首页 > 最新文献

2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Video Predictive Object Detector 视频预测目标检测器
Mohammed Gasmallah, F. Zulkernine
With the rise of video datasets and self-driving cars, many industries seek a way to perform quick object detection on video, as well as perform predictive tracking on these objects. We propose a predictive video object detector (POD net) integrating the You Only Look Once v2 (YOLOv2) framework with the convolutional 2-dimensional (2D) Long Short Term Memory (LSTM) model proposed by Shi et al. Our POD net performs object detection using YOLOv2 and object prediction using the LSTM model in an iterative manner with a view to improve object detection in video streams via object prediction. In this study we present two different approaches that we implemented to predict objects in subsequent video clips. The first approach, PODv1, applies a post-temporal pattern matching mechanism wherein the YOLOv2 detector is used to detect objects in multiple images and the LSTM layer is used to perform temporal feature mapping across the output tensors of the detectors. The second approach, PODv2, provides better results by applying the temporal feature mapping first across the images and then feeding the output into the YOLOv2 detector which is wrapped using a Time Distributed layer. We tested POD net on the Multi-Object Tracking (MOT) 2017 dataset and the network was able to perform predictive object detection and tracking, demonstrating that the LSTM layer is useful for a variety of video analysis problems.
随着视频数据集和自动驾驶汽车的兴起,许多行业都在寻找一种方法来对视频进行快速目标检测,并对这些目标进行预测跟踪。我们提出了一种预测视频对象检测器(POD net),将You Only Look Once v2 (YOLOv2)框架与Shi等人提出的卷积二维(2D)长短期记忆(LSTM)模型集成在一起。我们的POD网络使用YOLOv2进行对象检测,并使用LSTM模型以迭代的方式进行对象预测,以期通过对象预测来改进视频流中的对象检测。在这项研究中,我们提出了两种不同的方法来预测后续视频片段中的物体。第一种方法是PODv1,它应用了一种后时间模式匹配机制,其中YOLOv2检测器用于检测多个图像中的对象,LSTM层用于跨检测器的输出张量执行时间特征映射。第二种方法是PODv2,它通过首先在图像上应用时间特征映射,然后将输出输入使用时间分布层包装的YOLOv2检测器,从而提供更好的结果。我们在多目标跟踪(MOT) 2017数据集上对POD网络进行了测试,该网络能够执行预测目标检测和跟踪,这表明LSTM层对于各种视频分析问题都很有用。
{"title":"Video Predictive Object Detector","authors":"Mohammed Gasmallah, F. Zulkernine","doi":"10.1109/IEMCON.2018.8615054","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615054","url":null,"abstract":"With the rise of video datasets and self-driving cars, many industries seek a way to perform quick object detection on video, as well as perform predictive tracking on these objects. We propose a predictive video object detector (POD net) integrating the You Only Look Once v2 (YOLOv2) framework with the convolutional 2-dimensional (2D) Long Short Term Memory (LSTM) model proposed by Shi et al. Our POD net performs object detection using YOLOv2 and object prediction using the LSTM model in an iterative manner with a view to improve object detection in video streams via object prediction. In this study we present two different approaches that we implemented to predict objects in subsequent video clips. The first approach, PODv1, applies a post-temporal pattern matching mechanism wherein the YOLOv2 detector is used to detect objects in multiple images and the LSTM layer is used to perform temporal feature mapping across the output tensors of the detectors. The second approach, PODv2, provides better results by applying the temporal feature mapping first across the images and then feeding the output into the YOLOv2 detector which is wrapped using a Time Distributed layer. We tested POD net on the Multi-Object Tracking (MOT) 2017 dataset and the network was able to perform predictive object detection and tracking, demonstrating that the LSTM layer is useful for a variety of video analysis problems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131647412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Compact Hybrid Fractal Antenna using Koch and Minkowski Curves 基于Koch和Minkowski曲线的紧凑混合分形天线
