首页 > 最新文献

2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)最新文献

英文 中文
Design and verification of IEEE 802.11ah for IoT and M2M applications 针对IoT和M2M应用的IEEE 802.11ah的设计和验证
Rami Akeela, Yacoub Elziq
In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption compared to the existing Wi-Fi standards. In this paper, a Verilog RTL implementation of the new standard is presented. It is suitable for IoT, M2M, V2V (Vehicle-to-Vehicle) applications, and smart grids that require long battery life and long range reliability. Software simulations using Xilinx Vivado are also provided to verify the design. The design is then synthesized using the same tool, and performance, power, and area are reported.
为了有效地支持机器对机器(M2M)和物联网(IoT)应用,引入了Wi-Fi标准的新修订,即IEEE 802.11ah。在802.11ah(或Wi-Fi HaLow)中,增加了几个增强的MAC功能,以便为大量站点提供可扩展性,增加操作范围,同时与现有Wi-Fi标准相比降低能耗。本文给出了新标准的Verilog RTL实现。它适用于需要长电池寿命和长距离可靠性的IoT, M2M, V2V(车对车)应用以及智能电网。利用Xilinx Vivado软件仿真验证了该设计。然后使用相同的工具对设计进行综合,并报告性能、功率和面积。
{"title":"Design and verification of IEEE 802.11ah for IoT and M2M applications","authors":"Rami Akeela, Yacoub Elziq","doi":"10.1109/PERCOMW.2017.7917612","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917612","url":null,"abstract":"In order to efficiently support the Machine-to-Machine (M2M) and Internet of Things (IoT) applications, a new amendment for the Wi-Fi standard known as IEEE 802.11ah is introduced. In 802.11ah (or Wi-Fi HaLow), several enhanced MAC features are added in order to provide scalability for a large number of stations, increase the range of operation, while at the same time reduce the energy consumption compared to the existing Wi-Fi standards. In this paper, a Verilog RTL implementation of the new standard is presented. It is suitable for IoT, M2M, V2V (Vehicle-to-Vehicle) applications, and smart grids that require long battery life and long range reliability. Software simulations using Xilinx Vivado are also provided to verify the design. The design is then synthesized using the same tool, and performance, power, and area are reported.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
EyeAssist: A communication aid through gaze tracking for patients with neuro-motor disabilities EyeAssist:通过注视跟踪为神经运动障碍患者提供的交流辅助
A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam
The paper presents EyeAssist, a low cost, user friendly communication aid developed specifically for individuals suffering from neuro-motor problems. Existing gaze based typing systems encounter problems of unintentional key presses, extensive calibration process and inbuilt noise of eye trackers. We tried to solve these problems in the EyeAssist system by employing accurate gaze tracking. Fixation information are derived from the acquired gaze data. The systematic and variable noises of the eye tracker are being removed by graph signal processing based filters, Kalman filter and linear transformation. A unique one-time calibration which is subject and session independent has made the system easy to use without compromising its efficacy. The system has provision for setting variable dwell time according to users' preferences. EyeAssist also provides some unique features like text to speech conversion of typed sentences, predictive word and sentence entry etc. Results show that the average typing rate is 11.8 words per minute with an average error rate of 6.6%. Moreover the error rate reduces drastically with some practice. The system is user friendly, easy to use which makes it a perfect choice for patients suffering with neuro-motor disabilities.
