首页 > 最新文献

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

英文 中文
Optimum Placement of Conformal Antenna Array Based on Path Loss Profile 基于路径损耗曲线的共形天线阵优化布置
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194150
Hisham Khalil, M. M. Ahmed, U. Rafique, Reham Almesaeed, Waseem Nazar
In this paper, the optimum placement of a conformal antenna array based on the path loss profile has been discussed. The arrays are considered to be conformed on the wings and cylindrical fuselage of an Unmanned Aerial Vehicles (UAVs). Two types of feeding designs have been presented: Rectangular Waveguide (RWG) for fuselage conformal antenna array and Substrate Integrated Waveguide for wing conformal antenna array. The optimum placement of conformal arrays proposed on the basis of path loss profile for the air-to-air link (AA) and air-to-ground link (AG). The proposed arrays have been designed and simulated in Ansys HFSS and it has been observed that the proposed arrays offer gains of 11.15 dBi and 9.8 dBi for wing and fuselage, respectively.
本文讨论了基于路径损耗分布的共形天线阵的最佳布置。该阵列被认为是在无人机(uav)的机翼和圆柱形机身上一致的。提出了机身共形天线阵的矩形波导馈电设计和机翼共形天线阵的基板集成波导馈电设计。根据空对空链路(AA)和空对地链路(AG)的路径损耗分布,提出了共形阵的最佳布置。在Ansys HFSS中对所提出的阵列进行了设计和仿真,结果表明所提出的阵列对机翼和机身的增益分别为11.15 dBi和9.8 dBi。
{"title":"Optimum Placement of Conformal Antenna Array Based on Path Loss Profile","authors":"Hisham Khalil, M. M. Ahmed, U. Rafique, Reham Almesaeed, Waseem Nazar","doi":"10.1109/AECT47998.2020.9194150","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194150","url":null,"abstract":"In this paper, the optimum placement of a conformal antenna array based on the path loss profile has been discussed. The arrays are considered to be conformed on the wings and cylindrical fuselage of an Unmanned Aerial Vehicles (UAVs). Two types of feeding designs have been presented: Rectangular Waveguide (RWG) for fuselage conformal antenna array and Substrate Integrated Waveguide for wing conformal antenna array. The optimum placement of conformal arrays proposed on the basis of path loss profile for the air-to-air link (AA) and air-to-ground link (AG). The proposed arrays have been designed and simulated in Ansys HFSS and it has been observed that the proposed arrays offer gains of 11.15 dBi and 9.8 dBi for wing and fuselage, respectively.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Linear Parameter Varying Model Predictive Controller with Event-Triggered Mechanism for Nonholonomic Mobile Robot 基于事件触发机制的非完整移动机器人分布式线性参数变模型预测控制器
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194191
Aries Subiantoro, Muhammad Hadi, A. Muis
This paper deals with the design of distributed linear parameter varying model predictive controller (LPVMPC) to solve consensus problem on nonholomonic model with event-triggered mechanism. The nonlinear dynamic of nonholomonic model is simplified into linear time variant model by discretizing with Euler method. A quadratic cost function is determined by including terminal state and varying weight matrices, in order to reduce offset due to modeling simplification. The control signal for very agents are calculated by solving quadratic programming problem. A local optimal state controller is integrated with LPV-MPC during eventtriggered mechanism. In order to reduce computational load, the predictive controller only performs optimization only when the trigger conditions are met. The proposed controller is also verified in case of numerical simulation test, and shown its capability to provide good response of nonholomonic mobile robot’s consensus protocol.
