首页 > 最新文献

2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)最新文献

英文 中文
IoT Applications on Secure Smart Shopping 物联网在安全智能购物中的应用
Ruinian Li, Tianyi Song, Nicholas Capurso, Jiguo Yu, Xiuzhen Cheng
We propose to design a smart shopping system based on RFID. The smart carts used in such a system can navigate the customers to the desired products, and they can calculate the billing information as the customer shops. Items that are put in a smart shopping cart can be automatically recognized and billed. In this way, customers can avoid long queuing time at the check-out points. The grocery management also becomes much easier: The sensors on the grocery shelf can keep updating the number of items to the central server so that the server is always aware of the items' status in the store. Furthermore, the inventory management also becomes much easier, because all the items can be automatically read by a RFID reader instead of manually scanned by a laborer. In this paper, we propose a smart shopping cart system with consideration of how this system can work functionally and securely.
我们提出设计一个基于RFID的智能购物系统。在这种系统中使用的智能购物车可以将客户导航到所需的产品,并且可以在客户购物时计算账单信息。放入智能购物车的物品可以被自动识别并计费。这样,顾客就可以避免在收银台排很长的队。杂货管理也变得更加容易:杂货架上的传感器可以不断向中央服务器更新商品数量,以便服务器始终了解商店中商品的状态。此外,库存管理也变得更加容易,因为所有的物品都可以由RFID阅读器自动读取,而不是由工人手动扫描。在本文中,我们提出了一个智能购物车系统,并考虑了该系统如何在功能和安全的情况下工作。
{"title":"IoT Applications on Secure Smart Shopping","authors":"Ruinian Li, Tianyi Song, Nicholas Capurso, Jiguo Yu, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.25","DOIUrl":"https://doi.org/10.1109/IIKI.2016.25","url":null,"abstract":"We propose to design a smart shopping system based on RFID. The smart carts used in such a system can navigate the customers to the desired products, and they can calculate the billing information as the customer shops. Items that are put in a smart shopping cart can be automatically recognized and billed. In this way, customers can avoid long queuing time at the check-out points. The grocery management also becomes much easier: The sensors on the grocery shelf can keep updating the number of items to the central server so that the server is always aware of the items' status in the store. Furthermore, the inventory management also becomes much easier, because all the items can be automatically read by a RFID reader instead of manually scanned by a laborer. In this paper, we propose a smart shopping cart system with consideration of how this system can work functionally and securely.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing 基于定价定时Petri网的雾计算资源分配策略
Lina Ni, Jinquan Zhang, Jiguo Yu
This paper proposes a resource allocation strategy for fog computing based on Priced Timed Petri nets (PTPN), by which the user can choose the satisfied resources autonomously from a group of pre-allocated resources according to the price cost and time cost of task. We construct the PTPN models of tasks in fog computing in accordance with the features of fog resources. The algorithm of predicting task completion time and price is presented. In particular, we give the fog resources dynamic allocation algorithm. Simulation results demonstrate that our proposed algorithms can achieve the higher efficiency.
提出了一种基于定价时间Petri网(PTPN)的雾计算资源分配策略,用户可以根据任务的价格成本和时间成本,从一组预先分配的资源中自主选择满意的资源。根据雾资源的特点,构造了雾计算中任务的PTPN模型。提出了预测任务完成时间和价格的算法。特别给出了雾资源的动态分配算法。仿真结果表明,本文提出的算法可以达到较高的效率。
{"title":"Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing","authors":"Lina Ni, Jinquan Zhang, Jiguo Yu","doi":"10.1109/IIKI.2016.87","DOIUrl":"https://doi.org/10.1109/IIKI.2016.87","url":null,"abstract":"This paper proposes a resource allocation strategy for fog computing based on Priced Timed Petri nets (PTPN), by which the user can choose the satisfied resources autonomously from a group of pre-allocated resources according to the price cost and time cost of task. We construct the PTPN models of tasks in fog computing in accordance with the features of fog resources. The algorithm of predicting task completion time and price is presented. In particular, we give the fog resources dynamic allocation algorithm. Simulation results demonstrate that our proposed algorithms can achieve the higher efficiency.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization 一种基于WiFi指纹定位的轻量级位置隐私保护方案
Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun
Although regarded as a promising approach for indoor localization, WiFi fingerprint-based localization can lead to potential location privacy violations. In this work, we study the location privacy issues of WiFi fingerprint-based localization and propose a lightweight location privacy-preserving scheme that does not rely on any cryptographic primitive as the existing work does. In our scheme, a to-be-localized user sends the measured signal strength values and other k-1 dummy signal strength values to the service provider who accordingly replies with k locations. The service provider cannot distinguish the user's location from the other k-1 dummy locations. Compared with the existing work, the computational and communication overhead of the proposed scheme are much lower.
