首页 > 最新文献

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

英文 中文
Low Power Wireless Sensor Node Platform for Agriculture Monitoring in Argentina 阿根廷农业监测低功耗无线传感器节点平台
A. Valenzuela, Mauro Schwab, Adolfo A. Silnik, Alfredo F. Debattista, Roberto A. Kiessling
We present the development and evaluation of a basic building block for a future wireless sensor network for agriculture monitoring in Argentina. The module consists of a compact battery-powered wireless sensor node capable of monitoring the ambient air parameters of temperature, humidity, gas and air pressure in the agriculture industry of Argentina's Pampa region. Further in-and outputs allow the system to be extended flexibly by adding more sensors. Throughout the development, a simple, low-cost and open-source-based approach together with a lightweight communication protocol was pursued. The sensor nodes cover ranges of over 400 metres and can be operated on two AAA alkaline batteries for several years. Detailed current consumption values, range limits and battery life estimates are presented.
我们提出了阿根廷农业监测未来无线传感器网络的基本构建模块的开发和评估。该模块由一个紧凑的电池供电无线传感器节点组成,能够监测阿根廷潘帕地区农业工业的环境空气参数,包括温度、湿度、气体和气压。通过添加更多传感器,进一步的输入和输出允许系统灵活扩展。在整个开发过程中,采用了一种简单、低成本和基于开源的方法以及轻量级通信协议。传感器节点覆盖范围超过400米,可以使用两节AAA碱性电池运行数年。详细的电流消耗值,范围限制和电池寿命估计提出。
{"title":"Low Power Wireless Sensor Node Platform for Agriculture Monitoring in Argentina","authors":"A. Valenzuela, Mauro Schwab, Adolfo A. Silnik, Alfredo F. Debattista, Roberto A. Kiessling","doi":"10.1109/CYBERC.2018.00029","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00029","url":null,"abstract":"We present the development and evaluation of a basic building block for a future wireless sensor network for agriculture monitoring in Argentina. The module consists of a compact battery-powered wireless sensor node capable of monitoring the ambient air parameters of temperature, humidity, gas and air pressure in the agriculture industry of Argentina's Pampa region. Further in-and outputs allow the system to be extended flexibly by adding more sensors. Throughout the development, a simple, low-cost and open-source-based approach together with a lightweight communication protocol was pursued. The sensor nodes cover ranges of over 400 metres and can be operated on two AAA alkaline batteries for several years. Detailed current consumption values, range limits and battery life estimates are presented.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"50a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms 基于传统FPGA和LabVIEW FPGA平台的高效高速AES实现
M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe
The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.
LabVIEW FPGA平台基于图形化编程方法,使FPGA编程和I/O接口变得简单。LabVIEW FPGA显著提高了设计效率,并有助于缩短产品上市时间。另一方面,传统的FPGA平台通过使用HDL编程语言提供对每个位的控制,有助于实现高效/优化设计。本文利用传统的FPGA平台和LabVIEW平台对AES (Advanced Encryption Standard,高级加密标准)进行了高速优化设计。AES被认为是一种安全可靠的加密算法,在全球范围内用于提供加密服务,在不受信任的网络(如Internet)上通信时隐藏信息。在此,提出了AES核心,以保证ROV(遥控车辆)与控制站在海洋环境下的通信安全;但这个核心可以适用于任何其他高速电子通信。这项工作使用128位密钥提供128字节、256字节和512字节的输入集(单独和同时)加密。在同时实现的情况下,上述所有输入集都是并行加密的。这种同时实现导致了Gbps范围内的吞吐量。
{"title":"An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms","authors":"M. Rao, Admir Kaknjo, E. Omerdic, D. Toal, T. Newe","doi":"10.1109/CYBERC.2018.00028","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00028","url":null,"abstract":"The LabVIEW FPGA platform is based on graphical programming approach, which makes easy the FPGA programming and the I/O interfacing. The LabVIEW FPGA significantly improves the design productivity and helps to reduce the time to market. On the other hand, traditional FPGA platform is helpful to get an efficient/optimized design by providing control over each bit using HDL programming languages. This work utilized traditional as well as LabVIEW FPGA platforms to get an optimized high speed design of AES (Advanced Encryption Standard). The AES is considered to be a secure and reliable cryptographic algorithm that is used worldwide to provide encryption services, which hide the information during communication over untrusted networks, like Internet. Here, AES core is proposed to secure the communication between ROV (Remotely Operated Vehicle) and control station in a marine environment; but this core can be fit in any other high speed electronic communications. This work provides encryption of 128-bytes, 256-bytes and 512-bytes set of inputs (individually and simultaneously) using a 128-bit key. In case of simultaneous implementation, all the above mentioned set of inputs is encrypted in parallel. This simultaneous implementation is resulted in throughput of Gbps range.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVM 基于模糊多类支持向量机的微博垃圾信息检测
Guangxia Xu, G. Gao, Mengxiao Hu
