首页 > 最新文献

2016 International Conference on Information and Communication Technology (ICICTM)最新文献

英文 中文
Automatic Artificial Data Generator: Framework and implementation 自动人工数据生成器:框架与实现
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890777
Syahaneim, Raja Asilah Hazwani, N. Wahida, Siti Intan Shafikah, Zuraini, Puteri Nor Ellyza
Extracting unknown and possibly useful information from a set of examples that has desired features is crucial and important for data analysis and interpretation. Normally, a public repository has become the most used method in attempting to find a suitable domain. However, relying on the available data in the public repository has several disadvantages. In this case, an automatic problem generation system would be valuable to provide several advantages over the traditional methods. This paper focuses more on data extraction and artificial data generation. Here, a framework is proposed that consists of four main phases: 1) Data extraction, 2) Data characterization, 3) Artificial data generation and 4) Artificial data creation. The approach systematically creates testing datasets based on real data that is extracted from a reliable sources. The system uses random permutation algorithm to generate a large number of artificial data that resembles real data.
从一组具有所需特征的示例中提取未知的和可能有用的信息对于数据分析和解释至关重要。通常,公共存储库已成为尝试查找合适域的最常用方法。然而,依赖公共存储库中的可用数据有几个缺点。在这种情况下,一个自动问题生成系统将是有价值的,因为它提供了优于传统方法的几个优点。本文的重点是数据提取和人工数据生成。本文提出了一个由四个主要阶段组成的框架:1)数据提取,2)数据表征,3)人工数据生成和4)人工数据创建。该方法基于从可靠来源提取的真实数据系统地创建测试数据集。该系统采用随机排列算法生成大量与真实数据相似的人工数据。
{"title":"Automatic Artificial Data Generator: Framework and implementation","authors":"Syahaneim, Raja Asilah Hazwani, N. Wahida, Siti Intan Shafikah, Zuraini, Puteri Nor Ellyza","doi":"10.1109/ICICTM.2016.7890777","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890777","url":null,"abstract":"Extracting unknown and possibly useful information from a set of examples that has desired features is crucial and important for data analysis and interpretation. Normally, a public repository has become the most used method in attempting to find a suitable domain. However, relying on the available data in the public repository has several disadvantages. In this case, an automatic problem generation system would be valuable to provide several advantages over the traditional methods. This paper focuses more on data extraction and artificial data generation. Here, a framework is proposed that consists of four main phases: 1) Data extraction, 2) Data characterization, 3) Artificial data generation and 4) Artificial data creation. The approach systematically creates testing datasets based on real data that is extracted from a reliable sources. The system uses random permutation algorithm to generate a large number of artificial data that resembles real data.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
WarBox: Portable wardriving over Raspberry PI WarBox:在树莓派上的便携式wardrive
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890806
Amna Saad, A. Amran, M. N. A. Hasan
Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a specific tool to do wardriving, that is to search for Wi-Fi wireless networks by a person in a moving vehicle. The tool could be installed inside a portable computer, smartphone or personal digital assistant. Some hobbyist does wardriving to exploit connections to wireless local area network around a city or elsewhere. There may also be a potential data leak if the wardriving tool used are bulky that would attract attention from passerby. This is because to do wardriving one needs a vehicle, a portable computer, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. A small and non-bulky wardriving tool is more suitable in order not to attract attention. Traditionally, a network engineer still brings his notebook or laptop that is installed with Wi-Fi receiver for wardriving. We designed a portable wardriving tool, WarBox, that is smaller and non-bulky as compared to the notebooks or laptops that most engineers used. The device is built over the Raspberry Pi, a small, single-board computer. Our prototype includes the database for data collection of wireless data for further analysis. For example, the data could be used for wireless mapping and other trending usage by end users. We got the inspiration to build WarBox from the dedicated wireless analysis devices, like Netstumbler and Wireless Geographic Logging Engine (WiGLE). However, we did not compare the WarBox performance with these tools as it is beyond our research objective. Our main objective is to build a wardriving tool based on the Raspberry Pi, which is affordable and customizable to most environments. Our result shows that the WarBox requires a low power consumption. It is powered by the 5V coming from the Micro USB port and it is using a battery bank to power it. We are able to detect 596 access points at Taman Setapak Jaya, a suburban area that is 8.4km away from Universiti Kuala Lumpur, City Campus.
