首页 > 最新文献

2018 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

英文 中文
An Experimental Study towards Examining Human Body Movements in Indoor Wave Propagation at 18–22 GHz 18-22 GHz室内波传播中人体运动检测的实验研究
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531066
Ahmed Alabish, A. Kara, Y. Dalveren
As 5G communication may use Millimeter waves (mmWave) bands, it is necessary to evaluate short-range indoor links from the link blockage point of view. This paper presents some initial studies for characterizing effects of human body movements on short range indoor links at 18–22 GHz. Firstly, measurement system is described, and then, calibration measurements along with initial results of the impact of human body movement on the channel are presented for some scenarios. To the best of our knowledge, this study is the first to experimentally examine the effects of human body movements at this band. Yet, as this study constitutes a part of an ongoing research, further results will be anticipated to present the effects of objects over and around the link on the directional propagation at mmWave bands (28–30 GHz).
由于5G通信可能使用毫米波(mmWave)频段,因此有必要从链路阻塞的角度对室内短距离链路进行评估。本文介绍了人体运动对18-22 GHz短距离室内链路影响的一些初步研究。首先对测量系统进行了描述,然后针对一些场景给出了人体运动对通道影响的校准测量和初步结果。据我们所知,这项研究是第一次通过实验检查人体运动对该波段的影响。然而,由于这项研究是正在进行的研究的一部分,预计将有进一步的结果来展示链路上和周围物体对毫米波频段(28-30 GHz)定向传播的影响。
{"title":"An Experimental Study towards Examining Human Body Movements in Indoor Wave Propagation at 18–22 GHz","authors":"Ahmed Alabish, A. Kara, Y. Dalveren","doi":"10.1109/ISNCC.2018.8531066","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531066","url":null,"abstract":"As 5G communication may use Millimeter waves (mmWave) bands, it is necessary to evaluate short-range indoor links from the link blockage point of view. This paper presents some initial studies for characterizing effects of human body movements on short range indoor links at 18–22 GHz. Firstly, measurement system is described, and then, calibration measurements along with initial results of the impact of human body movement on the channel are presented for some scenarios. To the best of our knowledge, this study is the first to experimentally examine the effects of human body movements at this band. Yet, as this study constitutes a part of an ongoing research, further results will be anticipated to present the effects of objects over and around the link on the directional propagation at mmWave bands (28–30 GHz).","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fix Me Up: Smart Pathways Status Detection 修复我:智能路径状态检测
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531009
Massimo Marchiori
Pedestrian pathways are a crucial networking components of our cities, and yet they are somehow seen as subordinate to streets in many areas that are not central. As a result, detection of their actual status, and corresponding maintenance, is often far from optimal. In this work we look for solutions to the problem of pathways status detection, and look for novel solutions that allow us to assess the status of a pedestrian pathway. We develop a system that enables to collect data from the pathways in a very economical and flexible way, and then experiment to see whether the data allow to actually produce a reliable status prediction. The results, tested on the field, show that the obtained system is both convenient to use and precise, paving the way for better ways of handling pedestrian pathways networking within a smarter city environment.