Inkwinder Singh Bangi, J. S. Sivia
A small size multiband antenna immensely beneficial for wireless devices. Hybrid fractal technique gives an opportunity to design multiband and less weight antenna. In this article, two types of antennas are designed. Koch curved fractal antenna is superimposed on minkowski curve and minkowski curve is superimposed on Koch curve. Both proposed antennas are reciprocal to each other. FR4 material is used as a substrate and microstrip line feed is used to energized patch. The comparisons between proposed fractal antennas are conducted with single fractal geometry antenna and also analysis radiation pattern, gain, current distribution, VSWR and defected ground effects on return loss. The simulated and optimized results are observed on HFSS simulator. Thanks to KMHFA, huge impedance bandwidth is achieved and due to MKHFA, multiband behavior hybrid fractal antenna is designed. The maximum gain of MKHFA antenna is 6dB and maximum bandwidth of KMHFA is 1900MHz. Dimensions of KMHFA is 30x12mm2 and MKHFA is 28x19mm2. Thus, it is found that both proposed antennas are beneficial for different applications such as Wi-Fi (5GHz and 5.5GHz), WLAN(5.725-5.825GHz), satellite communication downlink (3.7-4.2GHz), satellite communication uplink (5.6-6.4GHz), GSMI800(1.7-1.8GHz), GSMI900(1.8-1.9GHz), 3G-WCDMA (1900MHz uplink-2100MHz downlink), Airborne and Naval Radars (8.6-9.3GHz), Amateur Radio (10.2-10.5GHz). Indian cellular SIM of Jio 4G operating at Band-3 with uplink 1.710-1.785GHz and downlink 1.805-1.880GHz frequencies which usher in revolution (provides digital voice calling, high speed internet and so on) in cellular mobile communication. In future, these types of hybrid fractal antennas are used for 5G which operates over 3000MHz.
一个小尺寸的多波段天线,对无线设备非常有益。混合分形技术为设计多频带轻重量天线提供了机会。本文设计了两种类型的天线。科赫曲线分形天线叠加在闵可夫斯基曲线上,闵可夫斯基曲线叠加在科赫曲线上。两种提议的天线都是相互的。采用FR4材料作为衬底,微带线馈电用于通电贴片。将所提出的分形天线与单个分形天线进行了比较,并分析了辐射方向图、增益、电流分布、驻波比和缺陷地效应对回波损耗的影响。在HFSS模拟器上观察了仿真和优化的结果。利用KMHFA实现了巨大的阻抗带宽,设计了多频带行为混合分形天线。该天线的最大增益为6dB,最大带宽为1900MHz。KMHFA尺寸为30x12mm2, MKHFA尺寸为28x19mm2。因此,我们发现这两种天线都适用于不同的应用,如Wi-Fi (5GHz和5.5GHz)、WLAN(5.725-5.825GHz)、卫星通信下行链路(3.7-4.2GHz)、卫星通信上行链路(5.6-6.4GHz)、GSMI800(1.7-1.8GHz)、GSMI900(1.8-1.9GHz)、3G-WCDMA (1900MHz上行链路- 2100mhz下行链路)、机载和海军雷达(8.6-9.3GHz)、业余无线电(10.2- 10.1 ghz)。Jio 4G的印度蜂窝SIM卡,运行频带3,上行频率1.710-1.785GHz,下行频率1.805-1.880GHz,开启了蜂窝移动通信的革命(提供数字语音通话、高速互联网等)。未来,这些类型的混合分形天线将用于3000MHz以上的5G。
{"title":"A Compact Hybrid Fractal Antenna using Koch and Minkowski Curves","authors":"Inkwinder Singh Bangi, J. S. Sivia","doi":"10.1109/IEMCON.2018.8614773","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614773","url":null,"abstract":"A small size multiband antenna immensely beneficial for wireless devices. Hybrid fractal technique gives an opportunity to design multiband and less weight antenna. In this article, two types of antennas are designed. Koch curved fractal antenna is superimposed on minkowski curve and minkowski curve is superimposed on Koch curve. Both proposed antennas are reciprocal to each other. FR4 material is used as a substrate and microstrip line feed is used to energized patch. The comparisons between proposed fractal antennas are conducted with single fractal geometry antenna and also analysis radiation pattern, gain, current distribution, VSWR and defected ground effects on return loss. The simulated and optimized results are observed on HFSS simulator. Thanks to KMHFA, huge impedance bandwidth is achieved and due to MKHFA, multiband behavior hybrid fractal antenna is designed. The maximum gain of MKHFA antenna is 6dB and maximum bandwidth of KMHFA is 1900MHz. Dimensions of KMHFA is 30x12mm2 and MKHFA is 28x19mm2. Thus, it is found that both proposed antennas are beneficial for different applications such as Wi-Fi (5GHz and 5.5GHz), WLAN(5.725-5.825GHz), satellite