本文介绍了EyeAssist,一种低成本,用户友好的交流辅助工具,专门为患有神经运动问题的个人开发。现有的基于注视的打字系统存在误按按键、大量校准过程和眼动仪内置噪音等问题。我们试图在EyeAssist系统中通过使用精确的注视跟踪来解决这些问题。注视信息来源于获取的注视数据。采用基于图信号处理的滤波、卡尔曼滤波和线性变换来去除眼动仪的系统噪声和可变噪声。一个独特的一次性校准,这是主题和会话独立,使系统易于使用,而不影响其功效。系统具有根据用户喜好设置可变停留时间的功能。EyeAssist还提供了一些独特的功能,如输入句子的文本到语音转换,预测单词和句子输入等。结果表明,平均打字速度为每分钟11.8个单词,平均错误率为6.6%。此外,经过一些实践,错误率大大降低。该系统用户友好,易于使用,使其成为患有神经运动障碍的患者的完美选择。
{"title":"EyeAssist: A communication aid through gaze tracking for patients with neuro-motor disabilities","authors":"A. Khasnobish, R. Gavas, D. Chatterjee, Ved Raj, S. Naitam","doi":"10.1109/PERCOMW.2017.7917593","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917593","url":null,"abstract":"The paper presents EyeAssist, a low cost, user friendly communication aid developed specifically for individuals suffering from neuro-motor problems. Existing gaze based typing systems encounter problems of unintentional key presses, extensive calibration process and inbuilt noise of eye trackers. We tried to solve these problems in the EyeAssist system by employing accurate gaze tracking. Fixation information are derived from the acquired gaze data. The systematic and variable noises of the eye tracker are being removed by graph signal processing based filters, Kalman filter and linear transformation. A unique one-time calibration which is subject and session independent has made the system easy to use without compromising its efficacy. The system has provision for setting variable dwell time according to users' preferences. EyeAssist also provides some unique features like text to speech conversion of typed sentences, predictive word and sentence entry etc. Results show that the average typing rate is 11.8 words per minute with an average error rate of 6.6%. Moreover the error rate reduces drastically with some practice. The system is user friendly, easy to use which makes it a perfect choice for patients suffering with neuro-motor disabilities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Establishing trust in heterogeneous networks 在异构网络中建立信任
Dominik Schürmann
Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.
许多场景需要保密通信和针对主动攻击者的保护。在设备之间建立信任和对这些网络进行认证的方式完全取决于具体的场景。在人体区域网络中,人体生物特征可以作为设备之间的共享秘密。在实时语音通信中,ZRTP协议允许通过识别对方的语音来建立交互式信任。在异步网络(如电子邮件)中,已经部署了其他交互机制,例如密钥指纹验证。在我们的研究中,我们分析了异构网络中现有信任机制的安全性和可用性。此外,我们正在提议修改协议和建立设备之间信任的新机制。本文对该领域的现有研究和未来研究进行了综述。对于同步网络,人类生物特征,如人类步态或同伴的声音,被用作信任锚。对于异步网络,作为信任锚点分析了交互式公钥验证机制的可用性。
{"title":"Establishing trust in heterogeneous networks","authors":"Dominik Schürmann","doi":"10.1109/PERCOMW.2017.7917540","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917540","url":null,"abstract":"Many scenarios require confidential communication and protection against active attackers. The way to establish trust between devices and authenticate these networks depends completely on the scenario. In Body Area Networks human biometrics can serve as a shared secret among devices. In real-time voice communication, the ZRTP protocol allows for interactive trust establishment by recognizing the peer's voice. In asynchronous networks, such as email, other interactive mechanisms have been deployed, such as key fingerprint verification. In our research, we are analyzing the security and usability of existing trust mechanisms for heterogeneous networks. Furthermore, we are proposing protocol changes and new mechanisms to establish trust between devices. In this paper an overview is given over existing and upcoming research in this area. For synchronous networks, human biometrics, such as human gait or a peer's voice, are used as trust anchors. For asynchronous networks, the usability of interactive public-key verification mechanism are analyzed as trust anchors.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Good pervasive computing studies require laborious data labeling efforts: Our experience in activity recognition and indoor positioning studies 良好的普适计算研究需要艰苦的数据标记工作:我们在活动识别和室内定位研究方面的经验
T. Maekawa
Preparing and labeling sensing data are necessary when we develop state-of-the-art sensing devices or methods in our studies. Since developing and proposing new sensing devices or modalities are important in the pervasive computing and ubicomp research communities, we need to provide high quality labeled data by making use of our limited time whenever we develop a new sensing device. In this keynote talk, we first introduce our recent studies on activity recognition and indoor positioning based on machine learning. Later, we discuss important aspects of producing labeled data and share our experiences gathered during our research activities.
