首页 > 最新文献

2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
A Formal Optimization Model for 5G Mobile Network Slice Resource Allocation 5G移动网络分片资源分配的形式化优化模型
Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer
Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.
网络切片是5G移动网络的关键功能之一,用于应对物联网、自动驾驶和未来工业等新用例带来的不同网络需求。网络切片是针对特定用例进行优化的隔离的、虚拟化的端到端网络。但是它们仍然共享一个共同的物理网络基础设施。由于网络切片的生命周期是动态的,因此对高效的移动端到端网络切片嵌入算法提出了强烈的需求。本文提出了一种求解离线网络切片嵌入问题的数学模型,并将其形式化为一个标准化的混合整数线性规划。时延敏感目标函数保证了网络分片通信的最佳网络利用率和最小时延。
{"title":"A Formal Optimization Model for 5G Mobile Network Slice Resource Allocation","authors":"Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer","doi":"10.1109/IEMCON.2018.8615049","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615049","url":null,"abstract":"Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A New Set of Bluetooth-Based Fingerprinting Algorithms for Indoor Location Services 一套新的基于蓝牙的室内定位服务指纹识别算法
Tarek El Salti, Mark Orlando, Simon Hood, Gerhard Knelsen, Melanie Iarocci, Zachary Lazzara, Yongmei Xie, Joseph Chun-Chung Cheung, I. Woungang
Indoor Location Based Services (LBSs) are likely to make significant contributions to society and the economy in the near future. Unlike outdoor LBSs, the technologies and methodologies used are still very much under development, and there are a number of challenges which must be addressed, namely: accuracy, precision, and time complexity. For the accuracy metric, the Euclidean distance error is calculated based on the difference between the known location (points of interests) and the localized position. Regarding the precision metric, the distribution of the distance errors is computed. In this paper, new fingerprinting-based algorithms, namely, the Nearest Neighbor Version 2 (NNV2), Nearest Neighbor Version 3 (NNV3) and Nearest Neighbor Version 4 (NNV4), are proposed, and tested to determine the most effective and efficient one with respect to those challenges. Our analysis reveals that: (1) the time complexity for each of the Nearest Neighbour (NN) and KNN algorithms (i.e., K is constant) is $(1ast mathbf{n}ast mathbf{m}+1ast mathbf{m})$ -comparison which is more than that for NNV2 and NNV4 (i.e., n is the number of centroids between any two rows, m refers to the Received Signal Strength Indicators (RSSIs) acquired at the offline stage, and 1 is the number of rows that holds some of the grid points), (2) NNV4 outperforms the NN, KNN and Path-loss based Fingerprint Localization algorithms (PFL) in terms of accuracy by approximately 29%, 13%, 22%; respectively, (3) NNV4 outperforms the NN, KNN and PFL in terms of precision by approximately 53%, 28%, 52%; respectively, and (4) NNV4 has a lower probability of positional error compared to those for the existing indoor localization algorithms.
在不久的将来,基于室内位置的服务(lbs)可能会对社会和经济做出重大贡献。与户外lbs不同,所使用的技术和方法仍处于开发阶段,必须解决许多挑战,即:准确性、精度和时间复杂性。对于精度度量,基于已知位置(兴趣点)与定位位置之间的差计算欧几里得距离误差。对于精度度量,计算了距离误差的分布。本文提出了新的基于指纹识别的算法,即最近邻版本2 (NNV2),最近邻版本3 (NNV3)和最近邻版本4 (NNV4),并对其进行了测试,以确定针对这些挑战最有效和最高效的算法。我们的分析显示:(1)最近邻(NN)和KNN算法(即K为常数)的时间复杂度为$(1ast mathbf{n}ast mathbf{m}+1ast mathbf{m})$ -比NNV2和NNV4(即n为任意两行之间的形心数,m为离线阶段获取的接收信号强度指标(rssi), 1为保存一些网格点的行数),(2)NNV4优于NN;KNN和基于路径损失的指纹定位算法(PFL)的准确率分别约为29%、13%和22%;(3) NNV4在精度方面分别优于NN、KNN和PFL,分别约为53%、28%和52%;(4)与现有室内定位算法相比,NNV4具有较低的位置误差概率。
