首页 > 最新文献

2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

英文 中文
Roadmap for Security-as-a-Service CRAN in 5G Networks 5G网络中安全即服务CRAN路线图
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194223
M. Javed, Shahzaib Tahir
Cellular networking has entered the paradigm of next generation networking, Software Defined Mobile Networking (SDMN) and Cloud Radio Access Networks (CRAN). This paradigm shift has compelled to improve future cellular networks by making them more efficient and smart. The improved, future cellular networks could have a profound impact on the commercial and research segments in terms of capital expenditure and operational expenditure by presenting a unified robust technology for data connectivity. In future, 5G cellular networks will be progressed with LTE that will facilitate this technological transformation. Future 5G demands reliance on more flexible and dynamic technologies such as static Radio Access Networks (RAN), otherwise resources will be depleting and will be unable to meet the surging demands including wireless transmission connectivity and providing an efficient network bandwidth. To address this problem, the paper presents a study exploring the amalgamation of Software Defined Network (SDN) and cloud computing achieve Cloud RAN or RAN-as-a-Service (RANaaS). This helps to overcome the problems associated with handling enormous matrix of connecting devices and nodes. This paper explores existing research geared towards the deployment of 5G networks through Remote Radio Heads (RRH) and Virtual Base Stations (VBSs) backed by SDN. Furthermore, this research survey is an effort to unearth the security implications and challenges of CRAN while adopting LTE and SDMN services in CRAN based 5G networks. The security challenges of conventional wireless networks are framed to emphasize on the need to migrate from traditional RAN to CRAN. Subsequently the possible mitigation techniques are also discussed. Furthermore, the role of SDN and its security artifacts are also explored to embed security within the CRAN architecture.
蜂窝网络已经进入下一代网络、软件定义移动网络(SDMN)和云无线接入网络(CRAN)的范式。这种模式的转变迫使人们改进未来的蜂窝网络,使其更高效、更智能。改进后的未来蜂窝网络将为数据连接提供统一的强大技术,从而在资本支出和运营支出方面对商业和研究部门产生深远的影响。未来,5G蜂窝网络将与LTE一起发展,这将促进这一技术转型。未来的5G需要依赖更加灵活和动态的技术,如静态无线接入网(RAN),否则资源将会耗尽,无法满足包括无线传输连接和提供高效网络带宽在内的激增需求。为了解决这个问题,本文提出了一项研究,探索软件定义网络(SDN)和云计算的融合,以实现云RAN或RAN即服务(RANaaS)。这有助于克服与处理庞大的连接设备和节点矩阵相关的问题。本文探讨了通过SDN支持的远程无线电头(RRH)和虚拟基站(vbs)部署5G网络的现有研究。此外,本研究调查旨在揭示在基于CRAN的5G网络中采用LTE和SDMN服务时CRAN的安全影响和挑战。传统无线网络的安全挑战强调了从传统RAN向CRAN迁移的需要。随后还讨论了可能的缓解技术。此外,还探讨了SDN及其安全构件的作用,以便在CRAN体系结构中嵌入安全性。
{"title":"Roadmap for Security-as-a-Service CRAN in 5G Networks","authors":"M. Javed, Shahzaib Tahir","doi":"10.1109/AECT47998.2020.9194223","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194223","url":null,"abstract":"Cellular networking has entered the paradigm of next generation networking, Software Defined Mobile Networking (SDMN) and Cloud Radio Access Networks (CRAN). This paradigm shift has compelled to improve future cellular networks by making them more efficient and smart. The improved, future cellular networks could have a profound impact on the commercial and research segments in terms of capital expenditure and operational expenditure by presenting a unified robust technology for data connectivity. In future, 5G cellular networks will be progressed with LTE that will facilitate this technological transformation. Future 5G demands reliance on more flexible and dynamic technologies such as static Radio Access Networks (RAN), otherwise resources will be depleting and will be unable to meet the surging demands including wireless transmission connectivity and providing an efficient network bandwidth. To address this problem, the paper presents a study exploring the amalgamation of Software Defined Network (SDN) and cloud computing achieve Cloud RAN or RAN-as-a-Service (RANaaS). This helps to overcome the problems associated with handling enormous matrix of connecting devices and nodes. This paper explores existing research geared towards the deployment of 5G networks through Remote Radio Heads (RRH) and Virtual Base Stations (VBSs) backed by SDN. Furthermore, this research survey is an effort to unearth the security implications and challenges of CRAN while adopting LTE and SDMN services in CRAN based 5G networks. The security challenges of conventional wireless networks are framed to emphasize on the need to migrate from traditional RAN to CRAN. Subsequently the possible mitigation techniques are also discussed. Furthermore, the role of SDN and its security artifacts are also explored to embed security within the CRAN architecture.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121097236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Agile Holistic Framework to Support Teachers in Pedagogical Gamification Design 支持教师进行教学游戏化设计的敏捷整体框架
