首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Packet delay, loss and reordering in IPv6 world: A case study IPv6世界中的数据包延迟、丢失和重新排序:一个案例研究
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440642
Fuliang Li, Xingwei Wang, Tian Pan, Jiahai Yang
With the exhausting of IPv4 addresses, the transition to IPv6 is imminent. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss of IPv6 is similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, e.g., 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct an analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3×10-6, which is much lower than the average rate of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for IPv6 network operators and researchers.
随着IPv4地址的耗尽,向IPv6的过渡迫在眉睫。为了深入了解IPv6,本文回顾了几个关键的IPv6性能指标。我们广泛的测量表明,当as级路径大致相同时,IPv6的数据包延迟和丢失与IPv4相似。具体而言,当链路利用率超过阈值时,例如在我们的研究中为0.83,数据包延迟的变化与链路利用率的变化呈现类似的模式。如果某条路径的数据包延迟较大,则该路径的丢包率波动较大。此外,我们还对IPv6世界中的数据包重排序进行了分析。IPv6探测报文的乱序率很少,重序率为2.3×10-6,远低于IPv4世界0.79%的平均水平。我们的分析巩固了IPv6网络运营商和研究人员的实验基础。
{"title":"Packet delay, loss and reordering in IPv6 world: A case study","authors":"Fuliang Li, Xingwei Wang, Tian Pan, Jiahai Yang","doi":"10.1109/ICCNC.2016.7440642","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440642","url":null,"abstract":"With the exhausting of IPv4 addresses, the transition to IPv6 is imminent. In order to gain a deep understanding of IPv6, this paper revisits several critical IPv6 performance metrics. Our extensive measurement shows that packet delay and loss of IPv6 is similar to IPv4 when the AS-level paths are roughly the same. Specifically, when the link utilization exceeds a threshold, e.g., 0.83 in our study, variation of packet delay presents a similar pattern with the variation of link utilization. If packet delay of a path is large, packet-loss rate of that path is more likely to fluctuate. In addition, we conduct an analysis of packet reordering in IPv6 world. Few IPv6 probe packets are out-of-order and the reordering rate is 2.3×10-6, which is much lower than the average rate of 0.79% in IPv4 world. Our analysis consolidates an experimental basis for IPv6 network operators and researchers.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116690258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MobiVPN: A mobile VPN providing persistency to applications 移动VPN:为应用程序提供持久性的移动VPN
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440684
Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang
Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. But conventional VPN solutions are intended for wired networks with high-speed, highly reliable connections. In a mobile environment, connections are less reliable. This affects traditional VPN performance resulting in frequent application failure, data loss and reduced productivity. MobiVPN bridges the gap between what users and applications expect from a wired network and the realities of mobility. In this work, system design for a caching model is developed, and modifications to the OpenVPN software is implemented to make disruptions in the VPN transparent to the applications. MobiVPN is able to provide 1) persistency to application despite long unavailability of network connection using caching and freeze TCP techniques; with negligible throughput penalty when there is no disconnections due to extra computation overhead, and 2) improved TCP performance when disconnections occur up to 9.88% increase in throughput.
