首页 > 最新文献

2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing最新文献

英文 中文
Deployment of Flow-Sensors in Internet of Things' Virtualization via OpenFlow 基于OpenFlow的流量传感器在物联网虚拟化中的部署
A. Mahmud, R. Rahmani, T. Kanter
A novel idea presented in this paper is to deploy the Open Flow technology in wireless sensor networks that can lead to a significant achievement in Internet of things and cloud computing arena through network virtualization. Two new abstract layers namely Common platform layer and virtualization layer can be added at the top and bottom of a preset Infrastructure as a Service architecture. Our proposed IOT virtualization can be applicable in a random topology scenario which makes possible of the flow-sensors' resources to be shared, establishment of multi operational sensor networks and escalation of the reach ability under the same platform without establishing any further physical networks. Flow-sensor achieved 39% more reach ability than the typical sensors in an ideal scenario and even better results are possible from the amount of packets generation and simulation time viewpoint for larger scale networks.
本文提出了一种新颖的思想,即在无线传感器网络中部署Open Flow技术,通过网络虚拟化在物联网和云计算领域取得重大成就。两个新的抽象层,即公共平台层和虚拟化层,可以在预设的基础设施即服务体系结构的顶部和底部添加。我们提出的物联网虚拟化可以应用于随机拓扑场景,在不建立任何物理网络的情况下,实现流传感器资源的共享,建立多业务传感器网络,提升同一平台下的到达能力。在理想情况下,流量传感器的可达能力比典型传感器高39%,从数据包生成量和模拟时间的角度来看,对于更大规模的网络可能会有更好的结果。
{"title":"Deployment of Flow-Sensors in Internet of Things' Virtualization via OpenFlow","authors":"A. Mahmud, R. Rahmani, T. Kanter","doi":"10.1109/MUSIC.2012.41","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.41","url":null,"abstract":"A novel idea presented in this paper is to deploy the Open Flow technology in wireless sensor networks that can lead to a significant achievement in Internet of things and cloud computing arena through network virtualization. Two new abstract layers namely Common platform layer and virtualization layer can be added at the top and bottom of a preset Infrastructure as a Service architecture. Our proposed IOT virtualization can be applicable in a random topology scenario which makes possible of the flow-sensors' resources to be shared, establishment of multi operational sensor networks and escalation of the reach ability under the same platform without establishing any further physical networks. Flow-sensor achieved 39% more reach ability than the typical sensors in an ideal scenario and even better results are possible from the amount of packets generation and simulation time viewpoint for larger scale networks.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Evaluation of Base Station Placement Scenarios for Mobile Node Localization 移动节点定位中基站放置方案的评估
Abdul Bais, Y. Morgan
The growing interest in utilizing short-range wireless for object positioning is compounded by the inherent GPS limitations. In order to harness the highest accuracy out of short-range positioning systems, we need to optimize the placement of Base-Stations (BS) in a given area. Hence, we need to study the impact of different influential attributes on the positioning problem as we alter the BS placement approach. In this paper we investigate different scenarios for short-range BS placement that maximize coverage and minimize the offset and strength of positioning error. Simulation results demonstrate that the optimal layout tends to be uniform placement of BSs in the area.
