首页 > 最新文献

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook 基于SNS数据的个人兴趣模式分析研究——以Facebook为例
Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim
The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.
全球SNS用户数量正在迅速增长,因为SNS是由智能手机设备执行的,用户可以以较低的成本克服时间和空间的障碍。这将证明SNS已经深入到许多人之间的交流中,相关数据也在不断增加。就像这样,随着用户的不断增加,SNS的数据量也在不断增加,专家们也在研究数据的可重用性。特别是,虽然利用SNS中存在的评论来提供个性化信息的研究很多,但由于SNS的特点——字符数(约150字),获取个人信息受到了限制。然而,由于SNS的特性,大多数由用户写入的数据仍然存在,连续存储的数据被认为是能够充分识别个人用户特征的数据。因此,在本文中,通过个人用户及其朋友的评论来识别个人的兴趣领域,并分析每个兴趣领域的模式,最后将分析的数据用于未来的研究。
{"title":"Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook","authors":"Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim","doi":"10.1109/IMIS.2014.94","DOIUrl":"https://doi.org/10.1109/IMIS.2014.94","url":null,"abstract":"The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security
Sen-Tarng Lai, Fang-Yie Leu, W. Chu
In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.
在信息网络时代,电子商务是一种重要的商业交易行为系统。然而,网络入侵、恶意用户、病毒攻击、系统安全漏洞等问题持续威胁着电子商务的运行,使得电子商务的安全遭遇严峻考验。如何提高电子商务的安全性已成为一个值得进一步探讨的课题。结合安全需求、日常安全测试和安全事件检测流程,提出了多层安全防护方案。MLSPS的第一层是定义良好的安全需求。MLSPS的第二层是常规的安全测试程序。MLSPS的第三层是安全事件检测过程。应用数据记录和事件检测技术,及时发现异常安全事件。MLSPS可以增强电子商务安全性,有效降低电子商务个人数据安全风险。
{"title":"A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/IMIS.2014.73","DOIUrl":"https://doi.org/10.1109/IMIS.2014.73","url":null,"abstract":"In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of Application Traffic Management Approaches: Challenges and Potential Extensions 应用程序流量管理方法概述:挑战和潜在扩展
I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert
The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.
Internet已经看到了支持覆盖应用程序和服务的有力举措,这些应用程序和服务要求在底层异构网络中以可扩展、有弹性和节能的方式进行一致和集成的控制。为此,网络管理和覆盖服务功能的更紧密集成可以导致操作和管理的跨层优化,这是一种很有前途的方法,可以为所有参与者提供操作角度的巨大业务潜力。因此,本文的目的是介绍和讨论云计算和软件定义网络等将在未来互联网中发挥核心作用的新范式的影响,讨论主要流量趋势,并确定由于采用和运营新应用程序而面临的关键挑战。本文将主要挑战转化为未来互联网流量管理机制的需求,概述了现有机制,根据上述需求对其进行了评估,并定性地估计了预期的优化潜力和收益,并为其在未来互联网充满挑战的环境下的潜在扩展和利用提供了提示。
{"title":"An Overview of Application Traffic Management Approaches: Challenges and Potential Extensions","authors":"I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert","doi":"10.1109/IMIS.2014.7","DOIUrl":"https://doi.org/10.1109/IMIS.2014.7","url":null,"abstract":"The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Implementing Web-Based Adaptive Application Mobility Using Web Real-Time Communications 利用Web实时通信实现基于Web的自适应应用程序移动性
Dan Johansson, Mikael Holmgren
Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.
应用程序迁移是服务迁移的一个子类,定义为在应用程序执行期间在不同主机之间迁移应用程序的过程。在本文中,我们使用WebRTC框架,提出了一种基于web的自适应应用程序移动性的分散架构。据我们所知,我们的建议是该地区的第一个。我们的目的是展示基于web的自适应应用程序移动性的分散系统的可行性,并将WebRTC作为该想法的强大促进者。
{"title":"Towards Implementing Web-Based Adaptive Application Mobility Using Web Real-Time Communications","authors":"Dan Johansson, Mikael Holmgren","doi":"10.1109/IMIS.2014.60","DOIUrl":"https://doi.org/10.1109/IMIS.2014.60","url":null,"abstract":"Application mobility is a subcategory of service mobility, being defined as the process of migrating applications between different hosts during application execution. In this paper we present a decentralized architecture for web-based adaptive application mobility, using the WebRTC framework. To the best of our knowledge, our proposal is the first of its kind within the area. It is our purpose to show the feasibility of a decentralized system for web-based adaptive application mobility, and present WebRTC as a strong facilitator of that idea.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode 基于QoS的译码转发协作通信系统性能评价
J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen
This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.
