首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
An Experimental Study to Understand How Users Choose Password 了解用户如何选择密码的实验研究
Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani
End-users share various personal information with different types of websites such as governmental, social networking, or educational websites. Websites vary in importance to the user and sensitivity of the information they involved about users. The password is the access key to the user account on websites and the first defense against unauthorized access. Previous studies mostly focused on the strength and weaknesses of passwords. This paper focuses on the passwords and the password’s relevance to the website’s sensitivity based on the type of information shared on them. A survey and think-aloud experiment, and post-interview are conducted in our laboratory. The participants were asked to create passwords to register on three different websites while thinking aloud so experimenters can prove and reject some hypotheses. The study’s results confirm that the importance of a website affects users’ behaviors and passwords.
终端用户与不同类型的网站共享各种个人信息,例如政府网站、社交网站或教育网站。网站的重要性不同的用户和敏感信息他们对用户参与。密码是用户登录网站时的访问密钥,是防止非法访问的第一道防线。以前的研究主要集中在密码的优点和缺点上。本文主要研究密码以及基于密码上共享的信息类型的密码与网站敏感性的相关性。在我们的实验室进行了调查和有声思考实验,以及访谈后。参与者被要求一边大声思考,一边在三个不同的网站上注册密码,这样实验者就可以证明和否定一些假设。研究结果证实,网站的重要性会影响用户的行为和密码。
{"title":"An Experimental Study to Understand How Users Choose Password","authors":"Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani","doi":"10.1145/3440749.3442643","DOIUrl":"https://doi.org/10.1145/3440749.3442643","url":null,"abstract":"End-users share various personal information with different types of websites such as governmental, social networking, or educational websites. Websites vary in importance to the user and sensitivity of the information they involved about users. The password is the access key to the user account on websites and the first defense against unauthorized access. Previous studies mostly focused on the strength and weaknesses of passwords. This paper focuses on the passwords and the password’s relevance to the website’s sensitivity based on the type of information shared on them. A survey and think-aloud experiment, and post-interview are conducted in our laboratory. The participants were asked to create passwords to register on three different websites while thinking aloud so experimenters can prove and reject some hypotheses. The study’s results confirm that the importance of a website affects users’ behaviors and passwords.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Flow Classification Model for Resource Distribution in SDN Networks SDN网络中资源分布的动态流分类模型
S. Muhizi, M. Al-Bahri
As the number of networked devices and applications rapidly grows, particularly the Internet of Things applications, billions of devices are connected to the network and therefore managing the generated traffic becomes a needy task. Effectively managing these devices to support reliable, secure, and high-quality applications become challenging. The main solution to manage network traffic is the automatic classification of application aimed at identifying the semantic type of the application by analyzing its network traffic and wide range of new features. This article proposes a model for dynamic network traffic classification in Software-Defined Networks based on the modified k-means algorithm for network resources distribution to prioritized types of traffic, which allows network applications optimization
随着联网设备和应用数量的快速增长,尤其是物联网应用,数以十亿计的设备连接到网络中,因此管理产生的流量成为一项迫切的任务。有效地管理这些设备以支持可靠、安全和高质量的应用程序变得具有挑战性。网络流量管理的主要解决方案是应用程序的自动分类,旨在通过分析应用程序的网络流量和广泛的新特征来识别应用程序的语义类型。本文提出了一种基于改进的k-means算法的软件定义网络动态流量分类模型,将网络资源分配到优先的流量类型,从而实现网络应用的优化
{"title":"Dynamic Flow Classification Model for Resource Distribution in SDN Networks","authors":"S. Muhizi, M. Al-Bahri","doi":"10.1145/3440749.3442613","DOIUrl":"https://doi.org/10.1145/3440749.3442613","url":null,"abstract":"As the number of networked devices and applications rapidly grows, particularly the Internet of Things applications, billions of devices are connected to the network and therefore managing the generated traffic becomes a needy task. Effectively managing these devices to support reliable, secure, and high-quality applications become challenging. The main solution to manage network traffic is the automatic classification of application aimed at identifying the semantic type of the application by analyzing its network traffic and wide range of new features. This article proposes a model for dynamic network traffic classification in Software-Defined Networks based on the modified k-means algorithm for network resources distribution to prioritized types of traffic, which allows network applications optimization","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges Posed by Quantum Computing on Emerging Technologies 量子计算对新兴技术的安全挑战
A. Abuarqoub
Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman. New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.