利用短距离无线进行目标定位的兴趣日益增长,而GPS固有的局限性又加剧了这种兴趣。为了利用短程定位系统的最高精度,我们需要优化基站(BS)在给定区域的位置。因此,我们需要研究在改变BS放置方法时,不同的影响属性对定位问题的影响。在本文中,我们研究了最大化覆盖范围和最小化定位误差偏移和强度的短程BS放置方案。仿真结果表明,最优布局趋向于在该区域内均匀放置BSs。
{"title":"Evaluation of Base Station Placement Scenarios for Mobile Node Localization","authors":"Abdul Bais, Y. Morgan","doi":"10.1109/MUSIC.2012.42","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.42","url":null,"abstract":"The growing interest in utilizing short-range wireless for object positioning is compounded by the inherent GPS limitations. In order to harness the highest accuracy out of short-range positioning systems, we need to optimize the placement of Base-Stations (BS) in a given area. Hence, we need to study the impact of different influential attributes on the positioning problem as we alter the BS placement approach. In this paper we investigate different scenarios for short-range BS placement that maximize coverage and minimize the offset and strength of positioning error. Simulation results demonstrate that the optimal layout tends to be uniform placement of BSs in the area.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure OTP and Biometric Verification Scheme for Mobile Banking 移动银行的安全联机服务和生物识别验证方案
Chang-Lung Tsai, Chun-Jung Chen, Deng-Jie Zhuang
Recently, according to the emerging development of smart mobile phones and tablet PC, mobile e-commerce has dramatically increased due to the reason that the function of smart mobile phone and tablet PC are combined together. M-banking is thus become more convenient, effective and timely through the new mobile communication systems. In order to raise the security of M-banking, some banks adopt the one-time password (OTP) to remedy the possible M-banking stealing risk. In the past, the OTP is sent to personal mobile phone. But, currently most of the smart mobile phone can performing M-banking easily. Thus, it gains higher risk of information security due to mobile phone hacking. In order to provide a reliable and secure M-banking process without decrease the convenience concurrently, in the paper one-time password (OTP) and personal biometric have been combined with personal identification and password for verification while M-banking. As the client side initiates a request for M-banking to the server side of a bank that provides M-banking service, the server side will generate an OTP with limited period for registration the M-banking and transmit to the client side. After receiving the OTP message, the client side must verify if the OTP message is validation and provided by the desired real server side. After then, the client side will register the on-line M-banking with the OTP in the specified short period. After receiving the service request, the server side will then request the client side to capture personal biometric such as fingerprint, iris, photo, and etc. immediately for further verification with the existed data stored in the server side to prevent the M-banking embezzling. If the personal biometric has been verified as an old one, the M-banking will immediately terminated by the server side. As the verification is finally done by the server side, the client side then can perform transaction via M-banking smoothly. The proposed scheme not only can provide secure M-banking, but also can clearly define the process. Therefore, if there are any M-banking arguments occurred due to Internet hacking or mobile phone stealing for M-banking, both of the server side and client side could protect their rights and interests.
近年来,随着智能手机和平板电脑的新兴发展,由于智能手机和平板电脑的功能结合在一起,移动电子商务急剧增加。通过新的移动通信系统,手机银行变得更加方便、有效和及时。为了提高手机银行的安全性,一些银行采用一次性密码(OTP)来弥补手机银行可能存在的被盗风险。过去,OTP是发送到个人手机上的。但是,目前大多数智能手机都可以很容易地实现移动银行。因此,由于手机被黑客入侵,信息安全风险更高。为了在不降低便利性的前提下提供可靠、安全的移动银行业务流程,本文将一次性密码(OTP)和个人生物识别技术与个人身份识别和密码验证相结合,实现了移动银行业务的实名化。当客户端向提供移动银行服务的银行服务器端发起移动银行请求时,服务器端将生成一个有期限的OTP,用于注册移动银行并传输给客户端。在接收到OTP消息后,客户端必须验证该OTP消息是否由所需的实服务器端验证并提供。在此之后,客户将在规定的短时间内向网上银行网点注册网上银行。服务器端收到服务请求后,立即请求客户端采集指纹、虹膜、照片等个人生物特征信息,与服务器端存储的已有数据进行进一步验证,防止移动银行盗用。如果个人生物特征被验证为旧的,移动银行将立即被服务器端终止。由于验证最终由服务器端完成,因此客户端可以顺利地通过移动银行进行交易。该方案不仅可以提供安全的移动银行服务,而且可以清晰地定义移动银行服务的流程。因此,如果发生手机银行因网络黑客攻击或手机被盗而引起的手机银行纠纷,服务器端和客户端都可以维护自己的权益。
{"title":"Secure OTP and Biometric Verification Scheme for Mobile Banking","authors":"Chang-Lung Tsai, Chun-Jung Chen, Deng-Jie Zhuang","doi":"10.1109/MUSIC.2012.31","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.31","url":null,"abstract":"Recently, according to the emerging development of smart mobile phones and tablet PC, mobile e-commerce has dramatically increased due to the reason that the function of smart mobile phone and tablet PC are combined together. M-banking is thus become more convenient, effective and timely through the new mobile communication systems. In order to raise the security of M-banking, some banks adopt the one-time password (OTP) to remedy the possible M-banking stealing risk. In the past, the OTP is sent to personal mobile phone. But, currently most of the smart mobile phone can performing M-banking easily. Thus, it gains higher risk of information security due to mobile phone hacking. In