人行道是我们城市网络的重要组成部分,但在许多非中心地区,它们不知何故被视为从属于街道。因此,对其实际状态的检测和相应的维护往往远非最佳状态。在这项工作中,我们寻找路径状态检测问题的解决方案,并寻找允许我们评估行人路径状态的新解决方案。我们开发了一个系统,能够以一种非常经济和灵活的方式从路径中收集数据,然后进行实验,看看这些数据是否能够实际产生可靠的状态预测。现场测试结果表明,所获得的系统既方便使用又精确,为在智能城市环境中更好地处理行人通道网络铺平了道路。
{"title":"Fix Me Up: Smart Pathways Status Detection","authors":"Massimo Marchiori","doi":"10.1109/ISNCC.2018.8531009","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531009","url":null,"abstract":"Pedestrian pathways are a crucial networking components of our cities, and yet they are somehow seen as subordinate to streets in many areas that are not central. As a result, detection of their actual status, and corresponding maintenance, is often far from optimal. In this work we look for solutions to the problem of pathways status detection, and look for novel solutions that allow us to assess the status of a pedestrian pathway. We develop a system that enables to collect data from the pathways in a very economical and flexible way, and then experiment to see whether the data allow to actually produce a reliable status prediction. The results, tested on the field, show that the obtained system is both convenient to use and precise, paving the way for better ways of handling pedestrian pathways networking within a smarter city environment.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sensory Systems for Human Body Gesture Recognition and Motion Capture 感官系统对人体姿态识别和动作捕捉
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531054
G. Saggio, G. Orengo, A. Pallotti, V. Errico, M. Ricci
Sensor-based systems for detecting, recognizing and measuring the position and movement of the human body in a three-dimensional space with great accuracy and precision have been widespread in last decades. Starting from consolidated optical systems, which still represent the reference for other cost effective systems, this work presents smart solutions for motion capture and posture recognition systems, either based on the most popular inertial sensors, but also flex sensors, such as the sensory gloves for measurement of bending angles of finger joints, whose development increases at the same rate of application developed to exploit the potential of these systems. Recently surface electromyography (sEMG) is gaining more and more importance in gesture recognition systems for disabled skills assessment and prosthesis control of transradial amputees.
在过去的几十年里,基于传感器的检测、识别和测量人体在三维空间中的位置和运动的系统得到了广泛的应用。从综合光学系统开始,这仍然是其他具有成本效益的系统的参考,这项工作提出了运动捕捉和姿势识别系统的智能解决方案,无论是基于最流行的惯性传感器,还是基于弯曲传感器,例如用于测量手指关节弯曲角度的感觉手套,其发展以开发应用的相同速度增长,以利用这些系统的潜力。近年来,表面肌电图(sEMG)在肢体识别系统、残障技能评估和经桡骨截肢者假肢控制中的作用越来越重要。
{"title":"Sensory Systems for Human Body Gesture Recognition and Motion Capture","authors":"G. Saggio, G. Orengo, A. Pallotti, V. Errico, M. Ricci","doi":"10.1109/ISNCC.2018.8531054","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531054","url":null,"abstract":"Sensor-based systems for detecting, recognizing and measuring the position and movement of the human body in a three-dimensional space with great accuracy and precision have been widespread in last decades. Starting from consolidated optical systems, which still represent the reference for other cost effective systems, this work presents smart solutions for motion capture and posture recognition systems, either based on the most popular inertial sensors, but also flex sensors, such as the sensory gloves for measurement of bending angles of finger joints, whose development increases at the same rate of application developed to exploit the potential of these systems. Recently surface electromyography (sEMG) is gaining more and more importance in gesture recognition systems for disabled skills assessment and prosthesis control of transradial amputees.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126153555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR 考虑GDPR的遗留认证数据库保护新方法
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531022
Juanita Blue, Eoghan Furey
The upcoming implementation of the European Union General Data Protection Regulation (GDPR) will require many organisations throughout the EU to comply with new requirements that are intended to better protect personal data. Large increases in responsibility, penalties and fines will place great pressure on organisations to ensure they are compliant and adequately protect user data that is associated with online accounts. Non-compliant legacy databases are those that store authentication credentials in plaintext or utilizing obsolete one-way encryption techniques that fail to adhere to best practice guidelines. Companies who remain reliant on these vulnerable systems will be forced to reconsider and improve their architecture, or risk the exposure of personal data and the debilitating penalties that will also be incurred. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. This paper offers a novel solution for improving the protection of currently non-compliant legacy authentication databases stored on Apache servers. The method applies best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords held within the databases. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure and unbeknownst to the user. It possesses the potential to improve system security, preserve privacy, and aid implementation of GDPR requirements.