为解决具有事件触发机制的非全子模型的一致性问题,研究了分布式线性参数变模型预测控制器的设计。采用欧拉离散方法将非整体模型的非线性动力学简化为线性时变模型。通过包含终端状态和变权矩阵来确定二次代价函数,以减少由于建模简化而产生的偏移。通过求解二次规划问题,计算了每个智能体的控制信号。在事件触发机制中,LPV-MPC集成了一个局部最优状态控制器。为了减少计算量,预测控制器只在满足触发条件时才进行优化。通过数值仿真试验验证了所提出的控制器对非完整移动机器人协商一致协议的良好响应能力。
{"title":"Distributed Linear Parameter Varying Model Predictive Controller with Event-Triggered Mechanism for Nonholonomic Mobile Robot","authors":"Aries Subiantoro, Muhammad Hadi, A. Muis","doi":"10.1109/AECT47998.2020.9194191","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194191","url":null,"abstract":"This paper deals with the design of distributed linear parameter varying model predictive controller (LPVMPC) to solve consensus problem on nonholomonic model with event-triggered mechanism. The nonlinear dynamic of nonholomonic model is simplified into linear time variant model by discretizing with Euler method. A quadratic cost function is determined by including terminal state and varying weight matrices, in order to reduce offset due to modeling simplification. The control signal for very agents are calculated by solving quadratic programming problem. A local optimal state controller is integrated with LPV-MPC during eventtriggered mechanism. In order to reduce computational load, the predictive controller only performs optimization only when the trigger conditions are met. The proposed controller is also verified in case of numerical simulation test, and shown its capability to provide good response of nonholomonic mobile robot’s consensus protocol.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Localization Error Computation for RSSI Based Positioning System in VANETs 基于RSSI的VANETs定位系统定位误差计算
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194192
Waqas Ahmad, Sheeraz Ahmed, Najia Sheeraz, Ayub Khan, A. Ishtiaq, Malka Saba
Vehicular Ad-hoc Networks (VANETs) is the most eminent field nowadays in Intelligent Transportation System. Applications included emergency alerts, positioning, and tracking of vehicles. Vehicle Localization in municipal areas is a major issue for protection applications. Many solutions have been provided including Global Positioning Systems (GPS) but these applications do not provide accuracy. Hence, a novel approach has been proposed here known as Received Signal Strength (RSS) Based Localization which aims to find accurate location of a target vehicle. It provides communication with Road Side Units (RSUs) by receiving signal within its range, and finds the average RSS. After the RSS has been found it is aided to the RSS Based Localization algorithm which finds accurate location of the vehicle. The main factor of proposed algorithm is its high signal to noise ratio which is obtained from the closest RSU. After the location of the vehicle is found, its Cramer Rao Lower Bound is analyzed. All the simulations performed shows that our suggested RSS based Localization are better than others traditional least squares and weighted least squares techniques.
车辆自组织网络(VANETs)是当今智能交通系统中最引人注目的领域。应用程序包括紧急警报、定位和车辆跟踪。车辆在城市区域的定位是保护应用的一个主要问题。已经提供了许多解决方案,包括全球定位系统(GPS),但这些应用程序不提供精度。因此,本文提出了一种新的方法,即基于接收信号强度(RSS)的定位,旨在找到目标车辆的准确位置。它通过接收其范围内的信号与路旁单位(rsu)进行通信,并计算平均RSS。在找到RSS后,辅助基于RSS的定位算法找到车辆的准确位置。该算法的主要特点是高信噪比,信噪比是由最接近的RSU获得的。在找到车辆位置后,对其Cramer Rao下界进行分析。仿真结果表明,本文提出的基于RSS的定位方法优于传统的最小二乘和加权最小二乘方法。
{"title":"Localization Error Computation for RSSI Based Positioning System in VANETs","authors":"Waqas Ahmad, Sheeraz Ahmed, Najia Sheeraz, Ayub Khan, A. Ishtiaq, Malka Saba","doi":"10.1109/AECT47998.2020.9194192","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194192","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) is the most eminent field nowadays in Intelligent Transportation System. Applications included emergency alerts, positioning, and tracking of vehicles. Vehicle Localization in municipal areas is a major issue for protection applications. Many solutions have been provided including Global Positioning Systems (GPS) but these applications do not provide accuracy. Hence, a novel approach has been proposed here known as Received Signal Strength (RSS) Based Localization which aims to find accurate location of a target vehicle. It provides communication with Road Side Units (RSUs) by receiving signal within its range, and finds the average RSS. After the RSS has been found it is aided to the RSS Based Localization algorithm which finds accurate location of the vehicle. The main factor of proposed algorithm is its high signal to noise ratio which is obtained from the closest RSU. After the location of the vehicle is found, its Cramer Rao Lower Bound is analyzed. All the simulations performed shows that our suggested RSS based Localization are better than others traditional least squares and weighted least squares techniques.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Cost Effective IoT-based System for Monitoring Baby Incidents by Deaf Parents 一个具有成本效益的基于物联网的聋人父母监测婴儿事件的系统