虽然被认为是一种很有前途的室内定位方法,但基于WiFi指纹的定位可能会导致潜在的位置隐私侵犯。在这项工作中,我们研究了基于WiFi指纹定位的位置隐私问题,并提出了一种轻量级的位置隐私保护方案,该方案不像现有工作那样依赖于任何加密原语。在我们的方案中,待定位用户将测量的信号强度值和其他k-1个虚拟信号强度值发送给服务提供商,服务提供商相应回复k个位置。服务提供商无法将用户的位置与其他k-1个虚拟位置区分开来。与现有的工作相比,该方案的计算量和通信开销都大大降低。
{"title":"A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization","authors":"Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun","doi":"10.1109/IIKI.2016.41","DOIUrl":"https://doi.org/10.1109/IIKI.2016.41","url":null,"abstract":"Although regarded as a promising approach for indoor localization, WiFi fingerprint-based localization can lead to potential location privacy violations. In this work, we study the location privacy issues of WiFi fingerprint-based localization and propose a lightweight location privacy-preserving scheme that does not rely on any cryptographic primitive as the existing work does. In our scheme, a to-be-localized user sends the measured signal strength values and other k-1 dummy signal strength values to the service provider who accordingly replies with k locations. The service provider cannot distinguish the user's location from the other k-1 dummy locations. Compared with the existing work, the computational and communication overhead of the proposed scheme are much lower.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"766 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133348591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a Location Aware Semantic Access Control Approach for Mobile Computing 面向移动计算的位置感知语义访问控制方法
Luokai Hu, Zhenyu Huang, Fang Deng, Ke Yan, Jin Liu
With the development of mobile computing, a more intelligent location aware access control approach which can not only protect the privacy of location information but also reduce the frequency of access control decision is needed. This paper brought semantic access control approach into the Location Aware Access Control (LAAC). First, we used semantic area to substitute physical location for the authorization decision, reducing the frequency of authorization decisions. The exact physical location of the subject would not be exposed. Secondly, for the different representation of semantic area of different security domains, we used ontology cluster to represent semantic spatial information. We established security domain ontology (SDO) and bridge ontology (BO) between the security domains. And then we used such ontology cluster as knowledge base and added annotation to the physical areas of XACML language. Finally, the model and framework of location aware semantics based access control for mobile computing is proposed. The proposed location aware semantic access control(LASAC) approach provides a better solution for location aware access control in mobile network environment.