虚拟专用网(VPN)是在两个端点之间实现端到端安全连接的传统方法。但传统的VPN解决方案是为具有高速、高可靠连接的有线网络设计的。在移动环境中,连接不太可靠。这会影响传统VPN的性能,导致应用程序频繁故障、数据丢失和生产力降低。MobiVPN弥合了用户和应用程序对有线网络的期望与移动现实之间的差距。在这项工作中,开发了缓存模型的系统设计,并对OpenVPN软件进行了修改,以使VPN中的中断对应用程序透明。MobiVPN能够提供1)持久性的应用程序,尽管长期不可用的网络连接使用缓存和冻结TCP技术;当由于额外的计算开销而没有断开连接时,吞吐量损失可以忽略不计,并且2)当断开连接发生时,TCP性能得到改善,吞吐量增加高达9.88%。
{"title":"MobiVPN: A mobile VPN providing persistency to applications","authors":"Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang","doi":"10.1109/ICCNC.2016.7440684","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440684","url":null,"abstract":"Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. But conventional VPN solutions are intended for wired networks with high-speed, highly reliable connections. In a mobile environment, connections are less reliable. This affects traditional VPN performance resulting in frequent application failure, data loss and reduced productivity. MobiVPN bridges the gap between what users and applications expect from a wired network and the realities of mobility. In this work, system design for a caching model is developed, and modifications to the OpenVPN software is implemented to make disruptions in the VPN transparent to the applications. MobiVPN is able to provide 1) persistency to application despite long unavailability of network connection using caching and freeze TCP techniques; with negligible throughput penalty when there is no disconnections due to extra computation overhead, and 2) improved TCP performance when disconnections occur up to 9.88% increase in throughput.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture 基于认知传感器网络能量和带宽联合检测的自适应阈值射频频谱扫描
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440558
I. Cushman, A. Younis, D. Rawat, Lei Chen
Opportunistic spectrum access in cognitive radio networks is regarded as an emerging technology for efficient utilization of under utilized of idle radio frequency spectrum. For opportunistic spectrum access, wireless devices are required to identify idle spectrum through spectrum sensing. The performance study of existing spectrum sensing algorithms often overlooks bandwidth of the detected signal while detecting the signal using peak of the energy spectrum that crosses the pre-specified threshold. This results in high false alarm probability. In this paper, we evaluate an adaptive threshold based RF spectrum sensing approach using USRP Software Defined Radio (SDR) for real-time opportunistic spectrum access in cloud based cognitive radio networks (ROAR) architecture where both signal energy and band-width of the signal are taken into account. We evaluate the performance of the proposed approach using probability of misdetection and false alarms metrics. The proposed approach can be particularized to a scenario with energy based detection or bandwidth based detection. The proposed approach is illustrated through numerical results obtained from experiments.
认知无线电网络中的机会频谱接入是一种有效利用未充分利用的空闲频谱的新兴技术。对于机会频谱接入,无线设备需要通过频谱感知来识别空闲频谱。现有的频谱感知算法的性能研究往往忽略了被检测信号的带宽,而是利用超过预设阈值的能谱峰值来检测信号。这将导致高虚警概率。在本文中,我们评估了一种基于自适应阈值的射频频谱感知方法,该方法使用USRP软件定义无线电(SDR)在基于云的认知无线电网络(ROAR)架构中进行实时机会频谱接入,其中信号能量和信号带宽都被考虑在内。我们使用误检概率和虚警度量来评估所提出方法的性能。所提出的方法可具体用于具有基于能量的检测或基于带宽的检测的场景。通过实验得到的数值结果说明了所提出的方法。
{"title":"Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture","authors":"I. Cushman, A. Younis, D. Rawat, Lei Chen","doi":"10.1109/ICCNC.2016.7440558","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440558","url":null,"abstract":"Opportunistic spectrum access in cognitive radio networks is regarded as an emerging technology for efficient utilization of under utilized of idle radio frequency spectrum. For opportunistic spectrum access, wireless devices are required to identify idle spectrum through spectrum sensing. The performance study of existing spectrum sensing algorithms often overlooks bandwidth of the detected signal while detecting the signal using peak of the energy spectrum that crosses the pre-specified threshold. This results in high false alarm probability. In this paper, we evaluate an adaptive threshold based RF spectrum sensing approach using USRP Software Defined Radio (SDR) for real-time opportunistic spectrum access in cloud based cognitive radio networks (ROAR) architecture where both signal energy and band-width of the signal are taken into account. We evaluate the performance of the proposed approach using probability of misdetection and false alarms metrics. The proposed approach can be particularized to a scenario with energy based detection or bandwidth based detection. The proposed approach is illustrated through numerical results obtained from experiments.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a user-friendly sensor network simulator to imitate wireless charging vehicle behaviors 开发一个用户友好的传感器网络模拟器来模拟无线充电车辆的行为
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440560
Shuo-Han Chen, Tseng-Yi Chen, Yu-Chun Cheng, H. Wei, T. Hsu, W. Shih
An emerging breakthrough in wireless charging technology is expected to solve the power constraint problem in wireless sensor networks (WSN). In various works, wireless chargers are being bundled with mobile vehicles to recharge sensor nodes. In these works, simulations of mobile vehicles are typically used in experiments because building a wireless sensor network test bed is very costly and many details of a wireless sensor network are neither standardized nor finalized. Accordingly, a simulator is extremely useful in testing new applications or protocols in wireless sensor networks. However, several well-known wireless sensor network simulators have no or limited support for wireless recharging. Researchers may want to construct their own simulating modules, but the highly complex design of current simulators is intimidating and stops researchers from testing their applications. This work develops a framework for simulating a WSN and focuses on the simulation of wireless power transfer and mobile vehicles. This simulator eliminates the need for researchers to build their own simulator or integrate complex wireless charging modules, allowing them simply to implement their algorithm. Moreover, the proposed simulator has been verified by implementing the work of Xie et al. [20].