order to provide a reliable and secure M-banking process without decrease the convenience concurrently, in the paper one-time password (OTP) and personal biometric have been combined with personal identification and password for verification while M-banking. As the client side initiates a request for M-banking to the server side of a bank that provides M-banking service, the server side will generate an OTP with limited period for registration the M-banking and transmit to the client side. After receiving the OTP message, the client side must verify if the OTP message is validation and provided by the desired real server side. After then, the client side will register the on-line M-banking with the OTP in the specified short period. After receiving the service request, the server side will then request the client side to capture personal biometric such as fingerprint, iris, photo, and etc. immediately for further verification with the existed data stored in the server side to prevent the M-banking embezzling. If the personal biometric has been verified as an old one, the M-banking will immediately terminated by the server side. As the verification is finally done by the server side, the client side then can perform transaction via M-banking smoothly. The proposed scheme not only can provide secure M-banking, but also can clearly define the process. Therefore, if there are any M-banking arguments occurred due to Internet hacking or mobile phone stealing for M-banking, both of the server side and client side could protect their rights and interests.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Node Control Model for the Charging and Accounting Problem in MANETs 面向manet收费计费问题的节点控制模型
Inna Kofman, U. T. Nguyen, Hoang Lan Nguyen
Because of the lack of infrastructure in mobile ad hoc networks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and might be reluctant to forward packets for other nodes. In this paper, we address the charging and accounting problems in MANETs. We develop a theoretical game model that offer advice to a central authority about the allocation of resources for monitoring mobile nodes. The solution provides the optimal monitoring probability, which discourages nodes from cheating because the gain would be compensated by the penalty. The solution is then extended to accommodate realistic assumptions such as finite punishments and imperfect monitoring. The efficiency and usefulness of the deployment of monitoring mobile agents were confirmed by simulation results.
由于移动自组织网络(manet)缺乏基础设施,其正常运行必须依赖于移动节点之间的合作。但是,移动节点倾向于节省自己的资源,并且可能不愿意将数据包转发给其他节点。在本文中,我们解决了无线无线网络中的收费和会计问题。我们开发了一个理论博弈模型,为中央权威机构提供关于监控移动节点的资源分配的建议。该解决方案提供了最优的监控概率,这将阻止节点作弊,因为获得的收益将通过惩罚来补偿。然后,该解决方案被扩展以适应现实的假设,例如有限的惩罚和不完善的监控。仿真结果验证了监控移动代理部署的有效性和实用性。
{"title":"A Node Control Model for the Charging and Accounting Problem in MANETs","authors":"Inna Kofman, U. T. Nguyen, Hoang Lan Nguyen","doi":"10.1109/MUSIC.2012.40","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.40","url":null,"abstract":"Because of the lack of infrastructure in mobile ad hoc networks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and might be reluctant to forward packets for other nodes. In this paper, we address the charging and accounting problems in MANETs. We develop a theoretical game model that offer advice to a central authority about the allocation of resources for monitoring mobile nodes. The solution provides the optimal monitoring probability, which discourages nodes from cheating because the gain would be compensated by the penalty. The solution is then extended to accommodate realistic assumptions such as finite punishments and imperfect monitoring. The efficiency and usefulness of the deployment of monitoring mobile agents were confirmed by simulation results.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116498389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Global Connectivity by Joint Routing and Scheduling in Wireless Mesh Networks 无线网状网络中联合路由和调度实现全局连接
Stephen Atambire Nsoh, R. Benkoczi
Wireless mesh networks are at the forefront of the technological drive. Achieving high system throughput in these networks is challenging due to interference which limits concurrent transmissions. In this paper we study routing and link scheduling in time division multiple access networks free of contention. We extend the work in the literature in several ways: (a) we present simple joint routing and time slot scheduling algorithms that have outperformed the existing proposals in most of our experiments, (b) we report the results using a simple combinatorial bound on the optimal routing/scheduling solution which gives us an absolute measure of the quality of the routes, (c) we depart from the classical routing tree approach by constructing session based routes for data and we quantify the performance gains for this approach to justify its use when QoS constraints are considered. We perform extensive experiments to evaluate our model. Results from the experiments indicate that our model outperforms most of the known approaches in the literature.