本文研究了译码转发模式下的协作通信系统。该方案包括1个源站、M个中继站和N个目的地。为了保证服务质量(QoS),考虑了最坏情况下源站和目的站之间的个体容量。然而,对于整个系统而言,最大吞吐量的逼近是本工作的主要目的。因此,选择中继站进行信号传输是实现系统最佳性能的重要方案。基于穷举搜索法的最优选择方案易于实现,但计算复杂度较高。为了降低计算复杂度,提出了一种将贪心算法应用于中继选择方案的解决方案。针对通信系统的不同情况,给出了该方法与穷举搜索方法的性能评价结果进行比较。结果表明,该算法可以为最优解提供一种求解方法。在中继站数量远大于目的站数量的情况下,采用本方案效果较好。
{"title":"QoS Based Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode","authors":"J. Wen, Jheng-Sian Li, Cheng-Ying Yang, Yi-Shan Lin, Hsing-Chung Chen","doi":"10.1109/IMIS.2014.68","DOIUrl":"https://doi.org/10.1109/IMIS.2014.68","url":null,"abstract":"This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major purpose in this work. Hence, to select the relay stations for signal transmission could be the important scheme to achieve the best system performance. Based on the exhaustive search method, easily to realize, the optimal selection scheme can be found with a highly complicated calculation. In order to reduce the computational complexity, a solution with a greedy algorithm applied to the relay selection scheme is proposed. With different situations of the communication systems, the performances evaluations obtained by both the proposed method and the exhaustive search method are given for comparison. It shows the proposed algorithm could provide a solution approaches to the optimal one. It is better to apply the proposed scheme when the number of relay stations is much larger than that of destination stations.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV Autopilot 基于CUDA的基于视觉的无人机自动驾驶仪快速多线检测与跟踪
V. Tyan, Doohyun Kim, Young-guk Ha, Dongwoon Jeon
This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.
本文介绍了一种利用图形处理器(gpu)实现快速多线跟踪的算法。视频流包含了大量的信息,可供车辆自行操作。这是一种需要对自主飞行进行实时分析的大数据。然而,对于小型无人机上的计算单元来说,图像处理是一项繁重的工作。提出了一种可行的基于视觉的智能汽车图像处理系统。提出的多线跟踪技术有霍夫变换、卡尔曼滤波和gpu聚类。这些方法相结合的优点是在跟踪过程中通过预测下一状态来减少计算量,对噪声和线路位置的快速变化具有较强的鲁棒性。霍夫变换用于提取线条,卡尔曼滤波用于预测未来状态。霍夫变换易于实现,对噪声具有鲁棒性,但随着输入图像分辨率的提高或对霍夫空间精度要求的提高,霍夫变换对资源的消耗呈指数级增长。克服这个速度问题的有效方法之一是利用GPU的大规模并行计算能力进行图像处理。性能评估表明,算法在速度和精度之间取得了令人满意的平衡。相对于CPU上的算法实现由于计算资源的限制而无法足够快地跟踪和检测行,在速度上的改进使算法保持了准确的跟踪。实验和性能分析验证了算法与用户自制的多线。
{"title":"Fast Multi-line Detection and Tracking with CUDA for Vision-Based UAV Autopilot","authors":"V. Tyan, Doohyun Kim, Young-guk Ha, Dongwoon Jeon","doi":"10.1109/IMIS.2014.14","DOIUrl":"https://doi.org/10.1109/IMIS.2014.14","url":null,"abstract":"This paper introduces an algorithm for fast multi line tracking utilizing the GPUs (Graphic Processing Units). Video stream contains huge of information for manipulating the vehicle by itself. It is a sort of big data to analyze properly in real-time for autonomous flight. However, image processing is heavy work for computing unit which is equipped on small unmanned aerial vehicle. This paper presents feasible image processing system for vision based intelligent vehicle. The proposed techniques for multi-line tracking are Hough transform, Kalman filter and clustering with GPUs. Integration of these methods has advantages to reduce the computational load by prediction of next state during the tracking and being robust for noise and rapid change of line's position. Hough transform used for extraction of lines while the Kalman filter predicts future state. Hough transform is easy to implement and robust for noise, on the other hand, the resource consumption raises exponentially as the resolution of input image or when we need high precision in Hough space. One of the efficient ways to overcome this speed problem is performing image processing with GPU's massive parallel calculation capabilities. Performance evaluations show promising results with acceptable trade-off between speed and accuracy of algorithm. Improving in speed algorithm keeps accurate tracking in comparison with algorithm implementation on CPU that is unable to track and detect lines fast enough due to computation resource limitations. Experiments and performance analysis of algorithm verified with user-made multi lines.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Developing Useful Mobile Applications in Cross-Media Platforms 在跨媒体平台上开发有用的移动应用程序
C. Hermansson, Mikael Söderström, Dan Johansson
As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called "The Time Machine", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.
随着应用市场的扩大,开发者也面临着新的挑战。创建有用的应用程序对于实现广泛和内聚的使用非常重要。本文介绍了一款名为“时光机”的移动应用程序,它可以提供有关城镇环境的位置相关信息。该应用程序通过专家评估和15名参与用户的现场观察进行用户评估来评估,衡量应用程序的可用性水平。结果用于讨论如何开发有用的移动应用程序的指导方针。了解用户行为、明确的应用程序目的、可理解的界面和跨平台功能都是开发人员需要考虑的重要方面。
{"title":"Developing Useful Mobile Applications in Cross-Media Platforms","authors":"C. Hermansson, Mikael Söderström, Dan Johansson","doi":"10.1109/IMIS.2014.59","DOIUrl":"https://doi.org/10.1109/IMIS.2014.59","url":null,"abstract":"As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called \"The Time Machine\", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks 基于网格的无线传感器网络双路径数据聚合方案
Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh
In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.
