首页 > 最新文献

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

英文 中文
Declarative Modeling for Deploying a Container Platform 用于部署容器平台的声明式建模
Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi
Cloud computing services provide several benefits in terms of flexibility, scalability and cost reductions. Container technology allows to further lower the overhead of virtualization making it possible to run more components per server. Designing and deploying a cloud platform requires significant effort and it should be possibly dealt with automation tools. Automation can be dealt through either an imperative or declarative approach. We present how we designed and deployed a cloud container platform using declarative modeling. A model of the architecture of the service is described through a declarative specification and then passed to an orchestration tool that generates the actual plan of steps to be performed in the deployment.
云计算服务在灵活性、可伸缩性和降低成本方面提供了一些好处。容器技术允许进一步降低虚拟化的开销,使每台服务器运行更多组件成为可能。设计和部署云平台需要大量的工作,并且可能应该使用自动化工具来处理。自动化可以通过命令式或声明式方法来处理。我们介绍了如何使用声明性建模设计和部署云容器平台。通过声明性规范描述服务的体系结构模型,然后传递给编制工具,该工具生成部署中要执行的步骤的实际计划。
{"title":"Declarative Modeling for Deploying a Container Platform","authors":"Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi","doi":"10.1109/WAINA.2018.00116","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00116","url":null,"abstract":"Cloud computing services provide several benefits in terms of flexibility, scalability and cost reductions. Container technology allows to further lower the overhead of virtualization making it possible to run more components per server. Designing and deploying a cloud platform requires significant effort and it should be possibly dealt with automation tools. Automation can be dealt through either an imperative or declarative approach. We present how we designed and deployed a cloud container platform using declarative modeling. A model of the architecture of the service is described through a declarative specification and then passed to an orchestration tool that generates the actual plan of steps to be performed in the deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems 基于DTN路由的生命安全信息系统静态物体检测方法的提出
Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata
Although the life safety information systems on the smartphones are widely spread for the sake of the emergent situations in disasters, there have been some problems to use them by people who are not good to operate or are injured. Therefore, this paper proposes the static body object detection methods with the Delay Tolerant Networking for life safety information system. In the system, the sensors on smartphones automatically detect the abnormal static situations by the time and position differences based with the Markov Chain Monte Carlo methods, and the emergent messages are automatically transmitted with the message priorities. Moreover, those messages are transmitted to the servers with the Delay Tolerant Networking. Then, the prototype system is introduced, and the experiments are discussed for the effectiveness of the proposed systems.
虽然智能手机上的生命安全信息系统在灾害紧急情况下得到了广泛的应用,但对于不擅长操作或受伤的人来说,使用智能手机也存在一些问题。为此,本文提出了基于时延容忍网络的生命安全信息系统静态物体检测方法。在系统中,智能手机上的传感器基于马尔可夫链蒙特卡罗方法,根据时间和位置差异自动检测异常静态情况,并根据消息优先级自动发送紧急消息。此外,这些消息通过延迟容忍网络传输到服务器。然后,介绍了原型系统,并对系统的有效性进行了实验讨论。
{"title":"Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems","authors":"Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/WAINA.2018.00072","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00072","url":null,"abstract":"Although the life safety information systems on the smartphones are widely spread for the sake of the emergent situations in disasters, there have been some problems to use them by people who are not good to operate or are injured. Therefore, this paper proposes the static body object detection methods with the Delay Tolerant Networking for life safety information system. In the system, the sensors on smartphones automatically detect the abnormal static situations by the time and position differences based with the Markov Chain Monte Carlo methods, and the emergent messages are automatically transmitted with the message priorities. Moreover, those messages are transmitted to the servers with the Delay Tolerant Networking. Then, the prototype system is introduced, and the experiments are discussed for the effectiveness of the proposed systems.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"58 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves 基于物联网的电子学习试验台的实现:考虑四种脑电波的Mean-Shift聚类方法的性能评估
Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we present an IoT-Based E-Learning testbed using Raspberry Pi mounted on Raspbian. We carried out some experiments with a student of our laboratory for gamma type of brain waves. We used Mind Wave Mobile (MWM) to get the data and considered four situations: sleeping, relaxing, active and moving. Then, we used mean-shift clustering algorithm to cluster the data. The evaluation results show that our testbed can judge the human situation by using delta, theta, gamma and alpha brain waves.