即将实施的欧盟通用数据保护条例(GDPR)将要求整个欧盟的许多组织遵守旨在更好地保护个人数据的新要求。责任、处罚和罚款的大幅增加将给企业带来巨大压力,要求它们确保合规,并充分保护与在线账户相关的用户数据。不兼容的遗留数据库是那些以明文形式存储身份验证凭据或使用过时的单向加密技术的数据库,这些技术不符合最佳实践指导原则。仍然依赖这些易受攻击的系统的公司将被迫重新考虑并改进其架构,否则将面临个人数据暴露的风险,并将受到严重的处罚。身份验证数据库经常成为攻击的目标,因为它们可能为实施更深入、更有利可图的犯罪提供途径。缺乏或不合格的实现造成了身份验证数据库及其中存储的数据不安全的环境。这一点在2016年雅虎遭遇的数据泄露事件中得到了证明,该事件导致大约10亿用户凭证被盗。这家全球科技公司被发现使用过时的安全机制来保护用户密码。本文提供了一种新颖的解决方案,用于改进存储在Apache服务器上的当前不兼容的遗留身份验证数据库的保护。该方法以盐、单向加密(散列)和迭代的形式将最佳实践机制应用于数据库中已存在的和新创建的密码。建议的解决方案可以在服务器端实现,对现有的基础设施几乎没有改变,并且用户不知道。它具有提高系统安全性、保护隐私和帮助实施GDPR要求的潜力。
{"title":"A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR","authors":"Juanita Blue, Eoghan Furey","doi":"10.1109/ISNCC.2018.8531022","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531022","url":null,"abstract":"The upcoming implementation of the European Union General Data Protection Regulation (GDPR) will require many organisations throughout the EU to comply with new requirements that are intended to better protect personal data. Large increases in responsibility, penalties and fines will place great pressure on organisations to ensure they are compliant and adequately protect user data that is associated with online accounts. Non-compliant legacy databases are those that store authentication credentials in plaintext or utilizing obsolete one-way encryption techniques that fail to adhere to best practice guidelines. Companies who remain reliant on these vulnerable systems will be forced to reconsider and improve their architecture, or risk the exposure of personal data and the debilitating penalties that will also be incurred. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. This paper offers a novel solution for improving the protection of currently non-compliant legacy authentication databases stored on Apache servers. The method applies best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords held within the databases. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure and unbeknownst to the user. It possesses the potential to improve system security, preserve privacy, and aid implementation of GDPR requirements.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple Sink Placement Strategy for Underwater Wireless Sensor Networks 水下无线传感器网络的多Sink放置策略
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531063
Faiza Al-Salti, K. Day, N. Alzeidi, A. Touzene
We propose a mathematical model for multiple sink placement in Underwater Wireless Sensor Networks (UWSNs). The model is constructed for a 3D mesh topology. Our objective is to minimize the overall number of hops of every source-closest sink pair of cells. We analyze the constructed model, and prove its hardness by reducing the k-median problem, a well-known NP-hard problem to our problem. We then use the Partitioning Around Medoid (PAM) approximation algorithm to find a near optimal solution to our sink placement problem. We test the solutions obtained by this approximation algorithm by comparing them with the optimal solutions obtained using a brute force method. We also compare the approximate solutions with solutions obtained using a random-based heuristic. Results show that the proposed PAM-based approximation achieves remarkably near-optimal solutions.