无线充电技术的新突破有望解决无线传感器网络(WSN)中的功率约束问题。在各种工作中,无线充电器被捆绑在移动车辆上,为传感器节点充电。在这些工作中,移动车辆的模拟通常用于实验,因为建立无线传感器网络测试平台非常昂贵,并且无线传感器网络的许多细节既没有标准化也没有最终确定。因此,模拟器在测试无线传感器网络中的新应用或协议时非常有用。然而,一些知名的无线传感器网络模拟器不支持或有限地支持无线充电。研究人员可能想要构建自己的模拟模块,但当前模拟器的高度复杂设计令人生畏,并阻止研究人员测试他们的应用程序。这项工作开发了一个模拟WSN的框架,并着重于无线电力传输和移动车辆的模拟。该模拟器消除了研究人员构建自己的模拟器或集成复杂的无线充电模块的需要,使他们能够简单地实现他们的算法。此外,所提出的模拟器已经通过Xie等人[20]的工作进行了验证。
{"title":"Developing a user-friendly sensor network simulator to imitate wireless charging vehicle behaviors","authors":"Shuo-Han Chen, Tseng-Yi Chen, Yu-Chun Cheng, H. Wei, T. Hsu, W. Shih","doi":"10.1109/ICCNC.2016.7440560","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440560","url":null,"abstract":"An emerging breakthrough in wireless charging technology is expected to solve the power constraint problem in wireless sensor networks (WSN). In various works, wireless chargers are being bundled with mobile vehicles to recharge sensor nodes. In these works, simulations of mobile vehicles are typically used in experiments because building a wireless sensor network test bed is very costly and many details of a wireless sensor network are neither standardized nor finalized. Accordingly, a simulator is extremely useful in testing new applications or protocols in wireless sensor networks. However, several well-known wireless sensor network simulators have no or limited support for wireless recharging. Researchers may want to construct their own simulating modules, but the highly complex design of current simulators is intimidating and stops researchers from testing their applications. This work develops a framework for simulating a WSN and focuses on the simulation of wireless power transfer and mobile vehicles. This simulator eliminates the need for researchers to build their own simulator or integrate complex wireless charging modules, allowing them simply to implement their algorithm. Moreover, the proposed simulator has been verified by implementing the work of Xie et al. [20].","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Achieving lightweight, time-specific and secure access control in cloud storage 在云存储中实现轻量级、特定时间和安全的访问控制
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440632
Yanchao Wang, Fenghua Li, Ben Niu, R. Xie
Cloud computing is regarded as a promising computing paradigm. More and more people store their sensitive data on the cloud. However, it is a great challenge for data security and accessing the sensitive data on the cloud. In this paper, we propose a novel access control scheme, termed LTS-ACCESS, which achieves Lightweight, Time-specific and Secure data access control for resource-limited devices in cloud storage. Our LTS-ACCESS simultaneously enjoys the following properties: i) constant size of the decryption keys and lower computation cost since we delegate almost all of the decryption cost to the decryption service provider, ii) time-specific, the sensitive data owner may specify a time interval, thus a receiver can decrypt the ciphertext once it is received and a time instant key has been obtained, and iii) provably secure, the proposed scheme is provably secure under the selective security model. Thoroughly theoretical analysis and performance evaluation indicate the effectiveness and efficiency of our proposed LTS-ACCESS.