无线网状网络处于技术驱动的前沿。在这些网络中实现高系统吞吐量是具有挑战性的,因为干扰限制了并发传输。本文研究了无争用时分多址网络中的路由和链路调度问题。我们从几个方面扩展了文献中的工作:(a)我们提出了简单的联合路由和时隙调度算法,在我们的大多数实验中都优于现有的建议,(b)我们报告了使用最优路由/调度解决方案的简单组合界的结果,该解决方案为我们提供了绝对衡量路线质量的方法。(c)我们通过为数据构建基于会话的路由来脱离经典的路由树方法,我们量化了这种方法的性能收益,以证明在考虑QoS约束时使用它是合理的。我们进行大量的实验来评估我们的模型。实验结果表明,我们的模型优于文献中大多数已知的方法。
{"title":"Towards Global Connectivity by Joint Routing and Scheduling in Wireless Mesh Networks","authors":"Stephen Atambire Nsoh, R. Benkoczi","doi":"10.1109/MUSIC.2012.44","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.44","url":null,"abstract":"Wireless mesh networks are at the forefront of the technological drive. Achieving high system throughput in these networks is challenging due to interference which limits concurrent transmissions. In this paper we study routing and link scheduling in time division multiple access networks free of contention. We extend the work in the literature in several ways: (a) we present simple joint routing and time slot scheduling algorithms that have outperformed the existing proposals in most of our experiments, (b) we report the results using a simple combinatorial bound on the optimal routing/scheduling solution which gives us an absolute measure of the quality of the routes, (c) we depart from the classical routing tree approach by constructing session based routes for data and we quantify the performance gains for this approach to justify its use when QoS constraints are considered. We perform extensive experiments to evaluate our model. Results from the experiments indicate that our model outperforms most of the known approaches in the literature.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recommend Significant Tags to Travel Photos Based on Web Mining 基于Web挖掘的旅游照片重要标签推荐
Jin-Yao Wang, Yu-Lun Chang, Wei-Sheng Zeng, Shian-Hua Lin
As the rapid development of smart phones and applications, users are familiar to take photos with smart phones on the trip and share photos to friends on social networks. Those photos are usually tagged and shared with trivial location information, such as attractions derived from mobile locations contributed from Facebook users. However, these attractions are not useful for enhancing the photo semantics. In this paper, we propose the Tag Recommendation System (TRS) that automatically mine significant tags from Flickr's photos so that these tags can be recommended to improve the semantics of photos according to location information. Experiments based on the user experience show that TRS can achieve about 85% satisfaction rates.