communication downlink (3.7-4.2GHz), satellite communication uplink (5.6-6.4GHz), GSMI800(1.7-1.8GHz), GSMI900(1.8-1.9GHz), 3G-WCDMA (1900MHz uplink-2100MHz downlink), Airborne and Naval Radars (8.6-9.3GHz), Amateur Radio (10.2-10.5GHz). Indian cellular SIM of Jio 4G operating at Band-3 with uplink 1.710-1.785GHz and downlink 1.805-1.880GHz frequencies which usher in revolution (provides digital voice calling, high speed internet and so on) in cellular mobile communication. In future, these types of hybrid fractal antennas are used for 5G which operates over 3000MHz.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Extracting Meaningful Correlations among Heterogeneous Datasets for Medical Question Answering with Domain Knowledge 基于领域知识的异构数据集间有意义相关性提取
Jiayi Feng, Runtong Zhang, Donghua Chen, Wei Zhang
A question answering system (QAS) merely built on a predefined medical knowledge base experiences difficulties in providing suitable answers for expert users to make medical and healthcare decisions. This study proposes a comprehensive method of extracting meaningful correlations among heterogeneous datasets using a semantic analysis with domain knowledge and accordingly provide flexible answers to decision support (ATDS) in a medical QAS (MQAS). First, the potential value of the heterogeneous datasets from medical information systems is examined for building ATDS. Second, an extraction algorithm for constructing a term relational network from the questions is proposed. Then, a correlation construction method for integrating the datasets into the MQAS using domain knowledge is proposed. Finally, a novel algorithm for constructing ATDS on the basis of questions and datasets is established. Experimental results indicate that utilizing external medical domain knowledge in analyzing correlations among the datasets outperforms existing algorithms that only involved with the datasets.
仅建立在预定义的医学知识库上的问答系统(QAS)在为专家用户提供适当的答案以做出医疗和保健决策方面遇到困难。本研究提出了一种综合的方法,利用领域知识的语义分析提取异构数据集之间有意义的相关性,从而为医疗QAS (MQAS)中的决策支持(ATDS)提供灵活的答案。首先,从医疗信息系统异构数据集的潜在价值进行了检查,以建立ATDS。其次,提出了一种从问题中提取术语关系网络的算法。然后,提出了一种利用领域知识将数据集集成到MQAS中的关联构建方法。最后,提出了一种基于问题和数据集构建ATDS的新算法。实验结果表明,利用外部医学领域知识分析数据集之间的相关性优于现有的仅涉及数据集的算法。
{"title":"Extracting Meaningful Correlations among Heterogeneous Datasets for Medical Question Answering with Domain Knowledge","authors":"Jiayi Feng, Runtong Zhang, Donghua Chen, Wei Zhang","doi":"10.1109/IEMCON.2018.8615045","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615045","url":null,"abstract":"A question answering system (QAS) merely built on a predefined medical knowledge base experiences difficulties in providing suitable answers for expert users to make medical and healthcare decisions. This study proposes a comprehensive method of extracting meaningful correlations among heterogeneous datasets using a semantic analysis with domain knowledge and accordingly provide flexible answers to decision support (ATDS) in a medical QAS (MQAS). First, the potential value of the heterogeneous datasets from medical information systems is examined for building ATDS. Second, an extraction algorithm for constructing a term relational network from the questions is proposed. Then, a correlation construction method for integrating the datasets into the MQAS using domain knowledge is proposed. Finally, a novel algorithm for constructing ATDS on the basis of questions and datasets is established. Experimental results indicate that utilizing external medical domain knowledge in analyzing correlations among the datasets outperforms existing algorithms that only involved with the datasets.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Mobile Malware Analysis, Detection Techniques and Tool 移动恶意软件分析、检测技术和工具综述
Nana Kwarne Gyamfi, E. Owusu
The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.