无线接入点无处不在,在家里,办公室和公共场所,如商场,在路上和开放空间。网络工程师将需要一个特定的工具来进行wardriving,即搜索移动车辆中的人的Wi-Fi无线网络。该工具可以安装在便携式电脑、智能手机或个人数字助理中。一些业余爱好者驾驶汽车利用城市周围或其他地方的无线局域网连接。如果使用的wardriving工具体积太大,可能会引起路人的注意,也可能会有潜在的数据泄漏。这是因为要进行wardriving,一个人需要一辆车、一台便携式电脑、一个设置在混杂模式下工作的无线以太网卡,以及某种可以安装在车顶或车内的天线。为了不引起注意,较小且不笨重的驱魔工具更合适。传统上,网络工程师仍然会带着装有Wi-Fi接收器的笔记本电脑或笔记本电脑进行驾驶。我们设计了一款便携式WarBox工具,与大多数工程师使用的笔记本电脑或笔记本电脑相比,它更小,更轻巧。该设备建立在树莓派(Raspberry Pi)上,这是一种小型的单板计算机。我们的原型包括用于收集无线数据以供进一步分析的数据库。例如,这些数据可以用于无线地图和终端用户的其他趋势使用。我们从专用的无线分析设备(如Netstumbler和wireless Geographic Logging Engine (WiGLE))中获得了构建WarBox的灵感。然而,我们没有将WarBox的性能与这些工具进行比较,因为这超出了我们的研究目标。我们的主要目标是建立一个基于树莓派的wardriving工具,这是负担得起的和可定制的大多数环境。我们的结果表明,WarBox需要一个低功耗。它由来自Micro USB端口的5V供电,并使用电池组供电。我们能够在距离吉隆坡大学城市校区8.4公里的郊区Taman Setapak Jaya检测到596个接入点。
{"title":"WarBox: Portable wardriving over Raspberry PI","authors":"Amna Saad, A. Amran, M. N. A. Hasan","doi":"10.1109/ICICTM.2016.7890806","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890806","url":null,"abstract":"Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a specific tool to do wardriving, that is to search for Wi-Fi wireless networks by a person in a moving vehicle. The tool could be installed inside a portable computer, smartphone or personal digital assistant. Some hobbyist does wardriving to exploit connections to wireless local area network around a city or elsewhere. There may also be a potential data leak if the wardriving tool used are bulky that would attract attention from passerby. This is because to do wardriving one needs a vehicle, a portable computer, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. A small and non-bulky wardriving tool is more suitable in order not to attract attention. Traditionally, a network engineer still brings his notebook or laptop that is installed with Wi-Fi receiver for wardriving. We designed a portable wardriving tool, WarBox, that is smaller and non-bulky as compared to the notebooks or laptops that most engineers used. The device is built over the Raspberry Pi, a small, single-board computer. Our prototype includes the database for data collection of wireless data for further analysis. For example, the data could be used for wireless mapping and other trending usage by end users. We got the inspiration to build WarBox from the dedicated wireless analysis devices, like Netstumbler and Wireless Geographic Logging Engine (WiGLE). However, we did not compare the WarBox performance with these tools as it is beyond our research objective. Our main objective is to build a wardriving tool based on the Raspberry Pi, which is affordable and customizable to most environments. Our result shows that the WarBox requires a low power consumption. It is powered by the 5V coming from the Micro USB port and it is using a battery bank to power it. We are able to detect 596 access points at Taman Setapak Jaya, a suburban area that is 8.4km away from Universiti Kuala Lumpur, City Campus.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Providing efficient, scalable and privacy preserved verification mechanism in remote attestation 在远程认证中提供高效、可扩展和隐私保护的验证机制
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890807
Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how to monitor remote applications. However, It becomes quite challenging task, when applications are running on millions of devices and it becomes necessary for the corporates to verify all of the applications. In this paper we have provided an efficient, scalable and privacy preserved mechanism to tackle the scalability of all these kinds of verifications. Machine learning algorithms are incorporated as Hadoop/MapReduce functions on the public cloud. The rest of low CPU intensive and privacy preserved verifications are performed on the private cloud.