Micro-blog has become an important information dissemination and exchange platform in people's social lives. Massive micro-blog data contains a large number of valuable information, but the micro-blog platform appears to have a lot of spam behavior problems in recent years; behavior consistent with spammers and spam micro-blogs. The spam not only affects the impact of micro-blog's data mining and decision analysis, but also seriously affects the healthy development of micro-blog platform and user experience. In this paper, a new spammer detection method based on fuzzy multi-class support vector machines (FMCSVM) is proposed in micro-blog, it combines the SVM multi-class classifier with the fuzzy mathematics theory in spammer detection. Current researches on micro-blog spammers is to analyze the characteristics of the global spammers, so that the strength of these analyses is not enough, and these researches lack the feature analysis for a certain type spammer. As a result, this will enable the spammer to escape the spam detection system. In this paper, we divide spammers into three categories by analyzing the features of micro-blog spammers, and then construct one-versus-rest SVM multi-class classifier. The fuzzy clustering method is used to deal with the mixed samples generated by the multi class classifier, and the combination classifier is obtained, which improves the detection accuracy.
微博已经成为人们社会生活中重要的信息传播和交流平台。海量的微博数据蕴含着大量有价值的信息,但近年来微博平台出现了大量垃圾信息行为问题;行为与垃圾邮件制造者和垃圾微博一致。垃圾邮件不仅影响了微博的数据挖掘和决策分析,而且严重影响了微博平台的健康发展和用户体验。本文提出了一种基于模糊多类支持向量机(FMCSVM)的微博垃圾邮件检测新方法,该方法将SVM多类分类器与模糊数学理论相结合,用于垃圾邮件检测。目前对微博垃圾邮件发送者的研究多是分析全球垃圾邮件发送者的特征,分析力度不够,缺乏对某一类垃圾邮件发送者的特征分析。因此,这将使垃圾邮件发送者能够逃避垃圾邮件检测系统。本文通过分析微博垃圾邮件发送者的特征,将垃圾邮件发送者分为三类,然后构建一对余支持向量机多类分类器。采用模糊聚类方法对多类分类器生成的混合样本进行处理,得到组合分类器,提高了检测精度。
{"title":"Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVM","authors":"Guangxia Xu, G. Gao, Mengxiao Hu","doi":"10.1109/CYBERC.2018.00016","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00016","url":null,"abstract":"Micro-blog has become an important information dissemination and exchange platform in people's social lives. Massive micro-blog data contains a large number of valuable information, but the micro-blog platform appears to have a lot of spam behavior problems in recent years; behavior consistent with spammers and spam micro-blogs. The spam not only affects the impact of micro-blog's data mining and decision analysis, but also seriously affects the healthy development of micro-blog platform and user experience. In this paper, a new spammer detection method based on fuzzy multi-class support vector machines (FMCSVM) is proposed in micro-blog, it combines the SVM multi-class classifier with the fuzzy mathematics theory in spammer detection. Current researches on micro-blog spammers is to analyze the characteristics of the global spammers, so that the strength of these analyses is not enough, and these researches lack the feature analysis for a certain type spammer. As a result, this will enable the spammer to escape the spam detection system. In this paper, we divide spammers into three categories by analyzing the features of micro-blog spammers, and then construct one-versus-rest SVM multi-class classifier. The fuzzy clustering method is used to deal with the mixed samples generated by the multi class classifier, and the combination classifier is obtained, which improves the detection accuracy.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Proxy Based Crawler Strategy for Data Collection on CyberGIS 基于动态代理的网络地理信息系统数据采集爬虫策略
Shumiao Yu, Weifeng Sun, Minghan Jia
With the development of geographic information system, digital earth and digital city play more and more important roles in life. The data generated by sensors or other edge nodes need to be collected by crawlers in the distributed systems in IoT, such as the GIS data in CyberGIS. In some edge networks, network operators have adopted methods to limit crawlers, such as blocking the request IP addresses, requiring logging in verification codes and other measures to avoid disturbance to servers. To collect data from web servers in these types of edge networks, a dynamic IP address based strategy DP-crawler is proposed to solve the anti-crawler strategies in the edge networks. DP-crawler can dynamic get proper IP addresses from a security-aware list and select the best available proxies. The security-aware list is designed to use the block-chain. Security and dynamic storage can be achieved by this method. DP-crawler is used to crawler webs, and the detailed information of Douban movies are obtained in the experiments. The experiment results show that the DP-Crawler can get more information by using the DP-Crawler.
