首页 > 最新文献

International Conference on Pervasive and Embedded Computing and Communication Systems最新文献

英文 中文
On Verify and Validate a Next Generation Automotive Communication Networka 关于验证和验证下一代汽车通信网络
Sebastian Brunthaler, T. Waas, M. Kucera
As a result of the enormous growth in data traffic for autonomous driving, the conventional in-vehicle network is no longer sufficient and requires new types of network concepts in a vehicle. This part of the automobile is known as the next generation communication network. Since the new car-systems can be extended by various services at any time, the network must adapt dynamically to new requirements wherever possible. For example, data flow must be configured dynamically between new services. Also data rates will be much higher in the future than today. This is one of the main reasons why we need to search for new technologies for data transfer in vehicles. This is based on an in-vehicle ethernet network. The process of configuring networks automatically has been discussed several times in recent years. One of the next steps is verifying and validating the automatic configuration process during the development of the new communication network. This research paper identifies several ways to ensure the automatically generated network configuration leads to a secure system. To achieve that, other parts of the company’s enterprise IT architecture and network technologies, the conventional vehicle network and other options for verification and validation are analysed.
由于自动驾驶数据流量的巨大增长,传统的车载网络已经不够用,需要新型的车载网络概念。汽车的这一部分被称为下一代通信网络。由于新的汽车系统可以随时通过各种服务进行扩展,因此网络必须尽可能动态地适应新的需求。例如,新业务之间必须动态配置数据流。此外,未来的数据速率将比现在高得多。这是我们需要寻找车辆数据传输新技术的主要原因之一。这是基于车载以太网的。近年来,自动配置网络的过程已被多次讨论。接下来的步骤之一是在新通信网络的开发过程中验证和验证自动配置过程。本文确定了几种确保自动生成的网络配置导致安全系统的方法。为实现这一目标,对公司其他部分的企业IT架构和网络技术、常规车联网等方案进行了验证和验证分析。
{"title":"On Verify and Validate a Next Generation Automotive Communication Networka","authors":"Sebastian Brunthaler, T. Waas, M. Kucera","doi":"10.5220/0008191601210127","DOIUrl":"https://doi.org/10.5220/0008191601210127","url":null,"abstract":"As a result of the enormous growth in data traffic for autonomous driving, the conventional in-vehicle network is no longer sufficient and requires new types of network concepts in a vehicle. This part of the automobile is known as the next generation communication network. Since the new car-systems can be extended by various services at any time, the network must adapt dynamically to new requirements wherever possible. For example, data flow must be configured dynamically between new services. Also data rates will be much higher in the future than today. This is one of the main reasons why we need to search for new technologies for data transfer in vehicles. This is based on an in-vehicle ethernet network. The process of configuring networks automatically has been discussed several times in recent years. One of the next steps is verifying and validating the automatic configuration process during the development of the new communication network. This research paper identifies several ways to ensure the automatically generated network configuration leads to a secure system. To achieve that, other parts of the company’s enterprise IT architecture and network technologies, the conventional vehicle network and other options for verification and validation are analysed.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flaws Validation of Maze Mobility Model using Spatial-temporal Synthetic Mobility Metrics 基于时空综合迁移度量的迷宫迁移模型缺陷验证
Nisrine Ibadah, K. Minaoui, M. Rziza, M. Oumsis, C. Benavente-Peces
Mobility modeling represents a critical task in mobile wireless networks to improve the overall throughput. This paper evaluates relevant spatial-temporal stochastic properties of the most frequently used synthetic mobility models compared to a new efficient mobility model named Maze Mobility Model (Maze MM). It imitates a real-life movement according to diverse mobility features, as spatial and temporal dependencies with also geographic restrictions. To demonstrate the efficiency of this new model, various metrics were validated such as; the speed decay problem, the density wave phenomenon, the spatial node distribution, the average neighbor percentage, and mobile neighbors range. Each mobility pattern may bear from diverse mobility flaws, as shown by network simulations. So, numerous metrics are employed to describe mobility features. The current research aims to deeply understand mobility features of Maze MM with the aim to deduce a definite judgment of each mobility metric, given that further this fact affects the whole network performances. The validation results are discussed to remark the effectiveness and robustness of Maze MM according to the validated mobility metrics.