量子计算已迅速成为当今许多计算机科学领域的先锋。这是因为量子计算机能够以经典计算机无法实现的效率执行计算任务。量子计算技术对社会有着持久的潜在影响,对我们生活的许多方面有着广泛的影响。通信产业研究机构(CIR)估计,到2023年,全球量子计算市场在相关软件和服务方面的支出预计将达到19亿美元,到2027年将增加到80亿美元。尽管量子计算有几个优势,但它威胁到当前的加密技术,而加密技术对于当今的互联网标准(如传输层安全(TLS))是必要的。这是由于它能够并行执行无限复杂的计算。因此,量子计算机有望解决密钥分发问题,破解每一个基于非对称密码的单一密码和认证算法,如:RSA、ECC、Diffie-Hellman等。物联网(IoT)、区块链、自动驾驶汽车、5G、人工智能(AI)和机器人等新兴技术的安全运行都依赖于密码学。虽然量子计算支持技术的进化和成长,但它将对这些技术的当前进展和未来发展构成威胁。因此,密码学和身份验证技术需要改进,因为引入量子计算将使当今的网络安全面临严重风险。NSA和NIST提出了应对这些挑战的解决方案。然而,这些解决方案仍然不成熟,因为它们需要对硬件实现进行重大升级。相反,这些建议侧重于所谓的后量子、量子证明、量子安全或量子抵抗密码系统。本次演讲概述了量子技术对身份验证、数据交换和数据存储的影响,以及密码学发挥重要作用的领域,如:区块链、5G、物联网和人工智能技术。它研究了量子技术对这些新兴技术可能产生的影响。最后,讨论了目前一些致力于保护量子时代设备和系统并减轻量子攻击的量子安全解决方案。
{"title":"Security Challenges Posed by Quantum Computing on Emerging Technologies","authors":"A. Abuarqoub","doi":"10.1145/3440749.3442651","DOIUrl":"https://doi.org/10.1145/3440749.3442651","url":null,"abstract":"Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman. New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial Forecasting 鹰眼:财务预测中深度学习方法敏捷交叉验证的可视化框架
S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero
Financial forecasting represents a challenging task, mainly due to the irregularity of the market, high fluctuations and noise of the involved data, as well as collateral phenomena including investor mood and mass psychology. In recent years, many researchers focused their work on predicting the performance of the market by exploiting novel Machine Learning and Deep Learning tools and techniques. However, many of the approaches proposed in the literature do not take adequately into account some important specific domain issues in the analysis of the results. Among these, it is worth to mention the bias introduced by the choice of model weights initialization and the considered observation periods, as well as the narrow separation between significant results and noise, typical of the financial domain. A thorough analysis of these peculiar issues lead to a substantial increase of the experiments and results to analyze, making the discovery of meaningful hidden patterns very difficult and time consuming to perform. To cope with these concerns and accompanying the current Machine Learning Interpretability trend, in this paper we propose a visual framework for in-depth analysis of results obtained from Deep Learning approaches, tackling classification tasks within the financial domain and aiming at a better interpretation and explanation of the trained Deep Learning models. Our framework offers a modular view, both general and targeted, of results data, providing several financial specific metrics, including Sharpe and Sortino ratios, Equity curves and Maximum Drawdown, as well as custom period analysis and reports, experiment comparison tools, and evaluation features for different algorithms.