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194179
N. Bahbouh, A. Alkhodre, A. A. Sen, Abdallah Namoun, S. Albouq
The importance of modern technology is prevalent in our lives for it helps us achieve our everyday activities and tasks. People with special needs represent a significant segment of the society and always require some sort of assistance to make their lives as normal as possible. Indeed, technological advancements can be exploited to achieve this endeavor. In this research, deaf mothers are guided to detect the needs of their babies by employing the Internet of Things and a mobile application. This research proposes a new algorithm to monitor children during their sleep based on successive periodic snapshots or sound, and when detecting any change in their environment the smart monitoring system alerts the mother by shaking a wearable bracelet or ringing her mobile phone. The proposed system has been implemented and tested and has been proven to be superior to other systems with respect to the implementation cost, accuracy of alerts, flexibility, and energy consumption.
现代科技的重要性在我们的生活中很普遍,因为它帮助我们完成日常活动和任务。有特殊需要的人是社会的一个重要组成部分,他们总是需要某种帮助来使他们的生活尽可能地正常。事实上,技术进步可以用来实现这一目标。在本研究中,聋哑母亲通过物联网和移动应用程序来指导他们发现婴儿的需求。这项研究提出了一种新的算法,可以根据连续的周期性快照或声音来监控孩子的睡眠,当检测到环境的任何变化时,智能监控系统会通过摇晃可穿戴手镯或拨打手机来提醒母亲。该系统已被实施和测试,并已被证明在实施成本、警报准确性、灵活性和能耗方面优于其他系统。
{"title":"A Cost Effective IoT-based System for Monitoring Baby Incidents by Deaf Parents","authors":"N. Bahbouh, A. Alkhodre, A. A. Sen, Abdallah Namoun, S. Albouq","doi":"10.1109/AECT47998.2020.9194179","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194179","url":null,"abstract":"The importance of modern technology is prevalent in our lives for it helps us achieve our everyday activities and tasks. People with special needs represent a significant segment of the society and always require some sort of assistance to make their lives as normal as possible. Indeed, technological advancements can be exploited to achieve this endeavor. In this research, deaf mothers are guided to detect the needs of their babies by employing the Internet of Things and a mobile application. This research proposes a new algorithm to monitor children during their sleep based on successive periodic snapshots or sound, and when detecting any change in their environment the smart monitoring system alerts the mother by shaking a wearable bracelet or ringing her mobile phone. The proposed system has been implemented and tested and has been proven to be superior to other systems with respect to the implementation cost, accuracy of alerts, flexibility, and energy consumption.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132138606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supervised Topic Modeling Using Word Embedding with Machine Learning Techniques 使用词嵌入和机器学习技术的监督主题建模
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194177
Rana Nassif, Mohamed Waleed Fahkr
Large amounts of text are collected on the internet every day. As more text documents become available, it becomes essential to categorize them for efficient archiving, retrieval and search. In this paper, we investigate both statistical and machine learning techniques like (HMM & Deep learning network) combined with two well-known word embedding models (word2vec & Glove) for supervised document classification. The investigated combinations are compared with state-of-the-art approaches applied on the same data. The main contribution of this paper is to demonstrate the importance of both the meaning and the order of the word on topic modeling. This has often been overlooked in previous work as neither were taken into consideration where in some others only one was taken. This paper shows that one of our proposed models; which employed a hybrid between LSTM and CNN neural networks, obtained better accuracy on the same dataset than all state-of-the-art models in the literature.
