首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Image Recognition with MapReduce Based Convolutional Neural Networks 基于MapReduce的卷积神经网络图像识别
Jackie Leung, Min Chen
Convolutional neural networks (CNNs) have gained global recognition in advancing the field of artificial intelligence and have had great successes in a wide array of applications including computer vision, speech and natural language processing. However, due to the rise of big data and increased complexity of tasks, the efficiency of training CNNs have been severely impacted. To achieve state-of-art results, CNNs require tens to hundreds of millions of parameters that need to be fine-tuned, resulting in extensive training time and high computational cost. To overcome these obstacles, this work takes advantage of distributed frameworks and cloud computing to develop a parallel CNN algorithm. Close examination of the implementation of MapReduce based CNNs as well as how the proposed algorithm accelerates learning are discussed and demonstrated through experiments. Results reveal high accuracy in classification and improvements in speedup, scaleup and sizeup compared to the standard algorithm.
卷积神经网络(cnn)在推动人工智能领域的发展方面获得了全球的认可,并在包括计算机视觉、语音和自然语言处理在内的广泛应用中取得了巨大成功。然而,由于大数据的兴起和任务复杂性的增加,cnn的训练效率受到了严重的影响。为了达到最先进的结果,cnn需要数千万到数亿个需要微调的参数,这导致了大量的训练时间和高昂的计算成本。为了克服这些障碍,本工作利用分布式框架和云计算来开发并行CNN算法。仔细研究了基于MapReduce的cnn的实现,以及所提出的算法如何加速学习,并通过实验进行了讨论和演示。结果表明,与标准算法相比,该算法具有较高的分类准确率,并且在加速、放大和大小方面都有改进。
{"title":"Image Recognition with MapReduce Based Convolutional Neural Networks","authors":"Jackie Leung, Min Chen","doi":"10.1109/UEMCON47517.2019.8992932","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992932","url":null,"abstract":"Convolutional neural networks (CNNs) have gained global recognition in advancing the field of artificial intelligence and have had great successes in a wide array of applications including computer vision, speech and natural language processing. However, due to the rise of big data and increased complexity of tasks, the efficiency of training CNNs have been severely impacted. To achieve state-of-art results, CNNs require tens to hundreds of millions of parameters that need to be fine-tuned, resulting in extensive training time and high computational cost. To overcome these obstacles, this work takes advantage of distributed frameworks and cloud computing to develop a parallel CNN algorithm. Close examination of the implementation of MapReduce based CNNs as well as how the proposed algorithm accelerates learning are discussed and demonstrated through experiments. Results reveal high accuracy in classification and improvements in speedup, scaleup and sizeup compared to the standard algorithm.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new Quantum Processor Architecture 一种新的量子处理器架构
Michael Joseph, K. Elleithy, Mohamed Mohamed
This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.
本文分析了离子阱和超导这两种领先的量子计算架构的现状,概述了这两种方法面临的挑战,并提出了一种结合这两种技术的最佳方面以及隔离量子比特的新方法的新架构。这种新架构保留了离子捕获架构在接近室温下操作其量子比特的能力,同时通过利用一种新的屏蔽技术和采用超导架构的表面代码布局来消除其可扩展性问题。通过消除超导结构的极低温度要求,这种新结构具有成本效益,可扩展性和大规模生产的实用性。
{"title":"A new Quantum Processor Architecture","authors":"Michael Joseph, K. Elleithy, Mohamed Mohamed","doi":"10.1109/UEMCON47517.2019.8992935","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992935","url":null,"abstract":"This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation of Transitional and Bursty Wireless Visual Sensor Networks 过渡与突发无线视觉传感器网络仿真
Mark Caswell, Yao Liang
Communication links in low-power wireless visual sensor networks (WVSNs) are subject to short-term and long-term noise variations. These variations can cause a WVSN to exhibit prolonged or periodic transitional or bursty transmission performance. In this paper, we present our work on how to generate noise traces that simulate real-world transitional and bursty network behavior in TOSSIM. We develop a toolset called BurstyGen for TOSSIM which can facilitate WVSN protocol designers and application developers to better understand WVSN performance under these conditions. BurstyGen allows users to model both short time-scale and long time-scale variations in WVSN noise environments for the simulation and testing of WVSN system algorithms and protocols.