金融预测是一项具有挑战性的任务,主要是由于市场的不规则性,所涉及数据的高波动和噪声,以及投资者情绪和大众心理等附带现象。近年来,许多研究人员将工作重点放在利用新的机器学习和深度学习工具和技术预测市场表现上。然而,文献中提出的许多方法在分析结果时没有充分考虑到一些重要的特定领域问题。其中,值得一提的是模型权重初始化的选择和考虑的观察期所带来的偏差,以及金融领域典型的显著结果与噪声之间的狭窄分离。对这些特殊问题的深入分析导致要分析的实验和结果的大量增加,使得发现有意义的隐藏模式变得非常困难和耗时。为了应对这些问题并伴随当前机器学习可解释性趋势,在本文中,我们提出了一个可视化框架,用于深入分析从深度学习方法获得的结果,处理金融领域内的分类任务,并旨在更好地解释和解释训练过的深度学习模型。我们的框架提供了一个通用的和有针对性的结果数据的模块化视图,提供了几个财务特定指标,包括夏普和Sortino比率,权益曲线和最大缩减,以及自定义周期分析和报告,实验比较工具和不同算法的评估功能。
{"title":"HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial Forecasting","authors":"S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero","doi":"10.1145/3440749.3442653","DOIUrl":"https://doi.org/10.1145/3440749.3442653","url":null,"abstract":"Financial forecasting represents a challenging task, mainly due to the irregularity of the market, high fluctuations and noise of the involved data, as well as collateral phenomena including investor mood and mass psychology. In recent years, many researchers focused their work on predicting the performance of the market by exploiting novel Machine Learning and Deep Learning tools and techniques. However, many of the approaches proposed in the literature do not take adequately into account some important specific domain issues in the analysis of the results. Among these, it is worth to mention the bias introduced by the choice of model weights initialization and the considered observation periods, as well as the narrow separation between significant results and noise, typical of the financial domain. A thorough analysis of these peculiar issues lead to a substantial increase of the experiments and results to analyze, making the discovery of meaningful hidden patterns very difficult and time consuming to perform. To cope with these concerns and accompanying the current Machine Learning Interpretability trend, in this paper we propose a visual framework for in-depth analysis of results obtained from Deep Learning approaches, tackling classification tasks within the financial domain and aiming at a better interpretation and explanation of the trained Deep Learning models. Our framework offers a modular view, both general and targeted, of results data, providing several financial specific metrics, including Sharpe and Sortino ratios, Equity curves and Maximum Drawdown, as well as custom period analysis and reports, experiment comparison tools, and evaluation features for different algorithms.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition Networks 数据采集网络中无人平台交互的网络编码
S. Vladimirov, R. Kirichek, V. Vishnevsky
The paper determines the application of the network coding method in the system for gathering information from wireless body area networks based on unmanned flying platforms. Application of network coding methods is carried out using the proposed model of a data acquisition network. The limits of applicability of the proposed method are estimated and statistical modeling is carried out using various checksum algorithms, taking into account the features of the problem being solved. The analysis of the simulation results is carried out.
本文确定了网络编码方法在基于无人飞行平台的无线体域网信息采集系统中的应用。利用所提出的数据采集网络模型进行了网络编码方法的应用。根据所要解决的问题的特点,估计了所提出方法的适用范围,并使用各种校验和算法进行了统计建模。对仿真结果进行了分析。
{"title":"Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition Networks","authors":"S. Vladimirov, R. Kirichek, V. Vishnevsky","doi":"10.1145/3440749.3442622","DOIUrl":"https://doi.org/10.1145/3440749.3442622","url":null,"abstract":"The paper determines the application of the network coding method in the system for gathering information from wireless body area networks based on unmanned flying platforms. Application of network coding methods is carried out using the proposed model of a data acquisition network. The limits of applicability of the proposed method are estimated and statistical modeling is carried out using various checksum algorithms, taking into account the features of the problem being solved. The analysis of the simulation results is carried out.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing the Kemeny's Weighted Median for the Rank Aggregation Problem 秩聚集问题的Kemeny加权中值
S. Dvoenko, D. O. Pshenichny
A coordinated ranking as the opinion of an expert group usually can be represented by the well-known Kemeny's median. The Kemeny's median is the least different ranking from other rankings and is free of known contradictions of the majority rule problem. As a mathematical principle, the Kemeny's median gives a decision in any case, in particular, for conflicting experts’ decisions in ordinal scales. In practice, competing opinions are usually modified by special approval procedures to achieve the required level of consensus. The known approach consists in assigning weights to experts’ opinions. In this paper, the problem to find the median for a linear combination of experts’ rankings is investigated using the well-known locally optimal Kemeny's algorithm. It is proposed to use the weighted loss matrix in it.