{"title":"A New Set of Bluetooth-Based Fingerprinting Algorithms for Indoor Location Services","authors":"Tarek El Salti, Mark Orlando, Simon Hood, Gerhard Knelsen, Melanie Iarocci, Zachary Lazzara, Yongmei Xie, Joseph Chun-Chung Cheung, I. Woungang","doi":"10.1109/IEMCON.2018.8614852","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614852","url":null,"abstract":"Indoor Location Based Services (LBSs) are likely to make significant contributions to society and the economy in the near future. Unlike outdoor LBSs, the technologies and methodologies used are still very much under development, and there are a number of challenges which must be addressed, namely: accuracy, precision, and time complexity. For the accuracy metric, the Euclidean distance error is calculated based on the difference between the known location (points of interests) and the localized position. Regarding the precision metric, the distribution of the distance errors is computed. In this paper, new fingerprinting-based algorithms, namely, the Nearest Neighbor Version 2 (NNV2), Nearest Neighbor Version 3 (NNV3) and Nearest Neighbor Version 4 (NNV4), are proposed, and tested to determine the most effective and efficient one with respect to those challenges. Our analysis reveals that: (1) the time complexity for each of the Nearest Neighbour (NN) and KNN algorithms (i.e., K is constant) is $(1ast mathbf{n}ast mathbf{m}+1ast mathbf{m})$ -comparison which is more than that for NNV2 and NNV4 (i.e., n is the number of centroids between any two rows, m refers to the Received Signal Strength Indicators (RSSIs) acquired at the offline stage, and 1 is the number of rows that holds some of the grid points), (2) NNV4 outperforms the NN, KNN and Path-loss based Fingerprint Localization algorithms (PFL) in terms of accuracy by approximately 29%, 13%, 22%; respectively, (3) NNV4 outperforms the NN, KNN and PFL in terms of precision by approximately 53%, 28%, 52%; respectively, and (4) NNV4 has a lower probability of positional error compared to those for the existing indoor localization algorithms.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring Resources of Machine Learning Engine In Microservices Architecture 微服务架构下机器学习引擎资源监控
Nikunj Parekh, Swathi Kurunji, Alan Beck
Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.
微服务架构有助于构建分布式可伸缩软件产品,通常部署在云环境中。监控部署在Kubernetes编排的分布式高级分析机器学习引擎中的微服务是许多云资源管理解决方案的核心。此外,在MPP机器学习引擎(MLE)中,在更细粒度的级别(如每个查询或子查询基础)测量资源利用率是资源规划的关键,也是我们工作的重点。本文提出了两种测量Teradata机器学习引擎(MLE)资源利用率的机制。第一种机制是集群资源监控(CRM)。CRM是一种高级资源度量机制,IT管理员和分析用户可以对整个集群使用统计数据进行可视化、绘图、生成警报并执行实时和历史分析。第二种机制是查询资源监控(QRM)。QRM使IT管理员和MLE用户能够度量每个查询及其子查询的计算资源利用率。当查询需要很长时间时,QRM提供了洞察力。这对于识别查询中开销较大的阶段非常有用,这些阶段会对某些资源造成更多的负担,并使工作分配出现偏差。我们展示了建议机制的结果,并突出了用例。
{"title":"Monitoring Resources of Machine Learning Engine In Microservices Architecture","authors":"Nikunj Parekh, Swathi Kurunji, Alan Beck","doi":"10.1109/IEMCON.2018.8614791","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614791","url":null,"abstract":"Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Voice Controlled E-Commerce Web Application 语音控制的电子商务Web应用程序
Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah
Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.