随着移动计算的发展,需要一种更加智能的位置感知访问控制方法,既能保护位置信息的隐私,又能减少访问控制决策的频率。将语义访问控制方法引入到位置感知访问控制(LAAC)中。首先,我们使用语义区域代替物理位置来进行授权决策,减少了授权决策的频率。实验对象的确切物理位置不会被暴露。其次,针对不同安全域语义区域的不同表示,采用本体聚类来表示语义空间信息。建立了安全域本体(SDO)和安全域间的桥接本体(BO)。然后利用本体聚类作为知识库,对XACML语言的物理区域进行标注。最后,提出了基于位置感知语义的移动计算访问控制模型和框架。提出的位置感知语义访问控制(LASAC)方法为移动网络环境下的位置感知访问控制提供了较好的解决方案。
{"title":"Towards a Location Aware Semantic Access Control Approach for Mobile Computing","authors":"Luokai Hu, Zhenyu Huang, Fang Deng, Ke Yan, Jin Liu","doi":"10.1109/IIKI.2016.117","DOIUrl":"https://doi.org/10.1109/IIKI.2016.117","url":null,"abstract":"With the development of mobile computing, a more intelligent location aware access control approach which can not only protect the privacy of location information but also reduce the frequency of access control decision is needed. This paper brought semantic access control approach into the Location Aware Access Control (LAAC). First, we used semantic area to substitute physical location for the authorization decision, reducing the frequency of authorization decisions. The exact physical location of the subject would not be exposed. Secondly, for the different representation of semantic area of different security domains, we used ontology cluster to represent semantic spatial information. We established security domain ontology (SDO) and bridge ontology (BO) between the security domains. And then we used such ontology cluster as knowledge base and added annotation to the physical areas of XACML language. Finally, the model and framework of location aware semantics based access control for mobile computing is proposed. The proposed location aware semantic access control(LASAC) approach provides a better solution for location aware access control in mobile network environment.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Concentration Based on the Tail Distortion Risk Measure under Generalized FGM Copula 广义FGM联结下基于尾部扭曲风险度量的风险集中
Wenhua Lv, Liheng Sang, Guangjun Shen
Risk concentration is used as a measurement of diversification benefits in the context of risk concentration. The tail distortion risk measure, which was introduced in Zhu and Li (2012), has attracted increasing interest recently. In this paper, We investigate the second-order asymptotics of the risk concentration based on the tail distortion risk measure, when the dependence structure is driven by the generalized copulas.
在风险集中的背景下,风险集中度被用来衡量多元化收益。在Zhu和Li(2012)中引入的尾部扭曲风险度量近来引起了越来越多的关注。本文研究了基于尾部扭曲风险测度的风险集中的二阶渐近性,当依赖结构由广义copula驱动时。
{"title":"Risk Concentration Based on the Tail Distortion Risk Measure under Generalized FGM Copula","authors":"Wenhua Lv, Liheng Sang, Guangjun Shen","doi":"10.1109/IIKI.2016.98","DOIUrl":"https://doi.org/10.1109/IIKI.2016.98","url":null,"abstract":"Risk concentration is used as a measurement of diversification benefits in the context of risk concentration. The tail distortion risk measure, which was introduced in Zhu and Li (2012), has attracted increasing interest recently. In this paper, We investigate the second-order asymptotics of the risk concentration based on the tail distortion risk measure, when the dependence structure is driven by the generalized copulas.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biomechanical Model for Detection of Vertigo Disease 眩晕病检测的生物力学模型
N. Filipovic, Z. Milosevic, I. Šaveljić, D. Nikolić, N. Zdravković, A. Kos
Benign Paroxysmal Positional Vertigo (BPPV) is most common vestibular disorder influencing the quality of life to considerable percentage of population after the age of forty. In this study the three-dimensional biomechanical model of the semi-circular canal (SCC) is described with full 3D fluid-structure interaction of particles, wall, cupula deformation and endolymph fluid flow. Oculus Rift device was used for experimental results of head motion and eye tracking and correlation with biomechanical model. A full Navier-Stokes equations and continuity equations are used for fluid domain with Arbitrary-Lagrangian Eulerian (ALE) formulation for mesh motion. Fluid-structure interaction for fluid coupling with cupula deformation is used. Particle tracking algorithm has been used for particle motion. Different size and number of particles with their full interaction between themselves, wall and cupula deformation are used. Velocity distribution, shear stress and force from endolymph side are presented for parametric one SCC and patient specific three SCC. All the models are used for correlation with the same experimental protocols with head moving and nystagmus eye tracking. A good correlation was found with numerical simulation of membrane deflection and nystagmus response detected with tracking technology. It can be used for virtual games with detection of vestibular disorders to the users.