作为专家组意见的协调排名通常可以用著名的凯梅尼中位数来表示。凯梅尼的中位数排名与其他排名差别最小,而且不存在多数决定原则问题的已知矛盾。作为一个数学原理,凯梅尼中值在任何情况下都会给出一个决定,特别是对于在有序尺度上相互冲突的专家的决定。在实践中,相互矛盾的意见通常通过特别的批准程序加以修改,以达到所需的协商一致程度。已知的方法包括为专家的意见分配权重。本文利用著名的局部最优Kemeny算法研究了专家排名线性组合的中位数问题。提出了在其中使用加权损失矩阵的方法。
{"title":"Developing the Kemeny's Weighted Median for the Rank Aggregation Problem","authors":"S. Dvoenko, D. O. Pshenichny","doi":"10.1145/3440749.3442652","DOIUrl":"https://doi.org/10.1145/3440749.3442652","url":null,"abstract":"A coordinated ranking as the opinion of an expert group usually can be represented by the well-known Kemeny's median. The Kemeny's median is the least different ranking from other rankings and is free of known contradictions of the majority rule problem. As a mathematical principle, the Kemeny's median gives a decision in any case, in particular, for conflicting experts’ decisions in ordinal scales. In practice, competing opinions are usually modified by special approval procedures to achieve the required level of consensus. The known approach consists in assigning weights to experts’ opinions. In this paper, the problem to find the median for a linear combination of experts’ rankings is investigated using the well-known locally optimal Kemeny's algorithm. It is proposed to use the weighted loss matrix in it.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying Vehicles 利用飞行器互联网加强基于优化的无线通信技术和路由技术
I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah
Effective communication plays a pivotal role to measure the quality of experience in networks. Recent technological development in the area of wireless communication and many other fields are emerged like flying ad hoc networks, internet of everything. Due to dynamic structure of unmanned aerial vehicles the mobile topological structure is having direct concerns about communication technology performance. Conventional routing techniques are utilized in communication to ensure effective connectivity of two or more workstations. This research study performs comprehensive comparative evaluation wireless communication technology generation for various parameters arrangements. Also qualified learning study is incorporated about different routing protocols in the area of flying ad hoc networks.
有效的沟通是衡量网络体验质量的关键。无线通信领域和许多其他领域的最新技术发展出现了,如飞行自组织网络,万物互联。由于无人机的动态结构,其移动拓扑结构直接关系到通信技术性能。传统的路由技术用于通信,以确保两个或多个工作站的有效连接。本研究对无线通信技术产生的各种参数安排进行了全面的比较评价。同时对飞行自组织网络中不同的路由协议进行了定性学习研究。
{"title":"Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying Vehicles","authors":"I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah","doi":"10.1145/3440749.3442621","DOIUrl":"https://doi.org/10.1145/3440749.3442621","url":null,"abstract":"Effective communication plays a pivotal role to measure the quality of experience in networks. Recent technological development in the area of wireless communication and many other fields are emerged like flying ad hoc networks, internet of everything. Due to dynamic structure of unmanned aerial vehicles the mobile topological structure is having direct concerns about communication technology performance. Conventional routing techniques are utilized in communication to ensure effective connectivity of two or more workstations. This research study performs comprehensive comparative evaluation wireless communication technology generation for various parameters arrangements. Also qualified learning study is incorporated about different routing protocols in the area of flying ad hoc networks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimization of designs for fiber optic communication line 光纤通信线路的优化设计
D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov
The article describes a modification of fiber optic communication lines for transmitting microwave signals. Development of microwave transmission lines proposed as an improvement in an educational institution, taking into account the technical requirements for a station in operation. Improving the receiving path is to create a multifunctional walker with the ability to transmit microwave signals. The use of a fiber-optic microwave signal transmission line in the receiving path allows it to be installed in objects with increased electromagnetic activity (for example, a sea-based object). A multifunctional radar with advanced waves can be used to detect various moving and stationary targets in air and sea space, as well as on the Earth’s surface. Studies have shown that the dynamic range of the developed FOCL is 80 dBm. This result is not worse than that of a coaxial cable. The dependence of the tangential sensitivity on the frequency of the received microwave signal was investigated. The results showed that when using the modernized fiber optic link, the sensitivity of the receiving path does not increase.