低功耗无线视觉传感器网络(WVSNs)中的通信链路受到短期和长期噪声变化的影响。这些变化可能导致WVSN表现出长时间或周期性的过渡或突发传输性能。在本文中,我们介绍了我们关于如何在TOSSIM中生成模拟真实世界过渡和突发网络行为的噪声轨迹的工作。我们为TOSSIM开发了一个名为BurstyGen的工具集,它可以帮助WVSN协议设计者和应用程序开发人员更好地理解这些条件下的WVSN性能。BurstyGen允许用户对WVSN噪声环境中的短时间尺度和长时间尺度变化进行建模,以模拟和测试WVSN系统算法和协议。
{"title":"Simulation of Transitional and Bursty Wireless Visual Sensor Networks","authors":"Mark Caswell, Yao Liang","doi":"10.1109/UEMCON47517.2019.8993079","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993079","url":null,"abstract":"Communication links in low-power wireless visual sensor networks (WVSNs) are subject to short-term and long-term noise variations. These variations can cause a WVSN to exhibit prolonged or periodic transitional or bursty transmission performance. In this paper, we present our work on how to generate noise traces that simulate real-world transitional and bursty network behavior in TOSSIM. We develop a toolset called BurstyGen for TOSSIM which can facilitate WVSN protocol designers and application developers to better understand WVSN performance under these conditions. BurstyGen allows users to model both short time-scale and long time-scale variations in WVSN noise environments for the simulation and testing of WVSN system algorithms and protocols.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Neuroadaptive Brain-Computer Interface utilizing Event-related Desynchronization 利用事件相关去同步的概念神经自适应脑机接口
Brian Luu, Bradley Hansberger, T. Tothong, K. George
This paper presents evidence for the possibility of a neuroadaptive system, based on electroencephalography (EEG) readings from the motor cortex region, to predict an individual's actions before the onset of motion. Testing for the neuroadaptive system utilized a G.nautilus headset, MATLAB with the EEGLAB toolbox, and a computer with the Processing IDE. Code from the Processing IDE provides an image slideshow which displays faces of various individuals so that the subject presses a keyboard key on a certain image. Three subjects were tested for 60 trials each, 30 trials where the keyboard key was pressed, and 30 trials where they were not, to gather enough data to train and test a classifier by using a machine learning algorithm. Machine learning assessed classification accuracy initially using 10 training trials and increased the training set by 10 trials each time to reassess accuracy until a total of 40 training trials were used. A set of 20 trials were used to assess accuracy without and with machine learning. Additionally, theoretical accuracy was computed by removing unfeasible machine learning features to assess the potential accuracy in a real-time system. The results provided an average accuracy of 52% without machine learning and an average accuracy ranging from 91.66% to 96.66% using the K-Nearest Neighbors(KNN) algorithm. The average theoretical accuracy ranged from to be 60% to 68.33%.
这篇论文提出了一个神经适应系统的可能性的证据,基于脑电图(EEG)读数从运动皮层区域,预测一个人的行动开始之前的运动。神经自适应系统的测试使用了g.s nautilus耳机、带有EEGLAB工具箱的MATLAB和带有Processing IDE的计算机。来自Processing IDE的代码提供了一个图像幻灯片,其中显示了不同个人的面孔,以便受试者按下某个图像上的键盘键。三名受试者分别接受了60次测试,其中30次是按下键盘键,30次是不按键盘键,以收集足够的数据,通过使用机器学习算法来训练和测试分类器。机器学习最初使用10个训练试验来评估分类准确性,然后每次将训练集增加10个试验来重新评估准确性,直到总共使用40个训练试验。一组20个试验用于评估不使用机器学习和使用机器学习的准确性。此外,通过去除不可行的机器学习特征来计算理论精度,以评估实时系统中的潜在精度。在没有机器学习的情况下,平均准确率为52%,使用k -最近邻(KNN)算法的平均准确率为91.66%至96.66%。平均理论精度为60% ~ 68.33%。