智能手机使用的迅速增加导致了移动攻击者的增加。在大多数情况下,欺骗性的应用程序被恶意内容感染,从而对硬件和软件造成损害。这些恶意程序或恶意软件通常旨在破坏设备或从设备收集信息。为了减少这些问题,提出了各种技术。本文试图分析最流行和最新的技术,并建议哪一种更好。
{"title":"Survey of Mobile Malware Analysis, Detection Techniques and Tool","authors":"Nana Kwarne Gyamfi, E. Owusu","doi":"10.1109/IEMCON.2018.8614895","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614895","url":null,"abstract":"The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Small Java Application for Learning Blockchain 一个学习区块链的小Java应用程序
Xing Liu
This paper introduces a small Java application named ChainTutor for learning basic Blockchain concepts. Although the term Blockchain is widely known and Blockchain technologies are finding applications in various areas such as banking, health care and Internet of Things, some concepts of Blockchain are not easy for beginners to understand. Fully text-based tutorials are often difficult to follow. General picture of Blockchain operations gets lost in lengthy textual descriptions. With the Java application introduced in this paper, users can experiment with key Blockchain concepts through a graphical user interface. They can generate keys, hashes, transactions, blocks and wallets. They can see the low level details of a blockchain such as encryption keys and hashes. They can see how mining works and how blocks are added to a blockchain. Parameters of a blockchain can also be varied in order to observe their impact on performance or even to make a blockchain invalid. The Java application is intended to be used in classroom environment by instructors when they teach introductory Blockchain courses.
本文介绍了一个名为ChainTutor的小型Java应用程序,用于学习区块链的基本概念。尽管区块链这个术语已经广为人知,区块链技术正在银行、医疗保健和物联网等各个领域得到应用,但区块链的一些概念对于初学者来说并不容易理解。完全基于文本的教程通常很难理解。区块链操作的总体情况在冗长的文本描述中丢失了。通过本文介绍的Java应用程序,用户可以通过图形用户界面尝试区块链的关键概念。它们可以生成密钥、哈希、交易、区块和钱包。他们可以看到区块链的底层细节,比如加密密钥和哈希值。他们可以看到采矿是如何工作的,以及区块是如何添加到区块链中的。区块链的参数也可以改变,以观察它们对性能的影响,甚至使区块链失效。该Java应用程序旨在供教师在讲授区块链入门课程时在课堂环境中使用。
{"title":"A Small Java Application for Learning Blockchain","authors":"Xing Liu","doi":"10.1109/IEMCON.2018.8614961","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614961","url":null,"abstract":"This paper introduces a small Java application named ChainTutor for learning basic Blockchain concepts. Although the term Blockchain is widely known and Blockchain technologies are finding applications in various areas such as banking, health care and Internet of Things, some concepts of Blockchain are not easy for beginners to understand. Fully text-based tutorials are often difficult to follow. General picture of Blockchain operations gets lost in lengthy textual descriptions. With the Java application introduced in this paper, users can experiment with key Blockchain concepts through a graphical user interface. They can generate keys, hashes, transactions, blocks and wallets. They can see the low level details of a blockchain such as encryption keys and hashes. They can see how mining works and how blocks are added to a blockchain. Parameters of a blockchain can also be varied in order to observe their impact on performance or even to make a blockchain invalid. The Java application is intended to be used in classroom environment by instructors when they teach introductory Blockchain courses.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Construction of Equivalent Model of Patch Antenna Using Magnetic Dipole 利用磁偶极子构建贴片天线等效模型
H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Abel Ogunzbile, Richard I. Nneji
This paper proposes a fast and efficient technique for constructing an equivalent model of patch antenna for predicting its radiation pattern. The equivalent model of the antenna is constructed based on its radiation properties. First, the initial model of the antenna is developed and then the arrangement of the initial model is optimized using FEKO optimization tool. The electric field of the magnetic dipole is determined based on numerical Green function derivation. The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its radiation pattern. Only two design parameters needed to be optimized making it more computational efficient. The derived radiation pattern from the equivalent model is validated with that of the original antenna model on FEKO to evaluate its efficiency. The simulation results show that the proposed equivalent model based on a magnetic dipole is fast and efficient and do not require the antenna's detailed material information.