在移动无线网络中,移动性建模是提高整体吞吐量的一项关键任务。本文将最常用的综合迁移模型的时空随机特性与一种新的高效迁移模型迷宫迁移模型(Maze MM)进行了比较。它根据不同的移动特征模仿现实生活中的运动,作为空间和时间的依赖关系,也有地理限制。为了证明这种新模型的有效性,验证了各种指标,例如;速度衰减问题,密度波现象,空间节点分布,平均邻居百分比,移动邻居范围。网络模拟表明,每种迁移模式都可能承受不同的迁移缺陷。因此,许多指标被用来描述移动性特性。本研究旨在深入了解Maze MM的移动性特征,并推导出对每个移动性指标的明确判断,因为这一事实会进一步影响整个网络的性能。对验证结果进行了讨论,根据验证的迁移率指标评价了Maze MM的有效性和鲁棒性。
{"title":"Flaws Validation of Maze Mobility Model using Spatial-temporal Synthetic Mobility Metrics","authors":"Nisrine Ibadah, K. Minaoui, M. Rziza, M. Oumsis, C. Benavente-Peces","doi":"10.5220/0008168801060112","DOIUrl":"https://doi.org/10.5220/0008168801060112","url":null,"abstract":"Mobility modeling represents a critical task in mobile wireless networks to improve the overall throughput. This paper evaluates relevant spatial-temporal stochastic properties of the most frequently used synthetic mobility models compared to a new efficient mobility model named Maze Mobility Model (Maze MM). It imitates a real-life movement according to diverse mobility features, as spatial and temporal dependencies with also geographic restrictions. To demonstrate the efficiency of this new model, various metrics were validated such as; the speed decay problem, the density wave phenomenon, the spatial node distribution, the average neighbor percentage, and mobile neighbors range. Each mobility pattern may bear from diverse mobility flaws, as shown by network simulations. So, numerous metrics are employed to describe mobility features. The current research aims to deeply understand mobility features of Maze MM with the aim to deduce a definite judgment of each mobility metric, given that further this fact affects the whole network performances. The validation results are discussed to remark the effectiveness and robustness of Maze MM according to the validated mobility metrics.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127811336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Configuration Parameters of Pipelines for Accelerating N-Body Simulations with an FPGA using High-level Synthesis 基于高级综合的FPGA加速n体仿真管道配置参数估计
T. Narumi, A. Muramatsu
In the era of the IoT (Internet of Things) and Edge computing, SoC (System on Chip) with an FPGA (Field Programmable Gate Array) is a suitable solution for embedded systems because it supports running rich operating systems on general-purpose CPUs, as well as the FPGA’s acceleration for specific computing. One problem of designing an accelerator on an FPGA is that optimization of the logic for the accelerator is not automatic and much trial and error is needed before attaining peak performance from the SoC. In this paper we propose a method to reduce the development time of the accelerator using N-body simulation as a target application. Based on the hardware resources needed for several pipelines of the accelerator and their performance estimation model, we can estimate how many pipelines can be implemented on an SoC. In addition, the amount of memory each pipeline requires for attaining maximum performance is suggested. Our model agreed with the actual calculation speed for different constraining conditions.
在物联网(IoT)和边缘计算时代,SoC (System on Chip)与FPGA (Field Programmable Gate Array)是嵌入式系统的合适解决方案,因为它支持在通用cpu上运行丰富的操作系统,以及FPGA对特定计算的加速。在FPGA上设计加速器的一个问题是,加速器的逻辑优化不是自动的,在从SoC获得峰值性能之前需要进行大量的试验和错误。本文提出了一种以n体仿真为目标应用,缩短加速器开发时间的方法。根据加速器的几个管道所需的硬件资源及其性能估计模型,我们可以估计在一个SoC上可以实现多少个管道。此外,还建议每个管道获得最大性能所需的内存量。在不同约束条件下,模型与实际计算速度吻合。
{"title":"Estimating Configuration Parameters of Pipelines for Accelerating N-Body Simulations with an FPGA using High-level Synthesis","authors":"T. Narumi, A. Muramatsu","doi":"10.5220/0008066500650074","DOIUrl":"https://doi.org/10.5220/0008066500650074","url":null,"abstract":"In the era of the IoT (Internet of Things) and Edge computing, SoC (System on Chip) with an FPGA (Field Programmable Gate Array) is a suitable solution for embedded systems because it supports running rich operating systems on general-purpose CPUs, as well as the FPGA’s acceleration for specific computing. One problem of designing an accelerator on an FPGA is that optimization of the logic for the accelerator is not automatic and much trial and error is needed before attaining peak performance from the SoC. In this paper we propose a method to reduce the development time of the accelerator using N-body simulation as a target application. Based on the hardware resources needed for several pipelines of the accelerator and their performance estimation model, we can estimate how many pipelines can be implemented on an SoC. In addition, the amount of memory each pipeline requires for attaining maximum performance is suggested. Our model agreed with the actual calculation speed for different constraining conditions.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques 后量子密码学范式与密码敏捷性:量子安全技术的策略方法
Olaf Grote, A. Ahrens, C. Benavente-Peces
General security protocols use cryptographic schemes which are not prepared against quantum attacks. Asymmetric public key cryptographic schemes based on well researched methods are defined as broken, from quantum computer perspective. In contrast, symmetric cryptographic schemes and there methods are considered quantum-safe. A new effective strategy is necessary with focusing on post-quantum cryptography for evaluating and researching new quantum-safe cryptographic principles and crypto-agility to update vulnerable security protocols.