随着地理信息系统的发展,数字地球和数字城市在人们的生活中发挥着越来越重要的作用。传感器或其他边缘节点产生的数据需要在物联网的分布式系统中由爬虫收集,例如CyberGIS中的GIS数据。在一些边缘网络中,网络运营商采取了屏蔽请求IP地址、要求登录验证码等措施来限制爬虫,避免对服务器造成干扰。针对边缘网络中web服务器的数据采集问题,提出了一种基于动态IP地址的DP-crawler策略来解决边缘网络中的反爬虫策略。DP-crawler可以从安全感知列表中动态获取合适的IP地址,并选择最佳可用代理。安全感知列表是为使用区块链而设计的。通过这种方法可以实现安全性和动态存储。采用DP-crawler对网络进行爬行,实验中获得了豆瓣电影的详细信息。实验结果表明,使用DP-Crawler可以获得更多的信息。
{"title":"A Dynamic Proxy Based Crawler Strategy for Data Collection on CyberGIS","authors":"Shumiao Yu, Weifeng Sun, Minghan Jia","doi":"10.1109/CYBERC.2018.00094","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00094","url":null,"abstract":"With the development of geographic information system, digital earth and digital city play more and more important roles in life. The data generated by sensors or other edge nodes need to be collected by crawlers in the distributed systems in IoT, such as the GIS data in CyberGIS. In some edge networks, network operators have adopted methods to limit crawlers, such as blocking the request IP addresses, requiring logging in verification codes and other measures to avoid disturbance to servers. To collect data from web servers in these types of edge networks, a dynamic IP address based strategy DP-crawler is proposed to solve the anti-crawler strategies in the edge networks. DP-crawler can dynamic get proper IP addresses from a security-aware list and select the best available proxies. The security-aware list is designed to use the block-chain. Security and dynamic storage can be achieved by this method. DP-crawler is used to crawler webs, and the detailed information of Douban movies are obtained in the experiments. The experiment results show that the DP-Crawler can get more information by using the DP-Crawler.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Binary Feature Extraction Based Data Provenance System Implemented on Flink Platform 基于二进制特征提取的数据溯源系统在Flink平台上实现
Yang Wang, Lan Li, Lei Fan
Data protection and the control of information flow are basic requirements for the security operation of enterprises or organizations. The data provenance of documents is a function that records the transmission of a specific document and provenance afterwards. As an important function of enterprise information security control, it has been confronted with the trouble of high management costs. Therefore, this paper attempts to recover the document content by proactively monitoring the internal traffic data of the enterprise and restore the document and find the parent document accurately through the proposed algorithm, thereby getting rid of the shackle of traditional document tracing. In order to ensure the flexibility and scalability of the streaming data restoration, this paper tries to build algorithm modules based on Flink, a streaming process platform, by migrating key computing services to its platform. In the process, the capture agent is set at the key node to collect traffic data, which is put into the stream processing system through the message queue. The stream processing system restores the file using document restoration algorithm, and finally the file is handed over to the feature extraction module. After the feature extraction module completes the file analysis, it is stored on file systems or structed data storage systems and waits for document tracking requests. The entire system solution achieved above and the daily business of the enterprise are completely seperated, while the load on the internal network flow is also very small. On the other hand, relying on the advantages of Flink's excellent distributed features, the experiments show that the data provenance results are satisfactory.