由于互联网提供的机会,人们正在利用电子学习课程,大量的研究工作已经致力于电子学习系统的开发。到目前为止,人们提出了许多电子学习系统并进行了实际应用。然而,在这些系统中,电子学习完成率很低。原因之一是学习欲望和动力不高。在这项工作中,我们提出了一个基于物联网的电子学习测试平台,使用安装在树莓派上的树莓派。我们和我们实验室的一个学生一起做了一些伽马型脑电波的实验。我们使用Mind Wave Mobile (MWM)来获取数据,并考虑了四种情况:睡眠、放松、活动和运动。然后,采用mean-shift聚类算法对数据进行聚类。评估结果表明,我们的测试平台可以通过delta, theta, gamma和alpha脑电波来判断人的情况。
{"title":"Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves","authors":"Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli","doi":"10.1109/WAINA.2018.00088","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00088","url":null,"abstract":"Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we present an IoT-Based E-Learning testbed using Raspberry Pi mounted on Raspbian. We carried out some experiments with a student of our laboratory for gamma type of brain waves. We used Mind Wave Mobile (MWM) to get the data and considered four situations: sleeping, relaxing, active and moving. Then, we used mean-shift clustering algorithm to cluster the data. The evaluation results show that our testbed can judge the human situation by using delta, theta, gamma and alpha brain waves.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Deep Learning Framework to Enhance Software Defined Networks Security 增强软件定义网络安全性的深度学习框架
A. Dawoud, Seyed Shahristani, Chun Raun
Software-Defined Networks (SDN) initiates a novel networking model. SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. The architecture enhances the network resilient, decompose management complexity, and support more straightforward network policies enforcement. However, the model suffers from severe security threats. Specifically, a centralized network controller is a precious target for two reasons. First, the controller is located at a central point between the application and data planes. Second, a controller is software which prone to vulnerabilities, e.g., buffer and stack overflow. Hence, providing security measures is a crucial procedure towards the fully unleash of the new model capabilities. Intrusion detection is an option to enhance the networking security. Several approaches were proposed, for instance, signature-based, and anomaly detection. Anomaly detection is a broad approach deployed by various methods, e.g., machine learning. For many decades intrusion detection solution suffers performance and accuracy deficiencies. This paper revisits network anomalies detection as recent advances in machine learning particularly deep learning proofed success in many areas like computer vision and speech recognition. The study proposes an intrusion detection framework based on unsupervised deep learning algorithms.
软件定义网络(SDN)开创了一种新的网络模式。SDN通过引入一种称为网络控制器的新的独立平面,提出了转发平面和控制平面的分离。该体系结构增强了网络弹性,分解了管理复杂性,并支持更直接的网络策略实施。然而,该模型面临着严重的安全威胁。具体来说,集中式网络控制器是一个宝贵的目标,原因有两个。首先,控制器位于应用程序和数据平面之间的中心点。其次,控制器是一种容易出现漏洞的软件,例如缓冲区和堆栈溢出。因此,提供安全措施是充分释放新模型功能的关键步骤。入侵检测是增强网络安全的一种手段。提出了基于签名的检测方法和异常检测方法。异常检测是一种广泛的方法,由各种方法部署,例如机器学习。几十年来,入侵检测解决方案一直存在性能和准确性方面的缺陷。随着机器学习的最新进展,特别是深度学习在计算机视觉和语音识别等许多领域取得了成功,本文重新审视了网络异常检测。本研究提出了一种基于无监督深度学习算法的入侵检测框架。
{"title":"A Deep Learning Framework to Enhance Software Defined Networks Security","authors":"A. Dawoud, Seyed Shahristani, Chun Raun","doi":"10.1109/WAINA.2018.00172","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00172","url":null,"abstract":"Software-Defined Networks (SDN) initiates a novel networking model. SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. The architecture enhances the network resilient, decompose management complexity, and support more straightforward network policies enforcement. However, the model suffers from severe security threats. Specifically, a centralized network controller is a precious target for two reasons. First, the controller is located at a central point between the application and data planes. Second, a controller is software which prone to vulnerabilities, e.g., buffer and stack overflow. Hence, providing security measures is a crucial procedure towards the fully unleash of the new model capabilities. Intrusion detection is an option to enhance the networking security. Several approaches were proposed, for instance, signature-based, and anomaly detection. Anomaly detection is a broad approach deployed by various methods, e.g., machine learning. For many decades intrusion detection solution suffers performance and accuracy deficiencies. This paper revisits network anomalies detection as recent advances in machine learning particularly deep learning proofed success in many areas like computer vision and speech recognition. The study proposes an intrusion detection framework based on unsupervised deep learning algorithms.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain 基于云的特定域虚拟策略网络管理方案中用户认证方法的概念
Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations as a third step, concept of user authentication method applied for this scheme is expanded and described.