一般的安全协议使用的加密方案没有针对量子攻击的准备。从量子计算机的角度来看,基于研究方法的非对称公钥加密方案被定义为破坏。相反,对称密码方案及其方法被认为是量子安全的。为了评估和研究新的量子安全加密原理和加密敏捷性,以更新脆弱的安全协议,需要一种新的有效策略来关注后量子密码学。
{"title":"Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques","authors":"Olaf Grote, A. Ahrens, C. Benavente-Peces","doi":"10.5220/0008162800910098","DOIUrl":"https://doi.org/10.5220/0008162800910098","url":null,"abstract":"General security protocols use cryptographic schemes which are not prepared against quantum attacks. Asymmetric public key cryptographic schemes based on well researched methods are defined as broken, from quantum computer perspective. In contrast, symmetric cryptographic schemes and there methods are considered quantum-safe. A new effective strategy is necessary with focusing on post-quantum cryptography for evaluating and researching new quantum-safe cryptographic principles and crypto-agility to update vulnerable security protocols.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Join Multiple Channels and IEEE 802.15.4e TSCH Protocol Use Effects on WSN Performance and Energy Efficiency 加入多信道和IEEE 802.15.4e TSCH协议使用对WSN性能和能效的影响
Diego V. Queiroz, R. Gomes, C. Benavente-Peces, I. Fonseca, M. Alencar
The goal of this paper is analysing the use of the IEEE 802.15.4e standard MAC layer protocol Time-Slotted Channel Hopping (TSCH) mode in the context of Internet of Things (IoT) and Industrial IoT (IIoT) aimed at reducing narrow-band interferences and the multi-path fading impact on available channels by using frequency hopping, with network time synchronization to achieve low-power operation. In low disturbances environments using several channels provides the diversity benefits. However, using several channels requires channel scanning and switching leads to extra power consumption. It could be accepted in harsh environments (industrial), due to its influence on channels features, requiring more channels, and it is necessary to continuously hop seeking for the best one to achieve the best performance. Several experiments have been simulated and implemented in real testbeds the laboratory as first validation approach. The performance and energy efficiency of the entire network is analysed for different scheduling methods, packet transmission rates, number of used channels and guard time. The relevant conclusion showed in this investigation is that using all the available channels of the standard is not required to achieve the best joint-results given that, regardless the scheduling method used, considering a higher number channels requires a higher power consumption for channels quality exploration and packet reception rate decreases.