每天在互联网上收集大量的文本。随着越来越多的文本文档变得可用,对它们进行分类以进行有效的归档、检索和搜索变得至关重要。在本文中,我们研究了统计和机器学习技术,如HMM和深度学习网络,结合两个著名的词嵌入模型(word2vec和Glove)进行监督文档分类。将所研究的组合与应用于相同数据的最先进方法进行比较。本文的主要贡献在于论证了语意和语序对主题建模的重要性。这一点在以前的工作中经常被忽视,因为两者都没有考虑到,而在其他一些工作中只考虑了一个。本文展示了我们提出的一个模型;它采用了LSTM和CNN神经网络的混合,在相同的数据集上获得了比文献中所有最先进的模型更好的准确性。
{"title":"Supervised Topic Modeling Using Word Embedding with Machine Learning Techniques","authors":"Rana Nassif, Mohamed Waleed Fahkr","doi":"10.1109/AECT47998.2020.9194177","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194177","url":null,"abstract":"Large amounts of text are collected on the internet every day. As more text documents become available, it becomes essential to categorize them for efficient archiving, retrieval and search. In this paper, we investigate both statistical and machine learning techniques like (HMM & Deep learning network) combined with two well-known word embedding models (word2vec & Glove) for supervised document classification. The investigated combinations are compared with state-of-the-art approaches applied on the same data. The main contribution of this paper is to demonstrate the importance of both the meaning and the order of the word on topic modeling. This has often been overlooked in previous work as neither were taken into consideration where in some others only one was taken. This paper shows that one of our proposed models; which employed a hybrid between LSTM and CNN neural networks, obtained better accuracy on the same dataset than all state-of-the-art models in the literature.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things: On the Opportunities, Applications and Open Challenges in Saudi Arabia 物联网:沙特阿拉伯的机遇、应用和公开挑战
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194213
Mohammad Ayoub Khan, M. Quasim, F. Algarni, Abdullah Alharthi
The role of the Internet has significantly changed due to the development in communication technologies. Nowadays, billions of people and physical devices are connected via Internet. In near future, storage and computational services will be more pervasive and distributed. Even in recent times, we can see that people, machines, objects, and platforms are connected with wireless or wired sensors. Considering such an internet setting with billions of connected devices, in this paper, we present a study on the background, state-of-the-art, growth, key players, applications, challenges, and future opportunities in the area of Internet of Things (IoT). The Kingdom of Saudi Arabia’s IoT and M2M (Machine to Machine) communication market is estimated to grow to $16.01 billion by 2019 from $4.88 billion in 2014[26]. We also discuss general aspects and issues of IoT and explore the implication of all these in a developing country’s setting taking the case of Saudi Arabia.
由于通信技术的发展,互联网的作用发生了重大变化。如今,数十亿人和物理设备通过互联网连接在一起。在不久的将来,存储和计算服务将更加普及和分布式。即使在最近,我们也可以看到人、机器、物体和平台都与无线或有线传感器相连。考虑到这样一个拥有数十亿连接设备的互联网环境,在本文中,我们对物联网(IoT)领域的背景、最新技术、增长、主要参与者、应用、挑战和未来机遇进行了研究。沙特阿拉伯王国的物联网和M2M(机器对机器)通信市场预计将从2014年的48.8亿美元增长到2019年的160.1亿美元[26]。我们还讨论了物联网的一般方面和问题,并以沙特阿拉伯为例,探讨了所有这些在发展中国家环境中的含义。
{"title":"Internet of Things: On the Opportunities, Applications and Open Challenges in Saudi Arabia","authors":"Mohammad Ayoub Khan, M. Quasim, F. Algarni, Abdullah Alharthi","doi":"10.1109/AECT47998.2020.9194213","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194213","url":null,"abstract":"The role of the Internet has significantly changed due to the development in communication technologies. Nowadays, billions of people and physical devices are connected via Internet. In near future, storage and computational services will be more pervasive and distributed. Even in recent times, we can see that people, machines, objects, and platforms are connected with wireless or wired sensors. Considering such an internet setting with billions of connected devices, in this paper, we present a study on the background, state-of-the-art, growth, key players, applications, challenges, and future opportunities in the area of Internet of Things (IoT). The Kingdom of Saudi Arabia’s IoT and M2M (Machine to Machine) communication market is estimated to grow to $16.01 billion by 2019 from $4.88 billion in 2014[26]. We also discuss general aspects and issues of IoT and explore the implication of all these in a developing country’s setting taking the case of Saudi Arabia.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121331476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Multi-Chaos Based Compressive Sensing Encryption Technique 一种新的基于多混沌的压缩感知加密技术
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194220
Jawad Ahmad, Ahsen Tahir, J. Khan, Atif Jameel, Q. Abbasi, W. Buchanan
Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintext image and a block of DCT coefficients is multiplied with an orthogonal matrix. Inverse DCT and scaling are performed to restrict the values between 0 and 255. Furthermore, values are shuffled using Chirikov-based pseudo-random permutation. A strong trade-off exists between DCT block size and computational efficiency. The quality and Signal to Noise Ratio (SNR) of the decrypted image decreases when the size of the DCT matrix is reduced, increasing the speed of the encryption algorithm. An extensive security analyses of the proposed scheme are performed, which establishes the robustness, computational efficiency and security of the technique against cryptographic attacks.
