Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00116
Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi
Cloud computing services provide several benefits in terms of flexibility, scalability and cost reductions. Container technology allows to further lower the overhead of virtualization making it possible to run more components per server. Designing and deploying a cloud platform requires significant effort and it should be possibly dealt with automation tools. Automation can be dealt through either an imperative or declarative approach. We present how we designed and deployed a cloud container platform using declarative modeling. A model of the architecture of the service is described through a declarative specification and then passed to an orchestration tool that generates the actual plan of steps to be performed in the deployment.
{"title":"Declarative Modeling for Deploying a Container Platform","authors":"Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi","doi":"10.1109/WAINA.2018.00116","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00116","url":null,"abstract":"Cloud computing services provide several benefits in terms of flexibility, scalability and cost reductions. Container technology allows to further lower the overhead of virtualization making it possible to run more components per server. Designing and deploying a cloud platform requires significant effort and it should be possibly dealt with automation tools. Automation can be dealt through either an imperative or declarative approach. We present how we designed and deployed a cloud container platform using declarative modeling. A model of the architecture of the service is described through a declarative specification and then passed to an orchestration tool that generates the actual plan of steps to be performed in the deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00072
Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata
Although the life safety information systems on the smartphones are widely spread for the sake of the emergent situations in disasters, there have been some problems to use them by people who are not good to operate or are injured. Therefore, this paper proposes the static body object detection methods with the Delay Tolerant Networking for life safety information system. In the system, the sensors on smartphones automatically detect the abnormal static situations by the time and position differences based with the Markov Chain Monte Carlo methods, and the emergent messages are automatically transmitted with the message priorities. Moreover, those messages are transmitted to the servers with the Delay Tolerant Networking. Then, the prototype system is introduced, and the experiments are discussed for the effectiveness of the proposed systems.
{"title":"Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems","authors":"Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/WAINA.2018.00072","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00072","url":null,"abstract":"Although the life safety information systems on the smartphones are widely spread for the sake of the emergent situations in disasters, there have been some problems to use them by people who are not good to operate or are injured. Therefore, this paper proposes the static body object detection methods with the Delay Tolerant Networking for life safety information system. In the system, the sensors on smartphones automatically detect the abnormal static situations by the time and position differences based with the Markov Chain Monte Carlo methods, and the emergent messages are automatically transmitted with the message priorities. Moreover, those messages are transmitted to the servers with the Delay Tolerant Networking. Then, the prototype system is introduced, and the experiments are discussed for the effectiveness of the proposed systems.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"58 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00088
Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we present an IoT-Based E-Learning testbed using Raspberry Pi mounted on Raspbian. We carried out some experiments with a student of our laboratory for gamma type of brain waves. We used Mind Wave Mobile (MWM) to get the data and considered four situations: sleeping, relaxing, active and moving. Then, we used mean-shift clustering algorithm to cluster the data. The evaluation results show that our testbed can judge the human situation by using delta, theta, gamma and alpha brain waves.
由于互联网提供的机会,人们正在利用电子学习课程,大量的研究工作已经致力于电子学习系统的开发。到目前为止,人们提出了许多电子学习系统并进行了实际应用。然而,在这些系统中,电子学习完成率很低。原因之一是学习欲望和动力不高。在这项工作中,我们提出了一个基于物联网的电子学习测试平台,使用安装在树莓派上的树莓派。我们和我们实验室的一个学生一起做了一些伽马型脑电波的实验。我们使用Mind Wave Mobile (MWM)来获取数据,并考虑了四种情况:睡眠、放松、活动和运动。然后,采用mean-shift聚类算法对数据进行聚类。评估结果表明,我们的测试平台可以通过delta, theta, gamma和alpha脑电波来判断人的情况。
{"title":"Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves","authors":"Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli","doi":"10.1109/WAINA.2018.00088","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00088","url":null,"abstract":"Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we present an IoT-Based E-Learning testbed using Raspberry Pi mounted on Raspbian. We carried out some experiments with a student of our laboratory for gamma type of brain waves. We used Mind Wave Mobile (MWM) to get the data and considered four situations: sleeping, relaxing, active and moving. Then, we used mean-shift clustering algorithm to cluster the data. The evaluation results show that our testbed can judge the human situation by using delta, theta, gamma and alpha brain waves.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00172
A. Dawoud, Seyed Shahristani, Chun Raun
Software-Defined Networks (SDN) initiates a novel networking model. SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. The architecture enhances the network resilient, decompose management complexity, and support more straightforward network policies enforcement. However, the model suffers from severe security threats. Specifically, a centralized network controller is a precious target for two reasons. First, the controller is located at a central point between the application and data planes. Second, a controller is software which prone to vulnerabilities, e.g., buffer and stack overflow. Hence, providing security measures is a crucial procedure towards the fully unleash of the new model capabilities. Intrusion detection is an option to enhance the networking security. Several approaches were proposed, for instance, signature-based, and anomaly detection. Anomaly detection is a broad approach deployed by various methods, e.g., machine learning. For many decades intrusion detection solution suffers performance and accuracy deficiencies. This paper revisits network anomalies detection as recent advances in machine learning particularly deep learning proofed success in many areas like computer vision and speech recognition. The study proposes an intrusion detection framework based on unsupervised deep learning algorithms.