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194204
Alaa Saggah, R. Campion, A. Atkins
The paper aims to pragmatically develop a method to support teachers to transfer their pedagogical knowledge into game requirements for educational purposes. The paper utilizes a qualitative approach, ‘think aloud’ interview protocol. The case study includes six teachers from a varied background and teaching experience in the Kingdom of Saudi Arabia (KSA). The analogy between teachers’ in-theory categorization and practical task design was used to validate the practicality of the framework components in helping teachers to identify game requirements from a pedagogical point of view. The outcome of this research identifies the factors that facilitate the collaboration between both teachers and game developers. An Agile Holistic Gamified Pedagogical Design framework(AHGPD) has been developed to provide a structured guidance for teachers regardless of their technical knowledge level. Future work will be to integrate the AH-GPD framework to produce a practical Pedagogical Game Design Document that can be used to build a repository of games requirements for educational purposes and enable faster roll out to support teachers in school environments.
本文旨在从实际出发,开发一种支持教师将其教学知识转化为教育游戏需求的方法。本文采用了一种定性的方法,即“自言自语”的访谈协议。案例研究包括来自沙特阿拉伯王国(KSA)具有不同背景和教学经验的六名教师。教师的理论分类和实际任务设计之间的类比被用来验证框架组件在帮助教师从教学的角度识别游戏需求方面的实用性。这项研究的结果确定了促进教师和游戏开发者之间合作的因素。开发了一个敏捷整体游戏化教学设计框架(AHGPD),为教师提供结构化指导,无论他们的技术知识水平如何。未来的工作将是整合AH-GPD框架,以生成一个实用的教学游戏设计文件,该文件可用于构建用于教育目的的游戏需求库,并能够更快地为学校环境中的教师提供支持。
{"title":"An Agile Holistic Framework to Support Teachers in Pedagogical Gamification Design","authors":"Alaa Saggah, R. Campion, A. Atkins","doi":"10.1109/AECT47998.2020.9194204","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194204","url":null,"abstract":"The paper aims to pragmatically develop a method to support teachers to transfer their pedagogical knowledge into game requirements for educational purposes. The paper utilizes a qualitative approach, ‘think aloud’ interview protocol. The case study includes six teachers from a varied background and teaching experience in the Kingdom of Saudi Arabia (KSA). The analogy between teachers’ in-theory categorization and practical task design was used to validate the practicality of the framework components in helping teachers to identify game requirements from a pedagogical point of view. The outcome of this research identifies the factors that facilitate the collaboration between both teachers and game developers. An Agile Holistic Gamified Pedagogical Design framework(AHGPD) has been developed to provide a structured guidance for teachers regardless of their technical knowledge level. Future work will be to integrate the AH-GPD framework to produce a practical Pedagogical Game Design Document that can be used to build a repository of games requirements for educational purposes and enable faster roll out to support teachers in school environments.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Energy Efficiency and Power Trading Exploiting Renewable Energy in Cloud Data Centers 利用云数据中心的可再生能源实现能源效率和电力交易
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194169
S. Aslam, S. Aslam, H. Herodotou, Syed Muhammad Mohsin, Khursheed Aurangzeb
This study investigates the energy cost and carbon emission reduction problem in geographically distributed cloud data centers (DCs), where each DC is connected with its own renewable energy resources (RERs) for green energy generation. We consider four cloud DCs that are operated by a single cloud service provider. They consume energy from both RERs and from the commercial grid to meet the demand of cloud users. For energy pricing, we consider four different energy markets that offer varying energy prices per hour. Additionally, our proposed strategy enables DCs to sell excess electricity to the commercial grid in peak-price hours and purchase in low-cost hours according to power trading. This work also exploits energy storage devices (ESDs) to store energy for future use. We utilize real-time data requests, weather data, and pricing data for performing simulations and results affirm the effectiveness and productiveness of our proposed method to mitigate the energy cost and carbon emission of cloud DCs.