云计算被认为是一种很有前途的计算范式。越来越多的人将他们的敏感数据存储在云上。然而,这对数据安全和访问云上的敏感数据是一个巨大的挑战。在本文中,我们提出了一种新的访问控制方案,称为LTS-ACCESS,它实现了云存储中资源有限的设备的轻量级,特定时间和安全的数据访问控制。我们的LTS-ACCESS同时具有以下特性:i)解密密钥的大小恒定,计算成本较低,因为我们将几乎所有的解密成本委托给了解密服务提供商;ii)特定于时间的,敏感数据所有者可以指定一个时间间隔,因此接收方一旦收到密文并获得时间即时密钥就可以解密密文;iii)可证明的安全性,所提出的方案在选择性安全模型下是可证明的安全性。全面的理论分析和性能评估表明了我们所提出的LTS-ACCESS的有效性和效率。
{"title":"Achieving lightweight, time-specific and secure access control in cloud storage","authors":"Yanchao Wang, Fenghua Li, Ben Niu, R. Xie","doi":"10.1109/ICCNC.2016.7440632","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440632","url":null,"abstract":"Cloud computing is regarded as a promising computing paradigm. More and more people store their sensitive data on the cloud. However, it is a great challenge for data security and accessing the sensitive data on the cloud. In this paper, we propose a novel access control scheme, termed LTS-ACCESS, which achieves Lightweight, Time-specific and Secure data access control for resource-limited devices in cloud storage. Our LTS-ACCESS simultaneously enjoys the following properties: i) constant size of the decryption keys and lower computation cost since we delegate almost all of the decryption cost to the decryption service provider, ii) time-specific, the sensitive data owner may specify a time interval, thus a receiver can decrypt the ciphertext once it is received and a time instant key has been obtained, and iii) provably secure, the proposed scheme is provably secure under the selective security model. Thoroughly theoretical analysis and performance evaluation indicate the effectiveness and efficiency of our proposed LTS-ACCESS.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing and optimal hop distance in wireless ad hoc networks 无线自组织网络中的路由和最优跳距
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440716
Yinxiang Qu, Yang Liu, Li Wang, Mei Song
This paper provides a cross-layer strategy which will combine nodes optimal coverage radius and routing complexity in wireless Ad Hoc networks that using Hop-count routing protocol. Assuming that channel state information(CSI) for all of links is available and constant. Every node is working in half-duplex model and using different channel to guarantee that there is no interference to others. We first consider a scenario that all nodes are deployed in a line, getting an optimal hop distance for different SNR by analysis and simulation. Then we use the optimal hop distance as a metric to determine the optimal coverage radius R of each nodes in Ad Hoc networks and investigate the relationship between the optimal coverage radius R and the optimal hop distance. In the end, we design a new coverage Ring algorithm in wireless networks which will make the network more sparse and reduce routing complexity in Ad Hoc networks. Simulations show that the Ring algorithm can outperform than tradition way in complexity of routing and energy consumption. This paper can provide a reference for a Ad Hoc network to determinate which node should connect directly and which node should act as a relay. Besides, this paper can also provides a reference for sensor networks to determine how many sensors should be deployed in an area to get a more efficient wireless network.