提出了一种水下无线传感器网络(UWSNs)中多sink放置的数学模型。该模型是基于三维网格拓扑结构构建的。我们的目标是最小化每个离源最近的sink对cell的总跳数。我们对所构建的模型进行了分析,并通过将k中值问题(一个众所周知的np困难问题)简化到我们的问题来证明其硬度。然后,我们使用围绕介质的分区(PAM)近似算法来找到我们的接收器放置问题的接近最优解。我们通过与蛮力方法得到的最优解进行比较来检验这种近似算法得到的解。我们还比较了近似解与使用随机启发式方法获得的解。结果表明,所提出的基于pam的近似得到了显著的近最优解。
{"title":"Multiple Sink Placement Strategy for Underwater Wireless Sensor Networks","authors":"Faiza Al-Salti, K. Day, N. Alzeidi, A. Touzene","doi":"10.1109/ISNCC.2018.8531063","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531063","url":null,"abstract":"We propose a mathematical model for multiple sink placement in Underwater Wireless Sensor Networks (UWSNs). The model is constructed for a 3D mesh topology. Our objective is to minimize the overall number of hops of every source-closest sink pair of cells. We analyze the constructed model, and prove its hardness by reducing the k-median problem, a well-known NP-hard problem to our problem. We then use the Partitioning Around Medoid (PAM) approximation algorithm to find a near optimal solution to our sink placement problem. We test the solutions obtained by this approximation algorithm by comparing them with the optimal solutions obtained using a brute force method. We also compare the approximate solutions with solutions obtained using a random-based heuristic. Results show that the proposed PAM-based approximation achieves remarkably near-optimal solutions.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey of Smart City Assets for Future Military Usage 面向未来军事用途的智慧城市资产调查
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530890
Manas Pradhan
The primary purpose of military anywhere around the world is to protect and serve the people. Over the years, the role of the military has diversified which has required the military to serve countries in several capabilities. Be it active wars, intelligence gathering, rescue operations, anti-terrorist operations etc., the modern military has to play a role. Since the military has to adapt to, prepare for and respond to the ever changing dynamics of people and surroundings around the world, it becomes necessary to look into what exists currently and what will form the future. Smart cities are such a phenomenon. The cities around the world are transforming to be “Smart”, to meet various future challenges such as population migration and how to manage the living of such a huge number of people in a relatively small area, improving the quality of various services delivered to citizens, saving and optimizing resource utilization and so on. In such a scenario, where the population and assets need to be protected in Smart Cities, the militaries need to get a hold of the technologies and know the emerging trends in the smart cities. This would give the defence sector a head-start in knowing what capabilities are and would be available so that they are ready to employ their services alongside the Smart City solutions and thus serve their motto optimally. This paper entails the various Smart City assets from various cities as well as involved Internet-of-Things (IoT) technologies and tries to provide a picture of what the military in future can integrate with their solutions to serve the Smart Cities.
世界上任何地方军队的首要目的都是保护和服务人民。多年来,军队的作用已经多样化,这要求军队以多种能力为国家服务。无论是主动战争、情报收集、救援行动、反恐行动等,现代军队都必须发挥作用。由于军队必须适应、准备和响应世界各地人民和环境不断变化的动态,因此有必要研究目前存在的情况和未来将形成的情况。智慧城市就是这样一种现象。世界各地的城市都在向“智慧”转型,以应对未来的各种挑战,如人口迁移和如何在相对较小的区域内管理如此庞大的人口的生活,提高向市民提供的各种服务的质量,节约和优化资源利用等等。在这种情况下,智慧城市中的人口和资产需要得到保护,军队需要掌握这些技术并了解智慧城市的新兴趋势。这将使国防部门在了解现有和可用的能力方面领先一步,以便他们准备好将他们的服务与智慧城市解决方案一起使用,从而最佳地实现他们的座右铭。本文涉及来自各个城市的各种智慧城市资产以及涉及物联网(IoT)技术,并试图提供未来军队可以与其解决方案集成以服务于智慧城市的图景。
{"title":"A Survey of Smart City Assets for Future Military Usage","authors":"Manas Pradhan","doi":"10.1109/ISNCC.2018.8530890","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530890","url":null,"abstract":"The primary purpose of military anywhere around the world is to protect and serve the people. Over the years, the role of the military has diversified which has required the military to serve countries in several capabilities. Be it active wars, intelligence gathering, rescue operations, anti-terrorist operations etc., the modern military has to play a role. Since the military has to adapt to, prepare for and respond to the ever changing dynamics of people and surroundings around the world, it becomes necessary to look into what exists currently and what will form the future. Smart cities are such a phenomenon. The cities around the world are transforming to be “Smart”, to meet various future challenges such as population migration and how to manage the living of such a huge number of people in a relatively small area, improving the quality of various services delivered to citizens, saving