首页 > 最新文献

J. Ubiquitous Syst. Pervasive Networks最新文献

英文 中文
An Optimized Kappa Architecture for IoT Data Management in Smart Farming 智能农业物联网数据管理的优化Kappa架构
Pub Date : 2022-12-01 DOI: 10.5383/juspn.17.02.002
Jean Bertin Nkamla Penka, Saïd Mahmoudi, Olivier Debauche
Agriculture 4.0 is a domain of IoT in full growth which produces large amounts of data from machines, robots, and sensors networks. This data must be processed very quickly, especially for the systems that need to make real-time decisions. The Kappa architecture provides a way to process Agriculture 4.0 data at high speed in the cloud, and thus meets processing requirements. This paper presents an optimized version of the Kappa architecture allowing fast and efficient data management in Agriculture. The goal of this optimized version of the classical Kappa architecture is to improve memory management and processing speed. the Kappa architecture parameters are fine tuned in order to process data from a concrete use case. The results of this work have shown the impact of parameters tweaking on the speed of treatment. We have also proven that the combination of Apache Samza with Apache Druid offers the better performances
农业4.0是一个全面发展的物联网领域,它从机器、机器人和传感器网络中产生大量数据。必须非常快速地处理这些数据,特别是对于需要做出实时决策的系统。Kappa架构提供了一种在云中高速处理农业4.0数据的方法,从而满足了处理需求。本文提出了Kappa架构的一个优化版本,允许在农业中进行快速有效的数据管理。经典Kappa架构的这个优化版本的目标是改进内存管理和处理速度。Kappa体系结构参数被微调,以便处理来自具体用例的数据。这项工作的结果显示了参数调整对治疗速度的影响。我们也证明了阿帕奇Samza和阿帕奇德鲁伊的结合可以提供更好的性能
{"title":"An Optimized Kappa Architecture for IoT Data Management in Smart Farming","authors":"Jean Bertin Nkamla Penka, Saïd Mahmoudi, Olivier Debauche","doi":"10.5383/juspn.17.02.002","DOIUrl":"https://doi.org/10.5383/juspn.17.02.002","url":null,"abstract":"Agriculture 4.0 is a domain of IoT in full growth which produces large amounts of data from machines, robots, and sensors networks. This data must be processed very quickly, especially for the systems that need to make real-time decisions. The Kappa architecture provides a way to process Agriculture 4.0 data at high speed in the cloud, and thus meets processing requirements. This paper presents an optimized version of the Kappa architecture allowing fast and efficient data management in Agriculture. The goal of this optimized version of the classical Kappa architecture is to improve memory management and processing speed. the Kappa architecture parameters are fine tuned in order to process data from a concrete use case. The results of this work have shown the impact of parameters tweaking on the speed of treatment. We have also proven that the combination of Apache Samza with Apache Druid offers the better performances","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121314913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Low-Cost IoT and LPWAN-Based Flood Forecast and Monitoring System 基于低成本物联网和低功耗广域网的洪水预报和监测系统
Pub Date : 2022-08-01 DOI: 10.5383/juspn.17.01.006
Nassima Tadrist, Olivier Debauche, Saïd Mahmoudi, Adriano Guttadauria
The recent floods have shown that the classic monitoring systems for watercourses are no longer adapted because other phenomena such as the insufficient capacity and/or obstruction of drainage networks, the modification of cultivation practices and rotations, the increase in the size of plots linked to the reparcelling, the urbanization of floodable areas, etc. The combination of all these causes, plus the modification of the water regime, implies an increase in the risk of flooding and an adapted monitoring that is no longer limited to watercourses in order to give early warning of the risk of flooding by runoff. The Internet of Things (IoT) and the availability of microcontrollers and sensors with low data rates and long ranges, as well as low-power wide area networks (LPWANs), allow for much more advanced monitoring systems.