在本文中,我们提出了一种基于网格的无线传感器网络(WSNs)的双路径数据聚合方案(DPBDAS)。我们通过将整个传感器场均匀地划分为细胞网格来构建网格基础设施。将传感器节点随机分为A类和B类。将网格中A类和B类传感器节点进一步组织为A组和B组。每个细胞对于每种类型都有一个头部。我们通过分别连接每一组的每个细胞头来构建双路径。每一组在自己的路径上都有一个从蜂窝头中随机选择的领导者,负责直接将数据传输到基站(BS)。对于每一轮的数据收集,每个cell head将自己的数据与从cell中其他相同类型的节点接收的数据聚合在一起,然后向自己的leader传输到相邻的cell head。因此,所有收集到的数据几乎均匀地通过双路径传输,因此每个传感器消耗的能量大致均匀。并且在自己路径上的细胞头中随机选择leader,使得每个细胞头的能量负荷是均匀的。这极大地提高了无线传感器网络的使用寿命。仿真结果表明,DPBDAS延长了传感器节点的生存期,从而延长了整个网络的生存期。
{"title":"A Dual-Path-Based Data Aggregation Scheme for Grid-Based Wireless Sensor Networks","authors":"Neng-Chung Wang, Y. Chiang, Young-Long Chen, Chih-Hung Hsieh","doi":"10.1109/IMIS.2014.69","DOIUrl":"https://doi.org/10.1109/IMIS.2014.69","url":null,"abstract":"In this paper, we propose a dual-path-based data aggregation scheme (DPBDAS) for grid-based wireless sensor networks (WSNs). We build a grid infrastructure by equally partitioning the whole sensor field into a grid of cells. The sensor nodes are randomly classified as type A and type B. All sensor nodes of type A and type B in the grid are further organized as group A and group B, respectively. Each cell has a head for each type. We construct dual paths by linking each cell head of each group, respectively. Each group has a leader randomly chosen from cell heads on its own path, responsible for directly transmitting the data to the base station (BS). For data gathering in each round, each cell head aggregates its own data with the data received from the other nodes of the same type in the cell and then transmits to the neighboring cell head toward its own leader. As a result, all gathered data are almost equally transmitted via dual paths so that the energy consumed by each sensor is approximately even. Besides, the group leader is randomly chosen among cell heads of its own path such that the energy load of each cell head is uniform. It greatly benefits the lifetime of the WSN. Simulation results show that the proposed DPBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Media Coverage and Stock Return an Impulse Response Analysis 媒体报道与股票收益的脉冲响应分析
Kuei-Yuan Wang, Chien-Kuo Chen, Hsiao-Chi Wei
This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.
本研究采用向量自回归方法研究脉冲响应效应。我们的实证结果表明,媒体报道的数量和信号对股票收益有影响。然而,企业发布假新闻可能是为了达到某种目的。因此,本研究建议投资者在进行投资决策时也应更加关注媒体报道的真实性。
{"title":"Media Coverage and Stock Return an Impulse Response Analysis","authors":"Kuei-Yuan Wang, Chien-Kuo Chen, Hsiao-Chi Wei","doi":"10.1109/IMIS.2014.83","DOIUrl":"https://doi.org/10.1109/IMIS.2014.83","url":null,"abstract":"This study utilized Vector Auto-regression method to investigate the impulse response effect. Our empirical results showed that the amount and signal of media coverage have impact on stock return. However, enterprises might release the fake news to attain some purposes. Hence, this study suggests that investors also should pay more attention to the truth of the media coverage while making the investment decisions.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks 在IEEE 802.15.4网络上扩展可扩展认证协议
M. P. Pawlowski, A. Jara, M. Ogorzałek
Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.
互联网进入我们的物质世界,使其无处不在。这种演变也在隐私和安全等问题上提出了挑战。因此,这项工作的重点是现有身份验证协议的集成和轻量级改编,这些协议也能够提供授权和访问控制功能。特别地,这项工作的重点是可扩展身份验证协议(Extensible Authentication Protocol, EAP)。EAP是无线(802.11)和有线(802.3)等局域网中广泛使用的接入控制协议。这项工作将EAP帧集成到IEEE 802.15.4帧中,证明了EAP协议及其一些机制在受限设备(如填充物联网网络的设备)中是可行的。
{"title":"Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks","authors":"M. P. Pawlowski, A. Jara, M. Ogorzałek","doi":"10.1109/IMIS.2014.93","DOIUrl":"https://doi.org/10.1109/IMIS.2014.93","url":null,"abstract":"Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible Authentication Protocol (EAP). EAP is widely used protocol for access control in local area networks such Wireless (802.11) and wired (802.3). This work presents an integration of the EAP frame into IEEE 802.15.4 frames, demonstrating that EAP protocol and some of its mechanisms are feasible to be applied in constrained devices, such as the devices that are populating the IoT networks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1