本文介绍了一种用于传输微波信号的光纤通信线路的改进方案。发展微波传输线作为教育机构的一项改进,考虑到运行中的站点的技术要求。改进接收路径是为了制造具有发射微波信号能力的多功能步行器。在接收路径中使用光纤微波信号传输线,可以将其安装在电磁活动增加的物体中(例如,海基物体)。具有先进波的多功能雷达可用于探测空中和海上空间以及地球表面的各种移动和静止目标。研究表明,开发的FOCL的动态范围为80 dBm。这个结果并不比同轴电缆差。研究了切向灵敏度与接收微波信号频率的关系。结果表明,采用现代化光纤链路时,接收路径的灵敏度没有增加。
{"title":"Optimization of designs for fiber optic communication line","authors":"D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov","doi":"10.1145/3440749.3442664","DOIUrl":"https://doi.org/10.1145/3440749.3442664","url":null,"abstract":"The article describes a modification of fiber optic communication lines for transmitting microwave signals. Development of microwave transmission lines proposed as an improvement in an educational institution, taking into account the technical requirements for a station in operation. Improving the receiving path is to create a multifunctional walker with the ability to transmit microwave signals. The use of a fiber-optic microwave signal transmission line in the receiving path allows it to be installed in objects with increased electromagnetic activity (for example, a sea-based object). A multifunctional radar with advanced waves can be used to detect various moving and stationary targets in air and sea space, as well as on the Earth’s surface. Studies have shown that the dynamic range of the developed FOCL is 80 dBm. This result is not worse than that of a coaxial cable. The dependence of the tangential sensitivity on the frequency of the received microwave signal was investigated. The results showed that when using the modernized fiber optic link, the sensitivity of the receiving path does not increase.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartGate system: Automating the detection and control of COVID-19 智能门系统:自动检测和控制COVID-19
Mashael M. Khayyat, Raafat M Munshi
The recent worldwide COVID-19 pandemic created the urgent need for innovative solutions to aid in early detection and control of this disease. This research begins by introducing the coronavirus strand and ends with the proposed SmartGate to detect the potential of the virus in patients without human intervention. This is to reduce the manual use of thermometers to measure temperature and to shift the detection to automation. Triz theory principles have been considered in the process of the innovative proposed design of the SmartGate. Implementing the proposed SmartGate in public places such as shopping malls, gardens, schools, supermarkets, etc. will avoid the need for manual measurement and thus reduce exposure to infected people. Furthermore, it aids in identifying infected people in order to guide them to visit the assigned hospitals and prevent the spread of infection. The relational COVID-19 tracking database (RCTD) of possibly infected people can be shared with assigned (to treat COVID-19 patients) local hospital module for further appropriate actions. In this paper, several available technologies are integrated to build an innovative solution that will help the world to live safer and provide a better future for the coming generations.
最近的COVID-19全球大流行迫切需要创新解决方案,以帮助早期发现和控制这一疾病。这项研究从引入冠状病毒链开始,以提出的SmartGate结束,在没有人为干预的情况下检测患者体内病毒的可能性。这是为了减少人工使用温度计来测量温度,并将检测转移到自动化。在智能门的创新设计过程中考虑了Triz理论原理。在商场、花园、学校、超市等公共场所实施“智能门”,将避免人工测量的需要,从而减少与感染者的接触。此外,它有助于识别受感染的人,以便指导他们到指定的医院就诊,防止感染的传播。可能感染者的相关COVID-19跟踪数据库(RCTD)可以与指定的(治疗COVID-19患者)当地医院模块共享,以便采取进一步的适当行动。在本文中,几种可用的技术被整合,以建立一个创新的解决方案,将有助于世界生活更安全,并为子孙后代提供一个更美好的未来。
{"title":"SmartGate system: Automating the detection and control of COVID-19","authors":"Mashael M. Khayyat, Raafat M Munshi","doi":"10.1145/3440749.3442602","DOIUrl":"https://doi.org/10.1145/3440749.3442602","url":null,"abstract":"The recent worldwide COVID-19 pandemic created the urgent need for innovative solutions to aid in early detection and control of this disease. This research begins by introducing the coronavirus strand and ends with the proposed SmartGate to detect the potential of the virus in patients without human intervention. This is to reduce the manual use of thermometers to measure temperature and to shift the detection to automation. Triz theory principles have been considered in the process of the innovative proposed design of the SmartGate. Implementing the proposed SmartGate in public places such as shopping malls, gardens, schools, supermarkets, etc. will avoid the need for manual measurement and thus reduce exposure to infected people. Furthermore, it aids in identifying infected people in order to guide them to visit the assigned hospitals and prevent the spread of infection. The relational COVID-19 tracking database (RCTD) of possibly infected people can be shared with assigned (to treat COVID-19 patients) local hospital module for further appropriate actions. In this paper, several available technologies are integrated to build an innovative solution that will help the world to live safer and provide a better future for the coming generations.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wireless Access Architecture: The Next 20+ Years 无线接入架构:未来20多年