{"title":"Conceptual Neuroadaptive Brain-Computer Interface utilizing Event-related Desynchronization","authors":"Brian Luu, Bradley Hansberger, T. Tothong, K. George","doi":"10.1109/UEMCON47517.2019.8992967","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992967","url":null,"abstract":"This paper presents evidence for the possibility of a neuroadaptive system, based on electroencephalography (EEG) readings from the motor cortex region, to predict an individual's actions before the onset of motion. Testing for the neuroadaptive system utilized a G.nautilus headset, MATLAB with the EEGLAB toolbox, and a computer with the Processing IDE. Code from the Processing IDE provides an image slideshow which displays faces of various individuals so that the subject presses a keyboard key on a certain image. Three subjects were tested for 60 trials each, 30 trials where the keyboard key was pressed, and 30 trials where they were not, to gather enough data to train and test a classifier by using a machine learning algorithm. Machine learning assessed classification accuracy initially using 10 training trials and increased the training set by 10 trials each time to reassess accuracy until a total of 40 training trials were used. A set of 20 trials were used to assess accuracy without and with machine learning. Additionally, theoretical accuracy was computed by removing unfeasible machine learning features to assess the potential accuracy in a real-time system. The results provided an average accuracy of 52% without machine learning and an average accuracy ranging from 91.66% to 96.66% using the K-Nearest Neighbors(KNN) algorithm. The average theoretical accuracy ranged from to be 60% to 68.33%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low Power FPGA-SoC Design Techniques for CNN-based Object Detection Accelerator 基于cnn的目标检测加速器低功耗FPGA-SoC设计技术
Heekyung Kim, K. Choi
This paper shows the possibility of the existing low power register transfer level (RTL) techniques can be effective as a low power design scheme for CNN-based object recognition system acceleration in contrast to conventional techniques. Most power efficient design techniques regarding CNN acceleration are focused on the High-level Synthesis (HLS) aspect, such as memory bandwidth optimization, network architecture reconfiguration, data reuse, and batch normalization. However, these attempts have reached the limits of the effectiveness of itself. Using the post-synthesis RTL code generated by field-programmable gate arrays (FPGA) manufacturers, the proposed RTL low power design technique was applied to the original FIFO part for reducing the power consumption during data transformation. We compared the HLS optimized result with the RTL optimized result in the aspect of power consumption. We configured the testbench for the modified FIFO module and analyzed the estimated power dissipation result. These power effectiveness factors, such as a look-up table (LUT), a lookup table RAM (LUTRAM), can reduce the power dissipation by 54%, 49% respectively, even though increased block RAM (BRAM) leads to the elevated power dissipation by 154%. Thus, the total power consumption was able to be decreased by 10%. This paper discusses two factors of FPGA with system-on-chip (FPGA-SoC) design for CNN-based hardware implementation in power consumption aspect, such as RTL architecture, memory design architecture, and the model architecture-based hardware implementation methods. The virtual additional memory can support the high throughput at full speed. Our simulated low power schemes applied to Processing System (PS) and Programmable Logic (PL) architecture effectively reduced the power consumption by 25.9% in the FIFO data transformation. We established that the increased LUT blocks affect the power-efficient rate and reduce the power consumption of the PL design up to 49%.