当我们在研究中开发最先进的传感设备或方法时,准备和标记传感数据是必要的。由于开发和提出新的传感设备或模式在普适计算和通用计算机研究界非常重要,因此每当我们开发新的传感设备时,我们需要利用有限的时间提供高质量的标记数据。在本次主题演讲中,我们首先介绍了我们最近在基于机器学习的活动识别和室内定位方面的研究。随后,我们讨论了产生标签数据的重要方面,并分享了我们在研究活动中收集的经验。
{"title":"Good pervasive computing studies require laborious data labeling efforts: Our experience in activity recognition and indoor positioning studies","authors":"T. Maekawa","doi":"10.1109/PERCOMW.2017.7917506","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917506","url":null,"abstract":"Preparing and labeling sensing data are necessary when we develop state-of-the-art sensing devices or methods in our studies. Since developing and proposing new sensing devices or modalities are important in the pervasive computing and ubicomp research communities, we need to provide high quality labeled data by making use of our limited time whenever we develop a new sensing device. In this keynote talk, we first introduce our recent studies on activity recognition and indoor positioning based on machine learning. Later, we discuss important aspects of producing labeled data and share our experiences gathered during our research activities.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Visible Light Communication system utilizing LED sensing 利用LED传感的实用可见光通信系统
Yanbing Yang
While the traditional Visible Light Communication (VLC) system has attracted a lot of research attentions on boosting throughput, using Commercial Off-The-Shelf (COTS) devices, e.g. existing cameras on the smartphones, is a recent trend to implement readily deployable VLC systems. In particular, since LED-Camera VLC systems have shown a promising potential in large indoor communication due to the growing deployment of LED lighting infrastructure, a comprehensive VLC system with cooperative transmission and roaming support has become an impending need. To this end, we propose a novel VLC and visible light sensing (VLS) system to address that by leveraging LED sensing and effective encoding/decoding schemes. It is achieved first by utilizing LED sensing via converting parts of LED luminaire into light sensors to detect diffuse reflection change caused by presence of the user. After the users are detected and located, the system employs rateless codes and newly designed code assignment scheme to collaboratively transmit to detected users in their communication cells. We believe the proposed system has the potential to a roaming support VLC system in the whole building or indoor areas.
虽然传统的可见光通信(VLC)系统在提高吞吐量方面吸引了大量的研究关注,但使用商用现货(COTS)设备,例如智能手机上现有的摄像头,是实现易于部署的VLC系统的最新趋势。特别是,由于LED照明基础设施的部署不断增加,LED- camera VLC系统在大型室内通信中显示出了良好的潜力,因此具有协作传输和漫游支持的综合VLC系统已成为迫在眉睫的需求。为此,我们提出了一种新的VLC和可见光传感(VLS)系统,通过利用LED传感和有效的编码/解码方案来解决这个问题。它首先是利用LED传感,通过将LED灯具的部分转换成光传感器来检测由于用户存在而引起的漫反射变化。在用户被检测并定位后,系统采用无速率码和新设计的码分配方案,在被检测用户的通信小区内协同传输。我们相信该系统有潜力成为整个建筑物或室内区域的漫游支持VLC系统。
{"title":"Practical Visible Light Communication system utilizing LED sensing","authors":"Yanbing Yang","doi":"10.1109/PERCOMW.2017.7917541","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917541","url":null,"abstract":"While the traditional Visible Light Communication (VLC) system has attracted a lot of research attentions on boosting throughput, using Commercial Off-The-Shelf (COTS) devices, e.g. existing cameras on the smartphones, is a recent trend to implement readily deployable VLC systems. In particular, since LED-Camera VLC systems have shown a promising potential in large indoor communication due to the growing deployment of LED lighting infrastructure, a comprehensive VLC system with cooperative transmission and roaming support has become an impending need. To this end, we propose a novel VLC and visible light sensing (VLS) system to address that by leveraging LED sensing and effective encoding/decoding schemes. It is achieved first by utilizing LED sensing via converting parts of LED luminaire into light sensors to detect diffuse reflection change caused by presence of the user. After the users are detected and located, the system employs rateless codes and newly designed code assignment scheme to collaboratively transmit to detected users in their communication cells. We believe the proposed system has the potential to a roaming support VLC system in the whole building or indoor areas.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130899307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Size does matter - positioning on the wrist a comparative study: SmartWatch vs. SmartPhone 尺寸很重要——在手腕上的定位是一个比较研究:智能手表和智能手机
Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha
Indoor Positioning is a crucial topic to provide autonomous services to people based on their location. Nowadays dominating positioning systems, like GPS (Global Positioning System), are designed for outdoor use not applicable for indoor scenarios as they depend on a direct line of sight to reference stations. Recent progress in wearable computing peaked in the promising development of SmartWatches. They are seen as a successor of the SmartPhone evoking a new era of an always on, large scale, planet spanning, body sensor network. This work investigates in the question if SmartWatches are an accurate and suitable approach for an out of the lab, 24/7, real world Indoor Positioning System. In utilising Wi-Fi fingerprinting methodologies in combination with machine learning techniques, it is shown that state of the art consumer hardware in form of SmartWatches can be used to shape a cost effective, unobtrusive, and accurate indoor positioning system.