最近的洪水表明,由于其他现象,如排水网络容量不足和/或阻塞、耕作方法和轮作的改变、与重新规划有关的地块面积的增加、可淹水地区的城市化等,经典的水道监测系统已不再适用。所有这些原因加在一起,再加上水状况的改变,意味着洪水的危险增加,并意味着不再局限于水道的调整监测,以便对径流造成洪水的危险发出早期预警。物联网(IoT)以及具有低数据速率和长距离的微控制器和传感器的可用性,以及低功耗广域网(lpwan),允许更先进的监控系统。
{"title":"Towards Low-Cost IoT and LPWAN-Based Flood Forecast and Monitoring System","authors":"Nassima Tadrist, Olivier Debauche, Saïd Mahmoudi, Adriano Guttadauria","doi":"10.5383/juspn.17.01.006","DOIUrl":"https://doi.org/10.5383/juspn.17.01.006","url":null,"abstract":"The recent floods have shown that the classic monitoring systems for watercourses are no longer adapted because other phenomena such as the insufficient capacity and/or obstruction of drainage networks, the modification of cultivation practices and rotations, the increase in the size of plots linked to the reparcelling, the urbanization of floodable areas, etc. The combination of all these causes, plus the modification of the water regime, implies an increase in the risk of flooding and an adapted monitoring that is no longer limited to watercourses in order to give early warning of the risk of flooding by runoff. The Internet of Things (IoT) and the availability of microcontrollers and sensors with low data rates and long ranges, as well as low-power wide area networks (LPWANs), allow for much more advanced monitoring systems.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114767892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices 基于url的移动设备网络钓鱼检测NLP变压器性能研究
Pub Date : 2022-08-01 DOI: 10.5383/juspn.17.01.005
H. Shirazi, K. Haynes, I. Ray
Hackers are increasingly launching phishing attacks via SMS and social media. Games and dating apps introduce yet another attack vector. However, current deep learning-based phishing detection applications do not apply to mobile devices due to the computational burden. We propose a lightweight phishing detection algorithm that distinguishes phishing from legitimate websites solely from URLs to be used in mobile devices. As a baseline performance, we apply Artificial Neural Networks (ANNs) to URL-based and HTML-based website features. A model search results in 15 ANN models with accuracies >96%, comparable to state-of-the-art approaches. Next, we test the performance of deep ANNs on URLbased features only; however, all models perform poorly with the highest accuracy of 86.2%, indicating that URL-based features alone are not adequate to detect phishing websites even with deep ANNs. Since language transformers learn to represent context-dependent text sequences, we hypothesize that they will be able to learn directly from the text in URLs to distinguish between legitimate and malicious websites. We apply three state-of-the-art deep transformers (BERT, ELECTRA, and RoBERTa) for phishing detection. Testing custom and standard vocabularies, we find that pre-trained transformers available for immediate use (with fine-tuning) outperform the model trained with the custom URL-based vocabulary. In addition, we test a thinner BERT transformer which is suitable for lightweight devices like mobiles, called MobileBERT. Our results emphasize that evaluation metrics of this model are competitive to other models in this study, yet the testing time is significantly less, making this model a choice for embedding phishing detection algorithms in mobile phones. Using pre-trained transformers to predict phishing websites from only URLs has five advantages: 1) requires little training time (230 to 320 s), 2) is more easily updatable than feature-based approaches because no pre-processing of URLs is required, 3) is safer to use because phishing websites can be predicted without physically visiting the malicious sites, 4) is easily deployable for real-time detection and is applicable to run on mobile devices, and 5) using a mobile specific transformer yields comparable performance and predicts 3 times faster than the other transformer models in this study.
黑客越来越多地通过短信和社交媒体发起网络钓鱼攻击。游戏和约会应用程序引入了另一种攻击媒介。然而,目前基于深度学习的网络钓鱼检测应用程序由于计算负担而不适用于移动设备。我们提出了一种轻量级的网络钓鱼检测算法,该算法仅从移动设备中使用的url中区分网络钓鱼与合法网站。作为基准性能,我们将人工神经网络(ann)应用于基于url和基于html的网站特征。模型搜索结果为15个ANN模型,准确率>96%,与最先进的方法相当。接下来,我们仅在基于url的特征上测试深度人工神经网络的性能;然而,所有模型都表现不佳,最高准确率为86.2%,这表明即使使用深度人工神经网络,仅基于url的特征也不足以检测网络钓鱼网站。由于语言转换器学习表示与上下文相关的文本序列,我们假设它们将能够直接从url中的文本中学习,以区分合法和恶意网站。我们采用三个最先进的深层变压器(BERT, ELECTRA和RoBERTa)进行网络钓鱼检测。在测试自定义词汇表和标准词汇表时,我们发现可立即使用的预训练的转换器(通过微调)优于使用基于url的自定义词汇表训练的模型。此外,我们还测试了一种更薄的BERT变压器,它适用于手机等轻型设备,称为MobileBERT。我们的研究结果强调,该模型的评估指标与本研究中其他模型相比具有竞争力,但测试时间显著减少,使该模型成为在手机上嵌入网络钓鱼检测算法的选择。使用预训练的变形器仅从url预测网络钓鱼网站有五个优点:1)需要很少的训练时间(230到320秒),2)比基于特征的方法更容易更新,因为不需要对url进行预处理,3)使用更安全,因为网络钓鱼网站可以在不实际访问恶意网站的情况下预测,4)易于部署用于实时检测,适用于移动设备上运行。5)使用移动专用变压器产生可比的性能,并且预测速度比本研究中其他变压器模型快3倍。
