首页 > 最新文献

2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
Integration of Communication Networks and Control Systems Using a Slotted Transmission Classification Model 基于开槽传输分类模型的通信网络与控制系统集成
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651811
Steffen Linsenmayer, Ben W. Carabelli, Frank Dürr, Jonathan Falk, F. Allgöwer, K. Rothermel
In this paper, we present a communication abstraction for Networked Control Systems that is characterized by a slotted transmission classification model. We discuss, how such a model can be implemented over local area networks by using IEEE Time Sensitive Networking methods. Furthermore, it is shown how asymptotic stability can be analyzed for linear systems that communicate over such a network. Based on the stability result, a controller design procedure is derived that takes the information captured in the network model into account. Further topics and related open problems that are implicated by the proposed model are briefly discussed as an outlook.
在本文中,我们提出了一个网络控制系统的通信抽象,其特点是一个狭缝传输分类模型。我们讨论了如何使用IEEE时间敏感网络方法在局域网上实现这样的模型。此外,还展示了如何分析在这种网络上通信的线性系统的渐近稳定性。根据稳定性结果,推导出考虑网络模型中捕获信息的控制器设计过程。进一步的主题和相关的开放问题,涉及到所提出的模型简要讨论作为展望。
{"title":"Integration of Communication Networks and Control Systems Using a Slotted Transmission Classification Model","authors":"Steffen Linsenmayer, Ben W. Carabelli, Frank Dürr, Jonathan Falk, F. Allgöwer, K. Rothermel","doi":"10.1109/CCNC.2019.8651811","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651811","url":null,"abstract":"In this paper, we present a communication abstraction for Networked Control Systems that is characterized by a slotted transmission classification model. We discuss, how such a model can be implemented over local area networks by using IEEE Time Sensitive Networking methods. Furthermore, it is shown how asymptotic stability can be analyzed for linear systems that communicate over such a network. Based on the stability result, a controller design procedure is derived that takes the information captured in the network model into account. Further topics and related open problems that are implicated by the proposed model are briefly discussed as an outlook.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Load Balancing for Distributed SDN with Harmony Search 基于和谐搜索的分布式SDN负载均衡
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651682
Sejun Kim, Sang-Young Kim, B. Lee, K. Kim, H. Youn
Unlike the traditional networking infrastructure, the software defined network (SDN) separates the network control function from the data transmission function. SDN of a large geographical area requires multiple controllers rather than a single centralized one, and controller provisioning has a significant impact on the network performance. In this paper we propose a novel load balancing scheme with switch migration to effectively solve the dynamic controller provisioning problem (DCPP) for SDN. The proposed scheme employs a meta-heuristic approach based on harmony search and K-means clustering of the switches. The proposed scheme is evaluated by computer simulation in terms of load balancing accuracy, and it turns out to be superior to the existing harmony search algorithm.
与传统的网络基础设施不同,软件定义网络(SDN)将网络控制功能与数据传输功能分离开来。大地理区域的SDN需要多个控制器,而不是一个集中的控制器,控制器的配置对网络性能的影响很大。为了有效解决SDN的动态控制器配置问题(DCPP),提出了一种基于交换机迁移的负载均衡方案。该方案采用基于和谐搜索和开关K-means聚类的元启发式方法。通过计算机仿真对该方案的负载均衡精度进行了评价,结果表明该方案优于现有的和谐搜索算法。
{"title":"Load Balancing for Distributed SDN with Harmony Search","authors":"Sejun Kim, Sang-Young Kim, B. Lee, K. Kim, H. Youn","doi":"10.1109/CCNC.2019.8651682","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651682","url":null,"abstract":"Unlike the traditional networking infrastructure, the software defined network (SDN) separates the network control function from the data transmission function. SDN of a large geographical area requires multiple controllers rather than a single centralized one, and controller provisioning has a significant impact on the network performance. In this paper we propose a novel load balancing scheme with switch migration to effectively solve the dynamic controller provisioning problem (DCPP) for SDN. The proposed scheme employs a meta-heuristic approach based on harmony search and K-means clustering of the switches. The proposed scheme is evaluated by computer simulation in terms of load balancing accuracy, and it turns out to be superior to the existing harmony search algorithm.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient 3D Placement of Access Points in an Aerial Wireless Network 空中无线网络中接入点的高效3D布局
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651769
Ismail Uluturk, Ismail Uysal, Kwang-Cheng Chen
Aerial deployment of access points (APs) to network infrastructure has been shown to be an effective technological solution for rapidly supplying networking services in diverse scenarios, particularly post-disaster networking after major hurricane, tsunami, and earthquake events, or for the purposes of homeland security. A straightforward yet helpful method for deployment of APs in this emerging technology is to consider the problem in two 2D planes, one for users and another for APs. However, considering the need for effectively connecting low-power user devices that may suffer from severe fading due to the blocking of line-of-sight(LoS) transmissions, genuine 3D deployment is very desirable, even though a simpler form of it had been mathematically an open problem until 2017 for 400 years. To meet the engineering requirements, we first leverage 3D random geometric graphs (RGG) to develop the joint optimization of 3D AP placement with a given number of APs for proper coverage. We further propose a computationally-efficient iterative algorithm to effectively deploy the adequate number of APs in 3D space and respond to dynamics of such wireless networks. Our simulations demonstrate the superior performance of this genuine 3D placement of APs over traditional approaches when considering connections for user devices, particularly for larger number of APs in rapid deployment.