室内定位是为人们提供基于位置的自主服务的一个重要课题。目前主要的定位系统,如GPS(全球定位系统),是为室外使用而设计的,不适用于室内场景,因为它们依赖于参考站的直接视线。最近可穿戴计算技术的发展在智能手表上达到了顶峰。它们被视为智能手机的继承者,开启了一个永远在线、大规模、跨越地球的身体传感器网络的新时代。这项工作调查的问题,如果智能手表是一个准确的和合适的方法,在实验室外,24/7,真实世界的室内定位系统。在利用Wi-Fi指纹识别方法与机器学习技术相结合的过程中,研究表明,以智能手表为形式的最先进的消费者硬件可以用来塑造一个成本效益高、不显眼、准确的室内定位系统。
{"title":"Size does matter - positioning on the wrist a comparative study: SmartWatch vs. SmartPhone","authors":"Gerold Hölzl, M. Kranz, A. Schmid, P. Halbmayer, A. Ferscha","doi":"10.1109/PERCOMW.2017.7917649","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917649","url":null,"abstract":"Indoor Positioning is a crucial topic to provide autonomous services to people based on their location. Nowadays dominating positioning systems, like GPS (Global Positioning System), are designed for outdoor use not applicable for indoor scenarios as they depend on a direct line of sight to reference stations. Recent progress in wearable computing peaked in the promising development of SmartWatches. They are seen as a successor of the SmartPhone evoking a new era of an always on, large scale, planet spanning, body sensor network. This work investigates in the question if SmartWatches are an accurate and suitable approach for an out of the lab, 24/7, real world Indoor Positioning System. In utilising Wi-Fi fingerprinting methodologies in combination with machine learning techniques, it is shown that state of the art consumer hardware in form of SmartWatches can be used to shape a cost effective, unobtrusive, and accurate indoor positioning system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PassFrame: Generating image-based passwords from egocentric videos PassFrame:从以自我为中心的视频生成基于图像的密码
Ngu Nguyen, S. Sigg
In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest another alternative method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication scheme in the presence of an informed attacker and observed that the effort is significantly higher than that of the legitimate user.