本研究探讨了地理分布的云数据中心(DC)的能源成本和碳减排问题,其中每个数据中心都与自己的可再生能源(rer)相连,用于绿色能源发电。我们考虑由单个云服务提供商操作的四个云数据中心。为了满足云用户的需求,它们同时消耗来自可再生能源和商业电网的能源。对于能源定价,我们考虑四种不同的能源市场,它们每小时提供不同的能源价格。此外,我们提出的策略使数据中心能够根据电力交易在高峰时段将多余的电力出售给商业电网,并在低成本时段购买。这项工作还利用了能量存储设备(ESDs)来存储能量以供将来使用。我们利用实时数据请求、天气数据和定价数据进行模拟,结果证实了我们提出的方法的有效性和生产力,以降低云数据中心的能源成本和碳排放。
{"title":"Towards Energy Efficiency and Power Trading Exploiting Renewable Energy in Cloud Data Centers","authors":"S. Aslam, S. Aslam, H. Herodotou, Syed Muhammad Mohsin, Khursheed Aurangzeb","doi":"10.1109/AECT47998.2020.9194169","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194169","url":null,"abstract":"This study investigates the energy cost and carbon emission reduction problem in geographically distributed cloud data centers (DCs), where each DC is connected with its own renewable energy resources (RERs) for green energy generation. We consider four cloud DCs that are operated by a single cloud service provider. They consume energy from both RERs and from the commercial grid to meet the demand of cloud users. For energy pricing, we consider four different energy markets that offer varying energy prices per hour. Additionally, our proposed strategy enables DCs to sell excess electricity to the commercial grid in peak-price hours and purchase in low-cost hours according to power trading. This work also exploits energy storage devices (ESDs) to store energy for future use. We utilize real-time data requests, weather data, and pricing data for performing simulations and results affirm the effectiveness and productiveness of our proposed method to mitigate the energy cost and carbon emission of cloud DCs.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Big Data Driven Secure IoT Analytics with Trusted Execution Environments 具有可信执行环境的大数据驱动的安全物联网分析
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194185
Md Shihabul Islam, L. Khan
The growing adoption of IoT devices in our daily life engendered a need for secure systems to safely store or analyze sensitive data, as well as a decentralized data processing system to handle vast amount of streaming data. The cloud services used to store data and process sensitive data are often come out to be vulnerable to outside threats. Moreover, to analyze enormous streaming data swiftly, they are in need of a fast and efficient system. In this paper we propose a framework to maintain confidentiality and integrity of IoT data, which is of paramount importance, and manage large-scale data anaytics. We design the framework to preserve data privacy utilizing Trusted Execution Environment (TEE) such as Intel SGX, and end-to-end data encryption mechanism. In addition, we utilize Apache Spark for fast real-time streaming data processing from many IoT devices. We evaluate the framework by performing simple decision making in the SGX securely that involves multiple IoT devices, and a real-time anomaly detection in the streaming data from IoT devices using Spark.