向网络基础设施空中部署接入点(ap)已被证明是在各种情况下快速提供网络服务的有效技术解决方案,特别是在主要飓风、海啸和地震事件之后的灾后网络,或用于国土安全目的。在这种新兴技术中部署ap的一种简单而有用的方法是在两个2D平面上考虑问题,一个用于用户,另一个用于ap。然而,考虑到有效连接低功耗用户设备的需求,这些设备可能由于视线(LoS)传输的阻塞而遭受严重的衰落,真正的3D部署是非常可取的,尽管在2017年之前的400年里,一种更简单的形式在数学上一直是一个开放的问题。为了满足工程需求,我们首先利用3D随机几何图(RGG)来开发具有给定AP数量的3D AP放置的联合优化,以获得适当的覆盖。我们进一步提出了一种计算效率高的迭代算法,以有效地在3D空间中部署足够数量的ap,并响应这种无线网络的动态。我们的模拟表明,在考虑用户设备的连接时,特别是在快速部署的大量ap时,这种真正的3D ap放置比传统方法具有更好的性能。
{"title":"Efficient 3D Placement of Access Points in an Aerial Wireless Network","authors":"Ismail Uluturk, Ismail Uysal, Kwang-Cheng Chen","doi":"10.1109/CCNC.2019.8651769","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651769","url":null,"abstract":"Aerial deployment of access points (APs) to network infrastructure has been shown to be an effective technological solution for rapidly supplying networking services in diverse scenarios, particularly post-disaster networking after major hurricane, tsunami, and earthquake events, or for the purposes of homeland security. A straightforward yet helpful method for deployment of APs in this emerging technology is to consider the problem in two 2D planes, one for users and another for APs. However, considering the need for effectively connecting low-power user devices that may suffer from severe fading due to the blocking of line-of-sight(LoS) transmissions, genuine 3D deployment is very desirable, even though a simpler form of it had been mathematically an open problem until 2017 for 400 years. To meet the engineering requirements, we first leverage 3D random geometric graphs (RGG) to develop the joint optimization of 3D AP placement with a given number of APs for proper coverage. We further propose a computationally-efficient iterative algorithm to effectively deploy the adequate number of APs in 3D space and respond to dynamics of such wireless networks. Our simulations demonstrate the superior performance of this genuine 3D placement of APs over traditional approaches when considering connections for user devices, particularly for larger number of APs in rapid deployment.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
[Copyright notice] (版权)
Pub Date : 2019-01-01 DOI: 10.1109/ccnc.2019.8651863
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ccnc.2019.8651863","DOIUrl":"https://doi.org/10.1109/ccnc.2019.8651863","url":null,"abstract":"","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Ad Hoc Networking Devices for Off-the-Grid Public Safety Networks 离网公共安全网络的节能自组织网络设备
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651836
Jithin Jagannath, Sean Furman, Anu Jagannath, A. Drozd
In this paper, we present the preliminary work towards providing a complete end-to-end solution that can connect survivors of a disaster with each other and public safety authorities using a completely self-sufficient ad hoc network. Accordingly, we develop a Heterogeneous Efficient Low Power Radio (HELPER) that acts as a WiFi (Wireless Fidelity) access point for end-users to connect using custom application. These HELPERs then coordinate with each other to form a LoRa based ad hoc network. The proposed solution will use a distributed optimized cross-layer routing algorithm that aims to maximize the network lifetime. This aspect is critical especially in energy-limited scenarios after a disaster. Some of the envisioned services include text and voice messages, live map updates, ability to send distress messages (like 911 calls) to authorities. HELPER network can also be used by authorities to remotely monitor the connectivity of the affected area, alert users of imminent dangers and share resource information. We intend to provide resources (code and instructions) that will enable the researchers of the community to set up a HELPER in a cost-effective (< $ 150) manner using commercial off-the-self components and advance it further. Overall, we hope this technology will become instrumental in improving the efficiency and effectiveness of public safety activities.