在当今庞大的网络世界中,有许多应用程序在分布式环境中运行。企业确实需要一种机制来监控在远程设备上运行的应用程序。可信计算组(TCG)的一种这样的机制称为远程认证,它可以监视和验证远程应用程序的可信性。在这方面,已经提供了许多关于如何监视远程应用程序的解决方案。然而,当应用程序在数百万台设备上运行时,企业有必要验证所有应用程序,这就变得相当具有挑战性。在本文中,我们提供了一种高效,可扩展和隐私保护的机制来解决所有这些类型验证的可扩展性。机器学习算法作为Hadoop/MapReduce函数在公有云上集成。其余的低CPU密集型和保护隐私的验证在私有云上执行。
{"title":"Providing efficient, scalable and privacy preserved verification mechanism in remote attestation","authors":"Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali","doi":"10.1109/ICICTM.2016.7890807","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890807","url":null,"abstract":"Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how to monitor remote applications. However, It becomes quite challenging task, when applications are running on millions of devices and it becomes necessary for the corporates to verify all of the applications. In this paper we have provided an efficient, scalable and privacy preserved mechanism to tackle the scalability of all these kinds of verifications. Machine learning algorithms are incorporated as Hadoop/MapReduce functions on the public cloud. The rest of low CPU intensive and privacy preserved verifications are performed on the private cloud.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Verification of a Battlefield Visualization Framework in Military Decision Making using Holograms (3D) and multi-touch technology 基于全息图(3D)和多点触控技术的军事决策战场可视化框架验证
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890770
Norshahriah Wahab, N. Hasbullah, S. Ramli, Norul Zahrah Mohd Zainuddin
Holograms Technology gives tremendous interactive surface in collaborations' atmosphere. This technology is becoming increasingly affordable medium as it inherited characteristics of a conventional workspace, a projected personal computer and touching capabilities. Holograms Technology offers a world of possibilities task engagement neither face-to-face collaboration nor remote collaboration in 3 Dimensional (3D) environment. It creates an effective and efficient way of presentation by offering an interactive display medium in order to cater the abilities of users' vision. This may enrich the visualization elements during making decision or even in military planning process. Due to these advantages, the Army Planning doctrine have seen these technology as a future bright in theirs planning operations moreover the execution of ‘Course of Actions’ (COAs). Adding to this note, by emerging the Holograms Technology capabilities may have a great potential to improve soldier performance in making decision. The Army Officers' easily visualized the bulk of information and at the same time pointed out all the relevant and important information using Multi-touch Table as discussion medium. The information need to be digested and manipulated effectively amongst the Army Officers' before any decision can be made under time constraints.