随着我们日常生活中越来越多地采用物联网设备,需要安全的系统来安全地存储或分析敏感数据,以及分散的数据处理系统来处理大量的流数据。用于存储数据和处理敏感数据的云服务往往容易受到外部威胁。此外,为了快速分析海量的流数据,他们需要一个快速高效的系统。在本文中,我们提出了一个框架来维护物联网数据的机密性和完整性,这是至关重要的,并管理大规模数据分析。我们利用可信执行环境(TEE)(如Intel SGX)和端到端数据加密机制来设计框架以保护数据隐私。此外,我们利用Apache Spark对来自许多物联网设备的快速实时流数据进行处理。我们通过在SGX中安全地执行简单的决策来评估框架,其中涉及多个物联网设备,并使用Spark在物联网设备的流数据中进行实时异常检测。
{"title":"Big Data Driven Secure IoT Analytics with Trusted Execution Environments","authors":"Md Shihabul Islam, L. Khan","doi":"10.1109/AECT47998.2020.9194185","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194185","url":null,"abstract":"The growing adoption of IoT devices in our daily life engendered a need for secure systems to safely store or analyze sensitive data, as well as a decentralized data processing system to handle vast amount of streaming data. The cloud services used to store data and process sensitive data are often come out to be vulnerable to outside threats. Moreover, to analyze enormous streaming data swiftly, they are in need of a fast and efficient system. In this paper we propose a framework to maintain confidentiality and integrity of IoT data, which is of paramount importance, and manage large-scale data anaytics. We design the framework to preserve data privacy utilizing Trusted Execution Environment (TEE) such as Intel SGX, and end-to-end data encryption mechanism. In addition, we utilize Apache Spark for fast real-time streaming data processing from many IoT devices. We evaluate the framework by performing simple decision making in the SGX securely that involves multiple IoT devices, and a real-time anomaly detection in the streaming data from IoT devices using Spark.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT for Smart Parking 物联网助力智能停车
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194195
Noura El Shabasy, M. Abdellatif
Nowadays, technology has become more reliable that allowed human interaction to decrease while the machines have started to take over in many fields of interest. The Internet of things (IoT) represents the idea of machines ability to control entire systems without any human interactions. This paper proposes an IoT system that takes a picture of parked cars in a garage, extract the plate number and the location of the car, and places these information in a database. At the garage entrance, a terminal linked to the system allows the user to locate the parked car using the license plate no.. The system is tested for reading license plates several times, and is shown to perform with a low probability of error. The proposed IoT parking system is an integrated system combining the RPi operating system Motion Eye, with MATLAB segmentation code for character recognition, database tools, as well as web services all in order to make the user interface as friendly as possible.
如今,技术已经变得更加可靠,使得人类的互动减少,而机器已经开始接管许多感兴趣的领域。物联网(IoT)代表了机器能够在没有任何人类交互的情况下控制整个系统的想法。本文提出了一种物联网系统,该系统拍摄车库中停放的汽车的照片,提取汽车的车牌号码和位置,并将这些信息放入数据库中。在车库入口,一个与系统相连的终端允许用户使用车牌号码来定位停放的汽车。该系统进行了多次车牌读取测试,结果显示其执行错误的概率很低。提出的物联网停车系统是一个集成系统,结合了RPi操作系统Motion Eye, MATLAB字符识别分割代码,数据库工具以及web服务,所有这些都是为了使用户界面尽可能友好。
{"title":"IoT for Smart Parking","authors":"Noura El Shabasy, M. Abdellatif","doi":"10.1109/AECT47998.2020.9194195","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194195","url":null,"abstract":"Nowadays, technology has become more reliable that allowed human interaction to decrease while the machines have started to take over in many fields of interest. The Internet of things (IoT) represents the idea of machines ability to control entire systems without any human interactions. This paper proposes an IoT system that takes a picture of parked cars in a garage, extract the plate number and the location of the car, and places these information in a database. At the garage entrance, a terminal linked to the system allows the user to locate the parked car using the license plate no.. The system is tested for reading license plates several times, and is shown to perform with a low probability of error. The proposed IoT parking system is an integrated system combining the RPi operating system Motion Eye, with MATLAB segmentation code for character recognition, database tools, as well as web services all in order to make the user interface as friendly as possible.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Live multimedia streaming multicast in local area social networking environment of MANETs using SLIM+ Protocol 基于SLIM+协议的无线局域网社会网络环境下的实时多媒体流组播
Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194182
N. N. Hussaini, Syed Muhammad Jamil Shah, M. A. Shaikh, S. Faizullah
Evolution of multicast routing protocols for MANET are becoming the center of attraction for scholars of these days. This is due to varying applications areas, which in turn requires appropriate routing schemes for them. In the environment of mobile ad hoc networks, multicast communication efficiently saves the network resources. Adapting MANET as local area social networks allows new nodes to keep arriving and existing nodes departing the network as and when they like. Multicast routing protocols need to be readdressed to introduce the openness of the node set in such environments. The research paper focuses on evaluating the performance of routing scheme used by SLIM+in multicast of live video or audio streaming to the freely interested devices or nodes, coming in the antenna rage. Performance metric used is Packet Delivery Ratio and End-to-End-Delay; by comparing it with its competitive and most commonly used tree based and mesh based multicast routing protocols. It then observed that SLIM+ remained successful in utmost delivery of data packets to the destinations thus took a little bit increased but insignificant time to advertise for live streaming. Whereas its counterpart MAODV failed in successful delivery of the data packets to the desired destinations and become free in less time. Whereas SLIM+ with its tree based structure competed with mesh based structured PUMA.