在本文中,我们介绍了提供完整的端到端解决方案的初步工作,该解决方案可以使用完全自给自足的自组织网络将灾难幸存者彼此和公共安全当局联系起来。因此,我们开发了一种异构高效低功耗无线电(HELPER),作为终端用户使用自定义应用程序连接的WiFi(无线保真度)接入点。然后,这些helper相互协调,形成基于LoRa的自组织网络。提出的解决方案将使用分布式优化的跨层路由算法,旨在最大化网络生命周期。这方面是至关重要的,特别是在灾难后能源有限的情况下。一些设想的服务包括文本和语音信息,实时地图更新,向当局发送求救信息(如911电话)的能力。当局还可以使用辅助网络远程监控受影响地区的连通性,提醒用户即将发生的危险,并共享资源信息。我们打算提供资源(代码和说明),使社区的研究人员能够使用商业的自制组件以具有成本效益(< 150美元)的方式建立HELPER,并进一步推进它。总的来说,我们希望这项技术将有助于提高公共安全活动的效率和效力。
{"title":"Energy Efficient Ad Hoc Networking Devices for Off-the-Grid Public Safety Networks","authors":"Jithin Jagannath, Sean Furman, Anu Jagannath, A. Drozd","doi":"10.1109/CCNC.2019.8651836","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651836","url":null,"abstract":"In this paper, we present the preliminary work towards providing a complete end-to-end solution that can connect survivors of a disaster with each other and public safety authorities using a completely self-sufficient ad hoc network. Accordingly, we develop a Heterogeneous Efficient Low Power Radio (HELPER) that acts as a WiFi (Wireless Fidelity) access point for end-users to connect using custom application. These HELPERs then coordinate with each other to form a LoRa based ad hoc network. The proposed solution will use a distributed optimized cross-layer routing algorithm that aims to maximize the network lifetime. This aspect is critical especially in energy-limited scenarios after a disaster. Some of the envisioned services include text and voice messages, live map updates, ability to send distress messages (like 911 calls) to authorities. HELPER network can also be used by authorities to remotely monitor the connectivity of the affected area, alert users of imminent dangers and share resource information. We intend to provide resources (code and instructions) that will enable the researchers of the community to set up a HELPER in a cost-effective (< $ 150) manner using commercial off-the-self components and advance it further. Overall, we hope this technology will become instrumental in improving the efficiency and effectiveness of public safety activities.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Discovering Messengers with Erasure Coding for Communication in Wireless Ad hoc Networks 用Erasure编码发现无线自组织网络通信中的信使
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651824
Chunchao Liang, Chang Liu, Ying Li
Information exchange between distant nodes is the basis for all functionalities of a wireless ad hoc network. To effectively transmit a packet from one node to other distant nodes, the key is messenger discovery. It is important for a sender to find sufficient but not excessive direct neighboring nodes as messengers. On one hand, the messengers should be distant from the sender but not too far away. On the other hand, the messengers should be far from each other. However, the nature of the wireless ad hoc networks makes this mission a great challenge. In this paper, considering limited energy resource and the nature of ad hoc networks, we review the previous protocols and propose a new protocol, exploiting Erasure Coding for messenger discovery. Our proposed protocol is stateless and works in a distributed manner. In each messenger discovery process, the sender encodes a message into multiple packets with erasure coding and broadcasts the packets until it finds enough messengers activated. The receivers decide whether they should act as messengers or not, based on the percentage of received packets and the number of activated messengers. Mathematical analysis and simulations verifies the viability of our protocol, and shows the superiorities of our protocol.
