首页 > 最新文献

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

英文 中文
Multihop Transmission Strategy to Improve Energy Efficiency in WSNs 提高无线传感器网络能量效率的多跳传输策略
M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad
Many researches have shown interest in the development of energy efficient transmission technique to reduce the power consumption and to extend the network lifetime. In this paperweproposeanenergy-efficientmultihoptransmissionstrategy in Wireless Sensor Networks (WSN). We consider a clustered WSN where each cluster is composed of N sensor nodes. These last detect information and try to transmit it to the cluster head which is responsible for transmitting received data to a center of maintenance in order to take the appropriate intervention. We suppose that the transmitting symbol is correctly received only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold γth. The main objective of our work is to define a new transmission technique minimizing the power consumption using multihop communication. The selected relays which participate in this transmission are those offering the least transmit power while maintaining SNR equal to the threshold γth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission with a single relay. Simulations results demonstrate that our proposed strategy significantly reduces the energy consumption, thus confirm significant energy relative to direct transmission.
为了降低网络的功耗,延长网络的使用寿命,开发高效节能的传输技术已成为众多研究的热点。在无线传感器网络中,提出了一种节能的多跳传输策略。我们考虑一个集群WSN,其中每个集群由N个传感器节点组成。最后这些检测信息并尝试将其传输到集群头部,集群头部负责将接收到的数据传输到维护中心,以便采取适当的干预措施。我们假设只有当接收器的信噪比(SNR)高于阈值γth时,才能正确接收发送符号。我们工作的主要目标是定义一种新的传输技术,使用多跳通信使功耗最小化。参与该传输的所选中继是那些提供最小发射功率同时保持信噪比等于阈值γth的中继。因此,与直接传输和单继电器传输相比,所提出的传输技术可以大大降低功耗。仿真结果表明,我们提出的策略显著降低了能耗,从而确认了相对于直接传输的显著能量。
{"title":"Multihop Transmission Strategy to Improve Energy Efficiency in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad","doi":"10.1109/WAINA.2018.00076","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00076","url":null,"abstract":"Many researches have shown interest in the development of energy efficient transmission technique to reduce the power consumption and to extend the network lifetime. In this paperweproposeanenergy-efficientmultihoptransmissionstrategy in Wireless Sensor Networks (WSN). We consider a clustered WSN where each cluster is composed of N sensor nodes. These last detect information and try to transmit it to the cluster head which is responsible for transmitting received data to a center of maintenance in order to take the appropriate intervention. We suppose that the transmitting symbol is correctly received only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold γth. The main objective of our work is to define a new transmission technique minimizing the power consumption using multihop communication. The selected relays which participate in this transmission are those offering the least transmit power while maintaining SNR equal to the threshold γth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission with a single relay. Simulations results demonstrate that our proposed strategy significantly reduces the energy consumption, thus confirm significant energy relative to direct transmission.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stereo-Based 3D Space Handwriting Recognition 基于立体的3D空间手写识别
Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan
Recently, based on the improvements of hardware performance and the popularity of internet, big data analysis and artificial intelligence were successfully applied in a wide range of applications. Similarly, computer vision technology also benefited from the powerful performance of hardware and artificial intelligence, so that the computer vision technology could solve problem more efficiently and accurately and improve the development of automation. In this thesis, we aim at measuring the distance between the finger and camera, and tracking the finger to fulfill a stereo vision-based hand-writing recognition system in three-dimensional (3D) space. Traditionally, the researchers usually applied infrared sensors to recognize human's hands. However, the infrared sensor solution still be challenged in hand tracking algorithm under widely varying lighting, distance limitation, and the outdoor condition. As mentioned above, this thesis attempts to generate the depth information based on stereo vision for improving the finger tracking. Through the depth information, we determine and track the fingers step by step. Also, tracking target would be excluded from other objects and background. In this thesis, the Probability Density Function is applied to get the threshold value, which could find out the region of interest automatically instead of manually. Furthermore, the proposed system uses Particle Swarm Optimization for hand tracking. After getting the hand (palm) position in each frame, the grayscale image would be used to analyze the fingers. Finally, the multilayer perceptron is used to train the MNIST dataset for hand-writing character validation. The experimental results demonstrate that the proposed system could recognize hand-writing digits in 3D space in high accuracy without any constraints and restricted environment.
