器节点,并利用DS理论最小化这种影响。仿真结果表明,与以往的传统方法相比,CSS增益有显著提高。
{"title":"Cooperative energy detection using dempster-shafer theory under noise uncertainties","authors":"P. B. Gohain, S. Chaudhari","doi":"10.1109/COMSNETS.2017.7945398","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945398","url":null,"abstract":"Cooperative spectrum sensing (CSS) is one of the efficient scheme that helps in improving the spectrum sensing performance of a cognitive radio network. In this paper we propose a Dempster-Shafer theory (DST) based CSS for cognitive radio network. The fusion rule is the D-S combination rule which is well known for its ability to handle uncertainty and has been used in quite a different number of fields. Noise uncertainty, which is unavoidable in practical field, can gravely limit the detection performance of CSS. In this paper we specially investigate sensor nodes undergoing uncertainty in noise power when the detection scheme is based on energy of the received signal and use DS theory to minimize such effects. Simulation results reveal significant improvement in CSS gain as compared to previous traditional methods.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122569527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Restless bandits that hide their hand and recommendation systems 不安分的强盗隐藏他们的手和推荐系统
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945378
R. Meshram, Aditya Gopalan, D. Manjunath
We consider a restless multi-armed bandit (RMAB) in which each arm can be in one of two states, say 0 or 1. Playing the arm brings it to state 0 with probability one and not playing it induces state transitions with arm-dependent probabilities. Playing an arm generates a unit reward with a probability that depends on the state of the arm. The belief about the state of the arm can be calculated using a Bayesian update after every play. This RMAB has been designed for use in recommendation systems which in turn can be used in applications like creating of playlists or placement of advertisements. In this paper we analyse the RMAB by first showing that it is Whittle-indexable and then obtain a closed form expression for the Whittle index for each arm calculated from the belief about its state and the parameters that describe the arm. For an RMAB to be useful in practice, we need to be able to learn the parameters of the arms. We present an algorithm derived from Thompson sampling scheme, that learns the parameters of the arms and also evaluate its performance numerically.
我们考虑一个不安分的多臂强盗(RMAB),其中每条手臂可以处于两种状态之一,比如0或1。玩手臂会使它以1的概率进入状态0,不玩手臂会导致状态转换,其概率与手臂相关。玩一只手臂会产生一个单位奖励,其概率取决于手臂的状态。关于手臂状态的信念可以在每次比赛后使用贝叶斯更新来计算。这个RMAB被设计用于推荐系统,而推荐系统又可以用于创建播放列表或放置广告等应用程序。本文首先对RMAB进行了分析,证明了它是可惠特尔索引的,然后得到了每个臂的惠特尔指数的封闭形式表达式,该表达式由臂的状态和描述臂的参数的信念计算得到。为了使RMAB在实践中有用,我们需要能够学习臂的参数。我们提出了一种基于汤普森采样方案的算法,该算法学习了机械臂的参数,并对其性能进行了数值评估。
{"title":"Restless bandits that hide their hand and recommendation systems","authors":"R. Meshram, Aditya Gopalan, D. Manjunath","doi":"10.1109/COMSNETS.2017.7945378","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945378","url":null,"abstract":"We consider a restless multi-armed bandit (RMAB) in which each arm can be in one of two states, say 0 or 1. Playing the arm brings it to state 0 with probability one and not playing it induces state transitions with arm-dependent probabilities. Playing an arm generates a unit reward with a probability that depends on the state of the arm. The belief about the state of the arm can be calculated using a Bayesian update after every play. This RMAB has been designed for use in recommendation systems which in turn can be used in applications like creating of playlists or placement of advertisements. In this paper we analyse the RMAB by first showing that it is Whittle-indexable and then obtain a closed form expression for the Whittle index for each arm calculated from the belief about its state and the parameters that describe the arm. For an RMAB to be useful in practice, we need to be able to learn the parameters of the arms. We present an algorithm derived from Thompson sampling scheme, that learns the parameters of the arms and also evaluate its performance numerically.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 9th International Conference on Communication Systems and Networks (COMSNETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1