随着智能手机和应用的快速发展,用户已经熟悉在旅行中用智能手机拍照,并在社交网络上分享照片给朋友。这些照片通常被贴上标签,并与琐碎的位置信息一起分享,比如Facebook用户提供的移动位置带来的景点。然而,这些吸引力对增强照片语义没有帮助。在本文中,我们提出了标签推荐系统(Tag Recommendation System, TRS),该系统可以自动从Flickr的照片中挖掘重要的标签,并根据位置信息推荐这些标签以提高照片的语义。基于用户体验的实验表明,TRS可以达到85%左右的满意率。
{"title":"Recommend Significant Tags to Travel Photos Based on Web Mining","authors":"Jin-Yao Wang, Yu-Lun Chang, Wei-Sheng Zeng, Shian-Hua Lin","doi":"10.1109/MUSIC.2012.22","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.22","url":null,"abstract":"As the rapid development of smart phones and applications, users are familiar to take photos with smart phones on the trip and share photos to friends on social networks. Those photos are usually tagged and shared with trivial location information, such as attractions derived from mobile locations contributed from Facebook users. However, these attractions are not useful for enhancing the photo semantics. In this paper, we propose the Tag Recommendation System (TRS) that automatically mine significant tags from Flickr's photos so that these tags can be recommended to improve the semantics of photos according to location information. Experiments based on the user experience show that TRS can achieve about 85% satisfaction rates.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Architecture Proposal for User-Generated Mobile Services 用户生成移动服务的体系结构建议
Dirk Werth, Andreas Emrich, Alexandra Chapko
This paper presents an architecture proposal for mobile services. It covers server-side and terminal-side components for the easy creation, provision and consumption of mobile services. The intrinsic characteristics of mobile services are reflected in this approach. Especially the role of the power user, that not only consumes mobile services but also modifies them or creates services of his own, is in the focus of this design. The paper concludes with a proof-of-concept that has been carried out in a European research project.
本文提出了一种针对移动业务的体系结构方案。它涵盖了服务器端和终端端组件,以便轻松创建、提供和使用移动服务。这种方法反映了移动服务的内在特征。特别是超级用户的角色,他们不仅消费移动服务,而且还修改它们或创建自己的服务,这是本设计的重点。本文以在欧洲研究项目中进行的概念验证作为结论。
{"title":"An Architecture Proposal for User-Generated Mobile Services","authors":"Dirk Werth, Andreas Emrich, Alexandra Chapko","doi":"10.1109/MUSIC.2012.32","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.32","url":null,"abstract":"This paper presents an architecture proposal for mobile services. It covers server-side and terminal-side components for the easy creation, provision and consumption of mobile services. The intrinsic characteristics of mobile services are reflected in this approach. Especially the role of the power user, that not only consumes mobile services but also modifies them or creates services of his own, is in the focus of this design. The paper concludes with a proof-of-concept that has been carried out in a European research project.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"46 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125671664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mesh Network Deployment to Ensure Global Reachability 网状网络部署,确保全球可达性
S. Khaled, R. Benkoczi, Y. Chen
We propose and study a network design problem whose goal is to ensure Internet reach ability to mobile wireless devices. Such design of networks is a resource location allocation problem related to minimum cost unsplitable flow in a tripartite network. We present IP formulation for the problem, and produce test results with ILOG CPLEX. We also present heuristic algorithms using local search and VNS based procedures. We test the algorithms with different randomly generated network instances from size 500 - 5000 nodes. Our algorithms could obtain optimal solution for some of the input instances, beat the solutions obtained by CPLEX for some others, and obtained a worst case integrality gap of 3% for the rest.
我们提出并研究了一个网络设计问题,其目标是确保移动无线设备的互联网到达能力。这种网络设计是一个涉及到最小成本不可分割流在三方网络中的资源位置分配问题。提出了该问题的IP公式,并利用ILOG CPLEX进行了测试。我们还提出了使用本地搜索和基于VNS的程序的启发式算法。我们用500 - 5000个节点随机生成的不同网络实例来测试算法。我们的算法可以在一些输入实例中获得最优解,在其他输入实例中优于CPLEX算法的解,并且在其余输入实例中获得了3%的最差情况完整性差。
{"title":"Mesh Network Deployment to Ensure Global Reachability","authors":"S. Khaled, R. Benkoczi, Y. Chen","doi":"10.1109/MUSIC.2012.43","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.43","url":null,"abstract":"We propose and study a network design problem whose goal is to ensure Internet reach ability to mobile wireless devices. Such design of networks is a resource location allocation problem related to minimum cost unsplitable flow in a tripartite network. We present IP formulation for the problem, and produce test results with ILOG CPLEX. We also present heuristic algorithms using local search and VNS based procedures. We test the algorithms with different randomly generated network instances from size 500 - 5000 nodes. Our algorithms could obtain optimal solution for some of the input instances, beat the solutions obtained by CPLEX for some others, and obtained a worst case integrality gap of 3% for the rest.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Target Identification Using Multifrequency Radar Sensor Networks 利用多频雷达传感器网络识别目标
Jen-Shiun Chen
We present techniques for target identification using resonance-region, multifrequency radar sensor networks. The majority-vote (MV) and sum-distance (SD) nearest-neighbor (NN) algorithms are used. The NN reference set initially contains samples of target features over the possible ranges of target aspect angles. We use a data condensation rule to condense the initial reference set. Simulation results show that the identification error probabilities can be significantly lowered by 1. increasing the number of radar sensors, 2. increasing the number of frequencies, 3. using the complex features instead of the amplitude ones, 4. using the SD algorithm instead of the MV one.