在采用跳数路由协议的无线自组网中,提出了一种结合节点最优覆盖半径和路由复杂度的跨层策略。假设所有链接的通道状态信息(CSI)都是可用且恒定的。每个节点工作在半双工模式下,使用不同的信道以保证不干扰其他节点。我们首先考虑所有节点在一条线上部署的场景,通过分析和仿真得到不同信噪比下的最优跳距。然后以最优跳距为度量,确定Ad Hoc网络中各节点的最优覆盖半径R,并研究最优覆盖半径R与最优跳距之间的关系。最后,我们设计了一种新的无线网络覆盖环算法,使网络更加稀疏,降低了Ad Hoc网络中的路由复杂度。仿真结果表明,环形算法在路由复杂度和能耗方面都优于传统算法。本文可以为Ad Hoc网络确定哪些节点应该直接连接,哪些节点应该充当中继提供参考。此外,本文还可以为传感器网络确定在一个区域内应该部署多少个传感器以获得更高效的无线网络提供参考。
{"title":"Routing and optimal hop distance in wireless ad hoc networks","authors":"Yinxiang Qu, Yang Liu, Li Wang, Mei Song","doi":"10.1109/ICCNC.2016.7440716","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440716","url":null,"abstract":"This paper provides a cross-layer strategy which will combine nodes optimal coverage radius and routing complexity in wireless Ad Hoc networks that using Hop-count routing protocol. Assuming that channel state information(CSI) for all of links is available and constant. Every node is working in half-duplex model and using different channel to guarantee that there is no interference to others. We first consider a scenario that all nodes are deployed in a line, getting an optimal hop distance for different SNR by analysis and simulation. Then we use the optimal hop distance as a metric to determine the optimal coverage radius R of each nodes in Ad Hoc networks and investigate the relationship between the optimal coverage radius R and the optimal hop distance. In the end, we design a new coverage Ring algorithm in wireless networks which will make the network more sparse and reduce routing complexity in Ad Hoc networks. Simulations show that the Ring algorithm can outperform than tradition way in complexity of routing and energy consumption. This paper can provide a reference for a Ad Hoc network to determinate which node should connect directly and which node should act as a relay. Besides, this paper can also provides a reference for sensor networks to determine how many sensors should be deployed in an area to get a more efficient wireless network.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Urban intelligent parking system based on the parallel theory 基于并行理论的城市智能停车系统
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440708
Fei-Yue Wang, Liuqing Yang, Jian Yang, Yanli Zhang, Shuangshuang Han, Kai Zhao
Nowadays, urban parking circumstances are becoming more and more challenging. To solve this problem, many methods have been proposed, such as infrastructure expansion, economic leverage and technical theory. However, these solutions are generally used independently, thus it is infeasible to solve all existing problems. Therefore, a novel and revolutionary solution is urgently required. In this paper, we first comprehensively investigate the background of parking difficulties, and find that all of the current existing solutions are not able to meet the requirements of dynamic, systematization, high efficiency and accuracy. Then we briefly introduce the parallel theory, and propose the intelligent parking system based on the parallel theory, which can provide a systematic intelligent solution to meet the needs of current parking systems. The parallel parking system is made up of three parts, including the artificial system, the computational experiments, and the parallel execution. The proposed parallel parking system not only provides a novel direction to solve the parking problem, but also is an important guidance for the specific implementation of parallel parking theory.
如今,城市停车环境变得越来越具有挑战性。为了解决这一问题,人们提出了许多方法,如基础设施扩张、经济杠杆和技术理论。但是,这些解决方案通常是独立使用的,因此不可能解决所有存在的问题。因此,迫切需要一种新颖的、革命性的解决方案。在本文中,我们首先对停车难的背景进行了全面的调查,发现目前现有的所有解决方案都不能满足动态、系统化、高效率和准确性的要求。然后简要介绍了并行理论,提出了基于并行理论的智能停车系统,为满足当前停车系统的需求提供了系统的智能解决方案。并联泊车系统由人工系统、计算实验和并行执行三部分组成。提出的平行停车系统不仅为解决停车问题提供了新的方向,而且对平行停车理论的具体实施具有重要的指导意义。
{"title":"Urban intelligent parking system based on the parallel theory","authors":"Fei-Yue Wang, Liuqing Yang, Jian Yang, Yanli Zhang, Shuangshuang Han, Kai Zhao","doi":"10.1109/ICCNC.2016.7440708","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440708","url":null,"abstract":"Nowadays, urban parking circumstances are becoming more and more challenging. To solve this problem, many methods have been proposed, such as infrastructure expansion, economic leverage and technical theory. However, these solutions are generally used independently, thus it is infeasible to solve all existing problems. Therefore, a novel and revolutionary solution is urgently required. In this paper, we first comprehensively investigate the background of parking difficulties, and find that all of the current existing solutions are not able to meet the requirements of dynamic, systematization, high efficiency and accuracy. Then we briefly introduce the parallel theory, and propose the intelligent parking system based on the parallel theory, which can provide a systematic intelligent solution to meet the needs of current parking systems. The parallel parking system is made up of three parts, including the artificial system, the computational experiments, and the parallel execution. The proposed parallel parking system not only provides a novel direction to solve the parking problem, but also is an important guidance for the specific implementation of parallel parking theory.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131688691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel metadata extraction method for surveillance video 一种新的监控视频元数据提取方法
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440665
Ran Zheng, Long Chen, Hai Jin, Lei Zhu, Qin Zhang
Surveillance videos are increasing massively with monitoring cameras widely deployed in cities. Metadata of moving objects in videos can reduce video storage and be utilized in many video analysis applications. The whole metadata extraction is too time-consuming to be fulfilled quickly. Therefore, it is urgent to parallelize and accelerate the extraction process. However, iterative execution of traditional metadata extraction methods makes the parallelization quite challenging. In this paper, we propose a novel Parallel Metadata Extraction (PME) method for surveillance video. A novel video segmentation algorithm is designed to segment whole video into independent video segments. The metadata of each video segment is extracted independently and simultaneously on computer nodes, which will be integrated later to guarantee the completeness of the metadata. Performance evaluations demonstrate that PME can accelerate extraction process greatly almost without metadata loss.