面向MANET的组播路由协议的发展成为近年来学者们关注的焦点。这是由于不同的应用领域,这反过来又需要适当的路由方案。在移动自组网环境下,组播通信有效地节省了网络资源。将MANET调整为局部区域社交网络,允许新节点不断到达,现有节点随时离开网络。在这种环境下,需要对组播路由协议进行重新改写,以引入节点集的开放性。本文重点研究了SLIM+在多播视频或音频流到天线范围内的自由感兴趣的设备或节点时所使用的路由方案的性能。使用的性能指标是数据包传送率和端到端延迟;将其与目前最常用的基于树和基于网格的组播路由协议进行了比较。然后观察到SLIM+仍然成功地将数据包最大限度地传递到目的地,因此花费了一点点增加但微不足道的时间来宣传直播。而其对应的MAODV无法成功地将数据包传递到期望的目的地,并在更短的时间内获得自由。而SLIM+以其树型结构与基于网格的结构化PUMA竞争。
{"title":"Live multimedia streaming multicast in local area social networking environment of MANETs using SLIM+ Protocol","authors":"N. N. Hussaini, Syed Muhammad Jamil Shah, M. A. Shaikh, S. Faizullah","doi":"10.1109/AECT47998.2020.9194182","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194182","url":null,"abstract":"Evolution of multicast routing protocols for MANET are becoming the center of attraction for scholars of these days. This is due to varying applications areas, which in turn requires appropriate routing schemes for them. In the environment of mobile ad hoc networks, multicast communication efficiently saves the network resources. Adapting MANET as local area social networks allows new nodes to keep arriving and existing nodes departing the network as and when they like. Multicast routing protocols need to be readdressed to introduce the openness of the node set in such environments. The research paper focuses on evaluating the performance of routing scheme used by SLIM+in multicast of live video or audio streaming to the freely interested devices or nodes, coming in the antenna rage. Performance metric used is Packet Delivery Ratio and End-to-End-Delay; by comparing it with its competitive and most commonly used tree based and mesh based multicast routing protocols. It then observed that SLIM+ remained successful in utmost delivery of data packets to the destinations thus took a little bit increased but insignificant time to advertise for live streaming. Whereas its counterpart MAODV failed in successful delivery of the data packets to the desired destinations and become free in less time. Whereas SLIM+ with its tree based structure competed with mesh based structured PUMA.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116855803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Language Independent Sentiment Analysis 独立于语言的情感分析
Pub Date : 2019-12-27 DOI: 10.1109/AECT47998.2020.9194186
M. Shakeel, Turki Alghamidi, S. Faizullah, Imdadullah Khan
Social media platforms and online forums generate a rapid and increasing amount of textual data. Businesses, government agencies, and media organizations seek to perform sentiment analysis on this rich text data. The results of these analytics are used for adapting marketing strategies, customizing products, security, and various other decision makings. Sentiment analysis has been extensively studied and various methods have been developed for it with great success. These methods, however, apply to texts written in a specific language. This limits the applicability to a particular demographic and geographic region. In this paper, we propose a general approach for sentiment analysis on data containing texts from multiple languages. This enables all the applications to utilize the results of sentiment analysis in a language oblivious or language-independent fashion.