{"title":"A Deep Learning Framework to Enhance Software Defined Networks Security","authors":"A. Dawoud, Seyed Shahristani, Chun Raun","doi":"10.1109/WAINA.2018.00172","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00172","url":null,"abstract":"Software-Defined Networks (SDN) initiates a novel networking model. SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. The architecture enhances the network resilient, decompose management complexity, and support more straightforward network policies enforcement. However, the model suffers from severe security threats. Specifically, a centralized network controller is a precious target for two reasons. First, the controller is located at a central point between the application and data planes. Second, a controller is software which prone to vulnerabilities, e.g., buffer and stack overflow. Hence, providing security measures is a crucial procedure towards the fully unleash of the new model capabilities. Intrusion detection is an option to enhance the networking security. Several approaches were proposed, for instance, signature-based, and anomaly detection. Anomaly detection is a broad approach deployed by various methods, e.g., machine learning. For many decades intrusion detection solution suffers performance and accuracy deficiencies. This paper revisits network anomalies detection as recent advances in machine learning particularly deep learning proofed success in many areas like computer vision and speech recognition. The study proposes an intrusion detection framework based on unsupervised deep learning algorithms.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00127
Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations as a third step, concept of user authentication method applied for this scheme is expanded and described.
{"title":"Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain","authors":"Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa","doi":"10.1109/WAINA.2018.00127","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00127","url":null,"abstract":"In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations as a third step, concept of user authentication method applied for this scheme is expanded and described.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00142
M. Abderrahim, Hela Hakim, H. Boujemaa
Recently, Wireless Sensor Network (WSN) has drawn serious attention to the researchers. The most important challenge of WSN is how to extend its lifetime. In this paper, we propose an energy-efficient multihop transmission strategy with organization cluster phase. During this phase, we try to choose the cluster head node which allows communicating with the other nodes with possible minimum energy and classify the remaining nodes into two groups. We consider a WSN organized into clusters, each cluster is composed of N sensor nodes classified as follows: source node, elected CH node as the destination, group of active nodes and group of sleeping nodes. When a source node detects relevant information in the network, it tries to transmit it to the cluster head via a cooperative or non-cooperative transmission. The transmission is supposed to be correct only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold ãth. The main objective of our work is to define a new transmission technique minimizing the power consumption. It is a multihop transmission technique where the selected relays which cooperate in the transmission are those offering the least transmit power while maintaining SNR equal to the threshold ãth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission where the CH node is chosen randomly within the cluster. Simulations results demonstrate that adding an organization cluster phase before transmitting data significantly increases the energy savings.
{"title":"Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa","doi":"10.1109/WAINA.2018.00142","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00142","url":null,"abstract":"Recently, Wireless Sensor Network (WSN) has drawn serious attention to the researchers. The most important challenge of WSN is how to extend its lifetime. In this paper, we propose an energy-efficient multihop transmission strategy with organization cluster phase. During this phase, we try to choose the cluster head node which allows communicating with the other nodes with possible minimum energy and classify the remaining nodes into two groups. We consider a WSN organized into clusters, each cluster is composed of N sensor nodes classified as follows: source node, elected CH node as the destination, group of active nodes and group of sleeping nodes. When a source node detects relevant information in the network, it tries to transmit it to the cluster head via a cooperative or non-cooperative transmission. The transmission is supposed to be correct only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold ãth. The main objective of our work is to define a new transmission technique minimizing the power consumption. It is a multihop transmission technique where the selected relays which cooperate in the transmission are those offering the least transmit power while maintaining SNR equal to the threshold ãth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission where the CH node is chosen randomly within the cluster. Simulations results demonstrate that adding an organization cluster phase before transmitting data significantly increases the energy savings.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00162
Marco Pota, M. Esposito, Marco A. Palomino, G. Masala
The successful use of online material in political campaigns over the past two decades has motivated the inclusion of social media platforms—such as Twitter—as an integral part of the political apparatus. Political analysts are increasingly turning to Twitter as an indicator of public opinion. We are interested in learning how positive and negative opinions propagate through Twitter and how important events influence public opinion. In this paper, we present a neural network-based approach to analyse the sentiment expressed on political tweets. First, our approach represents the text by dense vectors comprising subword information to better detect word similarities by exploiting both morphology and semantics. Then, a Convolutional Neural Network is trained to learn how to classify tweets depending on sentiment, based on an available labelled dataset. Finally, the model is applied to perform the sentiment analysis of a collection of tweets retrieved during the days prior to the latest UK General Election. Results are promising and show that the neural network approach represents an improvement over lexicon-based approaches for positive/negative sentence classification.