良性阵发性位置性眩晕(BPPV)是影响40岁以上人群生活质量的最常见的前庭疾病。在本研究中,描述了半圆管(SCC)的三维生物力学模型,包括颗粒、管壁、丘变形和内淋巴液体流动的全三维流固相互作用。使用Oculus Rift设备进行头动眼动追踪实验结果,并与生物力学模型进行关联。流体域采用完整的Navier-Stokes方程和连续性方程,网格运动采用任意拉格朗日欧拉(ALE)公式。流固耦合是指流体与锥体变形的耦合。粒子跟踪算法用于粒子运动。利用不同大小和数量的颗粒,充分相互作用,壁和丘变形。速度分布,剪应力和力从内淋巴侧的参数一个SCC和患者特异性三个SCC。所有的模型都与相同的实验方案进行了关联,包括头部运动和眼球震颤的眼动追踪。膜偏转的数值模拟结果与跟踪技术检测的眼球震颤反应有很好的相关性。可用于虚拟游戏,对用户进行前庭功能障碍检测。
{"title":"Biomechanical Model for Detection of Vertigo Disease","authors":"N. Filipovic, Z. Milosevic, I. Šaveljić, D. Nikolić, N. Zdravković, A. Kos","doi":"10.1109/IIKI.2016.59","DOIUrl":"https://doi.org/10.1109/IIKI.2016.59","url":null,"abstract":"Benign Paroxysmal Positional Vertigo (BPPV) is most common vestibular disorder influencing the quality of life to considerable percentage of population after the age of forty. In this study the three-dimensional biomechanical model of the semi-circular canal (SCC) is described with full 3D fluid-structure interaction of particles, wall, cupula deformation and endolymph fluid flow. Oculus Rift device was used for experimental results of head motion and eye tracking and correlation with biomechanical model. A full Navier-Stokes equations and continuity equations are used for fluid domain with Arbitrary-Lagrangian Eulerian (ALE) formulation for mesh motion. Fluid-structure interaction for fluid coupling with cupula deformation is used. Particle tracking algorithm has been used for particle motion. Different size and number of particles with their full interaction between themselves, wall and cupula deformation are used. Velocity distribution, shear stress and force from endolymph side are presented for parametric one SCC and patient specific three SCC. All the models are used for correlation with the same experimental protocols with head moving and nystagmus eye tracking. A good correlation was found with numerical simulation of membrane deflection and nystagmus response detected with tracking technology. It can be used for virtual games with detection of vestibular disorders to the users.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122358655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Complex Time Series Using a Modified Multiscale Fuzzy Entropy Algorithm 基于改进多尺度模糊熵算法的复杂时间序列分析
Tian Han, Cheng Cheng Shi, Z. Wei, T. Lin
Multiscale fuzzy entropy (MFE) is an effective algorithm which has been successfully applied in many fields for measuring the complexity of a time series. Though, MFE can yield inaccurate entropy estimations as the coarse-graining procedure used by the algorithm reduces the length of the time series under investigation. A modified multiscale fuzzy entropy (MMFE) algorithm is presented in this paper to overcome this problem. In this new approach, the coarse-graining procedure is replaced by a moving-average procedure which constructs template vectors in calculating the fuzzy entropy. The effectiveness of the proposed MMFE algorithm is evaluated on several mixed data (i.e., data mixed with white noise) of various data length. The result shows that the MMFE algorithm can effectively reduce the deviation in entropy estimation as compared to that using MFE algorithm. The MMFE algorithm is further employed in the study to estimate the complexity and irregularity of vibration data of a roller element bearing for fault diagnosis. It is shown that the MMFE algorithm can effectively discriminate the four bearing operation conditions under study.