and optimizing resource utilization and so on. In such a scenario, where the population and assets need to be protected in Smart Cities, the militaries need to get a hold of the technologies and know the emerging trends in the smart cities. This would give the defence sector a head-start in knowing what capabilities are and would be available so that they are ready to employ their services alongside the Smart City solutions and thus serve their motto optimally. This paper entails the various Smart City assets from various cities as well as involved Internet-of-Things (IoT) technologies and tries to provide a picture of what the military in future can integrate with their solutions to serve the Smart Cities.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multirate 5G Downlink Performance Comparison for f-OFDM and w-OFDM Schemes with Different Numerologies f-OFDM和w-OFDM方案下5G多速率下行链路性能比较
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530905
F. D. Stasio, M. Mondin, F. Daneshgaran
One of the main open problems for next generation wireless networks, is to find the new OFDM-based waveform to be used in 5G. The new modulation scheme must primarily be able to achieve higher spectral efficiency than its predecessor. The main 3GPP's candidate is a new version of OFDM, called Filtered Orthogonal Frequency-Division Modulation (f-OFDM), which is similar to OFDM but with additional filtering in order to reduce Out-Of-Band (OOB) emissions and to obtain a better spectral-localization. Another option is windowed-OFDM (w-OFDM), which is basically a classical OFDM scheme where each symbol is windowed and overlapped in the time domain. In this paper we compare classic OFDM signals using Cyclic Prefix (CP-OFDM) with f-OFDM and w-OFDM, each one with multiple parametric options and numerologies. A multirate transmitter simultaneously operating with multiple numerologies is considered, where the transmitted sub-bands must be up-sampled and interpolated in order to generate the composite numerical signal fed to the Digital to Analog Converter (DAC). Finally, we discuss advantages and disadvantages of the various schemes.
下一代无线网络面临的主要问题之一是找到用于5G的新的基于ofdm的波形。新的调制方案首先必须能够实现比其前身更高的频谱效率。3GPP的主要候选方案是一种新版本的OFDM,称为滤波正交频分调制(f-OFDM),它与OFDM类似,但增加了额外的滤波,以减少带外(OOB)发射,并获得更好的频谱定位。另一种选择是加窗OFDM (w-OFDM),它基本上是一种经典的OFDM方案,其中每个符号在时域上加窗和重叠。在本文中,我们比较了使用循环前缀(CP-OFDM)的经典OFDM信号与f-OFDM和w-OFDM,每一个都有多个参数选项和数字。考虑一个多速率的发射机同时工作在多个数字,其中发射的子带必须被上采样和内插,以产生复合数字信号馈送到数模转换器(DAC)。最后,讨论了各种方案的优缺点。
{"title":"Multirate 5G Downlink Performance Comparison for f-OFDM and w-OFDM Schemes with Different Numerologies","authors":"F. D. Stasio, M. Mondin, F. Daneshgaran","doi":"10.1109/ISNCC.2018.8530905","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530905","url":null,"abstract":"One of the main open problems for next generation wireless networks, is to find the new OFDM-based waveform to be used in 5G. The new modulation scheme must primarily be able to achieve higher spectral efficiency than its predecessor. The main 3GPP's candidate is a new version of OFDM, called Filtered Orthogonal Frequency-Division Modulation (f-OFDM), which is similar to OFDM but with additional filtering in order to reduce Out-Of-Band (OOB) emissions and to obtain a better spectral-localization. Another option is windowed-OFDM (w-OFDM), which is basically a classical OFDM scheme where each symbol is windowed and overlapped in the time domain. In this paper we compare classic OFDM signals using Cyclic Prefix (CP-OFDM) with f-OFDM and w-OFDM, each one with multiple parametric options and numerologies. A multirate transmitter simultaneously operating with multiple numerologies is considered, where the transmitted sub-bands must be up-sampled and interpolated in order to generate the composite numerical signal fed to the Digital to Analog Converter (DAC). Finally, we discuss advantages and disadvantages of the various schemes.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Extension of Mobile Edge Computing Bandwidth Management API 移动边缘计算带宽管理API的扩展
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530978
E. Pencheva, Denitsa Kireva-Mihova, I. Atanasov, V. Trifonov
Multi-access Edge Computing (MEC) is a cloud technology that converges telecommunication and computing capabilities at the Radio Access Network (RAN). The paper proposes an extension to existing MEC Application Programming Interfaces (API) for bandwidth management. The proposed extension allows authorized applications to supervise bandwidth allocation to any session or application considering up-to-date radio network information. Description of information flows, data models and actual API definition is provided. Resource state models reflect some implementation perspectives.