近年来,基于硬件性能的提升和互联网的普及,大数据分析和人工智能得到了成功的广泛应用。同样,计算机视觉技术也得益于硬件和人工智能的强大性能,使计算机视觉技术能够更高效、准确地解决问题,促进自动化的发展。在本文中,我们旨在测量手指与相机之间的距离,并跟踪手指,以实现三维空间中基于立体视觉的手写识别系统。传统上,研究人员通常使用红外传感器来识别人的手。然而,红外传感器解决方案在光照变化大、距离限制和室外条件下的手部跟踪算法仍然受到挑战。如上所述,本文试图基于立体视觉生成深度信息,以改进手指跟踪。通过深度信息,我们一步一步地确定和跟踪手指。此外,跟踪目标将被排除在其他物体和背景之外。本文采用概率密度函数来获取阈值,可以代替人工自动找到感兴趣的区域。此外,该系统采用粒子群算法进行手部跟踪。在获得每帧中的手(手掌)位置后,将使用灰度图像来分析手指。最后,使用多层感知器训练MNIST数据集进行手写字符验证。实验结果表明,该系统可以在不受任何约束和环境限制的情况下,高精度地识别三维空间中的手写数字。
{"title":"Stereo-Based 3D Space Handwriting Recognition","authors":"Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan","doi":"10.1109/WAINA.2018.00154","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00154","url":null,"abstract":"Recently, based on the improvements of hardware performance and the popularity of internet, big data analysis and artificial intelligence were successfully applied in a wide range of applications. Similarly, computer vision technology also benefited from the powerful performance of hardware and artificial intelligence, so that the computer vision technology could solve problem more efficiently and accurately and improve the development of automation. In this thesis, we aim at measuring the distance between the finger and camera, and tracking the finger to fulfill a stereo vision-based hand-writing recognition system in three-dimensional (3D) space. Traditionally, the researchers usually applied infrared sensors to recognize human's hands. However, the infrared sensor solution still be challenged in hand tracking algorithm under widely varying lighting, distance limitation, and the outdoor condition. As mentioned above, this thesis attempts to generate the depth information based on stereo vision for improving the finger tracking. Through the depth information, we determine and track the fingers step by step. Also, tracking target would be excluded from other objects and background. In this thesis, the Probability Density Function is applied to get the threshold value, which could find out the region of interest automatically instead of manually. Furthermore, the proposed system uses Particle Swarm Optimization for hand tracking. After getting the hand (palm) position in each frame, the grayscale image would be used to analyze the fingers. Finally, the multilayer perceptron is used to train the MNIST dataset for hand-writing character validation. The experimental results demonstrate that the proposed system could recognize hand-writing digits in 3D space in high accuracy without any constraints and restricted environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid 一种新的用于智能电网需求侧管理的元启发式混合增强差分和谐风(EDHWDO)优化技术
T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan
In recent decades numerous Demand Side Management (DSM) techniques have been merged for Smart Grid (SG). These techniques have been very effective in minimizing cost. However, lack in other characteristics like effective control over Peak Average Ratio (PAR) that why they are not equally beneficial for the utility. Due to different characteristic of different operations some techniques are really work well for cost and some for PAR. We have evaluated and extracted different operations from Harmony Search Algorithm (HSA), Enhanced Differential Evolution (EDE) and Wind Driven Optimization (WDO) for controlling cost along with PAR. A hybrid Enhanced Differential Harmony Wind Driven Optimization (EDHWADO) is formed that combines the cost effectiveness of WDO, HSA and PAR controlling operation through integration of EDE. The proposed hybrid engine proved to be most cost effective in comparison to Genetic Algorithm (GA), WDO along effective PAR control and User Comfort (UC) maximization. Real Time Pricing (RTP) signals are used to evaluate real time behavior of appliances. Three categories of appliances are used; fixed, elastic and shiftable. On basis of performances metrics, simulations proved that EDHWDO leads substantial cost saving along with enhancing user comfort and also helps in significant cost reduction.