在目前的互联网系统中,存在着许多使用网络通信匿名性的问题,如个人信息泄露和利用互联网系统犯罪。这就是Internet系统中使用的TCP/IP协议在通信数据上没有用户身份信息的原因,很难对用户进行上述行为的即时监督。基于策略的网络管理(PBNM)就是为了解决上述问题而进行的研究。这是一种通过对每个用户的通信控制来管理整个局域网(LAN)的方案。在这种PBNM中,存在两种类型的方案。作为一种方案,我们从理论上研究了与现有internet相关的目的寻址控制系统(DACS)方案。将该DACS方案应用于Internet系统管理,实现基于策略的Internet系统管理。本文进一步扩展并描述了应用于该方案的用户认证方法的概念,以实现对具有多个组织的网络组的特定域的管理。
{"title":"Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain","authors":"Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa","doi":"10.1109/WAINA.2018.00127","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00127","url":null,"abstract":"In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations as a third step, concept of user authentication method applied for this scheme is expanded and described.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs 基于集群组织阶段的无线传感器网络节能传输策略
M. Abderrahim, Hela Hakim, H. Boujemaa
Recently, Wireless Sensor Network (WSN) has drawn serious attention to the researchers. The most important challenge of WSN is how to extend its lifetime. In this paper, we propose an energy-efficient multihop transmission strategy with organization cluster phase. During this phase, we try to choose the cluster head node which allows communicating with the other nodes with possible minimum energy and classify the remaining nodes into two groups. We consider a WSN organized into clusters, each cluster is composed of N sensor nodes classified as follows: source node, elected CH node as the destination, group of active nodes and group of sleeping nodes. When a source node detects relevant information in the network, it tries to transmit it to the cluster head via a cooperative or non-cooperative transmission. The transmission is supposed to be correct only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold ãth. The main objective of our work is to define a new transmission technique minimizing the power consumption. It is a multihop transmission technique where the selected relays which cooperate in the transmission are those offering the least transmit power while maintaining SNR equal to the threshold ãth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission where the CH node is chosen randomly within the cluster. Simulations results demonstrate that adding an organization cluster phase before transmitting data significantly increases the energy savings.
近年来,无线传感器网络(WSN)受到了研究人员的高度关注。无线传感器网络面临的最大挑战是如何延长其使用寿命。本文提出了一种具有组织簇阶段的节能多跳传输策略。在此阶段,我们尝试选择能够以尽可能小的能量与其他节点进行通信的簇头节点,并将剩余节点分为两组。我们考虑将WSN组织成簇,每个簇由N个传感器节点组成,分类如下:源节点、被选为目标的CH节点、活动节点组和睡眠节点组。当一个源节点在网络中检测到相关信息时,它尝试通过合作或非合作传输将其传输到集群头部。只有当接收器的信噪比(SNR)高于阈值 th时,传输才被认为是正确的。我们工作的主要目标是定义一种新的传输技术,使功耗最小化。它是一种多跳传输技术,选择在传输中提供最小发射功率的中继,同时保持信噪比等于阈值 th。因此,与直接传输和在集群内随机选择CH节点的传输相比,所提出的传输技术可以大大降低功耗。仿真结果表明,在传输数据前添加组织集群阶段可以显著提高系统的节能效果。
{"title":"Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa","doi":"10.1109/WAINA.2018.00142","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00142","url":null,"abstract":"Recently, Wireless Sensor Network (WSN) has drawn serious attention to the researchers. The most important challenge of WSN is how to extend its lifetime. In this paper, we propose an energy-efficient multihop transmission strategy with organization cluster phase. During this phase, we try to choose the cluster head node which allows communicating with the other nodes with possible minimum energy and classify the remaining nodes into two groups. We consider a WSN organized into clusters, each cluster is composed of N sensor nodes classified as follows: source node, elected CH node as the destination, group of active nodes and group of sleeping nodes. When a source node detects relevant information in the network, it tries to transmit it to the cluster head via a cooperative or non-cooperative transmission. The transmission is supposed to be correct only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold ãth. The main objective of our work is to define a new transmission technique minimizing the power consumption. It is a multihop transmission technique where the selected relays which cooperate in the transmission are those offering the least transmit power while maintaining SNR equal to the threshold ãth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission where the CH node is chosen randomly within the cluster. Simulations results demonstrate that adding an organization cluster phase before transmitting data significantly increases the energy savings.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets 基于子词的政治推文情感分析深度学习方法
Marco Pota, M. Esposito, Marco A. Palomino, G. Masala
The successful use of online material in political campaigns over the past two decades has motivated the inclusion of social media platforms—such as Twitter—as an integral part of the political apparatus. Political analysts are increasingly turning to Twitter as an indicator of public opinion. We are interested in learning how positive and negative opinions propagate through Twitter and how important events influence public opinion. In this paper, we present a neural network-based approach to analyse the sentiment expressed on political tweets. First, our approach represents the text by dense vectors comprising subword information to better detect word similarities by exploiting both morphology and semantics. Then, a Convolutional Neural Network is trained to learn how to classify tweets depending on sentiment, based on an available labelled dataset. Finally, the model is applied to perform the sentiment analysis of a collection of tweets retrieved during the days prior to the latest UK General Election. Results are promising and show that the neural network approach represents an improvement over lexicon-based approaches for positive/negative sentence classification.