本文的目标是分析在物联网(IoT)和工业物联网(IIoT)背景下使用IEEE 802.15.4e标准MAC层协议时隙信道跳频(TSCH)模式,旨在通过使用跳频减少窄带干扰和多径衰落对可用信道的影响,与网络时间同步以实现低功耗运行。在低干扰环境下,使用多个信道可以提供分集优势。然而,使用多个通道需要通道扫描和切换导致额外的功耗。在恶劣的环境(工业)中也可以接受,因为它对信道特性有影响,需要更多的信道,需要不断地寻找最优的信道,以达到最佳的性能。在实验室的实际测试台上进行了模拟和实施,作为验证方法的第一步。分析了不同调度方法、分组传输速率、使用的信道数和保护时间对整个网络的性能和能效的影响。本研究得出的相关结论是,不需要使用标准的所有可用信道来获得最佳的联合效果,因为无论采用何种调度方法,考虑更多的信道数量会导致更高的信道质量探索功耗和数据包接收率下降。
{"title":"Join Multiple Channels and IEEE 802.15.4e TSCH Protocol Use Effects on WSN Performance and Energy Efficiency","authors":"Diego V. Queiroz, R. Gomes, C. Benavente-Peces, I. Fonseca, M. Alencar","doi":"10.5220/0008162300830090","DOIUrl":"https://doi.org/10.5220/0008162300830090","url":null,"abstract":"The goal of this paper is analysing the use of the IEEE 802.15.4e standard MAC layer protocol Time-Slotted Channel Hopping (TSCH) mode in the context of Internet of Things (IoT) and Industrial IoT (IIoT) aimed at reducing narrow-band interferences and the multi-path fading impact on available channels by using frequency hopping, with network time synchronization to achieve low-power operation. In low disturbances environments using several channels provides the diversity benefits. However, using several channels requires channel scanning and switching leads to extra power consumption. It could be accepted in harsh environments (industrial), due to its influence on channels features, requiring more channels, and it is necessary to continuously hop seeking for the best one to achieve the best performance. Several experiments have been simulated and implemented in real testbeds the laboratory as first validation approach. The performance and energy efficiency of the entire network is analysed for different scheduling methods, packet transmission rates, number of used channels and guard time. The relevant conclusion showed in this investigation is that using all the available channels of the standard is not required to achieve the best joint-results given that, regardless the scheduling method used, considering a higher number channels requires a higher power consumption for channels quality exploration and packet reception rate decreases.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132379940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interdependent Multi-layer Spatial Temporal-based Caching in Heterogeneous Mobile Edge and Fog Networks 异构移动边缘和雾网络中基于时空的相互依赖多层缓存
Vu San Ha Huynh, Milena Radenkovic
Applications and services hosted in the mobile edge/fog networks today (e.g., augmented reality, self-driving, and various cognitive applications) may suffer from limited network coverage and localized congestion due to dynamic mobility of users and surge of traffic demand. Mobile opportunistic caching at the edges is expected to be an effective solution for bringing content closer and improve the quality of service for mobile users. To fully exploit the edge/fog resources, the most popular contents should be identified and cached. Emerging research has shown significant importance of predicting content traffic patterns related to users’ mobility over time and locations which is a complex question and still not well-understood. This paper tackles this challenge by proposing K-order Markov chain-based fully-distributed multi-layer complex analytics and heuristics to predict the future trends of content traffic. More specifically, we propose the multilayer real-time predictive analytics based on historical temporal information (frequency, recency, betweenness) and spatial information (dynamic clustering, similarity, tie-strength) of the contents and the mobility patterns of contents’ subscribers. This enables better responsiveness to the rising of newly high popular contents and fading out of older contents over time and locations. We extensively evaluate our proposal against benchmark (TLRU) and competitive protocols (SocialCache, OCPCP, LocationCache) across a range of metrics over two vastly different complex temporal network topologies: random networks and scale-free networks (i.e. real connectivity Infocom traces) and use Foursquare dataset as a realistic content request patterns. We show that our caching framework consistently outperforms the state-of-the-art algorithms in the face of dynamically changing topologies and content workloads as well as dynamic resource availability.