数据保护和信息流控制是企业或组织安全运行的基本要求。文件的数据溯源功能是记录特定文件的传递和其后的溯源功能。作为企业信息安全控制的一项重要功能,它一直面临着管理成本高的困扰。因此,本文试图通过主动监控企业内部的流量数据来恢复文档内容,并通过提出的算法准确地恢复文档并找到父文档,从而摆脱传统文档追踪的束缚。为了保证流数据恢复的灵活性和可扩展性,本文尝试在Flink流处理平台上构建算法模块,将关键计算服务迁移到Flink流处理平台上。在此过程中,在关键节点设置捕获代理,采集流量数据,并通过消息队列输入流处理系统。流处理系统使用文档还原算法对文件进行还原,最后将文件交给特征提取模块。特征提取模块完成文件分析后,存储在文件系统或结构化数据存储系统中,等待文档跟踪请求。整个系统解决方案实现了以上与企业的日常业务完全分离,同时内部网络流量的负载也非常小。另一方面,依托Flink优良的分布式特征优势,实验表明,数据溯源结果令人满意。
{"title":"A Binary Feature Extraction Based Data Provenance System Implemented on Flink Platform","authors":"Yang Wang, Lan Li, Lei Fan","doi":"10.1109/CYBERC.2018.00045","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00045","url":null,"abstract":"Data protection and the control of information flow are basic requirements for the security operation of enterprises or organizations. The data provenance of documents is a function that records the transmission of a specific document and provenance afterwards. As an important function of enterprise information security control, it has been confronted with the trouble of high management costs. Therefore, this paper attempts to recover the document content by proactively monitoring the internal traffic data of the enterprise and restore the document and find the parent document accurately through the proposed algorithm, thereby getting rid of the shackle of traditional document tracing. In order to ensure the flexibility and scalability of the streaming data restoration, this paper tries to build algorithm modules based on Flink, a streaming process platform, by migrating key computing services to its platform. In the process, the capture agent is set at the key node to collect traffic data, which is put into the stream processing system through the message queue. The stream processing system restores the file using document restoration algorithm, and finally the file is handed over to the feature extraction module. After the feature extraction module completes the file analysis, it is stored on file systems or structed data storage systems and waits for document tracking requests. The entire system solution achieved above and the daily business of the enterprise are completely seperated, while the load on the internal network flow is also very small. On the other hand, relying on the advantages of Flink's excellent distributed features, the experiments show that the data provenance results are satisfactory.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127979672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Word Representation with Word Pair Distributional Asymmetry 利用词对分布不对称改进词表示
Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong
Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.
分布式单词表示已经在许多自然语言处理应用程序上展示了令人印象深刻的改进。然而,现有的大多数词语表示学习方法很少考虑词序信息的使用,导致相似度和相关性的混淆。针对这一问题,我们提出了一种通用的学习方法DAV (Distributional asymmetric Vector),利用包含词序信息的词对分布不对称来构建更好的词表示。在两个大型基准测试和几个最先进的词表示学习模型上的实验研究表明了该方法的潜力。
{"title":"Improving Word Representation with Word Pair Distributional Asymmetry","authors":"Chuan Tian, Wenge Rong, Y. Ouyang, Zhang Xiong","doi":"10.1109/CYBERC.2018.00024","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00024","url":null,"abstract":"Distributed word representation has demonstrated impressive improvements on numerous natural language processing applications. However, most existing word representation learning methods rarely consider use of word order information, and lead to confusion of similarity and relevance. Targeting on this problem we propose a general learning approach DAV (Distributional Asymmetry Vector) to build better word representation by utilizing word pair distributional asymmetry, which contains word order information. Experimental study on two large benchmarks with several state-of-art word representation learning models has shown the potential of the proposed method.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Optimization of Big Data Platform Under the Internet of Things 物联网下的大数据平台优化
Suzhen Wang, Yanpiao Zhang, Lu Zhang, Ning Cao
The development of the Internet of things(IOT) has produced huge diversity of data. In view of the need for massive data processing and application by the Internet of things, the big data service platform arises at the historic moment. Our paper mainly studies the optimization of the big data platform in the background of Internet of things, and combines the Internet of things with the big data platform–Spark. In this paper, we proposed an improved Spark job scheduling scheme based on the genetic and tabu search algorithm. By optimizing the job scheduling algorithm of Spark, it will provide the better technical support for data processing in the Internet of things.