在本文中,我们分析第一人称视角视频,以开发个性化的用户认证机制。我们提出的算法生成临时基于图像的密码,这有利于各种目的,如解锁移动设备或回退身份验证。首先,从以自我为中心的视频中提取有代表性的帧。然后,在应用聚类过程去除重复场景之前,将它们分成可区分的片段。整个过程旨在保留可记忆的图像,以形成身份验证挑战。我们整合了眼动追踪数据来选择视频帧的信息序列,并在没有面向眼睛的摄像头的情况下提出了另一种替代方法。为了评估我们的系统,我们在不同的环境中进行了实验,包括物体交互活动和旅行环境。尽管我们的机制产生可变的图形化密码,但用户的登录工作量与基于静态挑战的方法相当。我们在知情的攻击者存在的情况下验证了身份验证方案,并观察到其工作量明显高于合法用户的工作量。
{"title":"PassFrame: Generating image-based passwords from egocentric videos","authors":"Ngu Nguyen, S. Sigg","doi":"10.1109/PERCOMW.2017.7917518","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917518","url":null,"abstract":"In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest another alternative method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication scheme in the presence of an informed attacker and observed that the effort is significantly higher than that of the legitimate user.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131912887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Understanding passenger reaction to dynamic prices in ride-on-demand service 了解乘客对随叫随到服务动态价格的反应
Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu
In recent years emerging ride-on-demand services (eg., Uber or Didi) are penetrating into the market of traditional taxi service. In these new services mobile devices are a key enabler: they serve as the intermediary between passengers/drivers and the service provider, tracking the locations and behavior of both passengers and drivers. On the other hand, the use of mobile devices also help us to capture huge amount of data for analysis. Through collaboration with a leading service provider in China, we collect vast amount of accurate data and analyze, in this paper, passenger reaction to dynamic prices in such a service. We consider the analysis as an important step towards making the service more efficient and more attractive to the passengers. We present the patterns of passengers' reaction, and discuss if it is useful to estimate the trip fare for multiple times in order to get a lower price. Our findings pave the way for future study on system optimization and policy considerations.
近年来,新兴的按需乘车服务(如。(优步或滴滴)正在渗透到传统的出租车服务市场。在这些新服务中,移动设备是一个关键的促成因素:它们充当乘客/司机和服务提供商之间的中介,跟踪乘客和司机的位置和行为。另一方面,移动设备的使用也帮助我们获取大量数据进行分析。通过与中国一家领先的服务提供商合作,我们收集了大量准确的数据,并在本文中分析了乘客对此类服务中动态价格的反应。我们认为这项分析是提高服务效率和吸引乘客的重要一步。我们给出了乘客的反应模式,并讨论了为了获得更低的价格而多次估计行程票价是否有用。我们的发现为未来系统优化和政策考虑的研究铺平了道路。
{"title":"Understanding passenger reaction to dynamic prices in ride-on-demand service","authors":"Suiming Guo, Yaxiao Liu, Ke Xu, D. Chiu","doi":"10.1109/PERCOMW.2017.7917517","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917517","url":null,"abstract":"In recent years emerging ride-on-demand services (eg., Uber or Didi) are penetrating into the market of traditional taxi service. In these new services mobile devices are a key enabler: they serve as the intermediary between passengers/drivers and the service provider, tracking the locations and behavior of both passengers and drivers. On the other hand, the use of mobile devices also help us to capture huge amount of data for analysis. Through collaboration with a leading service provider in China, we collect vast amount of accurate data and analyze, in this paper, passenger reaction to dynamic prices in such a service. We consider the analysis as an important step towards making the service more efficient and more attractive to the passengers. We present the patterns of passengers' reaction, and discuss if it is useful to estimate the trip fare for multiple times in order to get a lower price. Our findings pave the way for future study on system optimization and policy considerations.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A novel key generation algorithm from twitter data stream for secure communication in IoT 一种基于微博数据流的物联网安全通信密钥生成算法
P. Majumder, K. Sinha
Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using a lightweight cryptographic (LWC) algorithm. Such an LWC algorithm will provide the desired security during the short session at the required speed, and a new key will be used for the next session so that an adversary would not have enough time to decipher the key of any session. In this paper, we propose a technique based on generating stream of random keys from streaming twitter data. The sequence of random keys generated by the proposed tweet-based key generation (TBKG) algorithm has been tested by the NIST statistical test suite for randomness. The test results show that TBKG algorithm passes all the fifteen tests for randomness. Also, the period of the key values is quite high, thus making it suitable for use over short sessions involving communication of 350 MB data through the wireless network. The unpredictability of the generated random key values is governed by the unpredictable nature of the tweets from thousands of individuals. The algorithm is very simple to implement with low computational and energy overhead.