由于用户的动态移动性和流量需求的激增,今天在移动边缘/雾网络中托管的应用程序和服务(例如,增强现实、自动驾驶和各种认知应用程序)可能会受到网络覆盖范围有限和局部拥塞的影响。边缘的移动机会缓存有望成为一种有效的解决方案,可以拉近内容的距离,提高移动用户的服务质量。为了充分利用边缘/雾资源,应该识别和缓存最受欢迎的内容。新兴的研究表明,预测与用户随时间和地点的移动性相关的内容流量模式非常重要,这是一个复杂的问题,而且仍然没有得到很好的理解。本文通过提出基于k阶马尔可夫链的全分布式多层复杂分析和启发式方法来预测内容流量的未来趋势,从而解决了这一挑战。更具体地说,我们提出了基于内容的历史时间信息(频率、近代性、间接性)和空间信息(动态聚类、相似度、联系强度)以及内容订阅者移动模式的多层实时预测分析。这可以更好地响应新流行内容的上升和旧内容随着时间和地点的消失。我们根据基准(TLRU)和竞争协议(SocialCache, OCPCP, LocationCache)在两种截然不同的复杂时间网络拓扑上广泛评估我们的提案:随机网络和无标度网络(即真实连接Infocom跟踪),并使用Foursquare数据集作为现实的内容请求模式。我们表明,面对动态变化的拓扑和内容工作负载以及动态资源可用性,我们的缓存框架始终优于最先进的算法。
{"title":"Interdependent Multi-layer Spatial Temporal-based Caching in Heterogeneous Mobile Edge and Fog Networks","authors":"Vu San Ha Huynh, Milena Radenkovic","doi":"10.5220/0008167900340045","DOIUrl":"https://doi.org/10.5220/0008167900340045","url":null,"abstract":"Applications and services hosted in the mobile edge/fog networks today (e.g., augmented reality, self-driving, and various cognitive applications) may suffer from limited network coverage and localized congestion due to dynamic mobility of users and surge of traffic demand. Mobile opportunistic caching at the edges is expected to be an effective solution for bringing content closer and improve the quality of service for mobile users. To fully exploit the edge/fog resources, the most popular contents should be identified and cached. Emerging research has shown significant importance of predicting content traffic patterns related to users’ mobility over time and locations which is a complex question and still not well-understood. This paper tackles this challenge by proposing K-order Markov chain-based fully-distributed multi-layer complex analytics and heuristics to predict the future trends of content traffic. More specifically, we propose the multilayer real-time predictive analytics based on historical temporal information (frequency, recency, betweenness) and spatial information (dynamic clustering, similarity, tie-strength) of the contents and the mobility patterns of contents’ subscribers. This enables better responsiveness to the rising of newly high popular contents and fading out of older contents over time and locations. We extensively evaluate our proposal against benchmark (TLRU) and competitive protocols (SocialCache, OCPCP, LocationCache) across a range of metrics over two vastly different complex temporal network topologies: random networks and scale-free networks (i.e. real connectivity Infocom traces) and use Foursquare dataset as a realistic content request patterns. We show that our caching framework consistently outperforms the state-of-the-art algorithms in the face of dynamically changing topologies and content workloads as well as dynamic resource availability.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115655826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of a Business Environment using Burstiness Parameter: The Case of a Grocery Shop 利用突发参数分析商业环境:以杂货店为例
A. Ahrens, O. Purvinis, Detlef Hartleb, J. Zaščerinska, D. Miceviciene
Nowadays, bursty business processes are part of our everyday life. Bursty business processes include such processesas selling and buying, too. One of the contemporary challenges business environment has to deal withis monitoring and controlling of burstiness in business processes. Monitoring and controlling of burstiness inbusiness processes often leads to the optimization of business processes. Validation of the model for analysingbuyers’ burstiness in business processes revealed the need in optimisation of the proposed model, as the elaboratedmodel based on gap processes is complex for implementation, as well as for parameter estimation. Foroptimization of the model for analysing buyers’ burstiness in business process, different levels of burstinessin the process of buying are studied in this work. Different approaches to modelling buyers’ behaviours arepresented and evaluated in this work, too. The novel contribution of this work is based on the estimation ofburstiness. With the proposed solution the level of burstiness can be estimated by taking the mean value andthe standard deviation of a gap sequence into account, which always exists for a given sequence. As a practicalapplication, the cash register of a medium size grocery shop in Lithuania is analysed. The novelty of this paperis given by the comparison of different approaches to measuring burstiness in real process data. Directions offurther research are proposed.