多接入边缘计算(MEC)是一种云技术,它融合了无线接入网(RAN)的电信和计算能力。本文提出了对现有MEC应用程序编程接口(API)进行带宽管理的扩展。拟议的扩展允许授权的应用程序监督带宽分配到任何会话或应用程序考虑到最新的无线网络信息。提供了信息流、数据模型和实际API定义的描述。资源状态模型反映了一些实现视角。
{"title":"An Extension of Mobile Edge Computing Bandwidth Management API","authors":"E. Pencheva, Denitsa Kireva-Mihova, I. Atanasov, V. Trifonov","doi":"10.1109/ISNCC.2018.8530978","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530978","url":null,"abstract":"Multi-access Edge Computing (MEC) is a cloud technology that converges telecommunication and computing capabilities at the Radio Access Network (RAN). The paper proposes an extension to existing MEC Application Programming Interfaces (API) for bandwidth management. The proposed extension allows authorized applications to supervise bandwidth allocation to any session or application considering up-to-date radio network information. Description of information flows, data models and actual API definition is provided. Resource state models reflect some implementation perspectives.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Approach of Fast-Data Architecture Applied to Alert Generation in Emergency Evacuation Systems 快速数据体系结构在应急疏散系统警报生成中的实用方法
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531069
Andrés Munoz-Arcentales, W. Velásquez, J. Salvachúa
This paper describes a proof of concept of a Fast-Data architecture to generate early response alerts on unforeseen events. For achieving that, in this work is presented the implementation of a fully integrated system capable to handle and process streaming data in order to generate an alert response for each generated event. The deployment stated are composed by a simulated wireless sensor network for generating environmental values, a centralized Kafka server for data segmentation and a machine learning model deployed in a Spark cluster for generating the emergency alerts. Also, a simulation was conducted assuming that a fire had affected the simulated scenario in order to determine and evaluate the system's behavior. Finally, the classification model is presented as an early system alternative based on real-time processing and can be used in different areas of occupational safety.