本文展示了现有的低功耗寄存器传输电平(RTL)技术与传统技术相比,可以有效地作为基于cnn的目标识别系统加速的低功耗设计方案的可能性。大多数关于CNN加速的节能设计技术都集中在高级综合(High-level Synthesis, HLS)方面,如内存带宽优化、网络架构重构、数据重用和批处理规范化。然而,这些尝试本身的效力已经达到了极限。利用现场可编程门阵列(FPGA)制造商生成的合成后RTL代码,将提出的RTL低功耗设计技术应用于原始FIFO部分,以降低数据转换过程中的功耗。我们将HLS优化结果与RTL优化结果在功耗方面进行了比较。我们为改进后的FIFO模块配置了测试平台,并分析了估计的功耗结果。这些功率效率因素,如查找表(LUT)、查找表RAM (LUTRAM),可以分别降低54%和49%的功耗,尽管增加的块RAM (BRAM)会导致功耗提高154%。因此,总功耗能够降低10%。本文从功耗方面讨论了FPGA与片上系统(FPGA- soc)设计对基于cnn的硬件实现的两个因素,即RTL架构、存储器设计架构和基于模型架构的硬件实现方法。虚拟附加内存可以在全速下支持高吞吐量。我们的模拟低功耗方案应用于处理系统(PS)和可编程逻辑(PL)架构,在FIFO数据转换中有效地降低了25.9%的功耗。我们确定增加的LUT模块会影响电源效率,并将PL设计的功耗降低49%。
{"title":"Low Power FPGA-SoC Design Techniques for CNN-based Object Detection Accelerator","authors":"Heekyung Kim, K. Choi","doi":"10.1109/UEMCON47517.2019.8992929","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992929","url":null,"abstract":"This paper shows the possibility of the existing low power register transfer level (RTL) techniques can be effective as a low power design scheme for CNN-based object recognition system acceleration in contrast to conventional techniques. Most power efficient design techniques regarding CNN acceleration are focused on the High-level Synthesis (HLS) aspect, such as memory bandwidth optimization, network architecture reconfiguration, data reuse, and batch normalization. However, these attempts have reached the limits of the effectiveness of itself. Using the post-synthesis RTL code generated by field-programmable gate arrays (FPGA) manufacturers, the proposed RTL low power design technique was applied to the original FIFO part for reducing the power consumption during data transformation. We compared the HLS optimized result with the RTL optimized result in the aspect of power consumption. We configured the testbench for the modified FIFO module and analyzed the estimated power dissipation result. These power effectiveness factors, such as a look-up table (LUT), a lookup table RAM (LUTRAM), can reduce the power dissipation by 54%, 49% respectively, even though increased block RAM (BRAM) leads to the elevated power dissipation by 154%. Thus, the total power consumption was able to be decreased by 10%. This paper discusses two factors of FPGA with system-on-chip (FPGA-SoC) design for CNN-based hardware implementation in power consumption aspect, such as RTL architecture, memory design architecture, and the model architecture-based hardware implementation methods. The virtual additional memory can support the high throughput at full speed. Our simulated low power schemes applied to Processing System (PS) and Programmable Logic (PL) architecture effectively reduced the power consumption by 25.9% in the FIFO data transformation. We established that the increased LUT blocks affect the power-efficient rate and reduce the power consumption of the PL design up to 49%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127200032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Designing and Analysis of IEEE 802.11 MAC for UAVs Ad Hoc Networks 无人机自组网IEEE 802.11 MAC的设计与分析
A. Shah, H. Ilhan, U. Tureli
Unmanned aerial vehicles (UAVs) are popular because they are low cost and do not put in danger human pilot lives. In this study, performance of IEEE 802.11 medium access control (MAC) for UAVs ad hoc networks is studied using an analytical model based on Markov chain model. Three dimensional (3D) nature and high mobility are main characteristics of UAVs ad hoc networks which are considered. The relationship among parameters and performance metrics such as throughput, packet dropping rate (PDR), and delay expressions are derived. Complexity analysis and numerical results are presented. Moreover, to ensure safe and efficient communication in UAVs ad hoc networks, IEEE 802.11 MAC can satisfy the performance requirements or not is investigated.
无人驾驶飞行器(uav)之所以受欢迎,是因为它们成本低,而且不会危及飞行员的生命。本文采用基于马尔可夫链模型的分析模型,对无人机自组织网络的IEEE 802.11介质访问控制(MAC)性能进行了研究。三维特性和高机动性是无人机自组织网络的主要特点。导出了参数与吞吐量、丢包率(packet drop rate, PDR)和时延表达式等性能指标之间的关系。给出了复杂度分析和数值结果。此外,为了保证无人机自组织网络的安全高效通信,研究了IEEE 802.11 MAC是否能满足性能要求。
{"title":"Designing and Analysis of IEEE 802.11 MAC for UAVs Ad Hoc Networks","authors":"A. Shah, H. Ilhan, U. Tureli","doi":"10.1109/UEMCON47517.2019.8993018","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993018","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are popular because they are low cost and do not put in danger human pilot lives. In this study, performance of IEEE 802.11 medium access control (MAC) for UAVs ad hoc networks is studied using an analytical model based on Markov chain model. Three dimensional (3D) nature and high mobility are main characteristics of UAVs ad hoc networks which are considered. The relationship among parameters and performance metrics such as throughput, packet dropping rate (PDR), and delay expressions are derived. Complexity analysis and numerical results are presented. Moreover, to ensure safe and efficient communication in UAVs ad hoc networks, IEEE 802.11 MAC can satisfy the performance requirements or not is investigated.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Better Management of Combined Sewage Systems 改善综合污水系统的管理