自动语音控制系统已经改变了人类与计算机交互的方式。语音或语音识别系统允许用户向计算机发出免提请求,计算机反过来处理请求并为用户提供适当的响应。经过机器学习和人工智能多年的研究和发展,如今语音控制技术已经变得更加高效,并被广泛应用于许多领域,以实现和改善人与人之间和人机之间的交互。最先进的电子商务应用程序在网络技术的帮助下,提供交互式和用户友好的界面。然而,在某些情况下,人们,特别是有视觉障碍的人,无法完全体验到这些应用程序的可维护性。在web应用程序中嵌入语音控制系统可以增强用户体验,并且可以提供语音作为控制电子商务网站功能的手段。在本文中,我们提出了语音识别系统(SRS)的分类,并提出了一个语音控制的商品购买电子商务应用程序,使用IBM Watson语音到文本来演示其可用性。该原型可以扩展到其他应用场景,如政府服务亭,并支持对转换后的文本数据进行分析,用于诊所的医疗诊断等场景。
{"title":"A Voice Controlled E-Commerce Web Application","authors":"Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah","doi":"10.1109/IEMCON.2018.8614771","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614771","url":null,"abstract":"Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Online Collaborative Approach of Interactive Antenatal Lectures for Expectant Mothers 面向准妈妈的互动式产前讲座的在线协作方法
G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, Basil C. Mbonu, Mercy C. Nneji
Antenatal classes are sometimes called parentcraft which help to prepare expectant mothers for their baby's birth, feeding the baby and to look after the baby. It is the best way to ensure expectant mothers stay healthy during pregnancy as well as to deliver confidence and information. This paper looks into the current state of antenatal education. It investigates the way antenatal classes are accessed by expectant mothers, the challenges they face in getting access to these classes and their attitudes towards these classes. For most women, it could be stressful and very inconvenient to attend physical antenatal classes. An online collaborative approach of interactive antenatal lecture for expectant mothers is proposed to replace these classes by providing live streaming lectures, discussion and interactive sessions between users. In order to accomplish this task, some face-to-face interviews were conducted. Questionnaires were also distributed. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the specification, development, and implementation. The web based system is implemented using PHP framework as Back-end, Front-End using HTML, CSS, JavaScript, XAMPP Server and MySQL was employed to handle the database structure. The web based system was implemented and tested using carefully thought out test cases which were successful. The proposed system offers antenatal education to expectant mothers no matter their location as well as a platform for discussion between expectant mothers, midwives, or anyone at all; sharing useful information amongst themselves and giving advice and encouragement to one another.
产前课程有时被称为育儿课程,帮助准妈妈为婴儿的出生做好准备,喂养婴儿和照顾婴儿。这是确保准妈妈在怀孕期间保持健康以及传递信心和信息的最佳方式。本文探讨了我国产前教育的现状。它调查了孕妇参加产前课程的方式,她们在参加这些课程时面临的挑战以及她们对这些课程的态度。对大多数妇女来说,参加产前物理课程可能会很有压力,也很不方便。提出了一种在线协同的孕妇产前互动讲座方式,通过提供用户间的直播讲座、讨论和互动会话来取代这些课程。为了完成这项任务,我们进行了一些面对面的访谈。还分发了调查问卷。本文采用结构化系统分析与设计方法(SSADM)进行规范、开发和实现。基于web的系统后端采用PHP框架,前端采用HTML、CSS、JavaScript,数据库结构采用XAMPP Server和MySQL处理。这个基于web的系统是用经过深思熟虑的测试用例来实现和测试的,并且是成功的。拟议的系统为孕妇提供产前教育,无论她们在哪里,以及孕妇、助产士或任何人之间讨论的平台;他们之间分享有用的信息,互相建议和鼓励。
{"title":"Online Collaborative Approach of Interactive Antenatal Lectures for Expectant Mothers","authors":"G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, Basil C. Mbonu, Mercy C. Nneji","doi":"10.1109/IEMCON.2018.8614823","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614823","url":null,"abstract":"Antenatal classes are sometimes called parentcraft which help to prepare expectant mothers for their baby's birth, feeding the baby and to look after the baby. It is the best way to ensure expectant mothers stay healthy during pregnancy as well as to deliver confidence and information. This paper looks into the current state of antenatal education. It investigates the way antenatal classes are accessed by expectant mothers, the challenges they face in getting access to these classes and their attitudes towards these classes. For most women, it could be stressful and very inconvenient to attend physical antenatal classes. An online collaborative approach of interactive antenatal lecture for expectant mothers is proposed to replace these classes by providing live streaming lectures, discussion and interactive sessions between users. In order to accomplish this task, some face-to-face interviews were conducted. Questionnaires were also distributed. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the specification, development, and implementation. The web based system is implemented using PHP framework as Back-end, Front-End using HTML, CSS, JavaScript, XAMPP Server and MySQL was employed to handle the database structure. The web based system was implemented and tested using carefully thought out test cases which were successful. The proposed system offers antenatal education to expectant mothers no matter their location as well as a platform for discussion between expectant mothers, midwives, or anyone at all; sharing useful information amongst themselves and giving advice and encouragement to one another.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Pakistani Software Companies don't use Best Practices for Requirement Engineering Processes 为什么巴基斯坦软件公司不使用需求工程过程的最佳实践
I. Zafar, Asma Shaheen, A. Nazir, B. Maqbool, Wasi Haider Butt, Jahan Zeb
Requirement engineering (RE) is initial and critical phase of software engineering. The success of software project is based on good requirement engineering practices. The purpose of requirement engineering practices is to elicit all intended user needs and document them for clarity of understanding and for future reference. In developing countries like Pakistan best RE practices are not fully used in software industry. In this study, major reasons for not using best RE practices are identified based on literature review of research work done related to RE in different countries. Literature review revealed that lack of knowledge of requirement engineering processes, lack of cost, lack of time are major factors behind not using RE practices in software development. A survey was conducted to base on factors identified to highlight major obstacles in way of using best requirement engineering practices in Pakistan. Survey results depicted the main issues are lack of budget, lack of time, lack of dedicated team and communication difficulties.