近几十年来,许多需求侧管理(DSM)技术被用于智能电网(SG)。这些技术在降低成本方面非常有效。然而,由于缺乏对峰值平均比(PAR)的有效控制等其他特性,因此它们对公用事业不是同样有益。由于不同操作的不同特性,有些技术对成本和PAR确实有效。我们评估并提取了和谐搜索算法(HSA),增强差分进化(EDE)和风驱动优化(WDO)的不同操作,以控制成本和PAR。形成了混合增强差分和谐风驱动优化(EDHWADO),结合了WDO的成本效益,通过EDE一体化控制HSA和PAR的运行。与遗传算法(GA)、沿有效PAR控制的WDO和用户舒适度(UC)最大化相比,所提出的混合动力发动机最具成本效益。实时定价(RTP)信号用于评估设备的实时行为。使用的器具有三类;固定,弹性和可移动。在性能指标的基础上,仿真证明EDHWDO在提高用户舒适度的同时大幅节省了成本,也有助于显著降低成本。
{"title":"A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid","authors":"T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan","doi":"10.1109/WAINA.2018.00128","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00128","url":null,"abstract":"In recent decades numerous Demand Side Management (DSM) techniques have been merged for Smart Grid (SG). These techniques have been very effective in minimizing cost. However, lack in other characteristics like effective control over Peak Average Ratio (PAR) that why they are not equally beneficial for the utility. Due to different characteristic of different operations some techniques are really work well for cost and some for PAR. We have evaluated and extracted different operations from Harmony Search Algorithm (HSA), Enhanced Differential Evolution (EDE) and Wind Driven Optimization (WDO) for controlling cost along with PAR. A hybrid Enhanced Differential Harmony Wind Driven Optimization (EDHWADO) is formed that combines the cost effectiveness of WDO, HSA and PAR controlling operation through integration of EDE. The proposed hybrid engine proved to be most cost effective in comparison to Genetic Algorithm (GA), WDO along effective PAR control and User Comfort (UC) maximization. Real Time Pricing (RTP) signals are used to evaluate real time behavior of appliances. Three categories of appliances are used; fixed, elastic and shiftable. On basis of performances metrics, simulations proved that EDHWDO leads substantial cost saving along with enhancing user comfort and also helps in significant cost reduction.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Network Intrusions Using a Confidence-Based Reward System 使用基于信任的奖励系统检测网络入侵
Kole Nunley, Wei Lu
Combining multiple intrusion detection technologies into a hybrid system has been recently proposed to improve the comprehensive intrusion detection capability. However, such a hybrid system is not always stronger than its component detectors. Getting different detection technologies to interoperate effectively and efficiently has become a major challenge when building operational intrusion detection systems (IDS's). In this paper, we propose a novel reward system model in order to increase the accuracy and reliability of hybrid IDS's. In particular, the proposed confidence-based reward system built within a reinforcement learning algorithm includes three components. Namely, a relative discount factor, a confidence extraction technique, and a unique reward computing algorithm. The preliminary case studies show that the proposed reward system has a potential to improve the anomaly detection accuracy, decrease false alarm rate, and improve adaptability to new network traffic.
为了提高综合入侵检测能力,近年来提出了将多种入侵检测技术组合成一个混合系统。然而,这种混合系统并不总是比其组成探测器强。在构建可操作的入侵检测系统(IDS)时,如何使不同的检测技术有效地互操作已成为一个主要的挑战。为了提高混合入侵检测系统的准确性和可靠性,本文提出了一种新的奖励系统模型。特别地,在强化学习算法中建立的基于信心的奖励系统包括三个组成部分。即,一个相对折扣因子,一个置信度提取技术,和一个独特的奖励计算算法。初步的案例研究表明,所提出的奖励系统具有提高异常检测准确率、降低虚警率和提高对新网络流量适应性的潜力。
{"title":"Detecting Network Intrusions Using a Confidence-Based Reward System","authors":"Kole Nunley, Wei Lu","doi":"10.1109/WAINA.2018.00083","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00083","url":null,"abstract":"Combining multiple intrusion detection technologies into a hybrid system has been recently proposed to improve the comprehensive intrusion detection capability. However, such a hybrid system is not always stronger than its component detectors. Getting different detection technologies to interoperate effectively and efficiently has become a major challenge when building operational intrusion detection systems (IDS's). In this paper, we propose a novel reward system model in order to increase the accuracy and reliability of hybrid IDS's. In particular, the proposed confidence-based reward system built within a reinforcement learning algorithm includes three components. Namely, a relative discount factor, a confidence extraction technique, and a unique reward computing algorithm. The preliminary case studies show that the proposed reward system has a potential to improve the anomaly detection accuracy, decrease false alarm rate, and improve adaptability to new network traffic.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand 基于新西兰房产课程参与的学生行为特征分析
Shadi Esnaashari, L. Gardner, Michael Rehm
Identifying students' learning behavior is very important in giving insights to the lecturer. Tracking data from 102 university students' in class and out of class have been investigated to find a different pattern in their learning process. Our aim was to group the students based on their activities in their class and their performance on the final exam. Data from students' answers to the regular quizzes were used at the end of online modules, internal test, and tournament questions. A clustering algorithm has been applied to the students' data to group them with similar performance and scores. Four different groups of students have been identified. The results revealed that students who were more active and participated more in activities achieved better scores on their final exam.