多尺度模糊熵(MFE)是一种有效的度量时间序列复杂度的算法,已成功地应用于许多领域。然而,MFE可能会产生不准确的熵估计,因为算法使用的粗粒度过程减少了所研究的时间序列的长度。针对这一问题,提出了一种改进的多尺度模糊熵(MMFE)算法。在该方法中,模糊熵的计算以构造模板向量的移动平均过程代替粗粒度过程。在不同数据长度的混合数据(即混合了白噪声的数据)上对所提出的MMFE算法的有效性进行了评价。结果表明,与MFE算法相比,MMFE算法可以有效地减少熵估计的偏差。进一步利用MMFE算法对滚动轴承振动数据的复杂性和不规则性进行估计,用于故障诊断。结果表明,MMFE算法能够有效地区分所研究的四种轴承工况。
{"title":"Analysis of Complex Time Series Using a Modified Multiscale Fuzzy Entropy Algorithm","authors":"Tian Han, Cheng Cheng Shi, Z. Wei, T. Lin","doi":"10.1109/IIKI.2016.12","DOIUrl":"https://doi.org/10.1109/IIKI.2016.12","url":null,"abstract":"Multiscale fuzzy entropy (MFE) is an effective algorithm which has been successfully applied in many fields for measuring the complexity of a time series. Though, MFE can yield inaccurate entropy estimations as the coarse-graining procedure used by the algorithm reduces the length of the time series under investigation. A modified multiscale fuzzy entropy (MMFE) algorithm is presented in this paper to overcome this problem. In this new approach, the coarse-graining procedure is replaced by a moving-average procedure which constructs template vectors in calculating the fuzzy entropy. The effectiveness of the proposed MMFE algorithm is evaluated on several mixed data (i.e., data mixed with white noise) of various data length. The result shows that the MMFE algorithm can effectively reduce the deviation in entropy estimation as compared to that using MFE algorithm. The MMFE algorithm is further employed in the study to estimate the complexity and irregularity of vibration data of a roller element bearing for fault diagnosis. It is shown that the MMFE algorithm can effectively discriminate the four bearing operation conditions under study.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128666653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree 基于排名Merkle哈希树的动态可证明数据占有
Jing Zou, Yunchuan Sun, Shixian Li
To move the application software and data into the cloud has become a trend. To prevent the data from being lost, modified and corrupted, the data integrity needs to be verified. The provable data possession (PDP) protocol is used to solve this problem. However, users often do some dynamic operations, such as insertion, modification and deletion, and it increases the difficulty and complexity of verification. How to construct the PDP scheme supporting dynamic updating of data becomes a hot research topic. The technology of hash aggregation is considered as one of the solutions to reduce costs of verification due to data dynamic operation. We analyze Wang et al.'s dynamic provable data possession (DPDP) solution and identify its security flaws during hash aggregation phase. This paper proposes an improved scheme to resolve security problem in Wang et al.'s scheme.
将应用软件和数据迁移到云端已经成为一种趋势。为了防止数据丢失、被修改和损坏,需要对数据完整性进行验证。可证明数据占有(PDP)协议解决了这一问题。但是,用户经常进行一些动态操作,如插入、修改、删除等,这增加了验证的难度和复杂性。如何构建支持数据动态更新的PDP方案成为一个研究热点。哈希聚合技术被认为是减少数据动态操作带来的验证成本的解决方案之一。我们分析了Wang等人的动态可证明数据占有(DPDP)解决方案,并识别了其在哈希聚合阶段的安全缺陷。本文提出了一种改进方案来解决Wang等人方案中的安全问题。
{"title":"Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree","authors":"Jing Zou, Yunchuan Sun, Shixian Li","doi":"10.1109/IIKI.2016.69","DOIUrl":"https://doi.org/10.1109/IIKI.2016.69","url":null,"abstract":"To move the application software and data into the cloud has become a trend. To prevent the data from being lost, modified and corrupted, the data integrity needs to be verified. The provable data possession (PDP) protocol is used to solve this problem. However, users often do some dynamic operations, such as insertion, modification and deletion, and it increases the difficulty and complexity of verification. How to construct the PDP scheme supporting dynamic updating of data becomes a hot research topic. The technology of hash aggregation is considered as one of the solutions to reduce costs of verification due to data dynamic operation. We analyze Wang et al.'s dynamic provable data possession (DPDP) solution and identify its security flaws during hash aggregation phase. This paper proposes an improved scheme to resolve security problem in Wang et al.'s scheme.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Correlation and Visualization Analysis of Large Scale Dataset GDELT 大型数据集GDELT的关联与可视化分析
Fengcai Qiao, Kedi Chen
The Global Data on Events, Location, and Tone (GDELT) is a real time large scale database of global human society for open research which monitors the worlds broadcast, print, and web news since 1979, creating a free open platform for computing on the entire world. In this paper, first, we designed and implemented a data crawler, which collects metadata of GDELT database in real time and stores them in Hadoop Distributed File System (HDFS). Then, we proposed a hashbased method to correlate "Event" table, "Mentions" table and "GKG" table in GDELT, in order to digest every detailed information of each event. Finally, we took South Korea as example to make spatiotemporal visualization analysis, such as event spatiotemporal heat map, distribution of media attention and event extraction confidence dot map.