远程节点之间的信息交换是无线自组织网络所有功能的基础。为了有效地将数据包从一个节点传输到其他远程节点,关键是信使发现。对于发送方来说,找到足够但不过量的直接相邻节点作为发送方是很重要的。一方面,送信人应该离发信人很远,但又不能太远。另一方面,信使应该远离彼此。然而,无线自组织网络的性质使这项任务成为一个巨大的挑战。在本文中,考虑到有限的能源和自组织网络的性质,我们回顾了以前的协议,并提出了一个新的协议,利用Erasure编码的信使发现。我们提出的协议是无状态的,以分布式方式工作。在每个信使发现过程中,发送方使用擦除编码将一条消息编码为多个数据包,并广播这些数据包,直到发现足够多的信使被激活。接收方根据接收到的包的百分比和激活的信使的数量来决定他们是否应该充当信使。数学分析和仿真验证了协议的可行性,显示了协议的优越性。
{"title":"Discovering Messengers with Erasure Coding for Communication in Wireless Ad hoc Networks","authors":"Chunchao Liang, Chang Liu, Ying Li","doi":"10.1109/CCNC.2019.8651824","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651824","url":null,"abstract":"Information exchange between distant nodes is the basis for all functionalities of a wireless ad hoc network. To effectively transmit a packet from one node to other distant nodes, the key is messenger discovery. It is important for a sender to find sufficient but not excessive direct neighboring nodes as messengers. On one hand, the messengers should be distant from the sender but not too far away. On the other hand, the messengers should be far from each other. However, the nature of the wireless ad hoc networks makes this mission a great challenge. In this paper, considering limited energy resource and the nature of ad hoc networks, we review the previous protocols and propose a new protocol, exploiting Erasure Coding for messenger discovery. Our proposed protocol is stateless and works in a distributed manner. In each messenger discovery process, the sender encodes a message into multiple packets with erasure coding and broadcasts the packets until it finds enough messengers activated. The receivers decide whether they should act as messengers or not, based on the percentage of received packets and the number of activated messengers. Mathematical analysis and simulations verifies the viability of our protocol, and shows the superiorities of our protocol.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Establishing Trusted and Timely Information Source using Social Media Services 利用社交媒体服务建立可信、及时的信息源
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651814
Ryutaro Ushigome, Mio Suzuki, Tao Ban, Takeshi Takahashi, D. Inoue, T. Matsuda, M. Sonoda
Social media is regarded as one of the most timely sources of information. Nevertheless, malicious users may misuse such media, and it may lead to severe incidents. Countermeasures to remove malicious user accounts and remove untrusted information need to be built. Various studies have been conducted until now. In this paper, we first provide an overview of recent work in this domain and then introduce our approach. Our preliminary experiment shows the feasibility of the research and discusses the future direction of this research.
社交媒体被认为是最及时的信息来源之一。然而,恶意用户可能会滥用这些媒体,并可能导致严重的事件。需要建立删除恶意用户帐户和删除不可信信息的对策。到目前为止,已经进行了各种研究。在本文中,我们首先概述了该领域的最新工作,然后介绍了我们的方法。初步实验表明了研究的可行性,并对未来的研究方向进行了探讨。
{"title":"Establishing Trusted and Timely Information Source using Social Media Services","authors":"Ryutaro Ushigome, Mio Suzuki, Tao Ban, Takeshi Takahashi, D. Inoue, T. Matsuda, M. Sonoda","doi":"10.1109/CCNC.2019.8651814","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651814","url":null,"abstract":"Social media is regarded as one of the most timely sources of information. Nevertheless, malicious users may misuse such media, and it may lead to severe incidents. Countermeasures to remove malicious user accounts and remove untrusted information need to be built. Various studies have been conducted until now. In this paper, we first provide an overview of recent work in this domain and then introduce our approach. Our preliminary experiment shows the feasibility of the research and discusses the future direction of this research.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building a Crowdsourcing based Disabled Pedestrian Level of Service routing application using Computer Vision and Machine Learning 使用计算机视觉和机器学习构建基于众包的残疾人服务路由应用程序
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651850
N. Blanc, Zhan Liu, O. Ertz, Diego Rojas, R. Sandoz, M. Sokhn, J. Ingensand, J. Loubier
The availability of global and scalable tools to assess disabled pedestrian level of service (DPLoS) is a real need, yet still a challenge in today’s world. This is due to the lack of tools that can ease the measurement of a level of service adapted to disabled people, and also to the limitation concerns about the availability of information regarding the existing level of service, especially in real time. This paper describes preliminary results to progress on those needs. It also includes a design for a navigation tool that can help a disabled person move around a city by suggesting the most adapted routes according to the person’s disabilities. The main topics are how to use advanced computer vision technologies, and how to benefit from the prevalence of handheld devices. Our approach intends to show how crowdsourcing techniques can improve data quality by gathering and combining up-to-date data with valuable field observations.