在过去的二十年里,在线材料在政治竞选中的成功应用促使社交媒体平台——如twitter——成为政治机器的一个组成部分。政治分析人士越来越多地把Twitter作为民意的指示器。我们感兴趣的是了解积极和消极的意见是如何通过Twitter传播的,以及重要事件是如何影响公众舆论的。在本文中,我们提出了一种基于神经网络的方法来分析政治推文上表达的情绪。首先,我们的方法通过包含子词信息的密集向量来表示文本,通过利用形态学和语义来更好地检测词的相似性。然后,训练卷积神经网络学习如何基于可用的标记数据集根据情绪对推文进行分类。最后,将该模型应用于对最近一次英国大选前几天检索到的推文集合进行情感分析。结果很有希望,并且表明神经网络方法代表了基于词典的正负句分类方法的改进。
{"title":"A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets","authors":"Marco Pota, M. Esposito, Marco A. Palomino, G. Masala","doi":"10.1109/WAINA.2018.00162","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00162","url":null,"abstract":"The successful use of online material in political campaigns over the past two decades has motivated the inclusion of social media platforms—such as Twitter—as an integral part of the political apparatus. Political analysts are increasingly turning to Twitter as an indicator of public opinion. We are interested in learning how positive and negative opinions propagate through Twitter and how important events influence public opinion. In this paper, we present a neural network-based approach to analyse the sentiment expressed on political tweets. First, our approach represents the text by dense vectors comprising subword information to better detect word similarities by exploiting both morphology and semantics. Then, a Convolutional Neural Network is trained to learn how to classify tweets depending on sentiment, based on an available labelled dataset. Finally, the model is applied to perform the sentiment analysis of a collection of tweets retrieved during the days prior to the latest UK General Election. Results are promising and show that the neural network approach represents an improvement over lexicon-based approaches for positive/negative sentence classification.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones 多无人机协同安全飞行控制系统图像处理改进
Noriyasu Yamamoto, Noriki Uchida
In recent years, it has become possible for anyone to purchase high-performance Drones at low price. The Drones are equipped with a unit of high-vision camera, multiple compact cameras for flight control, gyroscope, infrared sensor, GPS, and a processor for processing video images and sensor information for controlling the flight. Relatively stable flight is available for Drones by operating within human's sight. However, scope of shooting is narrow and precision of the images is poor by human's operation within his or her sight. Therefore, studies on automated operation of Drones are very important. In this paper, we improved our conventional collaborative security flight control system for multiple drones. We also presents the performance evolution. The proposed methods mainly consist of the pattern recognition using drones' camera images and the collaboration of drones. Our proposed image processing method can operate with 100 msec/frame and we found that the drone can trace the host drone.