{"title":"A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets","authors":"Marco Pota, M. Esposito, Marco A. Palomino, G. Masala","doi":"10.1109/WAINA.2018.00162","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00162","url":null,"abstract":"The successful use of online material in political campaigns over the past two decades has motivated the inclusion of social media platforms—such as Twitter—as an integral part of the political apparatus. Political analysts are increasingly turning to Twitter as an indicator of public opinion. We are interested in learning how positive and negative opinions propagate through Twitter and how important events influence public opinion. In this paper, we present a neural network-based approach to analyse the sentiment expressed on political tweets. First, our approach represents the text by dense vectors comprising subword information to better detect word similarities by exploiting both morphology and semantics. Then, a Convolutional Neural Network is trained to learn how to classify tweets depending on sentiment, based on an available labelled dataset. Finally, the model is applied to perform the sentiment analysis of a collection of tweets retrieved during the days prior to the latest UK General Election. Results are promising and show that the neural network approach represents an improvement over lexicon-based approaches for positive/negative sentence classification.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00087
Noriyasu Yamamoto, Noriki Uchida
In recent years, it has become possible for anyone to purchase high-performance Drones at low price. The Drones are equipped with a unit of high-vision camera, multiple compact cameras for flight control, gyroscope, infrared sensor, GPS, and a processor for processing video images and sensor information for controlling the flight. Relatively stable flight is available for Drones by operating within human's sight. However, scope of shooting is narrow and precision of the images is poor by human's operation within his or her sight. Therefore, studies on automated operation of Drones are very important. In this paper, we improved our conventional collaborative security flight control system for multiple drones. We also presents the performance evolution. The proposed methods mainly consist of the pattern recognition using drones' camera images and the collaboration of drones. Our proposed image processing method can operate with 100 msec/frame and we found that the drone can trace the host drone.
{"title":"Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones","authors":"Noriyasu Yamamoto, Noriki Uchida","doi":"10.1109/WAINA.2018.00087","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00087","url":null,"abstract":"In recent years, it has become possible for anyone to purchase high-performance Drones at low price. The Drones are equipped with a unit of high-vision camera, multiple compact cameras for flight control, gyroscope, infrared sensor, GPS, and a processor for processing video images and sensor information for controlling the flight. Relatively stable flight is available for Drones by operating within human's sight. However, scope of shooting is narrow and precision of the images is poor by human's operation within his or her sight. Therefore, studies on automated operation of Drones are very important. In this paper, we improved our conventional collaborative security flight control system for multiple drones. We also presents the performance evolution. The proposed methods mainly consist of the pattern recognition using drones' camera images and the collaboration of drones. Our proposed image processing method can operate with 100 msec/frame and we found that the drone can trace the host drone.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00098
M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira
5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of requirements. There will obviously be conflicting demands in an allocation of such slices, and the effective provisioning of network slicing poses numerous challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., inter-slice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel resource allocation scheme able to dynamically allocate network resources to different slices in order to achieve the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.
{"title":"Resource Allocation Scheme in 5G Network Slices","authors":"M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira","doi":"10.1109/WAINA.2018.00098","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00098","url":null,"abstract":"5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of requirements. There will obviously be conflicting demands in an allocation of such slices, and the effective provisioning of network slicing poses numerous challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., inter-slice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel resource allocation scheme able to dynamically allocate network resources to different slices in order to achieve the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00109
Dario Bruneo, S. Chillari, S. Distefano, Maurizio Giacobbe, Antonino Longo Minnolo, F. Longo, Giovanni Merlino, Davide Mulfari, Alfonso Panarello, G. Patanè, A. Puliafito, C. Puliafito, M. Scarpa, Nachiket Tapas, Giancarlo Visalli
Some words mark an era, and "Smart City" is definitely one of these. A Smart City is an urban area where the Information and Communication Technologies (ICT) are employed to improve citizens' Quality of Life (QoL) in areas such as: mobility, urban surveillance, and energy management. Throughout this paper, we present the #SmartME project, which aims to create an infrastructure and an ecosystem of "smart" services by exploiting existing devices, sensors, and actuators distributed in the city of Messina. We also present the Stack4Things framework, which is the management core of the #SmartME project.
{"title":"Building a Smart City Service Platform in Messina with the #SmartME Project","authors":"Dario Bruneo, S. Chillari, S. Distefano, Maurizio Giacobbe, Antonino Longo Minnolo, F. Longo, Giovanni Merlino, Davide Mulfari, Alfonso Panarello, G. Patanè, A. Puliafito, C. Puliafito, M. Scarpa, Nachiket Tapas, Giancarlo Visalli","doi":"10.1109/WAINA.2018.00109","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00109","url":null,"abstract":"Some words mark an era, and \"Smart City\" is definitely one of these. A Smart City is an urban area where the Information and Communication Technologies (ICT) are employed to improve citizens' Quality of Life (QoL) in areas such as: mobility, urban surveillance, and energy management. Throughout this paper, we present the #SmartME project, which aims to create an infrastructure and an ecosystem of \"smart\" services by exploiting existing devices, sensors, and actuators distributed in the city of Messina. We also present the Stack4Things framework, which is the management core of the #SmartME project.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115550061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}