全息技术在协作氛围中提供了巨大的互动界面。由于继承了传统工作空间、投影式个人电脑和触摸功能的特点,这项技术正逐渐成为人们负担得起的媒介。全息技术提供了一个世界的可能性,任务参与既不是面对面的协作,也不是远程协作的三维(3D)环境。它通过提供一种互动的显示媒介,创造了一种有效和高效的展示方式,以满足用户的视觉能力。这可以在决策甚至军事规划过程中丰富可视化元素。由于这些优势,陆军规划学说已将这些技术视为其规划作战以及“行动方针”(coa)执行的光明未来。除此之外,全息技术的出现可能会有很大的潜力来提高士兵的决策能力。以多点触控表为讨论媒介,方便军官将大量信息可视化,同时指出所有相关的重要信息。在时间限制下做出任何决定之前,需要在陆军军官中有效地消化和处理这些信息。
{"title":"Verification of a Battlefield Visualization Framework in Military Decision Making using Holograms (3D) and multi-touch technology","authors":"Norshahriah Wahab, N. Hasbullah, S. Ramli, Norul Zahrah Mohd Zainuddin","doi":"10.1109/ICICTM.2016.7890770","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890770","url":null,"abstract":"Holograms Technology gives tremendous interactive surface in collaborations' atmosphere. This technology is becoming increasingly affordable medium as it inherited characteristics of a conventional workspace, a projected personal computer and touching capabilities. Holograms Technology offers a world of possibilities task engagement neither face-to-face collaboration nor remote collaboration in 3 Dimensional (3D) environment. It creates an effective and efficient way of presentation by offering an interactive display medium in order to cater the abilities of users' vision. This may enrich the visualization elements during making decision or even in military planning process. Due to these advantages, the Army Planning doctrine have seen these technology as a future bright in theirs planning operations moreover the execution of ‘Course of Actions’ (COAs). Adding to this note, by emerging the Holograms Technology capabilities may have a great potential to improve soldier performance in making decision. The Army Officers' easily visualized the bulk of information and at the same time pointed out all the relevant and important information using Multi-touch Table as discussion medium. The information need to be digested and manipulated effectively amongst the Army Officers' before any decision can be made under time constraints.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An initial theoretical usability evaluation model for assessing defence mobile e-based application system 初步建立了国防机动应用系统可用性评价理论模型
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890800
Z. Zali
This study is aimed for developing a framework of usability metrics specifically for assessing usability in mobile applications. This study is design to achieve fifteen major attributes: accurateness; attractiveness; behaviorness; cognitive load; effectiveness; efficiency; effortlessness; errors; learnability; memorability; operability; satisfaction; steadiness; timeliness; and understandability. As a results, a usability framework based on the sequence of Goal, Attributes and Metrics (GAM) is developed in which outlined metrics is used for measuring the different attributes. This framework can be used for constructing usability model for assessing usability in mobile applications.
本研究旨在开发一个可用性指标框架,专门用于评估移动应用程序的可用性。本研究旨在达到15个主要属性:准确性;吸引力;behaviorness;认知负荷;有效性;效率;游刃有余;错误;易学性;难忘的;可操作性;满意度;稳定;及时性;和可理解性。因此,开发了一个基于目标、属性和度量(GAM)序列的可用性框架,其中概述的度量用于度量不同的属性。该框架可用于构建可用性模型,以评估移动应用程序的可用性。
{"title":"An initial theoretical usability evaluation model for assessing defence mobile e-based application system","authors":"Z. Zali","doi":"10.1109/ICICTM.2016.7890800","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890800","url":null,"abstract":"This study is aimed for developing a framework of usability metrics specifically for assessing usability in mobile applications. This study is design to achieve fifteen major attributes: accurateness; attractiveness; behaviorness; cognitive load; effectiveness; efficiency; effortlessness; errors; learnability; memorability; operability; satisfaction; steadiness; timeliness; and understandability. As a results, a usability framework based on the sequence of Goal, Attributes and Metrics (GAM) is developed in which outlined metrics is used for measuring the different attributes. This framework can be used for constructing usability model for assessing usability in mobile applications.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Critical review of intrusion detection systems in cloud computing environment 云计算环境下入侵检测系统综述
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890809
Abdulaziz Aborujilah, Shahrulniza Musa
Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud computing environment.