本文提出了一种快速有效地建立贴片天线等效模型以预测其辐射方向图的方法。根据天线的辐射特性,建立了天线的等效模型。首先建立天线的初始模型,然后利用FEKO优化工具对初始模型的布局进行优化。利用数值格林函数推导确定了磁偶极子的电场。利用磁偶极子建立基于辐射机理的贴片天线等效模型,预测其辐射方向图。只有两个设计参数需要优化,使其计算效率更高。在FEKO上对等效模型导出的辐射方向图与原天线模型的辐射方向图进行了验证,以评价其效率。仿真结果表明,基于磁偶极子的等效模型快速有效,且不需要天线的详细材料信息。
{"title":"Construction of Equivalent Model of Patch Antenna Using Magnetic Dipole","authors":"H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Abel Ogunzbile, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8614860","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614860","url":null,"abstract":"This paper proposes a fast and efficient technique for constructing an equivalent model of patch antenna for predicting its radiation pattern. The equivalent model of the antenna is constructed based on its radiation properties. First, the initial model of the antenna is developed and then the arrangement of the initial model is optimized using FEKO optimization tool. The electric field of the magnetic dipole is determined based on numerical Green function derivation. The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its radiation pattern. Only two design parameters needed to be optimized making it more computational efficient. The derived radiation pattern from the equivalent model is validated with that of the original antenna model on FEKO to evaluate its efficiency. The simulation results show that the proposed equivalent model based on a magnetic dipole is fast and efficient and do not require the antenna's detailed material information.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133039633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Spatio-Temporal Semantic Trajectory for Groups Identification 群体识别的时空语义轨迹挖掘
Yang Cao, Yunfei Si, Zhi Cai, Zhiming Ding
Group identification refers to discovering groups with similar behaviors or preferences. The daily trajectories record the activities of moving objects, which reflect their behaviors. These mobile data provide us with a new data analysis approach for groups identification. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit behaviors patterns. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient two-phase discovering stay regions method (TPD) from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels based on POI information and LDA topic model. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on geographic and semantic similarity factor. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.
群体认同是指发现具有相似行为或偏好的群体。日常轨迹记录了移动物体的活动,反映了它们的行为。这些移动数据为群体识别提供了一种新的数据分析方法。因此,我们可以通过挖掘隐式行为模式来识别基于相似轨迹模式的用户或组。在本文中,我们提出了一种新的轨迹语义计算方法来识别具有相似行为的群体。在该模型中,我们首先提出了一种快速高效的两阶段停留区域发现方法(TPD),然后基于POI信息和LDA主题模型,通过为停留区域添加语义标签来生成语义轨迹。为了测量语义轨迹之间的相似性,我们设计了一个基于地理和语义相似性因子的语义相似性度量模型。我们在Geolife项目的真实轨迹数据集上进行了大量的实验,实验结果表明我们提出的方法是有效的。
{"title":"Mining Spatio-Temporal Semantic Trajectory for Groups Identification","authors":"Yang Cao, Yunfei Si, Zhi Cai, Zhiming Ding","doi":"10.1109/IEMCON.2018.8614859","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614859","url":null,"abstract":"Group identification refers to discovering groups with similar behaviors or preferences. The daily trajectories record the activities of moving objects, which reflect their behaviors. These mobile data provide us with a new data analysis approach for groups identification. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit behaviors patterns. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient two-phase discovering stay regions method (TPD) from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels based on POI information and LDA topic model. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on geographic and semantic similarity factor. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tight Bounds on the Ratio of Network Diameter to Average Internode Distance 网络直径与平均节点间距离之比的紧边界
B. Parhami
The average internode distance for a network is fairly difficult to derive. There is often no closed-form formula for this parameter, leading to the need for simulation-based derivation methods. Network diameter, by contrast, is relatively easier to determine and, for many networks of common interest, we have closed-form formulas for it. The bounds established in this paper show that the two parameters are usually not totally independent and that, from a practical standpoint, network diameter can be used in lieu of average internode distance for the evaluation of message-routing algorithms and assessment or comparison of communication performance, particularly for symmetric networks that are prevalent in many parallel systems.