C. Berke, E. Fassman-Beck, Jack Li, Gregg Vesonder
In New York and New Jersey, and many older areas in the United States, stormwater runoff is cleared from the streets and is dispensed into combined sewers. These combined sewers transport both runoff and domestic waste through pipes that lead to wastewater treatment plants. The problem is that when it rains a couple of tenths of an inch, the runoff enters the sewer and dramatically increases the amount of water and domestic waste in the sewer, exceeding the maximum capacity. This causes the water-waste mixture to bypass the treatment plant and dispense into the nearest waterway (e.g. the Hudson River). This pollutes the waterway it enters and makes the environment uninhabitable for wildlife it used to support, and unsafe for the people that use it. The introduction of rain barrels - barrels that collect stormwater runoff from the roofs of buildings - can delay the runofffrom going into the sewer, allowing it to be dispensed in a manner that the sewer systems can manage. [1]
在纽约和新泽西,以及美国许多老旧的地区,街道上的雨水被清除,并被分配到联合下水道。这些综合下水道通过管道将径流和生活垃圾输送到污水处理厂。问题是,当降雨量达到十分之二英寸时,雨水进入下水道,大大增加了下水道中的水量和生活垃圾,超过了最大容量。这使得水-废物混合物绕过处理厂,排入最近的水道(例如哈德逊河)。这污染了它进入的水道,使它曾经赖以生存的野生动物无法生存,对使用它的人来说也不安全。雨水桶——从建筑物屋顶收集雨水径流的桶——的引入可以延缓雨水进入下水道,使其以下水道系统可以管理的方式分配。[1]
{"title":"Towards Better Management of Combined Sewage Systems","authors":"C. Berke, E. Fassman-Beck, Jack Li, Gregg Vesonder","doi":"10.1109/UEMCON47517.2019.8992936","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992936","url":null,"abstract":"In New York and New Jersey, and many older areas in the United States, stormwater runoff is cleared from the streets and is dispensed into combined sewers. These combined sewers transport both runoff and domestic waste through pipes that lead to wastewater treatment plants. The problem is that when it rains a couple of tenths of an inch, the runoff enters the sewer and dramatically increases the amount of water and domestic waste in the sewer, exceeding the maximum capacity. This causes the water-waste mixture to bypass the treatment plant and dispense into the nearest waterway (e.g. the Hudson River). This pollutes the waterway it enters and makes the environment uninhabitable for wildlife it used to support, and unsafe for the people that use it. The introduction of rain barrels - barrels that collect stormwater runoff from the roofs of buildings - can delay the runofffrom going into the sewer, allowing it to be dispensed in a manner that the sewer systems can manage. [1]","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AECC: An Enhanced Public Key Cryptosystem for User Defined Messages AECC:一种用于用户定义消息的增强公钥密码系统
Shajina Anand, G. Raja, Aishwarya Ganapathisubramaniyan
Due to enormous growth of devices and its interconnected communication, there are lot of possibilities for attacks and vulnerabilities in the network. From recent studies, we come to know about various security related techniques and their usage. A lot of cryptographic algorithms are used efficiently and effectively in plenty of applications. Thus it is notable to classify the attacks as two types Active and Passive Attack. Unauthorized access to the information implies passive attack. For example, in the communication channel doing operations like intercepting and eavesdropping are considered as passive attack. If the attacker tries to access the information and modify the information in an unauthorized manner, then it is considered as active attack. Man in the Middle attack is the best example of active attack. Here the attacker sends its public key as the hosts public and tries to hack the message. To overcome the issues in tradional authentication model, we proposed an Advanced Elliptical Curve Cryptographic (AECC) Algorithm which uses a code bit with a random function in both the sender and receiver side for encoding and decoding functions. This code bit is used to identify whether the public key belongs to attacker or the sender. By identifying the sender, the receiver can communicate with it without any restrictions. The results analysis section shows that our proposed AECC algorithm enhances security for user defined input messages like text, image, video and also for binary data.