近年来,任何人都可以以低廉的价格购买高性能无人机。无人机装备有一个高视觉摄像机单元、多个用于飞行控制的紧凑型摄像机、陀螺仪、红外传感器、GPS和一个用于处理视频图像和用于控制飞行的传感器信息的处理器。通过在人的视线范围内操作,无人机可以实现相对稳定的飞行。但由于人在视线范围内的操作,使得拍摄范围狭窄,图像精度较差。因此,研究无人机的自动化操作是非常重要的。本文对传统的多无人机协同安全飞行控制系统进行了改进。我们还介绍了性能的演变。提出的方法主要包括利用无人机的摄像头图像进行模式识别和无人机之间的协作。我们提出的图像处理方法可以以100毫秒/帧的速度运行,我们发现无人机可以跟踪主机无人机。
{"title":"Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones","authors":"Noriyasu Yamamoto, Noriki Uchida","doi":"10.1109/WAINA.2018.00087","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00087","url":null,"abstract":"In recent years, it has become possible for anyone to purchase high-performance Drones at low price. The Drones are equipped with a unit of high-vision camera, multiple compact cameras for flight control, gyroscope, infrared sensor, GPS, and a processor for processing video images and sensor information for controlling the flight. Relatively stable flight is available for Drones by operating within human's sight. However, scope of shooting is narrow and precision of the images is poor by human's operation within his or her sight. Therefore, studies on automated operation of Drones are very important. In this paper, we improved our conventional collaborative security flight control system for multiple drones. We also presents the performance evolution. The proposed methods mainly consist of the pattern recognition using drones' camera images and the collaboration of drones. Our proposed image processing method can operate with 100 msec/frame and we found that the drone can trace the host drone.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Resource Allocation Scheme in 5G Network Slices 5G网络切片中的资源分配方案
M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira
5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of requirements. There will obviously be conflicting demands in an allocation of such slices, and the effective provisioning of network slicing poses numerous challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., inter-slice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel resource allocation scheme able to dynamically allocate network resources to different slices in order to achieve the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.
5G移动网络具有可预见性,可辅助灵活需求,今后可根据需求动态分配网络资源。网络切片是将网络资源根据用户的特定需求,以定制的方式分配和打包给一组用户,是实现需求多样性的关键标准。在这种切片的分配中显然会有相互冲突的需求,并且有效地提供网络切片带来了许多挑战。实际上,网络切片在用户/流量优先级方面有双重影响,因为它要求同时管理不同片(即片间)之间的优先级和属于同一片(即片内)的用户之间的优先级。在本文中,我们提出了一种新的资源分配方案,能够动态地将网络资源分配到不同的分片中,从而在保证满足用户所属分片需求的同时,达到用户满意的目的。
{"title":"Resource Allocation Scheme in 5G Network Slices","authors":"M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira","doi":"10.1109/WAINA.2018.00098","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00098","url":null,"abstract":"5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of requirements. There will obviously be conflicting demands in an allocation of such slices, and the effective provisioning of network slicing poses numerous challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., inter-slice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel resource allocation scheme able to dynamically allocate network resources to different slices in order to achieve the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Building a Smart City Service Platform in Messina with the #SmartME Project 通过#SmartME项目在墨西拿建立智慧城市服务平台
Dario Bruneo, S. Chillari, S. Distefano, Maurizio Giacobbe, Antonino Longo Minnolo, F. Longo, Giovanni Merlino, Davide Mulfari, Alfonso Panarello, G. Patanè, A. Puliafito, C. Puliafito, M. Scarpa, Nachiket Tapas, Giancarlo Visalli
Some words mark an era, and "Smart City" is definitely one of these. A Smart City is an urban area where the Information and Communication Technologies (ICT) are employed to improve citizens' Quality of Life (QoL) in areas such as: mobility, urban surveillance, and energy management. Throughout this paper, we present the #SmartME project, which aims to create an infrastructure and an ecosystem of "smart" services by exploiting existing devices, sensors, and actuators distributed in the city of Messina. We also present the Stack4Things framework, which is the management core of the #SmartME project.
有些词标志着一个时代,“智慧城市”绝对是其中之一。智慧城市是指利用信息通信技术(ICT)在交通、城市监控、能源管理等领域改善市民生活质量(QoL)的城市地区。在本文中,我们介绍了#SmartME项目,该项目旨在通过利用分布在墨西拿市的现有设备、传感器和执行器,创建一个“智能”服务的基础设施和生态系统。我们还介绍了Stack4Things框架,它是#SmartME项目的管理核心。
{"title":"Building a Smart City Service Platform in Messina with the #SmartME Project","authors":"Dario Bruneo, S. Chillari, S. Distefano, Maurizio Giacobbe, Antonino Longo Minnolo, F. Longo, Giovanni Merlino, Davide Mulfari, Alfonso Panarello, G. Patanè, A. Puliafito, C. Puliafito, M. Scarpa, Nachiket Tapas, Giancarlo Visalli","doi":"10.1109/WAINA.2018.00109","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00109","url":null,"abstract":"Some words mark an era, and \"Smart City\" is definitely one of these. A Smart City is an urban area where the Information and Communication Technologies (ICT) are employed to improve citizens' Quality of Life (QoL) in areas such as: mobility, urban surveillance, and energy management. Throughout this paper, we present the #SmartME project, which aims to create an infrastructure and an ecosystem of \"smart\" services by exploiting existing devices, sensors, and actuators distributed in the city of Messina. We also present the Stack4Things framework, which is the management core of the #SmartME project.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115550061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1