物联网中基于安全无线通信的应用通常需要非常短的会话。流密码是确保此类应用中数据通信安全的流行选择。为了降低实现这种流密码算法的成本、复杂性和能量消耗,通常通过使用轻量级加密(LWC)算法来利用无线通信会话的短持续时间。这种LWC算法将在短会话期间以所需的速度提供所需的安全性,并且将在下一个会话中使用新密钥,以便攻击者没有足够的时间来破译任何会话的密钥。在本文中,我们提出了一种基于流式twitter数据生成随机密钥流的技术。所提出的基于tweet的密钥生成(TBKG)算法生成的随机密钥序列已通过NIST随机性统计测试套件进行了测试。测试结果表明,TBKG算法通过了所有15项随机性测试。此外,密钥值的周期相当高,因此适合用于通过无线网络进行350 MB数据通信的短会话。生成的随机键值的不可预测性是由来自数千个人的tweet的不可预测性决定的。该算法实现简单,计算量和能量消耗低。
{"title":"A novel key generation algorithm from twitter data stream for secure communication in IoT","authors":"P. Majumder, K. Sinha","doi":"10.1109/PERCOMW.2017.7917638","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917638","url":null,"abstract":"Secure wireless communication based applications in IoT typically require very short sessions. Stream ciphers constitute a popular choice for ensuring security of data communications in such applications. To keep the cost, complexity and energy expenditure in the implementation of such stream cipher algorithms low, the short duration of the wireless communication sessions are often exploited by using a lightweight cryptographic (LWC) algorithm. Such an LWC algorithm will provide the desired security during the short session at the required speed, and a new key will be used for the next session so that an adversary would not have enough time to decipher the key of any session. In this paper, we propose a technique based on generating stream of random keys from streaming twitter data. The sequence of random keys generated by the proposed tweet-based key generation (TBKG) algorithm has been tested by the NIST statistical test suite for randomness. The test results show that TBKG algorithm passes all the fifteen tests for randomness. Also, the period of the key values is quite high, thus making it suitable for use over short sessions involving communication of 350 MB data through the wireless network. The unpredictability of the generated random key values is governed by the unpredictable nature of the tweets from thousands of individuals. The algorithm is very simple to implement with low computational and energy overhead.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132659634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of IoT-based HVAC system for future zero energy building 基于物联网的未来零能耗建筑暖通空调系统设计与实现
Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park
Zero energy building (ZEB) technologies are under investigation as a solution to problems of greenhouse gas emissions and energy depletion. Not only to solving energy problems, but also future ZEB needs to provide a comfortable environment for building occupants. A HVAC systems are significant parts of ZEB technologies. However, the existing HVAC systems have several problems. To solve the problem, in this paper, we propose a IoT-based HVAC system (I-HVACS) for indoor air quality (IAQ) management and reduction of building energy consumption. The I-HVACS is implemented and demonstrated in a real building which is a senior care center in Republic of Korea. The power consumption in the building is reduced by about 13.7% compared with the existing system.
零能耗建筑(ZEB)技术作为温室气体排放和能源消耗问题的解决方案正在研究中。不仅要解决能源问题,未来的ZEB还需要为建筑使用者提供舒适的环境。HVAC系统是ZEB技术的重要组成部分。然而,现有的暖通空调系统存在一些问题。为了解决这一问题,本文提出了一种基于物联网的室内空气质量管理系统(I-HVACS),以降低建筑能耗。I-HVACS在韩国一家老年护理中心的真实建筑中实施和演示。与现有系统相比,建筑能耗降低约13.7%。
{"title":"Design and implementation of IoT-based HVAC system for future zero energy building","authors":"Myeong-in Choi, Keon-hee Cho, Junyeon Hwang, L. Park, Kyuhee Jang, Sunghwan Park, Sehyun Park","doi":"10.1109/PERCOMW.2017.7917631","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917631","url":null,"abstract":"Zero energy building (ZEB) technologies are under investigation as a solution to problems of greenhouse gas emissions and energy depletion. Not only to solving energy problems, but also future ZEB needs to provide a comfortable environment for building occupants. A HVAC systems are significant parts of ZEB technologies. However, the existing HVAC systems have several problems. To solve the problem, in this paper, we propose a IoT-based HVAC system (I-HVACS) for indoor air quality (IAQ) management and reduction of building energy consumption. The I-HVACS is implemented and demonstrated in a real building which is a senior care center in Republic of Korea. The power consumption in the building is reduced by about 13.7% compared with the existing system.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121995565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1