网络的平均节点间距离是相当难以求出的。该参数通常没有封闭形式的公式,因此需要基于仿真的推导方法。相比之下,网络直径相对容易确定,对于许多共同感兴趣的网络,我们有其封闭形式的公式。本文建立的界限表明,这两个参数通常不是完全独立的,从实际的角度来看,网络直径可以代替平均节点间距离来评估消息路由算法和评估或比较通信性能,特别是对于许多并行系统中普遍存在的对称网络。
{"title":"Tight Bounds on the Ratio of Network Diameter to Average Internode Distance","authors":"B. Parhami","doi":"10.1109/IEMCON.2018.8614796","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614796","url":null,"abstract":"The average internode distance for a network is fairly difficult to derive. There is often no closed-form formula for this parameter, leading to the need for simulation-based derivation methods. Network diameter, by contrast, is relatively easier to determine and, for many networks of common interest, we have closed-form formulas for it. The bounds established in this paper show that the two parameters are usually not totally independent and that, from a practical standpoint, network diameter can be used in lieu of average internode distance for the evaluation of message-routing algorithms and assessment or comparison of communication performance, particularly for symmetric networks that are prevalent in many parallel systems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115522988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment 私有云环境下的数据治理与数据安全提升
H. Monday, C. Ukwuoma, J. Li, David Agomuo, G. Nneji, Richard I. Nneji
this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility. As easy-to-use cloud services penetrate personal computing, users expect to enjoy the same conveniences they have at home in the office. This paper proposes a workable security technique in a cloud computing environment that delivers Infrastructure as a Service (SaaS), and deployed in a Private Cloud to protect data and information stored and shared from potential intrusion, threats, theft, virus, and agents. This paper proposes a system that focuses on data encryption and CAPTCHA methods as regards to security solutions. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the development, and implementation of the new system. Java play framework is adopted for the implementation of the web based system. The database structure is handled be employing MySQL. The system was implemented and tested using the various test cases which were successful. The test result shows that the proposed method is efficient in data confidentiality, integrity and availability.
本文提出了私有云环境下保障数据治理和增强数据安全的新体系。安全和隐私问题一直是云计算环境的主要缺点。安全性、可靠性和隐私性增强了用户访问文件的灵活性。随着易于使用的云服务渗透到个人计算中,用户希望在办公室享受与在家一样的便利。本文在云计算环境中提出了一种可行的安全技术,该技术提供基础设施即服务(SaaS),并部署在私有云中,以保护存储和共享的数据和信息免受潜在的入侵、威胁、盗窃、病毒和代理的侵害。本文提出了一个以数据加密和验证码方法为核心的安全解决方案。本文采用结构化系统分析与设计方法(SSADM)进行新系统的开发与实现。基于web的系统采用Java play框架实现。数据库结构采用MySQL处理。使用各种成功的测试用例对系统进行了实现和测试。测试结果表明,该方法在数据保密性、完整性和可用性方面是有效的。
{"title":"Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment","authors":"H. Monday, C. Ukwuoma, J. Li, David Agomuo, G. Nneji, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8615066","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615066","url":null,"abstract":"this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility. As easy-to-use cloud services penetrate personal computing, users expect to enjoy the same conveniences they have at home in the office. This paper proposes a workable security technique in a cloud computing environment that delivers Infrastructure as a Service (SaaS), and deployed in a Private Cloud to protect data and information stored and shared from potential intrusion, threats, theft, virus, and agents. This paper proposes a system that focuses on data encryption and CAPTCHA methods as regards to security solutions. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the development, and implementation of the new system. Java play framework is adopted for the implementation of the web based system. The database structure is handled be employing MySQL. The system was implemented and tested using the various test cases which were successful. The test result shows that the proposed method is efficient in data confidentiality, integrity and availability.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Inspiration and Expiration Mechanism of Lungs using Bond Graph 用键图建模肺的吸气和呼气机制