我们介绍了利用共振区域多频雷达传感器网络进行目标识别的技术。我们使用了多数票(MV)和和-距离(SD)近邻(NN)算法。NN 参考集最初包含目标特征样本,涵盖目标纵横角的可能范围。我们使用数据压缩规则来压缩初始参考集。仿真结果表明,1.增加雷达传感器数量;2.增加频率数量;3.使用复合特征而不是振幅特征;4.使用 SD 算法而不是 MV 算法,可以显著降低识别错误概率。
{"title":"Target Identification Using Multifrequency Radar Sensor Networks","authors":"Jen-Shiun Chen","doi":"10.1109/MUSIC.2012.36","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.36","url":null,"abstract":"We present techniques for target identification using resonance-region, multifrequency radar sensor networks. The majority-vote (MV) and sum-distance (SD) nearest-neighbor (NN) algorithms are used. The NN reference set initially contains samples of target features over the possible ranges of target aspect angles. We use a data condensation rule to condense the initial reference set. Simulation results show that the identification error probabilities can be significantly lowered by 1. increasing the number of radar sensors, 2. increasing the number of frequencies, 3. using the complex features instead of the amplitude ones, 4. using the SD algorithm instead of the MV one.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building a Semantic Social Network Based on Interpersonal Relationships 构建基于人际关系的语义社会网络
Kee-Sung Lee, Myung-Duk Hong, Jin-Guk Jung, Geun-Sik Jo
With the emergence of the Smart phone, people can use Online Social Network Services ubiquitously, leading to a significant increase of the number of participants in online social networks. Under these circumstances, online users will require an intelligent and intuitive social relationship management system such as the ontology-driven browsing method. In this paper, to build a user-centered semantic social network and to represent entities and relationships with ontology to improve retrieval performance of the semantic social network, we will design our ontology extended from FOAF, RELATIONSHIP and propose a new method to compute closeness among friends using resources on social networks. Furthermore, we evaluate our ontology-driven browsing on via implementing a prototype system.
随着智能手机的出现,人们可以无处不在地使用在线社交网络服务,导致在线社交网络的参与者数量显著增加。在这种情况下,在线用户将需要一个智能和直观的社会关系管理系统,如本体驱动的浏览方式。为了构建以用户为中心的语义社交网络,用本体来表示实体和关系,提高语义社交网络的检索性能,我们将FOAF、RELATIONSHIP扩展到本体,提出了一种利用社交网络上的资源计算朋友之间亲密度的新方法。此外,我们通过实现一个原型系统来评估我们的本体驱动浏览。
{"title":"Building a Semantic Social Network Based on Interpersonal Relationships","authors":"Kee-Sung Lee, Myung-Duk Hong, Jin-Guk Jung, Geun-Sik Jo","doi":"10.1109/MUSIC.2012.23","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.23","url":null,"abstract":"With the emergence of the Smart phone, people can use Online Social Network Services ubiquitously, leading to a significant increase of the number of participants in online social networks. Under these circumstances, online users will require an intelligent and intuitive social relationship management system such as the ontology-driven browsing method. In this paper, to build a user-centered semantic social network and to represent entities and relationships with ontology to improve retrieval performance of the semantic social network, we will design our ontology extended from FOAF, RELATIONSHIP and propose a new method to compute closeness among friends using resources on social networks. Furthermore, we evaluate our ontology-driven browsing on via implementing a prototype system.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1