H. Yanikomeroglu
The very fundamental principles of digital and wireless communications reveal that the provision of ubiquitous super-connectivity in the global scale – i.e., beyond indoors, dense downtown or campus-type areas – is infeasible with the legacy terrestrial network architecture as this would require prohibitively expensive gross over-provisioning. The problem will only exacerbate with even more demanding use-cases of 2030s such as UAVs requiring connectivity (ex: delivery drones), thus the 3D super-connectivity. The roots of today’s wireless access architecture (the terrestrial 4G & 5G cellular network) go back to 1940s. The access architecture has evolved substantially over the decades. However, rapid developments in a number of domains outside telecommunications, including those in aerospace and satellite industries as well as in artificial intelligence, will likely result in a disruptive transformation in the wireless access architecture in the next 20+ years. In this talk, an ultra-agile, dynamic, distributed, and partly-autonomous vertical heterogeneous network (VHetNet) architecture with very low earth orbit satellites (VLEOs), high-altitude platform station (HAPS) systems, and UAV-BSs (UxNB in 3GPP terminology) for almost-ubiquitous super-connectivity will be presented. In the envisioned VHetNet architecture, the HAPS systems constitute arguably the most promising tier. For more information on HAPS systems, please refer to the below papers under review: [5],[1],[4],[2],[3].
数字和无线通信的基本原理表明,在全球范围内提供无处不在的超级连接——即,超越室内、密集的市中心或校园类型的区域——对于传统的地面网络架构来说是不可实现的,因为这将需要非常昂贵的总超额供应。这个问题只会随着2030年代更苛刻的用例而加剧,比如需要连接的无人机(例如:送货无人机),因此需要3D超级连接。当今无线接入架构(地面4G和5G蜂窝网络)的根源可以追溯到20世纪40年代。在过去的几十年里,访问体系结构发生了很大的变化。然而,在电信以外的许多领域,包括航空航天和卫星工业以及人工智能领域的快速发展,可能会在未来20多年里导致无线接入架构的颠覆性变革。在本次演讲中,将介绍一种超敏捷、动态、分布式和部分自主的垂直异构网络(VHetNet)架构,该架构包括极低地球轨道卫星(VLEOs)、高空平台站(HAPS)系统和无人机- bss (3GPP术语中的UxNB),用于几乎无处不在的超级连接。在设想的VHetNet体系结构中,HAPS系统可以说是最有前途的一层。有关HAPS系统的更多信息,请参阅以下正在审查的论文:[5],[1],[4],[2],[3]。
{"title":"Wireless Access Architecture: The Next 20+ Years","authors":"H. Yanikomeroglu","doi":"10.1145/3440749.3442647","DOIUrl":"https://doi.org/10.1145/3440749.3442647","url":null,"abstract":"The very fundamental principles of digital and wireless communications reveal that the provision of ubiquitous super-connectivity in the global scale – i.e., beyond indoors, dense downtown or campus-type areas – is infeasible with the legacy terrestrial network architecture as this would require prohibitively expensive gross over-provisioning. The problem will only exacerbate with even more demanding use-cases of 2030s such as UAVs requiring connectivity (ex: delivery drones), thus the 3D super-connectivity. The roots of today’s wireless access architecture (the terrestrial 4G & 5G cellular network) go back to 1940s. The access architecture has evolved substantially over the decades. However, rapid developments in a number of domains outside telecommunications, including those in aerospace and satellite industries as well as in artificial intelligence, will likely result in a disruptive transformation in the wireless access architecture in the next 20+ years. In this talk, an ultra-agile, dynamic, distributed, and partly-autonomous vertical heterogeneous network (VHetNet) architecture with very low earth orbit satellites (VLEOs), high-altitude platform station (HAPS) systems, and UAV-BSs (UxNB in 3GPP terminology) for almost-ubiquitous super-connectivity will be presented. In the envisioned VHetNet architecture, the HAPS systems constitute arguably the most promising tier. For more information on HAPS systems, please refer to the below papers under review: [5],[1],[4],[2],[3].","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1