物联网(IOT)的发展产生了海量的数据。针对物联网对海量数据的处理和应用需求,大数据服务平台应运而生。本文主要研究物联网背景下大数据平台的优化,将物联网与大数据平台——spark相结合。本文提出了一种改进的基于遗传和禁忌搜索算法的Spark作业调度方案。通过对Spark作业调度算法的优化,将为物联网中的数据处理提供更好的技术支持。
{"title":"The Optimization of Big Data Platform Under the Internet of Things","authors":"Suzhen Wang, Yanpiao Zhang, Lu Zhang, Ning Cao","doi":"10.1109/CYBERC.2018.00034","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00034","url":null,"abstract":"The development of the Internet of things(IOT) has produced huge diversity of data. In view of the need for massive data processing and application by the Internet of things, the big data service platform arises at the historic moment. Our paper mainly studies the optimization of the big data platform in the background of Internet of things, and combines the Internet of things with the big data platform–Spark. In this paper, we proposed an improved Spark job scheduling scheme based on the genetic and tabu search algorithm. By optimizing the job scheduling algorithm of Spark, it will provide the better technical support for data processing in the Internet of things.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QAM Division Based Space-Time Modulation for Two-User Uplink Massive MIMO Systems 基于QAM分割的双用户上行海量MIMO系统空时调制
G. Han, Linxin Zhang, X. Mu, Dalong Zhang, Yi Sun
A two-user uplink massive MIMO system is considered in this paper, where each user has a single antenna and the base station (BS) is equipped with a large number of antennas. It is assumed that the small scale channel fading is Rayleigh fading and the channel fading coefficients keep quasi-static in two consecutive slots, and then, change to other values independently in the next two slots. For such a massive MIMO uplink system, a QAM division based space-time modulation scheme is proposed to execute the simultaneous communication of the two users with the same frequency, and four detectors are given to adapt to different conditions. In addition, the channel coefficients can also be figured out after the signals are correctly detected. Computer simulations demonstrate that the proposed scheme performs well and need less than 100 BS antennas to make the average BER below 10^3.
本文研究了一种双用户上行大规模MIMO系统,其中每个用户有一个天线,基站(BS)配备了大量天线。假设小尺度信道衰落为瑞利衰落,信道衰落系数在连续两个时隙保持准静态,然后在下两个时隙独立地改变为其他值。针对这种大规模MIMO上行系统,提出了一种基于QAM分频的空时调制方案,实现两个用户在同一频率下同时通信,并给出了四种检测器以适应不同的条件。此外,在正确检测信号后,还可以计算出通道系数。计算机仿真结果表明,该方案性能良好,只需不到100个BS天线即可使平均误码率低于10^3。
{"title":"QAM Division Based Space-Time Modulation for Two-User Uplink Massive MIMO Systems","authors":"G. Han, Linxin Zhang, X. Mu, Dalong Zhang, Yi Sun","doi":"10.1109/CYBERC.2018.00065","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00065","url":null,"abstract":"A two-user uplink massive MIMO system is considered in this paper, where each user has a single antenna and the base station (BS) is equipped with a large number of antennas. It is assumed that the small scale channel fading is Rayleigh fading and the channel fading coefficients keep quasi-static in two consecutive slots, and then, change to other values independently in the next two slots. For such a massive MIMO uplink system, a QAM division based space-time modulation scheme is proposed to execute the simultaneous communication of the two users with the same frequency, and four detectors are given to adapt to different conditions. In addition, the channel coefficients can also be figured out after the signals are correctly detected. Computer simulations demonstrate that the proposed scheme performs well and need less than 100 BS antennas to make the average BER below 10^3.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parafac-Based Blind Channel Estimation and Symbol Detection Scheme for Massive MIMO Systems 一种基于parafac的大规模MIMO系统盲信道估计和符号检测方案
Lingxiao Zhao, Shuangzhi Li, Jiankang Zhang, X. Mu
In this paper, a multi-user massive multiple-input and multiple-output (MIMO) uplink system is considered, in which multiple single antenna users communicate with a target BS equipped with a large antenna array. We assume both the BS and K users have no knowledge of channel statement information. For such a system, by utilizing the unique factorization of three-way tensors, we proposed a parafac-based blind channel estimation and symbol detection scheme for the massive MIMO system, the proposed system can ensure the unique identification of the channel matrix and symbol matrix in a noise-free case. In a noisy case, a novel fitting algorithm called constrained bilinear alternating least squares is proposed to efficiently estimate the channel matrix and symbols. Numerical simulation results illustrate that the proposed scheme has a superior bit error ratio and normalized mean square error performance than traditional least square method. In addition, it has a faster convergence speed than typical alternation least square fitting algorithm.