压缩感知是一种可以有效应用于多媒体加密的压缩技术。利用安全哈希算法(SHA-512)、离散余弦变换(DCT)、正交矩阵和基于离散奇里科夫映射的随机置换,提出了一种新的压缩感知图像加密方案。将DCT应用于明文图像,并将DCT系数块与正交矩阵相乘。执行逆DCT和缩放以限制0到255之间的值。此外,使用基于chirikov的伪随机置换对值进行洗牌。DCT块大小和计算效率之间存在很强的权衡。随着DCT矩阵的减小,解密图像的质量和信噪比降低,提高了加密算法的速度。对所提出的方案进行了广泛的安全性分析,证明了该技术对密码攻击的鲁棒性、计算效率和安全性。
{"title":"A Novel Multi-Chaos Based Compressive Sensing Encryption Technique","authors":"Jawad Ahmad, Ahsen Tahir, J. Khan, Atif Jameel, Q. Abbasi, W. Buchanan","doi":"10.1109/AECT47998.2020.9194220","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194220","url":null,"abstract":"Compressive sensing is a compression technique that can be effectively utilised in multimedia encryption. This paper proposes a new compressive sensing image encryption scheme using the Secure Hash Algorithm (SHA-512), Discrete Cosine Transform (DCT), orthogonal matrix and discrete Chirikov map-based random permutation. DCT is applied on a plaintext image and a block of DCT coefficients is multiplied with an orthogonal matrix. Inverse DCT and scaling are performed to restrict the values between 0 and 255. Furthermore, values are shuffled using Chirikov-based pseudo-random permutation. A strong trade-off exists between DCT block size and computational efficiency. The quality and Signal to Noise Ratio (SNR) of the decrypted image decreases when the size of the DCT matrix is reduced, increasing the speed of the encryption algorithm. An extensive security analyses of the proposed scheme are performed, which establishes the robustness, computational efficiency and security of the technique against cryptographic attacks.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Permissioned Blockchain-Based Security for SDN in IoT Cloud Networks 物联网云网络中基于区块链的SDN安全
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194181
S. Faizullah, Muhammad Asad Khan, Ali Alzahrani, Imdadullah Khan
The advancement in cloud networks has enabled connectivity of both traditional networked elements and new devices from all walks of life, thereby forming the Internet of Things (IoT). In an IoT setting, improving and scaling network components as well as reducing cost is essential to sustain exponential growth. In this domain, software-defined networking (SDN) is revolutionizing the network infrastructure with a new paradigm. SDN splits the control/routing logic from the data transfer/forwarding. This splitting causes many issues in SDN, such as vulnerabilities of DDoS attacks. Many solutions (including blockchain based) have been proposed to overcome these problems. In this work, we offer a blockchain-based solution that is provided in redundant SDN (load-balanced) to service millions of IoT devices. Blockchain is considered as tamper-proof and impossible to corrupt due to the replication of the ledger and consensus for verification and addition to the ledger. Therefore, it is a perfect fit for SDN in IoT Networks. Blockchain technology provides everyone with a working proof of decentralized trust. The experimental results show gain and efficiency with respect to the accuracy, update process, and bandwidth utilization.