Adeela Arshad, A. Kashif, Muhammad Wasim, N. Mazhar, S. M. H. Zaidi
In modern technological era research in Mechanical Ventilators (MV) has drastically increased in designing model based MV treatment. In model based MV treatment mathematical model of lung is used to detect lungs diseases. In proposed work, inspiration and expiration mechanism of lungs has been modelled using Bond Graphs. Lung segments are assigned Hydraulic analogies using cylinders and accumulators. Upper airway from nostrils to trachea is modelled as single cylinder having resistance and associated compliance effect. Trachea to lower lung segment consists of 23 generations of airways. In this study, 4 generations are considered with their respective resistance and compliance, whereas resistance and compliance effect, of 5th to 17th generations are lumped. These are modelled with cylinders of decreasing size. Generation 17 to 23 are considered as respiratory zone that are modelled as accumulator having compliance and resistance associated. Grey-Box model estimation is used to estimate model parameters of 4 generations and controller is designed. 20 sim software is used to determine the relationship between Pressure (P) and Volume (V) and evaluate the model performance. Model is capable of predicting the true PV curves and thus leading to screening of lungs diseases. Model can be used for clinical trials with any existing MV.
在现代技术时代,机械呼吸机的研究在基于机械呼吸机处理的模型设计方面得到了极大的发展。在基于模型的MV治疗中,使用肺的数学模型来检测肺部疾病。在拟议的工作中,肺的吸气和呼气机制已经用键图建模。使用气缸和蓄能器分配肺段的液压类比。从鼻孔到气管的上呼吸道被建模为单柱,具有阻力和相关的顺应效应。气管至下肺段由23代气道组成。在本研究中,4代分别考虑抗性和依从性,而第5代至第17代的抗性和依从性效应被集中考虑。这些都是用尺寸递减的圆柱体来模拟的。第17 ~ 23代为呼吸区,建模为具有顺应性和阻力相关的蓄能器。采用灰盒模型估计方法对4代模型参数进行估计,并设计了控制器。使用20sim软件确定压力(P)和体积(V)之间的关系,并评估模型性能。模型能够预测真实的PV曲线,从而导致肺部疾病的筛查。模型可用于临床试验与任何现有的MV。
{"title":"Modelling Inspiration and Expiration Mechanism of Lungs using Bond Graph","authors":"Adeela Arshad, A. Kashif, Muhammad Wasim, N. Mazhar, S. M. H. Zaidi","doi":"10.1109/IEMCON.2018.8615031","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615031","url":null,"abstract":"In modern technological era research in Mechanical Ventilators (MV) has drastically increased in designing model based MV treatment. In model based MV treatment mathematical model of lung is used to detect lungs diseases. In proposed work, inspiration and expiration mechanism of lungs has been modelled using Bond Graphs. Lung segments are assigned Hydraulic analogies using cylinders and accumulators. Upper airway from nostrils to trachea is modelled as single cylinder having resistance and associated compliance effect. Trachea to lower lung segment consists of 23 generations of airways. In this study, 4 generations are considered with their respective resistance and compliance, whereas resistance and compliance effect, of 5th to 17th generations are lumped. These are modelled with cylinders of decreasing size. Generation 17 to 23 are considered as respiratory zone that are modelled as accumulator having compliance and resistance associated. Grey-Box model estimation is used to estimate model parameters of 4 generations and controller is designed. 20 sim software is used to determine the relationship between Pressure (P) and Volume (V) and evaluate the model performance. Model is capable of predicting the true PV curves and thus leading to screening of lungs diseases. Model can be used for clinical trials with any existing MV.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1