本文研究了一个多用户大规模多输入多输出(MIMO)上行系统,其中多个单天线用户与配备大型天线阵列的目标基站通信。我们假设BS和K用户都不知道通道语句信息。针对该系统,利用三向张量的唯一分解,提出了一种基于parafac的大规模MIMO系统盲信道估计和符号检测方案,该方案能够在无噪声情况下保证信道矩阵和符号矩阵的唯一识别。在噪声情况下,提出了一种新的拟合算法——约束双线性交替最小二乘,以有效地估计信道矩阵和信道符号。数值仿真结果表明,与传统的最小二乘法相比,该方法具有更好的误码率和归一化均方误差性能。与典型的交替最小二乘拟合算法相比,具有更快的收敛速度。
{"title":"A Parafac-Based Blind Channel Estimation and Symbol Detection Scheme for Massive MIMO Systems","authors":"Lingxiao Zhao, Shuangzhi Li, Jiankang Zhang, X. Mu","doi":"10.1109/CYBERC.2018.00069","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00069","url":null,"abstract":"In this paper, a multi-user massive multiple-input and multiple-output (MIMO) uplink system is considered, in which multiple single antenna users communicate with a target BS equipped with a large antenna array. We assume both the BS and K users have no knowledge of channel statement information. For such a system, by utilizing the unique factorization of three-way tensors, we proposed a parafac-based blind channel estimation and symbol detection scheme for the massive MIMO system, the proposed system can ensure the unique identification of the channel matrix and symbol matrix in a noise-free case. In a noisy case, a novel fitting algorithm called constrained bilinear alternating least squares is proposed to efficiently estimate the channel matrix and symbols. Numerical simulation results illustrate that the proposed scheme has a superior bit error ratio and normalized mean square error performance than traditional least square method. In addition, it has a faster convergence speed than typical alternation least square fitting algorithm.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of Video Analytics System Based on Edge Computing 基于边缘计算的视频分析系统的设计与实现
Yuejun Chen, Yinghao Xie, Yihong Hu, Yaqiong Liu, Guochu Shou
Real-Time video analytics, whose applications range from safety, public security to smart cities, is a typical use case of Internet of Things (IoT). However, uploading the video stream to the cloud for analytics cannot meet the requirements of low latency and efficient bandwidth usage. Edge video analytics, which uploads the stream at the edge node, is a key to solve the abovementioned problem. This paper proposes an intelligent video analytics system on edge computing platform. Combining the edge computing and video analytics, this system can analyze the video stream by face recognition, indoor positioning, and semantic analytics in real time and archive the videos automatically. Specifically, applied in conference room, the video analytics system analyzes the conference room scenario and files the conference videos, which reduces the cost of manual recording and promotes the data sharing. The implementation results prove that our system can operate smoothly on the edge computing platform to provide real-time and efficient video analytics services.
实时视频分析是物联网(IoT)的典型用例,其应用范围从安全、公共安全到智慧城市。但是,将视频流上传到云端进行分析,无法满足低时延和高效带宽利用的要求。边缘视频分析是解决上述问题的关键,它将视频流上传到边缘节点。提出了一种基于边缘计算平台的智能视频分析系统。该系统将边缘计算与视频分析相结合,通过人脸识别、室内定位、语义分析等对视频流进行实时分析,并对视频进行自动归档。具体应用于会议室,视频分析系统对会议室场景进行分析,对会议视频进行归档,降低人工录制的成本,促进数据共享。实施结果表明,系统能够在边缘计算平台上平稳运行,为用户提供实时、高效的视频分析服务。
{"title":"Design and Implementation of Video Analytics System Based on Edge Computing","authors":"Yuejun Chen, Yinghao Xie, Yihong Hu, Yaqiong Liu, Guochu Shou","doi":"10.1109/CYBERC.2018.00035","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00035","url":null,"abstract":"Real-Time video analytics, whose applications range from safety, public security to smart cities, is a typical use case of Internet of Things (IoT). However, uploading the video stream to the cloud for analytics cannot meet the requirements of low latency and efficient bandwidth usage. Edge video analytics, which uploads the stream at the edge node, is a key to solve the abovementioned problem. This paper proposes an intelligent video analytics system on edge computing platform. Combining the edge computing and video analytics, this system can analyze the video stream by face recognition, indoor positioning, and semantic analytics in real time and archive the videos automatically. Specifically, applied in conference room, the video analytics system analyzes the conference room scenario and files the conference videos, which reduces the cost of manual recording and promotes the data sharing. The implementation results prove that our system can operate smoothly on the edge computing platform to provide real-time and efficient video analytics services.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"79 290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1