Global Data on Events, Location, and Tone (GDELT)是一个用于开放研究的全球人类社会的实时大型数据库,它监测了自1979年以来世界广播,印刷和网络新闻,为整个世界创造了一个免费开放的计算平台。本文首先设计并实现了一个数据爬虫,实时收集GDELT数据库的元数据并存储在Hadoop分布式文件系统(HDFS)中。然后,我们提出了一种基于哈希的方法来关联GDELT中的“Event”表、“mention”表和“GKG”表,以消化每个事件的每个详细信息。最后,以韩国为例,进行事件时空热图、媒体关注度分布、事件提取置信度点图等时空可视化分析。
{"title":"Correlation and Visualization Analysis of Large Scale Dataset GDELT","authors":"Fengcai Qiao, Kedi Chen","doi":"10.1109/IIKI.2016.19","DOIUrl":"https://doi.org/10.1109/IIKI.2016.19","url":null,"abstract":"The Global Data on Events, Location, and Tone (GDELT) is a real time large scale database of global human society for open research which monitors the worlds broadcast, print, and web news since 1979, creating a free open platform for computing on the entire world. In this paper, first, we designed and implemented a data crawler, which collects metadata of GDELT database in real time and stores them in Hadoop Distributed File System (HDFS). Then, we proposed a hashbased method to correlate \"Event\" table, \"Mentions\" table and \"GKG\" table in GDELT, in order to digest every detailed information of each event. Finally, we took South Korea as example to make spatiotemporal visualization analysis, such as event spatiotemporal heat map, distribution of media attention and event extraction confidence dot map.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on the Influence of Latin Dance and Tai Chi Exercise on Balance and Knee Joint Proprioception 拉丁舞与太极运动对平衡及膝关节本体感觉影响的研究
Huihui Wang, Zhongqiu Ji, Guiping Jiang, Xibian Jiao, Weitong Liu
Objective: To study the influence of Latin dance and Tai Chi on knee joint proprioception and balance. Method: All experiments were performed in the Beijing Normal University School of Physical Education and Sport Biomechanics Laboratory. An isokinetic test system (Biodex system 4, BS4) and a balance testing system (Biodex Balance System, BBS)from the United States Biodex medical system were used to test related indexes. Results: In the LOS test, the overall score of Latin group is much better than sedentary group. In the ASL test, Latin group have a better balance ability in anterior and posterior direction and overall score than sedentary group(p
目的:探讨拉丁舞和太极对膝关节本体感觉和平衡的影响。方法:实验在北京师范大学体育与运动学院生物力学实验室进行。采用美国Biodex医疗系统的等速测试系统(Biodex system 4, BS4)和平衡测试系统(Biodex balance system, BBS)对相关指标进行测试。结果:在LOS测试中,拉丁组的总分明显优于久坐组。在美国手语测试中,拉丁组的前后方向平衡能力和总分均优于久坐组(p
{"title":"A Study on the Influence of Latin Dance and Tai Chi Exercise on Balance and Knee Joint Proprioception","authors":"Huihui Wang, Zhongqiu Ji, Guiping Jiang, Xibian Jiao, Weitong Liu","doi":"10.1109/IIKI.2016.50","DOIUrl":"https://doi.org/10.1109/IIKI.2016.50","url":null,"abstract":"Objective: To study the influence of Latin dance and Tai Chi on knee joint proprioception and balance. Method: All experiments were performed in the Beijing Normal University School of Physical Education and Sport Biomechanics Laboratory. An isokinetic test system (Biodex system 4, BS4) and a balance testing system (Biodex Balance System, BBS)from the United States Biodex medical system were used to test related indexes. Results: In the LOS test, the overall score of Latin group is much better than sedentary group. In the ASL test, Latin group have a better balance ability in anterior and posterior direction and overall score than sedentary group(p","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1