提供全球性和可扩展的工具来评估残疾行人的服务水平(DPLoS)是一个现实的需求,但在当今世界仍然是一个挑战。这是由于缺乏能够方便地衡量适合残疾人的服务水平的工具,也是由于对有关现有服务水平的信息的可用性的关注有限,特别是在实时方面。本文描述了在这些需求方面取得进展的初步结果。它还包括一个导航工具的设计,可以帮助残疾人在城市中走动,根据残疾人的残疾情况建议最适合的路线。主要主题是如何使用先进的计算机视觉技术,以及如何从手持设备的普及中受益。我们的方法旨在展示众包技术如何通过收集和结合最新数据和有价值的实地观察来提高数据质量。
{"title":"Building a Crowdsourcing based Disabled Pedestrian Level of Service routing application using Computer Vision and Machine Learning","authors":"N. Blanc, Zhan Liu, O. Ertz, Diego Rojas, R. Sandoz, M. Sokhn, J. Ingensand, J. Loubier","doi":"10.1109/CCNC.2019.8651850","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651850","url":null,"abstract":"The availability of global and scalable tools to assess disabled pedestrian level of service (DPLoS) is a real need, yet still a challenge in today’s world. This is due to the lack of tools that can ease the measurement of a level of service adapted to disabled people, and also to the limitation concerns about the availability of information regarding the existing level of service, especially in real time. This paper describes preliminary results to progress on those needs. It also includes a design for a navigation tool that can help a disabled person move around a city by suggesting the most adapted routes according to the person’s disabilities. The main topics are how to use advanced computer vision technologies, and how to benefit from the prevalence of handheld devices. Our approach intends to show how crowdsourcing techniques can improve data quality by gathering and combining up-to-date data with valuable field observations.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning at Your Fingertips 触手可及的深度学习
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651868
Jonathan Rogers, Dylan Simmons, Milesh Shah, Connor Rowland, Yi Shang
From SurveyMonkey to Google Forms, online surveys have become a cornerstone of modern research. However, these survey platforms lack the ability to provide advanced analysis to researchers, often requiring expensive third-party analytics software to rectify their shortcomings. We propose to solve this problem by adding data analysis capabilities onto TigerAware, an existing data collection platform. TigerAware offers a generic and customizable tool which allows researchers without technical expertise to create, manage, and deploy custom mobile surveys to participants in real-time. We seek to add data analysis functionalities to the TigerAware platform ranging from basic statistics functions to emotion recognition via deep learning. Our analysis platform uses data collected by TigerAware to give researchers real-time analytics throughout the duration of their study. Through our additions to the TigerAware platform, we present a novel all-in-one tool for researchers to facilitate effective survey creation, survey administration, data collection, and data analysis.