由于设备的大量增长及其互联通信,网络中存在许多攻击和漏洞的可能性。从最近的研究中,我们了解了各种与安全相关的技术及其使用。许多加密算法在许多应用中得到了高效的应用。因此,将攻击分为主动攻击和被动攻击是值得注意的。未经授权访问信息意味着被动攻击。例如,在通信信道中进行拦截和窃听等操作被认为是被动攻击。如果攻击者试图以未经授权的方式访问信息并修改信息,则认为是主动攻击。中路人的进攻是主动进攻的最好例子。在这里,攻击者将其公钥作为主机的公钥发送,并试图破解该消息。为了克服传统认证模型存在的问题,我们提出了一种高级椭圆曲线加密算法(AECC),该算法在发送端和接收端都使用具有随机函数的码位进行编码和解码。该码位用于识别公钥是属于攻击者还是属于发送者。通过识别发送方,接收方可以不受任何限制地与其通信。结果分析部分表明,我们提出的AECC算法增强了用户自定义输入消息(如文本、图像、视频)和二进制数据的安全性。
{"title":"AECC: An Enhanced Public Key Cryptosystem for User Defined Messages","authors":"Shajina Anand, G. Raja, Aishwarya Ganapathisubramaniyan","doi":"10.1109/UEMCON47517.2019.8992992","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992992","url":null,"abstract":"Due to enormous growth of devices and its interconnected communication, there are lot of possibilities for attacks and vulnerabilities in the network. From recent studies, we come to know about various security related techniques and their usage. A lot of cryptographic algorithms are used efficiently and effectively in plenty of applications. Thus it is notable to classify the attacks as two types Active and Passive Attack. Unauthorized access to the information implies passive attack. For example, in the communication channel doing operations like intercepting and eavesdropping are considered as passive attack. If the attacker tries to access the information and modify the information in an unauthorized manner, then it is considered as active attack. Man in the Middle attack is the best example of active attack. Here the attacker sends its public key as the hosts public and tries to hack the message. To overcome the issues in tradional authentication model, we proposed an Advanced Elliptical Curve Cryptographic (AECC) Algorithm which uses a code bit with a random function in both the sender and receiver side for encoding and decoding functions. This code bit is used to identify whether the public key belongs to attacker or the sender. By identifying the sender, the receiver can communicate with it without any restrictions. The results analysis section shows that our proposed AECC algorithm enhances security for user defined input messages like text, image, video and also for binary data.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unformatted, Certified Scientific Objects 未格式化的、经过认证的科学对象
M. Royer, S. Chawathe
We present an approach for scientific data management systems to apply certificates to scientific objects, which are typically unformatted datasets, to facilitate analysis by climate scientists. Typically, for a program to process data, the program requires cleansed data in a form that supports automatic manipulation. Most systems require that data must adhere to a specific format to achieve that goal. The technique described in this paper takes the opposite approach; instead, any dataset may be imported and manipulated in the system. But upon initial import, however, only a subset of system functions may work with any given dataset. As the data is refined and transformed by system functions, more functions may become compatible. Certificates are associated with objects that pass constraint validation within the system to ensure that they conform to function requirements. The attached object constraints represent invariant properties of the object, which may be used by functions in the system as function preconditions. Furthermore, the functions defined in the system may associate certificates with the newly generated results. Certificates related to function results are effectively function postconditions, which in turn are used to associate certificates with the objects generated in the system. Additionally, attached object certificates reflect the refinement of data into a more pristine version. This paper describes the technique for modeling and enforcing the constraints for data scientists that have similar requirements.