社交媒体平台和在线论坛产生了快速增长的文本数据。企业、政府机构和媒体组织寻求对这些富文本数据执行情感分析。这些分析的结果用于调整营销策略、定制产品、安全性和各种其他决策。情感分析得到了广泛的研究,并开发了各种方法,取得了巨大的成功。然而,这些方法适用于用特定语言编写的文本。这限制了对特定人口和地理区域的适用性。在本文中,我们提出了一种对包含多种语言文本的数据进行情感分析的通用方法。这使得所有的应用程序能够以语言无关或语言独立的方式利用情感分析的结果。
{"title":"Language Independent Sentiment Analysis","authors":"M. Shakeel, Turki Alghamidi, S. Faizullah, Imdadullah Khan","doi":"10.1109/AECT47998.2020.9194186","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194186","url":null,"abstract":"Social media platforms and online forums generate a rapid and increasing amount of textual data. Businesses, government agencies, and media organizations seek to perform sentiment analysis on this rich text data. The results of these analytics are used for adapting marketing strategies, customizing products, security, and various other decision makings. Sentiment analysis has been extensively studied and various methods have been developed for it with great success. These methods, however, apply to texts written in a specific language. This limits the applicability to a particular demographic and geographic region. In this paper, we propose a general approach for sentiment analysis on data containing texts from multiple languages. This enables all the applications to utilize the results of sentiment analysis in a language oblivious or language-independent fashion.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"425 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113983278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow 基于OpenFlow漏洞的SDN DDoS攻击检测
Pub Date : 2019-12-27 DOI: 10.1109/AECT47998.2020.9194211
Abdullah M. Alshanqiti, S. Faizullah, Sarwan Ali, Maria K. Alvi, Muhammad Asad Khan, Imdadullah Khan
Software Defined Networking (SDN) is a network paradigm shift that facilitates comprehensive network programmability to cope with emerging new technologies such as cloud computing and big data. SDN facilitates simplified and centralized network management enabling it to operate in dynamic scenarios. Further, SDN uses the OpenFlow protocol for communication between the controller and its switches. The OpenFlow creates vulnerabilities for network attacks especially Distributed Denial of Service (DDoS). DDoS attacks are launched from the compromised hosts connected to the SDN switches. In this paper, we introduce a timeand space-efficient solution for the identification of these compromised hosts. Our solution consumes less computational resources and space and does not require any special equipment.
软件定义网络(SDN)是一种网络范式的转变,它促进了全面的网络可编程性,以应对云计算和大数据等新兴技术。SDN简化、集中的网络管理,使其能够在动态场景下运行。此外,SDN使用OpenFlow协议在控制器和交换机之间进行通信。OpenFlow为网络攻击特别是分布式拒绝服务(DDoS)创造了漏洞。DDoS攻击是从SDN交换机连接的受损主机发起的。在本文中,我们介绍了一种时间和空间有效的解决方案,用于识别这些受损主机。我们的解决方案消耗更少的计算资源和空间,不需要任何特殊的设备。
{"title":"Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow","authors":"Abdullah M. Alshanqiti, S. Faizullah, Sarwan Ali, Maria K. Alvi, Muhammad Asad Khan, Imdadullah Khan","doi":"10.1109/AECT47998.2020.9194211","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194211","url":null,"abstract":"Software Defined Networking (SDN) is a network paradigm shift that facilitates comprehensive network programmability to cope with emerging new technologies such as cloud computing and big data. SDN facilitates simplified and centralized network management enabling it to operate in dynamic scenarios. Further, SDN uses the OpenFlow protocol for communication between the controller and its switches. The OpenFlow creates vulnerabilities for network attacks especially Distributed Denial of Service (DDoS). DDoS attacks are launched from the compromised hosts connected to the SDN switches. In this paper, we introduce a timeand space-efficient solution for the identification of these compromised hosts. Our solution consumes less computational resources and space and does not require any special equipment.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Clustering Based UAV Base Station Positioning for Enhanced Network Capacity 基于集群的无人机基站定位增强网络容量
Pub Date : 2019-10-20 DOI: 10.1109/AECT47998.2020.9194188
Metin Ozturk, J. Nadas, P. V. Klaine, S. Hussain, M. Imran
Unmanned aerial vehicles (UAVs) are expected to be deployed in a variety of applications in future mobile networks due to several advantages they bring over the deployment of ground base stations. However, despite the recent interest in UAVs in mobile networks, some issues still remain, such as determining the placement of multiple UAVs in different scenarios. In this paper we propose a solution to determine the optimal 3D position of multiple UAVs in a capacity enhancement use-case, or in other words, when the ground network cannot cope with the user traffic demand. For this scenario, real data from the city of Milan, provided by Telecom Italia is utilized to simulate an event. Based on that, a solution based on k-means, a machine learning technique, to position multiple UAVs is proposed and it is compared with two other baseline methods. Results demonstrate that the proposed solution is able to significantly outperform other methods in terms of users covered and quality of service.