需求工程(RE)是软件工程的初始阶段和关键阶段。软件项目的成功建立在良好的需求工程实践的基础上。需求工程实践的目的是引出所有预期的用户需求,并为清晰的理解和将来的参考记录它们。在巴基斯坦这样的发展中国家,最佳的可再生能源实践并没有完全应用于软件行业。在本研究中,通过对不同国家可再生能源相关研究工作的文献综述,确定了不采用最佳可再生能源实践的主要原因。文献回顾表明,缺乏对需求工程过程的了解、缺乏成本、缺乏时间是在软件开发中不使用可再生能源实践的主要因素。进行了一项调查,以确定的因素为基础,突出了在巴基斯坦使用最佳需求工程实践的主要障碍。调查结果描述的主要问题是缺乏预算,缺乏时间,缺乏专门的团队和沟通困难。
{"title":"Why Pakistani Software Companies don't use Best Practices for Requirement Engineering Processes","authors":"I. Zafar, Asma Shaheen, A. Nazir, B. Maqbool, Wasi Haider Butt, Jahan Zeb","doi":"10.1109/IEMCON.2018.8614913","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614913","url":null,"abstract":"Requirement engineering (RE) is initial and critical phase of software engineering. The success of software project is based on good requirement engineering practices. The purpose of requirement engineering practices is to elicit all intended user needs and document them for clarity of understanding and for future reference. In developing countries like Pakistan best RE practices are not fully used in software industry. In this study, major reasons for not using best RE practices are identified based on literature review of research work done related to RE in different countries. Literature review revealed that lack of knowledge of requirement engineering processes, lack of cost, lack of time are major factors behind not using RE practices in software development. A survey was conducted to base on factors identified to highlight major obstacles in way of using best requirement engineering practices in Pakistan. Survey results depicted the main issues are lack of budget, lack of time, lack of dedicated team and communication difficulties.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast Prediction of Equivalent Model of Installed Patch Antenna Radiation Pattern 已安装贴片天线辐射方向图等效模型的快速预测
H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji
This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.
为了快速预测贴片天线的安装辐射方向图,提出了一种有效的贴片天线等效模型。要准确预测不同平台上贴片天线的安装辐射方向图,需要耗费较多的CPU时间和内存成本。然而,在构建能够再现与贴片天线相似的辐射方向图的等效贴片天线模型时,快速有效的预测可以节省CPU时间和内存成本。开发了一种基于格林函数推导的确定磁偶极子电场的程序。利用商业软件工具(FEKO)计算了远场和近场的辐射方向图,并与结果进行了验证。利用磁偶极子建立基于辐射机理的贴片天线等效模型,预测其安装辐射方向图。将需要优化的设计参数减少到只有两个参数,即x和y方向上偶极子之间的间距。偶极子的高度与贴片天线的高度保持在同一地平面以上的固定值。这减少了CPU时间和内存成本,从而提高了计算效率。利用FEKO优化工具对等效模型进行优化后,将等效模型安装在平台上计算安装后的辐射方向图。仿真结果表明,基于磁偶极子的等效模型只需要两个设计参数,就可以快速预测贴片天线安装在平台上时的辐射方向图。等效模型不需要贴片天线的详细几何和材料信息。
{"title":"Fast Prediction of Equivalent Model of Installed Patch Antenna Radiation Pattern","authors":"H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8614869","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614869","url":null,"abstract":"This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Counting Quantitative Comparison Using Background Subtraction, Viola Jones and Deep Learning Methods 使用背景减法、Viola Jones和深度学习方法的车辆计数定量比较
Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim
In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)
本文在四个数据集上使用不同的机器方法研究了车辆计数。公路交通模型的短期预测需要车辆计数来完成所需的数据,进而适用于道路设计和使用规划。本研究的目的是表明,自动车辆计数使用机器方法,可以利用现有的闭路电视图像数据或更好的摄像机。然后通过定量评价,得到F1和精度分数,从而给出一些建议。通过多次模拟,在现有CCTV数据上,使用背景减法和Viola Jones方法,成功地获得了一个低分辨率数据集的F1分数,范围从0.32到0.75。还发现,Viola Jones方法可以提高F1分数,比Back减法提高约39%至56%。此外,深度学习特别是YOLO的使用也取得了很好的效果,在三个更高分辨率的数据集上,F1得分在0.94 ~ 1之间,精度在97.37% ~ 100%之间。(抽象)
{"title":"Vehicle Counting Quantitative Comparison Using Background Subtraction, Viola Jones and Deep Learning Methods","authors":"Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim","doi":"10.1109/IEMCON.2018.8615085","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615085","url":null,"abstract":"In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A practical study on Bluetooth Low Energy (BLE) throughput 蓝牙低功耗(BLE)吞吐量的实际研究