本文描述了一个快速数据架构的概念证明,该架构可以在不可预见的事件上生成早期响应警报。为了实现这一目标,本文介绍了一个完全集成的系统的实现,该系统能够处理和处理流数据,以便为每个生成的事件生成警报响应。该部署由模拟无线传感器网络(用于生成环境值)、集中式Kafka服务器(用于数据分割)和部署在Spark集群中的机器学习模型(用于生成紧急警报)组成。此外,为了确定和评估系统的行为,假设火灾影响了模拟场景,进行了模拟。最后,该分类模型是基于实时处理的早期系统替代方案,可用于职业安全的不同领域。
{"title":"Practical Approach of Fast-Data Architecture Applied to Alert Generation in Emergency Evacuation Systems","authors":"Andrés Munoz-Arcentales, W. Velásquez, J. Salvachúa","doi":"10.1109/ISNCC.2018.8531069","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531069","url":null,"abstract":"This paper describes a proof of concept of a Fast-Data architecture to generate early response alerts on unforeseen events. For achieving that, in this work is presented the implementation of a fully integrated system capable to handle and process streaming data in order to generate an alert response for each generated event. The deployment stated are composed by a simulated wireless sensor network for generating environmental values, a centralized Kafka server for data segmentation and a machine learning model deployed in a Spark cluster for generating the emergency alerts. Also, a simulation was conducted assuming that a fire had affected the simulated scenario in order to determine and evaluate the system's behavior. Finally, the classification model is presented as an early system alternative based on real-time processing and can be used in different areas of occupational safety.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building an Intelligent and Efficient Smart Space to Detect Human Behavior in Common Areas 构建智能高效的智能空间,探测公共区域的人类行为
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530988
S. Shelke, Jacob Harbour, Baris Aksanli
Smart spaces have become an integral part of our daily routines to improve quality of life for many different groups of people. The use of embedded systems to build these smart spaces, in combination with data analytics, can provide real-time information about the environment and how it interacts with the people in it. In this paper, we demonstrate how one embedded system that acquires data based on a 2-dimensional positional-grid, movement, temperature and vibration is used to build a smart and pervasive space. Data collected from these sensors is used for real time localization in conjunction with machine learning mechanisms to analyze human activities. We evaluate five machine learning algorithms, namely Logistic Regression, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and Artificial Neural Network applied on a dataset collected in our lab. Results show high classification performance for all methods giving up-to 99.95% classification accuracy. These patterns provide useful information about occupancy patterns, movement patterns, etc., which will be later used to allocate computational resources in the smart space accordingly. Furthermore, our implementation does not use any camera or microphone deployment, hence addressing potential privacy issues.
智能空间已经成为我们日常生活中不可或缺的一部分,可以改善许多不同人群的生活质量。使用嵌入式系统来构建这些智能空间,结合数据分析,可以提供有关环境及其如何与其中的人交互的实时信息。在本文中,我们演示了如何使用一个嵌入式系统来获取基于二维位置网格,运动,温度和振动的数据来构建智能和无处不在的空间。从这些传感器收集的数据用于实时定位,并结合机器学习机制来分析人类活动。我们评估了五种机器学习算法,即逻辑回归、支持向量机、决策树、随机森林、朴素贝叶斯和人工神经网络在我们实验室收集的数据集上的应用。结果表明,所有方法的分类准确率均达到99.95%。这些模式提供了关于占用模式、移动模式等的有用信息,这些信息将在稍后用于相应地在智能空间中分配计算资源。此外,我们的实现不使用任何摄像头或麦克风部署,因此解决了潜在的隐私问题。
{"title":"Building an Intelligent and Efficient Smart Space to Detect Human Behavior in Common Areas","authors":"S. Shelke, Jacob Harbour, Baris Aksanli","doi":"10.1109/ISNCC.2018.8530988","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530988","url":null,"abstract":"Smart spaces have become an integral part of our daily routines to improve quality of life for many different groups of people. The use of embedded systems to build these smart spaces, in combination with data analytics, can provide real-time information about the environment and how it interacts with the people in it. In this paper, we demonstrate how one embedded system that acquires data based on a 2-dimensional positional-grid, movement, temperature and vibration is used to build a smart and pervasive space. Data collected from these sensors is used for real time localization in conjunction with machine learning mechanisms to analyze human activities. We evaluate five machine learning algorithms, namely Logistic Regression, Support Vector Machine, Decision Tree, Random Forest, Naive Bayes and Artificial Neural Network applied on a dataset collected in our lab. Results show high classification performance for all methods giving up-to 99.95% classification accuracy. These patterns provide useful information about occupancy patterns, movement patterns, etc., which will be later used to allocate computational resources in the smart space accordingly. Furthermore, our implementation does not use any camera or microphone deployment, hence addressing potential privacy issues.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 International Symposium on Networks, Computers and Communications (ISNCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1