基于云计算的服务代表了提供IT服务方式的重大发展。然而,这些服务的安全挑战仍然是严重的威胁。因此,入侵检测系统(ids)越来越受到人们的关注。这包括IDS方法和应用程序。这篇综述文章集中解释了云计算环境中使用的大多数入侵检测技术的特点和局限性。
{"title":"Critical review of intrusion detection systems in cloud computing environment","authors":"Abdulaziz Aborujilah, Shahrulniza Musa","doi":"10.1109/ICICTM.2016.7890809","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890809","url":null,"abstract":"Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud computing environment.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design guideline of Wi-Fi fingerprinting in indoor localization using invariant Received Signal Strength 接收信号强度不变的室内Wi-Fi指纹定位设计准则
Pub Date : 1900-01-01 DOI: 10.1109/ICICTM.2016.7890811
Mohd Nizam Husen, Sukhan Lee
Location-based services application in indoor environment utilizing Wi-Fi Received Signal Strength (RSS) is recently prevalent in pervasive computing applications. It is used as an enabler of various location based personal services with handheld and wearable communication devices. This paper present a design guideline for the benefits of the society who wish to employ invariant RSS-based localization using Wi-Fi fingerprinting in any indoor environment. This useful guideline relates statistically the different levels of the random spatiotemporal disturbances inducing RSS instability to the minimum number of Wi-Fi sources required for achieving a certain class separation degree under the given number of calibration locations to be identified. We developed an algorithm to simulate the invariant reference RSS propagations, spontaneous RSS propagations, identify the effective invariant RSS after applying spatiotemporal disturbances, and compute the class separation degree of the calibrated reference locations. An instance from the result shows that to get a class separation degree of above 90% with 35% random spatiotemporal disturbances when the number of calibrated locations is 20, the optimum number of obtainable Wi-Fi signal sources should be at least 50.
利用Wi-Fi接收信号强度(RSS)在室内环境中实现基于位置的服务是目前普适计算应用中比较流行的一种方法。它被用作手持和可穿戴通信设备的各种基于位置的个人服务的推动者。本文提出了一个设计准则,为社会谁希望采用不变的rss定位使用Wi-Fi指纹在任何室内环境的利益。这一有用的准则在统计上将引起RSS不稳定的随机时空扰动的不同水平与在给定的待识别校准位置数量下实现一定的类分离程度所需的最小Wi-Fi源数量联系起来。我们开发了一种算法来模拟参考点的不变RSS传播和自发RSS传播,在施加时空扰动后识别有效的不变RSS,并计算校准后参考点的类分离度。结果表明,当校准位置数为20个时,要在35%随机时空干扰下获得90%以上的类分离度,可获得的Wi-Fi信号源的最佳数量应至少为50个。
{"title":"Design guideline of Wi-Fi fingerprinting in indoor localization using invariant Received Signal Strength","authors":"Mohd Nizam Husen, Sukhan Lee","doi":"10.1109/ICICTM.2016.7890811","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890811","url":null,"abstract":"Location-based services application in indoor environment utilizing Wi-Fi Received Signal Strength (RSS) is recently prevalent in pervasive computing applications. It is used as an enabler of various location based personal services with handheld and wearable communication devices. This paper present a design guideline for the benefits of the society who wish to employ invariant RSS-based localization using Wi-Fi fingerprinting in any indoor environment. This useful guideline relates statistically the different levels of the random spatiotemporal disturbances inducing RSS instability to the minimum number of Wi-Fi sources required for achieving a certain class separation degree under the given number of calibration locations to be identified. We developed an algorithm to simulate the invariant reference RSS propagations, spontaneous RSS propagations, identify the effective invariant RSS after applying spatiotemporal disturbances, and compute the class separation degree of the calibrated reference locations. An instance from the result shows that to get a class separation degree of above 90% with 35% random spatiotemporal disturbances when the number of calibrated locations is 20, the optimum number of obtainable Wi-Fi signal sources should be at least 50.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 International Conference on Information and Communication Technology (ICICTM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1