随着监控摄像头在城市的广泛部署,监控视频正在大量增加。视频中运动对象的元数据可以减少视频的存储空间,在很多视频分析应用中都有应用。整个元数据提取太耗时,无法快速完成。因此,迫切需要并行化和加速提取过程。然而,传统元数据提取方法的迭代执行使得并行化非常具有挑战性。本文提出了一种新的用于监控视频的并行元数据提取方法。设计了一种新的视频分割算法,将整个视频分割成独立的视频片段。每个视频片段的元数据在计算机节点上独立同时提取,后期进行集成,保证元数据的完整性。性能评估表明,PME可以在几乎不丢失元数据的情况下大大加快提取过程。
{"title":"A novel metadata extraction method for surveillance video","authors":"Ran Zheng, Long Chen, Hai Jin, Lei Zhu, Qin Zhang","doi":"10.1109/ICCNC.2016.7440665","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440665","url":null,"abstract":"Surveillance videos are increasing massively with monitoring cameras widely deployed in cities. Metadata of moving objects in videos can reduce video storage and be utilized in many video analysis applications. The whole metadata extraction is too time-consuming to be fulfilled quickly. Therefore, it is urgent to parallelize and accelerate the extraction process. However, iterative execution of traditional metadata extraction methods makes the parallelization quite challenging. In this paper, we propose a novel Parallel Metadata Extraction (PME) method for surveillance video. A novel video segmentation algorithm is designed to segment whole video into independent video segments. The metadata of each video segment is extracted independently and simultaneously on computer nodes, which will be integrated later to guarantee the completeness of the metadata. Performance evaluations demonstrate that PME can accelerate extraction process greatly almost without metadata loss.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lifetime maximization via optimal coordinator deployment for wireless body area network 基于优化协调器部署的无线体域网络寿命最大化
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440660
Feng Wang, Fengye Hu, Wei Xiong, Shanshan Wang
Wireless body area network (WBAN) consists of an coordinator and several wearable sensor nodes placed in/on/around human body and monitors human body functions and characteristics, such as blood pressure and heartbeat. However, sensor nodes are energy-constrained and lifetime maximization has become one of the most important problems in WBAN. In this paper, we deduce the lifetime maximization model and propose an optimal coordinator deployment policy to maximize lifetime for WBAN under walking scenery. When sensor nodes have the fixed locations and path loss model is adopted, different deployment policy of coordinator will obtain different lifetime. Our policy is used for confirming the optimal coordinator location with the constraint of bit error rate (BER). Analytical and simulation results provide that the policy is optimal and can acquire the maximal lifetime.