如今,繁忙的业务流程已成为我们日常生活的一部分。突发业务流程还包括销售和购买等流程。当前业务环境面临的挑战之一是如何对业务流程中的突发事件进行监视和控制。监视和控制业务流程中的突发事件通常会导致业务流程的优化。分析业务流程中买方突发性的模型验证表明,需要优化所提出的模型,因为基于缺口流程的详细模型在实现和参数估计方面都很复杂。为了优化业务流程中购买者突发性分析模型,本文研究了不同层次的购买过程突发性。在这项工作中,也提出和评估了不同的方法来模拟买家的行为。这项工作的新颖贡献是基于对突发性的估计。利用所提出的方法,可以通过考虑间隙序列的均值和标准差来估计间隙序列的突发性水平,而对于给定序列,突发性总是存在的。作为实际应用,本文对立陶宛一家中型杂货店的收银机进行了分析。本文的新颖之处在于对实际过程数据中不同测量方法的比较。提出了进一步研究的方向。
{"title":"Analysis of a Business Environment using Burstiness Parameter: The Case of a Grocery Shop","authors":"A. Ahrens, O. Purvinis, Detlef Hartleb, J. Zaščerinska, D. Miceviciene","doi":"10.5220/0007977600490056","DOIUrl":"https://doi.org/10.5220/0007977600490056","url":null,"abstract":"Nowadays, bursty business processes are part of our everyday life. Bursty business processes include such processes\u0000as selling and buying, too. One of the contemporary challenges business environment has to deal with\u0000is monitoring and controlling of burstiness in business processes. Monitoring and controlling of burstiness in\u0000business processes often leads to the optimization of business processes. Validation of the model for analysing\u0000buyers’ burstiness in business processes revealed the need in optimisation of the proposed model, as the elaborated\u0000model based on gap processes is complex for implementation, as well as for parameter estimation. For\u0000optimization of the model for analysing buyers’ burstiness in business process, different levels of burstiness\u0000in the process of buying are studied in this work. Different approaches to modelling buyers’ behaviours are\u0000presented and evaluated in this work, too. The novel contribution of this work is based on the estimation of\u0000burstiness. With the proposed solution the level of burstiness can be estimated by taking the mean value and\u0000the standard deviation of a gap sequence into account, which always exists for a given sequence. As a practical\u0000application, the cash register of a medium size grocery shop in Lithuania is analysed. The novelty of this paper\u0000is given by the comparison of different approaches to measuring burstiness in real process data. Directions of\u0000further research are proposed.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Influence of Emotions on Software Developer Productivity 情绪对软件开发人员生产力的影响
Mohammed R. Anany, Heba Hussien, S. Aly, Nourhan Sakr
The Software developer productivity is an important indicator that has attracted the attention of the industry over the years. It has been established that improving software productivity enhances the performance of organizations. Despite its importance, a full understanding of contextual factors and how they influence productivity is not attained. One such important factor is the developer’s emotions. In this paper, we conduct an experiment on 11 participants where they attempt to solve 10 ACM-style problems as we monitor their emotions and behaviour in the background. The experiments performed achieve an accuracy of 55.4% on the test set using a random forest classifier. There is room for multiple improvements such as increasing dataset size, performing class balancing, and utilizing different aggregation methods for the data. This paper opens a different track for experimentation relating to the relationship between emotions and software productivity. Achieving a better understanding of this relationship can aid further research that would utilize it to build context aware and pervasive systems that can automatically react to developers’ emotions when going through a low productivity phase and orient them towards emotions that are correlated with positive productivity.
多年来,软件开发人员的生产力一直是业界关注的一个重要指标。已经确定,提高软件生产力可以提高组织的绩效。尽管它很重要,但对环境因素及其如何影响生产力的充分理解尚未实现。其中一个重要因素就是开发者的情绪。在本文中,我们对11名参与者进行了一项实验,他们试图解决10个acm风格的问题,而我们在后台监控他们的情绪和行为。使用随机森林分类器进行的实验在测试集上实现了55.4%的准确率。还有多种改进的空间,比如增加数据集大小、执行类平衡以及对数据使用不同的聚合方法。本文为有关情绪和软件生产力之间关系的实验开辟了一条不同的轨道。更好地理解这种关系可以帮助进一步的研究,利用它来构建上下文感知和普及系统,这些系统可以在经历低生产力阶段时自动对开发人员的情绪做出反应,并将他们导向与积极生产力相关的情绪。
{"title":"Influence of Emotions on Software Developer Productivity","authors":"Mohammed R. Anany, Heba Hussien, S. Aly, Nourhan Sakr","doi":"10.5220/0008068800750082","DOIUrl":"https://doi.org/10.5220/0008068800750082","url":null,"abstract":"The Software developer productivity is an important indicator that has attracted the attention of the industry over the years. It has been established that improving software productivity enhances the performance of organizations. Despite its importance, a full understanding of contextual factors and how they influence productivity is not attained. One such important factor is the developer’s emotions. In this paper, we conduct an experiment on 11 participants where they attempt to solve 10 ACM-style problems as we monitor their emotions and behaviour in the background. The experiments performed achieve an accuracy of 55.4% on the test set using a random forest classifier. There is room for multiple improvements such as increasing dataset size, performing class balancing, and utilizing different aggregation methods for the data. This paper opens a different track for experimentation relating to the relationship between emotions and software productivity. Achieving a better understanding of this relationship can aid further research that would utilize it to build context aware and pervasive systems that can automatically react to developers’ emotions when going through a low productivity phase and orient them towards emotions that are correlated with positive productivity.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Approaches to Resource Allocation in Hybrid Fog and Cloud Systems 云雾混合系统中资源分配的两种方法
D. Gasior
In this paper, two approaches to the hybrid fog and cloud computing environment are presented. The first is based on the assumption of centralized management performed by cloud, while the latter takes utilization of self-managing concept enabling distributed resource allocation carried by fogs. The appropriate mathematical models are introduced and the optimization problems are formulated. While the first concept turned out to be the mixed nonlinear programming, the second may be interpreted as the noncooperative game. The ideas of the possible solutions are briefly suggested.