云网络的进步使传统的网络元素和来自各行各业的新设备连接起来,从而形成了物联网(IoT)。在物联网环境中,改进和扩展网络组件以及降低成本对于维持指数级增长至关重要。在这个领域,软件定义网络(SDN)正在以一种新的范式彻底改变网络基础设施。SDN将控制/路由逻辑与数据传输/转发分离。这种分裂导致了SDN中的许多问题,例如DDoS攻击的漏洞。已经提出了许多解决方案(包括基于区块链的解决方案)来克服这些问题。在这项工作中,我们提供了一个基于区块链的解决方案,该解决方案通过冗余SDN(负载均衡)提供,为数百万个物联网设备提供服务。区块链被认为是防篡改的,由于分类帐的复制和对分类帐的验证和添加的共识,它不可能被破坏。因此,它非常适合物联网网络中的SDN。区块链技术为每个人提供了去中心化信任的有效证明。实验结果表明,该方法在精度、更新过程和带宽利用率方面具有较高的增益和效率。
{"title":"Permissioned Blockchain-Based Security for SDN in IoT Cloud Networks","authors":"S. Faizullah, Muhammad Asad Khan, Ali Alzahrani, Imdadullah Khan","doi":"10.1109/AECT47998.2020.9194181","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194181","url":null,"abstract":"The advancement in cloud networks has enabled connectivity of both traditional networked elements and new devices from all walks of life, thereby forming the Internet of Things (IoT). In an IoT setting, improving and scaling network components as well as reducing cost is essential to sustain exponential growth. In this domain, software-defined networking (SDN) is revolutionizing the network infrastructure with a new paradigm. SDN splits the control/routing logic from the data transfer/forwarding. This splitting causes many issues in SDN, such as vulnerabilities of DDoS attacks. Many solutions (including blockchain based) have been proposed to overcome these problems. In this work, we offer a blockchain-based solution that is provided in redundant SDN (load-balanced) to service millions of IoT devices. Blockchain is considered as tamper-proof and impossible to corrupt due to the replication of the ledger and consensus for verification and addition to the ledger. Therefore, it is a perfect fit for SDN in IoT Networks. Blockchain technology provides everyone with a working proof of decentralized trust. The experimental results show gain and efficiency with respect to the accuracy, update process, and bandwidth utilization.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114031133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Progression towards an e-Management Centralized Blood Donation System in Saudi Arabia 沙特阿拉伯电子管理集中献血系统的进展
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194178
Fawaz D. Alharbi
Current healthcare systems rely on blood donation to save lives. Voluntary blood donation is the main source of blood supply in many countries. However, blood donors face barriers to donating such as time constraints and the long times required to complete registration and donor health questionnaires. Thus, this paper analyses the blood donor cycle and proposes information technology solutions. Based on the analysis, a Central Blood Donation Management System (CBDMS) is proposed with interconnected systems. The proposed system is among the first e-management systems for blood donation management in Saudi Arabia. Major components of CBDMS are explained to show the various functions of the system. The implementation of CBDMS can reduce the time required for blood donation by decreasing the information collected from the donors. The system can also improve the efficiency of the blood donation management system by linking various systems and importing information from different sites. It can also reduce blood donation errors and reduce the number of deferral blood donors.