从SurveyMonkey到Google Forms,在线调查已经成为现代研究的基石。然而,这些调查平台缺乏为研究人员提供高级分析的能力,通常需要昂贵的第三方分析软件来纠正它们的缺点。我们建议通过在现有的数据收集平台TigerAware上添加数据分析功能来解决这个问题。TigerAware提供了一个通用的、可定制的工具,允许没有技术专长的研究人员创建、管理和部署定制的移动调查。我们试图将数据分析功能添加到TigerAware平台,从基本的统计功能到通过深度学习的情感识别。我们的分析平台使用TigerAware收集的数据,在研究期间为研究人员提供实时分析。通过我们对TigerAware平台的补充,我们为研究人员提供了一种新颖的一体化工具,以促进有效的调查创建,调查管理,数据收集和数据分析。
{"title":"Deep Learning at Your Fingertips","authors":"Jonathan Rogers, Dylan Simmons, Milesh Shah, Connor Rowland, Yi Shang","doi":"10.1109/CCNC.2019.8651868","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651868","url":null,"abstract":"From SurveyMonkey to Google Forms, online surveys have become a cornerstone of modern research. However, these survey platforms lack the ability to provide advanced analysis to researchers, often requiring expensive third-party analytics software to rectify their shortcomings. We propose to solve this problem by adding data analysis capabilities onto TigerAware, an existing data collection platform. TigerAware offers a generic and customizable tool which allows researchers without technical expertise to create, manage, and deploy custom mobile surveys to participants in real-time. We seek to add data analysis functionalities to the TigerAware platform ranging from basic statistics functions to emotion recognition via deep learning. Our analysis platform uses data collected by TigerAware to give researchers real-time analytics throughout the duration of their study. Through our additions to the TigerAware platform, we present a novel all-in-one tool for researchers to facilitate effective survey creation, survey administration, data collection, and data analysis.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asymmetric Hidden Node Problem Aware Routing Metric for Wireless Mesh Networks 无线网状网络非对称隐节点问题感知路由度量
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651716
Keisuke Maesako, Yumi Takaki, Tomio Kamada, C. Ohta
In recent years, wireless mesh networks (WMNs) have become popular because of their wide coverage areas and high fault tolerance. Although unlicensed-band off-the-shelf wireless devices based on IEEE 802.11 are widely deployed, WMNs based on IEEE 802.11 suffer from degradation of throughput owing to the hidden node problem. To mitigate this problem, in this study, we developed a new routing metric called the “Asymmetric Hidden node problem Aware routing Metric (AHAM).” AHAM enables a new flow to establish a source-destination path that largely avoids not only interference with hidden nodes of existing flows but also making hidden nodes on that path interfere with existing flows. This is because the hidden node problem can asymmetrically impact throughput between flows when new flows are established. As a response, AHAM aims to estimate the influence of hidden nodes accurately and compensate for how both the new and existing flows influence each other. Simulation results showed that AHAM realizes high throughput while maintaining network fairness compared with other metrics.
近年来,无线网状网络(WMNs)以其覆盖范围广、容错能力强等优点得到了广泛的应用。尽管基于IEEE 802.11的非授权频段现成无线设备得到了广泛部署,但由于隐藏节点问题,基于IEEE 802.11的wmn的吞吐量下降。为了缓解这个问题,在本研究中,我们开发了一种新的路由度量,称为“非对称隐藏节点问题感知路由度量(AHAM)”。AHAM使新流能够建立源-目的路径,在很大程度上避免了对现有流的隐藏节点的干扰,也避免了该路径上的隐藏节点对现有流的干扰。这是因为当建立新流时,隐藏节点问题会不对称地影响流之间的吞吐量。作为一种响应,AHAM旨在准确估计隐藏节点的影响,并补偿新流和现有流之间的相互影响。仿真结果表明,与其他指标相比,AHAM在保持网络公平性的同时实现了较高的吞吐量。
{"title":"Asymmetric Hidden Node Problem Aware Routing Metric for Wireless Mesh Networks","authors":"Keisuke Maesako, Yumi Takaki, Tomio Kamada, C. Ohta","doi":"10.1109/CCNC.2019.8651716","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651716","url":null,"abstract":"In recent years, wireless mesh networks (WMNs) have become popular because of their wide coverage areas and high fault tolerance. Although unlicensed-band off-the-shelf wireless devices based on IEEE 802.11 are widely deployed, WMNs based on IEEE 802.11 suffer from degradation of throughput owing to the hidden node problem. To mitigate this problem, in this study, we developed a new routing metric called the “Asymmetric Hidden node problem Aware routing Metric (AHAM).” AHAM enables a new flow to establish a source-destination path that largely avoids not only interference with hidden nodes of existing flows but also making hidden nodes on that path interfere with existing flows. This is because the hidden node problem can asymmetrically impact throughput between flows when new flows are established. As a response, AHAM aims to estimate the influence of hidden nodes accurately and compensate for how both the new and existing flows influence each other. Simulation results showed that AHAM realizes high throughput while maintaining network fairness compared with other metrics.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1