我们提出了一种科学数据管理系统的方法,将证书应用于科学对象(通常是未格式化的数据集),以方便气候科学家进行分析。通常,对于处理数据的程序,程序需要以支持自动操作的形式清理数据。大多数系统要求数据必须遵循特定的格式才能实现这一目标。本文中描述的技术采用了相反的方法;相反,任何数据集都可以在系统中导入和操作。但是,在初始导入时,只有系统函数的子集可以与任何给定的数据集一起工作。随着数据经过系统功能的细化和转换,可能会有更多的功能兼容。证书与通过系统内约束验证的对象相关联,以确保它们符合功能需求。附加的对象约束表示对象的不变属性,这些属性可以被系统中的函数用作函数的先决条件。此外,系统中定义的功能可以将证书与新生成的结果关联起来。与函数结果相关的证书实际上是函数后置条件,它们又用于将证书与系统中生成的对象关联起来。此外,附加的对象证书反映了将数据细化为更原始的版本。本文描述了为具有类似需求的数据科学家建模和实施约束的技术。
{"title":"Unformatted, Certified Scientific Objects","authors":"M. Royer, S. Chawathe","doi":"10.1109/UEMCON47517.2019.8993010","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993010","url":null,"abstract":"We present an approach for scientific data management systems to apply certificates to scientific objects, which are typically unformatted datasets, to facilitate analysis by climate scientists. Typically, for a program to process data, the program requires cleansed data in a form that supports automatic manipulation. Most systems require that data must adhere to a specific format to achieve that goal. The technique described in this paper takes the opposite approach; instead, any dataset may be imported and manipulated in the system. But upon initial import, however, only a subset of system functions may work with any given dataset. As the data is refined and transformed by system functions, more functions may become compatible. Certificates are associated with objects that pass constraint validation within the system to ensure that they conform to function requirements. The attached object constraints represent invariant properties of the object, which may be used by functions in the system as function preconditions. Furthermore, the functions defined in the system may associate certificates with the newly generated results. Certificates related to function results are effectively function postconditions, which in turn are used to associate certificates with the objects generated in the system. Additionally, attached object certificates reflect the refinement of data into a more pristine version. This paper describes the technique for modeling and enforcing the constraints for data scientists that have similar requirements.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130381139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions 电子商务交易中欺诈检测和预防的机器学习管道
Resham Jhangiani, Doina Bein, Abhishek Verma
Fraud has become a major problem in e-commerce and a lot of resources are being invested to recognize and prevent it. Present fraud detection and prevention systems are designed to prevent only a small fraction of fraudulent transactions processed, which still costs billions of dollars in loss. There is an urgent need for better fraud detection and prevention as the online transactions are estimated to increase substantially in the coming year. We propose a data driven model using machine learning algorithms on big data to predict the probability of a transaction being fraudulent or legitimate. The model was trained on historical e-commerce credit card transaction data to predict the probability of any future transaction by the customer being fraudulent. Supervised machine learning algorithms like Random Forest, Support Vector Machine, Gradient Boost and combinations of these are implemented and their performance are compared. While at the same time the problem of class imbalance is taken into consideration and techniques of oversampling and data pre-processing are performed before the model is trained on a classifier.
欺诈已成为电子商务中的一个主要问题,人们正在投入大量资源来识别和预防欺诈。目前的欺诈检测和预防系统只能防止一小部分已处理的欺诈交易,而这些交易仍造成数十亿美元的损失。由于网上交易预计在未来一年将大幅增加,因此迫切需要更好地检测和预防欺诈。我们提出了一个数据驱动模型,使用大数据上的机器学习算法来预测交易是欺诈还是合法的概率。该模型在历史电子商务信用卡交易数据上进行训练,以预测客户未来任何交易被欺诈的可能性。实现了随机森林、支持向量机、梯度增强等监督机器学习算法及其组合,并比较了它们的性能。同时考虑了类不平衡问题,在分类器上训练模型之前进行了过采样和数据预处理技术。
{"title":"Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions","authors":"Resham Jhangiani, Doina Bein, Abhishek Verma","doi":"10.1109/UEMCON47517.2019.8992993","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992993","url":null,"abstract":"Fraud has become a major problem in e-commerce and a lot of resources are being invested to recognize and prevent it. Present fraud detection and prevention systems are designed to prevent only a small fraction of fraudulent transactions processed, which still costs billions of dollars in loss. There is an urgent need for better fraud detection and prevention as the online transactions are estimated to increase substantially in the coming year. We propose a data driven model using machine learning algorithms on big data to predict the probability of a transaction being fraudulent or legitimate. The model was trained on historical e-commerce credit card transaction data to predict the probability of any future transaction by the customer being fraudulent. Supervised machine learning algorithms like Random Forest, Support Vector Machine, Gradient Boost and combinations of these are implemented and their performance are compared. While at the same time the problem of class imbalance is taken into consideration and techniques of oversampling and data pre-processing are performed before the model is trained on a classifier.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130741342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1