与地面基站的部署相比,无人机有望在未来移动网络的各种应用中得到部署。然而,尽管最近对移动网络中的无人机感兴趣,但仍然存在一些问题,例如在不同场景中确定多架无人机的放置位置。在本文中,我们提出了一种在容量增强用例中,或者换句话说,当地面网络无法满足用户流量需求时,确定多架无人机最佳3D位置的解决方案。对于这个场景,使用意大利电信提供的来自米兰市的真实数据来模拟事件。在此基础上,提出了一种基于机器学习技术k-means的多无人机定位方法,并与其他两种基线方法进行了比较。结果表明,所提出的解决方案在用户覆盖和服务质量方面明显优于其他方法。
{"title":"Clustering Based UAV Base Station Positioning for Enhanced Network Capacity","authors":"Metin Ozturk, J. Nadas, P. V. Klaine, S. Hussain, M. Imran","doi":"10.1109/AECT47998.2020.9194188","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194188","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are expected to be deployed in a variety of applications in future mobile networks due to several advantages they bring over the deployment of ground base stations. However, despite the recent interest in UAVs in mobile networks, some issues still remain, such as determining the placement of multiple UAVs in different scenarios. In this paper we propose a solution to determine the optimal 3D position of multiple UAVs in a capacity enhancement use-case, or in other words, when the ground network cannot cope with the user traffic demand. For this scenario, real data from the city of Milan, provided by Telecom Italia is utilized to simulate an event. Based on that, a solution based on k-means, a machine learning technique, to position multiple UAVs is proposed and it is compared with two other baseline methods. Results demonstrate that the proposed solution is able to significantly outperform other methods in terms of users covered and quality of service.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127795578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Location Dependent Channel Characteristics for Implantable Devices 植入式装置的位置相关通道特性
Pub Date : 2019-10-14 DOI: 10.1109/AECT47998.2020.9194165
Muhammad Ilyas, O. Bayat, O. Ucan, M. Imran, Q. Abbasi
This paper presents an impact on an in-vivo channel with respect to the position of ex-vivo antenna placement and its location. The paper also shows how the location of the antenna is impacting the channel. Three different parts are considered for the simulations using measured data for 500 MHz bandwidth. The results in the paper present the high location dependent characteristics of the in-vivo channel in the context of changing the position of the ex-vivo antenna. These findings can help in the system design for the future of the implantable devices design to be placed inside the human body.
本文介绍了离体天线放置位置及其位置对体内信道的影响。本文还说明了天线的位置对信道的影响。采用500mhz带宽下的实测数据,考虑了三个不同的部分进行仿真。本文的结果表明,在改变离体天线位置的情况下,体内信道的高度位置依赖特性。这些发现可以为将来植入人体的植入式装置的系统设计提供帮助。
{"title":"Location Dependent Channel Characteristics for Implantable Devices","authors":"Muhammad Ilyas, O. Bayat, O. Ucan, M. Imran, Q. Abbasi","doi":"10.1109/AECT47998.2020.9194165","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194165","url":null,"abstract":"This paper presents an impact on an in-vivo channel with respect to the position of ex-vivo antenna placement and its location. The paper also shows how the location of the antenna is impacting the channel. Three different parts are considered for the simulations using measured data for 500 MHz bandwidth. The results in the paper present the high location dependent characteristics of the in-vivo channel in the context of changing the position of the ex-vivo antenna. These findings can help in the system design for the future of the implantable devices design to be placed inside the human body.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1