F. J. Dian, A. Yousefi, Sungjoon Lim
the data rate of Bluetooth Low Energy (BLE) is 1Mbps, and 2Mbps for BLE 4.2 and BLE 5, respectively. However, the throughput of a BLE system would be much lower since we need to account for various protocol overheads, adaptive RF connection adjustments for maintaining robust links amid interference, and protocol limitations based on BLE data exchange strategy and operations such as connection intervals, packet size and packet acknowledgment scheme. In this paper, we practically investigate the maximum throughput achievable in a simple BLE 4.2 network of two nodes, used in a data logging application. In this type of application, one node always has data to transmit and the other node which collects the transmitted sensor data does not have any data to send. We will also consider the effect of BLE parameters in this study. The result of our study shows that the maximum amount of throughput is 221.7 kbps for this application under the condition that the wireless link is error free and application always has data to transmit.
BLE (Bluetooth Low Energy)协议的数据速率为1Mbps, BLE 4.2协议为2Mbps, BLE 5协议为2Mbps。然而,BLE系统的吞吐量会低得多,因为我们需要考虑各种协议开销、自适应RF连接调整以在干扰中保持稳健的链路,以及基于BLE数据交换策略和操作(如连接间隔、数据包大小和数据包确认方案)的协议限制。在本文中,我们实际研究了在数据记录应用中使用的简单双节点BLE 4.2网络所能实现的最大吞吐量。在这种类型的应用程序中,一个节点总是有数据要传输,而收集传输的传感器数据的另一个节点没有任何数据要发送。我们还将在本研究中考虑BLE参数的影响。研究结果表明,在无线链路无差错且应用程序始终有数据传输的情况下,该应用程序的最大吞吐量为221.7 kbps。
{"title":"A practical study on Bluetooth Low Energy (BLE) throughput","authors":"F. J. Dian, A. Yousefi, Sungjoon Lim","doi":"10.1109/IEMCON.2018.8614763","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614763","url":null,"abstract":"the data rate of Bluetooth Low Energy (BLE) is 1Mbps, and 2Mbps for BLE 4.2 and BLE 5, respectively. However, the throughput of a BLE system would be much lower since we need to account for various protocol overheads, adaptive RF connection adjustments for maintaining robust links amid interference, and protocol limitations based on BLE data exchange strategy and operations such as connection intervals, packet size and packet acknowledgment scheme. In this paper, we practically investigate the maximum throughput achievable in a simple BLE 4.2 network of two nodes, used in a data logging application. In this type of application, one node always has data to transmit and the other node which collects the transmitted sensor data does not have any data to send. We will also consider the effect of BLE parameters in this study. The result of our study shows that the maximum amount of throughput is 221.7 kbps for this application under the condition that the wireless link is error free and application always has data to transmit.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Smart Intelligent System for Women and Child Security 智能妇幼安全系统
Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy
This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.
本文调查了妇女和儿童的安全系统,该系统允许在公共场所,社会等任何骚扰中立即作出反应。世界各地的妇女都面临着不道德的身体骚扰,儿童不能在社交活动中或在家外无人看管。我们的项目解决了这两个问题。有压力开关的便携式装置。一旦攻击者准备攻击妇女/儿童,或者当他们感觉到陌生人的不安全感时,他/她就可以通过挤压或压缩设备施加压力。压力传感器立即感应到这种压力,并发送一条传统的短信,连同受害者的位置将发送到他们的父母/监护人在购买设备时存储的手机号码,然后打电话。如果长时间无人接听,则会将电话重新定向到警方,并发送相同的信息。我们的系统的主要特点是更少的响应时间将需要帮助受害者。
{"title":"Smart Intelligent System for Women and Child Security","authors":"Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy","doi":"10.1109/IEMCON.2018.8614929","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614929","url":null,"abstract":"This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1