本文提出了两种用于雾和云混合计算环境的方法。前者基于云进行集中管理的假设,后者利用自管理的概念,通过雾进行分布式资源分配。引入了相应的数学模型,并提出了优化问题。第一个概念是混合非线性规划,第二个概念可以解释为非合作博弈。简要地提出了可能的解决办法。
{"title":"Two Approaches to Resource Allocation in Hybrid Fog and Cloud Systems","authors":"D. Gasior","doi":"10.5220/0008168700990105","DOIUrl":"https://doi.org/10.5220/0008168700990105","url":null,"abstract":"In this paper, two approaches to the hybrid fog and cloud computing environment are presented. The first is based on the assumption of centralized management performed by cloud, while the latter takes utilization of self-managing concept enabling distributed resource allocation carried by fogs. The appropriate mathematical models are introduced and the optimization problems are formulated. While the first concept turned out to be the mixed nonlinear programming, the second may be interpreted as the noncooperative game. The ideas of the possible solutions are briefly suggested.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114355420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study 低端汽车传感器的安全性:轮胎压力和雨光传感器案例研究
Adrian Musuroi, B. Groza, Pal-Stefan Murvay, Horatiu Gurban
In recent years, the security of in-vehicle buses and components has been extensively addressed, but only a few research works considered the security of low-end in-vehicle sensors. The main problem in addressing such components stems from the numerous constraints, both in terms of computational power, since most sensors are equipped with low-speed 8 bit controllers, and low bandwidth. In this work we use as a case study a tire-pressure sensor and a rain-light sensor. The first communicates over radio-frequency while the second uses a low-speed in-vehicle bus, both interfaces having a very low bandwidth and reduced packet size of only 64 bits. Under these constraints we discuss the design of a cryptographic security protocol based on an existing lightweight block cipher in order to assure both security and privacy objectives.
近年来,车载总线及零部件的安全问题得到了广泛的研究,但针对低端车载传感器的安全问题的研究却很少。解决此类组件的主要问题源于计算能力方面的众多限制,因为大多数传感器都配备了低速8位控制器和低带宽。在这项工作中,我们使用轮胎压力传感器和雨光传感器作为案例研究。第一种是通过射频通信,第二种是使用低速车载总线,两种接口的带宽都很低,数据包大小也只有64位。在这些约束条件下,我们讨论了基于现有轻量级分组密码的加密安全协议的设计,以保证安全性和隐私性。
{"title":"Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study","authors":"Adrian Musuroi, B. Groza, Pal-Stefan Murvay, Horatiu Gurban","doi":"10.5220/0008165400250033","DOIUrl":"https://doi.org/10.5220/0008165400250033","url":null,"abstract":"In recent years, the security of in-vehicle buses and components has been extensively addressed, but only a few research works considered the security of low-end in-vehicle sensors. The main problem in addressing such components stems from the numerous constraints, both in terms of computational power, since most sensors are equipped with low-speed 8 bit controllers, and low bandwidth. In this work we use as a case study a tire-pressure sensor and a rain-light sensor. The first communicates over radio-frequency while the second uses a low-speed in-vehicle bus, both interfaces having a very low bandwidth and reduced packet size of only 64 bits. Under these constraints we discuss the design of a cryptographic security protocol based on an existing lightweight block cipher in order to assure both security and privacy objectives.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115874882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Conference on Pervasive and Embedded Computing and Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1