识别学生的学习行为对于给讲师提供见解是非常重要的。对102名大学生课堂内外的跟踪数据进行了调查,以发现他们学习过程中的不同模式。我们的目的是根据学生在课堂上的活动和期末考试的表现对他们进行分组。学生对常规测验的回答数据用于在线模块、内部测试和锦标赛问题的结束。采用聚类算法对学生的数据进行分组,使其具有相似的表现和分数。已经确定了四组不同的学生。结果显示,那些更活跃、参加更多活动的学生在期末考试中取得了更好的成绩。
{"title":"Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand","authors":"Shadi Esnaashari, L. Gardner, Michael Rehm","doi":"10.1109/WAINA.2018.00055","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00055","url":null,"abstract":"Identifying students' learning behavior is very important in giving insights to the lecturer. Tracking data from 102 university students' in class and out of class have been investigated to find a different pattern in their learning process. Our aim was to group the students based on their activities in their class and their performance on the final exam. Data from students' answers to the regular quizzes were used at the end of online modules, internal test, and tournament questions. A clustering algorithm has been applied to the students' data to group them with similar performance and scores. Four different groups of students have been identified. The results revealed that students who were more active and participated more in activities achieved better scores on their final exam.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection 踏脚石入侵检测中的嗅探和欺骗网络流量
Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert
Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders' manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet.
自从踏脚石入侵被广泛用于对网络目标发起攻击以来,人们开发了许多检测踏脚石入侵的方法。我们发现大多数方法都需要嗅探和分析计算机网络流量来检测入侵。本文介绍了如何编写一个嗅探TCP/IP数据包的代码。但是一些入侵者可以使用TCP/IP会话操作来逃避检测,例如箔条扰动。为了帮助研究人员了解会话是如何被操纵的,并开发更先进的方法,不仅可以检测入侵的跳板,而且可以抵抗入侵者的操纵,我们提出了一个工具Fragroute,它可以用来在互联网上向TCP/IP会话注入无意义的数据包。
{"title":"Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection","authors":"Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert","doi":"10.1109/WAINA.2018.00137","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00137","url":null,"abstract":"Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders' manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MELODIC: Utility Based Cross Cloud Deployment Optimisation MELODIC:基于实用程序的跨云部署优化
G. Horn, Pawel Skrzypek
Cross Cloud deployment of applications allows for many additional benefits, like using the best Cloud provider for a given application component, increasing the reliability owing to the diversification of Cloud providers, and providing additional elasticity and capacity. On the other side, in practical applications, it is currently very difficult to properly plan and optimise the architecture of the application for cross Cloud deployment. Different Cloud providers uses different types of infrastructure, making direct comparisons difficult. Additionally, the requirements of the application could change over time and according to the application's execution context, workload, users, and many other aspects. This paper presents the fundamentals of the MELODIC solution based on a high level model of the application and dynamic, Cloud provider agnostic optimised deployment and reconfiguration of the application.