目前的卫生保健系统依靠献血来挽救生命。在许多国家,自愿献血是血液供应的主要来源。然而,献血者面临着诸如时间限制和完成登记和献血者健康问卷所需的较长时间等捐献障碍。因此,本文分析了献血者周期,并提出了信息技术解决方案。在此基础上,提出了一个系统互联的中央献血管理系统(CBDMS)。该系统是沙特阿拉伯首批用于献血管理的电子管理系统之一。介绍了CBDMS的主要组成部分,展示了系统的各种功能。实施CBDMS可以减少从献血者那里收集的信息,从而减少献血所需的时间。该系统还可以通过连接各个系统和从不同站点导入信息来提高献血管理系统的效率。它还可以减少献血错误,减少延迟献血者的数量。
{"title":"Progression towards an e-Management Centralized Blood Donation System in Saudi Arabia","authors":"Fawaz D. Alharbi","doi":"10.1109/AECT47998.2020.9194178","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194178","url":null,"abstract":"Current healthcare systems rely on blood donation to save lives. Voluntary blood donation is the main source of blood supply in many countries. However, blood donors face barriers to donating such as time constraints and the long times required to complete registration and donor health questionnaires. Thus, this paper analyses the blood donor cycle and proposes information technology solutions. Based on the analysis, a Central Blood Donation Management System (CBDMS) is proposed with interconnected systems. The proposed system is among the first e-management systems for blood donation management in Saudi Arabia. Major components of CBDMS are explained to show the various functions of the system. The implementation of CBDMS can reduce the time required for blood donation by decreasing the information collected from the donors. The system can also improve the efficiency of the blood donation management system by linking various systems and importing information from different sites. It can also reduce blood donation errors and reduce the number of deferral blood donors.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Futuristic Blockchain based Vehicular Network Architecture and Trust Management System 未来基于区块链的车辆网络架构与信任管理系统
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194160
Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid
In a complex network of smart vehicles, some issues arise related to security, privacy, selfishness of nodes and node failures. We have proposed an architecture of vehicular network in a smart city based on blockchain. Some scenarios and design principles are also provided. Contrary to prior architectures of vehicular networks, our proposed model provides robustness, scalability, adaptability, trust management as well as privacy and security. It eliminates the issue of selfish nodes and malicious nodes. Unlike other vehicular architectures, it also takes into account the passengers’ medical facilities and fault tolerance. In case of any failure of sensors or nodes, system will effectively tackle it. Both big data storage and fast computation are not possible on vehicles end. This can be handled by moving these processes to static nodes and data center. Malicious behaviour of nodes is handled using trust values and incentives mechanism in order to motivate nodes to work effectively while assigning penalty for selfish nodes.
在复杂的智能汽车网络中,会出现一些与安全、隐私、节点自私和节点故障相关的问题。我们提出了一种基于区块链的智慧城市车联网架构。给出了一些场景和设计原则。与先前的车辆网络架构相反,我们提出的模型具有鲁棒性、可扩展性、适应性、信任管理以及隐私和安全性。它消除了自私节点和恶意节点的问题。与其他车辆架构不同,它还考虑了乘客的医疗设施和容错能力。当传感器或节点出现故障时,系统将有效处理。大数据存储和快速计算在车辆端是不可能实现的。这可以通过将这些流程移动到静态节点和数据中心来解决。利用信任值和激励机制来处理节点的恶意行为,以激励节点有效工作,同时对自私节点进行惩罚。
{"title":"A Futuristic Blockchain based Vehicular Network Architecture and Trust Management System","authors":"Usama Arshad, Sakeena Javaid, Sheeraz Ahmed, Beenish Seemab, N. Javaid","doi":"10.1109/AECT47998.2020.9194160","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194160","url":null,"abstract":"In a complex network of smart vehicles, some issues arise related to security, privacy, selfishness of nodes and node failures. We have proposed an architecture of vehicular network in a smart city based on blockchain. Some scenarios and design principles are also provided. Contrary to prior architectures of vehicular networks, our proposed model provides robustness, scalability, adaptability, trust management as well as privacy and security. It eliminates the issue of selfish nodes and malicious nodes. Unlike other vehicular architectures, it also takes into account the passengers’ medical facilities and fault tolerance. In case of any failure of sensors or nodes, system will effectively tackle it. Both big data storage and fast computation are not possible on vehicles end. This can be handled by moving these processes to static nodes and data center. Malicious behaviour of nodes is handled using trust values and incentives mechanism in order to motivate nodes to work effectively while assigning penalty for selfish nodes.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1