无线身体区域网络(WBAN)由一个协调器和几个放置在人体内/上/周围的可穿戴传感器节点组成,监测人体的功能和特征,如血压和心跳。然而,传感器节点的能量限制和寿命最大化已经成为WBAN中最重要的问题之一。本文推导了WBAN的寿命最大化模型,并提出了一种优化的协调器部署策略,使WBAN在步行场景下的寿命最大化。当传感器节点位置固定且采用路径损失模型时,不同的协调器部署策略将获得不同的生存期。该策略用于在误码率约束下确定协调器的最佳位置。分析和仿真结果表明,该策略是最优的,可以获得最大的寿命。
{"title":"Lifetime maximization via optimal coordinator deployment for wireless body area network","authors":"Feng Wang, Fengye Hu, Wei Xiong, Shanshan Wang","doi":"10.1109/ICCNC.2016.7440660","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440660","url":null,"abstract":"Wireless body area network (WBAN) consists of an coordinator and several wearable sensor nodes placed in/on/around human body and monitors human body functions and characteristics, such as blood pressure and heartbeat. However, sensor nodes are energy-constrained and lifetime maximization has become one of the most important problems in WBAN. In this paper, we deduce the lifetime maximization model and propose an optimal coordinator deployment policy to maximize lifetime for WBAN under walking scenery. When sensor nodes have the fixed locations and path loss model is adopted, different deployment policy of coordinator will obtain different lifetime. Our policy is used for confirming the optimal coordinator location with the constraint of bit error rate (BER). Analytical and simulation results provide that the policy is optimal and can acquire the maximal lifetime.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Public scene recognition using mobile phone sensors 利用手机传感器识别公共场景
Pub Date : 2016-03-24 DOI: 10.1109/ICCNC.2016.7440683
Shuang Liang, Xiaojiang Du, Ping Dong
Smartphones evolve rapidly and become more powerful in computing capabilities. More importantly, they are becoming smarter as more sensors such as the accelerometer, gyroscope, compass and the camera have been embedded on the digital board. In this paper, we propose a novel framework to recognize public scenes based on the sensors embedded in mobile phones. We build individual models for audio, light, wifi and bluetooth first, then integrate these sub-models using dynamically-weighted majority voting. We consider two factors when deciding the voting weight. One factor is the recognition rate of each sub-model and the other factor is recognition precision of the sub-model in specific scenes. We build the data-collecting app on the Android phone and implement the recognition algorithm on a Linux server. Evaluation of the data collected in the bar, cafe, elevator, library, subway station and the office shows that the ensemble recognition model is more accurate and robust than each individual sub-models. We achieved 83.33% (13.33% higher than audio sub-model) recognition accuracy when we evaluated the ensemble model with test dataset.
智能手机发展迅速,在计算能力方面变得更加强大。更重要的是,随着越来越多的传感器,如加速度计、陀螺仪、指南针和摄像头被嵌入到数字板上,它们变得越来越智能。本文提出了一种基于手机传感器的公共场景识别框架。我们首先为音频、灯光、wifi和蓝牙建立单独的模型,然后使用动态加权多数投票将这些子模型整合起来。在决定投票权重时,我们考虑两个因素。一个因素是每个子模型的识别率,另一个因素是子模型在特定场景中的识别精度。我们在Android手机上构建数据采集应用,在Linux服务器上实现识别算法。通过对酒吧、咖啡馆、电梯、图书馆、地铁站和办公室等场所的数据进行评估,结果表明,集成识别模型比单个子模型更准确、鲁棒。当我们使用测试数据集评估集成模型时,我们获得了83.33%(比音频子模型高13.33%)的识别准确率。
{"title":"Public scene recognition using mobile phone sensors","authors":"Shuang Liang, Xiaojiang Du, Ping Dong","doi":"10.1109/ICCNC.2016.7440683","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440683","url":null,"abstract":"Smartphones evolve rapidly and become more powerful in computing capabilities. More importantly, they are becoming smarter as more sensors such as the accelerometer, gyroscope, compass and the camera have been embedded on the digital board. In this paper, we propose a novel framework to recognize public scenes based on the sensors embedded in mobile phones. We build individual models for audio, light, wifi and bluetooth first, then integrate these sub-models using dynamically-weighted majority voting. We consider two factors when deciding the voting weight. One factor is the recognition rate of each sub-model and the other factor is recognition precision of the sub-model in specific scenes. We build the data-collecting app on the Android phone and implement the recognition algorithm on a Linux server. Evaluation of the data collected in the bar, cafe, elevator, library, subway station and the office shows that the ensemble recognition model is more accurate and robust than each individual sub-models. We achieved 83.33% (13.33% higher than audio sub-model) recognition accuracy when we evaluated the ensemble model with test dataset.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1