应用程序的跨云部署可以带来许多额外的好处,比如为给定的应用程序组件使用最好的云提供商,由于云提供商的多样化而提高可靠性,并提供额外的弹性和容量。另一方面,在实际应用中,目前很难正确地规划和优化跨云部署的应用程序架构。不同的云提供商使用不同类型的基础设施,这使得直接比较变得困难。此外,应用程序的需求可能随着时间的推移以及根据应用程序的执行上下文、工作负载、用户和许多其他方面而变化。本文介绍了MELODIC解决方案的基本原理,该解决方案基于应用程序的高级模型和动态的、与云提供商无关的优化部署和应用程序的重新配置。
{"title":"MELODIC: Utility Based Cross Cloud Deployment Optimisation","authors":"G. Horn, Pawel Skrzypek","doi":"10.1109/WAINA.2018.00112","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00112","url":null,"abstract":"Cross Cloud deployment of applications allows for many additional benefits, like using the best Cloud provider for a given application component, increasing the reliability owing to the diversification of Cloud providers, and providing additional elasticity and capacity. On the other side, in practical applications, it is currently very difficult to properly plan and optimise the architecture of the application for cross Cloud deployment. Different Cloud providers uses different types of infrastructure, making direct comparisons difficult. Additionally, the requirements of the application could change over time and according to the application's execution context, workload, users, and many other aspects. This paper presents the fundamentals of the MELODIC solution based on a high level model of the application and dynamic, Cloud provider agnostic optimised deployment and reconfiguration of the application.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Secure OTT Service Scheme Based on Blockchain Technology 基于区块链技术的安全OTT服务方案
Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen
Due to the popularity of multimedia and constantly growing capacity of network, digital media demanding is increasingly high in last decade. The digital media with copyrighted contents, such as pictures, videos, audios, and 3D-model materials, etc., are more important in today's e-commerce. In recent years, the digital media content service by using OTT (over-the-top) platform is an emerging e-commerce model. The traditional website of the digital media content (DMC) always provides the transaction platform for both content producer and content provider to upload their DMC products. Then, clients (consumers) could browse their interesting products on the website, and download DMCs after payment. However, the transaction of these copyrighted DMCs on the platform is still carried out by means of the traditional payment, e.g. credit cards, debit cards and the ACH (Automated Clearing House). This paper proposes an innovative secure private OTT (p-OTT) platform in which the transaction process could deal with the credible and customizable services by adopting blockchain technology. One of the key features of the blockchain technique is smart contract. Thus, each DMC product could be pre-defined a template of data contract. After negotiation process by using the smart contract, the real data contract (RDC) will be created and outputted by smart contract. According to the predefined template of data contract, the content producer or provider could easily implement his transaction policy. In addition, we design an online authentication key for each member and a shadow key pair for each booked DMC during a transaction period. Therefore, this paper presents a secure OTT model with blockchain technology. Finally, we shows that it is not only a secure OTT platform but also a flexible transaction via preforming smart contract.
近十年来,由于多媒体的普及和网络容量的不断增长,对数字媒体的需求越来越高。具有版权内容的数字媒体,如图片、视频、音频、3d模型材料等,在当今的电子商务中更加重要。近年来,利用OTT (over- top)平台提供数字媒体内容服务是一种新兴的电子商务模式。传统的数字媒体内容网站一直是内容生产者和内容提供者上传其数字媒体内容产品的交易平台。然后,客户(消费者)可以在网站上浏览他们感兴趣的产品,并在付款后下载dmc。然而,这些有版权的dmc在平台上的交易仍然是通过传统的支付方式进行的,例如信用卡、借记卡和ACH(自动清算所)。本文提出了一种创新的安全私有OTT (p-OTT)平台,该平台采用区块链技术,使交易过程能够处理可信的、可定制的服务。区块链技术的关键特征之一是智能合约。因此,每个DMC产品都可以预先定义一个数据契约模板。经过使用智能合约的协商过程,将由智能合约创建并输出真实的数据合约(RDC)。根据预定义的数据契约模板,内容生产者或提供者可以很容易地实现其事务策略。此外,我们为每个成员设计了一个在线认证密钥,并为每个交易期间预订的DMC设计了一个影子密钥对。为此,本文提出了一种基于区块链技术的安全OTT模型。最后,我们证明了它不仅是一个安全的OTT平台,而且通过执行智能合约实现了灵活的交易。
{"title":"Secure OTT Service Scheme Based on Blockchain Technology","authors":"Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen","doi":"10.1109/WAINA.2018.00161","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00161","url":null,"abstract":"Due to the popularity of multimedia and constantly growing capacity of network, digital media demanding is increasingly high in last decade. The digital media with copyrighted contents, such as pictures, videos, audios, and 3D-model materials, etc., are more important in today's e-commerce. In recent years, the digital media content service by using OTT (over-the-top) platform is an emerging e-commerce model. The traditional website of the digital media content (DMC) always provides the transaction platform for both content producer and content provider to upload their DMC products. Then, clients (consumers) could browse their interesting products on the website, and download DMCs after payment. However, the transaction of these copyrighted DMCs on the platform is still carried out by means of the traditional payment, e.g. credit cards, debit cards and the ACH (Automated Clearing House). This paper proposes an innovative secure private OTT (p-OTT) platform in which the transaction process could deal with the credible and customizable services by adopting blockchain technology. One of the key features of the blockchain technique is smart contract. Thus, each DMC product could be pre-defined a template of data contract. After negotiation process by using the smart contract, the real data contract (RDC) will be created and outputted by smart contract. According to the predefined template of data contract, the content producer or provider could easily implement his transaction policy. In addition, we design an online authentication key for each member and a shadow key pair for each booked DMC during a transaction period. Therefore, this paper presents a secure OTT model with blockchain technology. Finally, we shows that it is not only a secure OTT platform but also a flexible transaction via preforming smart contract.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing 从云到边缘和物联网:实现渗透计算的智能编排架构
Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari
The latest technological and conceptual developments have destroyed the centralized Cloud Computing model, moving Cloud services in emerging ICT infrastructures such as Edge, Fog and Internet of Things (IoT) that are closer to end users. Specifically, current Cloud computing programming models and resource orchestration techniques are challenged by the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be place near such devices. In this regard, the Osmotic Computing aims to provide a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, Fog an IoT layers. In this scientific paper, we investigate the Smart Orchestration of a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. Several use cases are presented for describing the Artificial Intelligence processes that enables the MELs deployment.
最新的技术和概念发展已经摧毁了集中式云计算模式,将云服务转移到边缘、雾和物联网(IoT)等新兴ICT基础设施中,使其更接近最终用户。具体来说,当前的云计算编程模型和资源编排技术受到物联网现象最近演变的挑战,因为智能设备变得越来越普及、强大和廉价。因此,服务需要放置在这些设备附近。在这方面,渗透计算旨在提供一种新的计算范式,该范式基于与云、边缘、雾和物联网层的基础设施和应用程序需求相关的部署和迁移策略。在这篇科学论文中,我们研究了一种名为MicroELement (MEL)的新软件抽象的智能编排,它封装了运行物联网应用程序所需的资源、服务和数据。介绍了几个用例,用于描述支持mel部署的人工智能流程。
{"title":"From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing","authors":"Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari","doi":"10.1109/WAINA.2018.00122","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00122","url":null,"abstract":"The latest technological and conceptual developments have destroyed the centralized Cloud Computing model, moving Cloud services in emerging ICT infrastructures such as Edge, Fog and Internet of Things (IoT) that are closer to end users. Specifically, current Cloud computing programming models and resource orchestration techniques are challenged by the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be place near such devices. In this regard, the Osmotic Computing aims to provide a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, Fog an IoT layers. In this scientific paper, we investigate the Smart Orchestration of a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. Several use cases are presented for describing the Artificial Intelligence processes that enables the MELs deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach 大数据算法的并行化和部署:TOREADOR方法
Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito
In order to reduce the initial investments needed by small and medium enterprises (SMEs) to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, TOREADOR proposes a Big Data Analytics framework which supports users in devising their own Big Data solutions by keeping the inherent costs at a minimum. Among the objectives of the TOREADOR framework is supporting developers in parallelizing and deploying their algorithms, in order to develop they own analytics solutions. This paper describes the Code-Based approach, developed by CINI and adopted within the TOREADOR framework to parallelize users' algorithms and deploy them on distributed platforms, with a focus on its integration with the web services and resources offered by ATOS for the actual deployment of the solution.
为了减少中小企业(sme)为获得必要的专业知识、硬件和软件来运行适当的大数据分析所需的初始投资,TOREADOR提出了一个大数据分析框架,支持用户通过将固有成本降至最低来设计自己的大数据解决方案。TOREADOR框架的目标之一是支持开发人员并行化和部署他们的算法,以便开发他们自己的分析解决方案。本文描述了由CINI开发并在TOREADOR框架内采用的基于代码的方法,以并行化用户的算法并将其部署到分布式平台上,重点介绍了它与ATOS提供的web服务和资源的集成,以实现解决方案的实际部署。
{"title":"Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach","authors":"Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito","doi":"10.1109/WAINA.2018.00120","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00120","url":null,"abstract":"In order to reduce the initial investments needed by small and medium enterprises (SMEs) to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, TOREADOR proposes a Big Data Analytics framework which supports users in devising their own Big Data solutions by keeping the inherent costs at a minimum. Among the objectives of the TOREADOR framework is supporting developers in parallelizing and deploying their algorithms, in order to develop they own analytics solutions. This paper describes the Code-Based approach, developed by CINI and adopted within the TOREADOR framework to parallelize users' algorithms and deploy them on distributed platforms, with a focus on its integration with the web services and resources offered by ATOS for the actual deployment of the solution.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1