{"title":"Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices","authors":"H. Shirazi, K. Haynes, I. Ray","doi":"10.5383/juspn.17.01.005","DOIUrl":"https://doi.org/10.5383/juspn.17.01.005","url":null,"abstract":"Hackers are increasingly launching phishing attacks via SMS and social media. Games and dating apps introduce yet another attack vector. However, current deep learning-based phishing detection applications do not apply to mobile devices due to the computational burden. We propose a lightweight phishing detection algorithm that distinguishes phishing from legitimate websites solely from URLs to be used in mobile devices. As a baseline performance, we apply Artificial Neural Networks (ANNs) to URL-based and HTML-based website features. A model search results in 15 ANN models with accuracies >96%, comparable to state-of-the-art approaches. Next, we test the performance of deep ANNs on URLbased features only; however, all models perform poorly with the highest accuracy of 86.2%, indicating that URL-based features alone are not adequate to detect phishing websites even with deep ANNs. Since language transformers learn to represent context-dependent text sequences, we hypothesize that they will be able to learn directly from the text in URLs to distinguish between legitimate and malicious websites. We apply three state-of-the-art deep transformers (BERT, ELECTRA, and RoBERTa) for phishing detection. Testing custom and standard vocabularies, we find that pre-trained transformers available for immediate use (with fine-tuning) outperform the model trained with the custom URL-based vocabulary. In addition, we test a thinner BERT transformer which is suitable for lightweight devices like mobiles, called MobileBERT. Our results emphasize that evaluation metrics of this model are competitive to other models in this study, yet the testing time is significantly less, making this model a choice for embedding phishing detection algorithms in mobile phones. Using pre-trained transformers to predict phishing websites from only URLs has five advantages: 1) requires little training time (230 to 320 s), 2) is more easily updatable than feature-based approaches because no pre-processing of URLs is required, 3) is safer to use because phishing websites can be predicted without physically visiting the malicious sites, 4) is easily deployable for real-time detection and is applicable to run on mobile devices, and 5) using a mobile specific transformer yields comparable performance and predicts 3 times faster than the other transformer models in this study.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"95 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The way it made me feel - Creating and evaluating an in-app feedback tool for mobile apps 它给我的感觉是——为移动应用创建和评估应用内反馈工具
Pub Date : 2022-08-01 DOI: 10.5383/juspn.17.01.004
Simon André Scherr, Mher Ter-Tovmasyan, Frauke Neugebauer, Steffen Hupp, Frank Elberzhager
Mobile apps are becoming increasingly important in everyone's daily life. The success of an app is linked to high user acceptance. Therefore, it is necessary to capture users' expectations, needs, and problems regarding an app in any situation. By continuously capturing and analyzing user feedback, developers can evaluate the level of user acceptance. There are various feedback channels, such as app stores, social networks, and within the app, which can be used to capture user feedback. As we already have experience with feedback from app stores and social networks, we wanted to investigate inapp feedback approaches and thus conducted a mapping study to understand the state of the art of these approaches.We analyzed 36 publications and derived requirements for in-app feedback tools. Based on that, we defined requirements for an in-app feedback tool to describe its prototypical realization. Then we performed an evaluation regarding user acceptance of our tool with 33 participants. The evaluation showed a high rate of acceptance for the tool among the participants. The results also highlighted improvement areas for our tool, such as optimizing the rate of requests for feedback. We plan to address these aspects in future work and to continue improving our tool.
移动应用程序在每个人的日常生活中变得越来越重要。一款应用的成功与用户的高接受度息息相关。因此,有必要在任何情况下捕捉用户对应用程序的期望、需求和问题。通过不断获取和分析用户反馈,开发人员可以评估用户的接受程度。有各种反馈渠道,如应用商店、社交网络和应用内部,可以用来获取用户反馈。因为我们已经从应用商店和社交网络获得了反馈,所以我们想要调查应用内部反馈方法,因此我们进行了一项地图研究,以了解这些方法的现状。我们分析了36份出版物,并得出了应用内反馈工具的需求。在此基础上,我们定义了应用内反馈工具的需求,以描述其原型实现。然后我们对33名参与者进行了关于我们工具的用户接受度的评估。评估显示参与者对该工具的接受率很高。结果还突出了我们工具的改进领域,例如优化反馈请求的比率。我们计划在未来的工作中解决这些问题,并继续改进我们的工具。
{"title":"The way it made me feel - Creating and evaluating an in-app feedback tool for mobile apps","authors":"Simon André Scherr, Mher Ter-Tovmasyan, Frauke Neugebauer, Steffen Hupp, Frank Elberzhager","doi":"10.5383/juspn.17.01.004","DOIUrl":"https://doi.org/10.5383/juspn.17.01.004","url":null,"abstract":"Mobile apps are becoming increasingly important in everyone's daily life. The success of an app is linked to high user acceptance. Therefore, it is necessary to capture users' expectations, needs, and problems regarding an app in any situation. By continuously capturing and analyzing user feedback, developers can evaluate the level of user acceptance. There are various feedback channels, such as app stores, social networks, and within the app, which can be used to capture user feedback. As we already have experience with feedback from app stores and social networks, we wanted to investigate inapp feedback approaches and thus conducted a mapping study to understand the state of the art of these approaches.We analyzed 36 publications and derived requirements for in-app feedback tools. Based on that, we defined requirements for an in-app feedback tool to describe its prototypical realization. Then we performed an evaluation regarding user acceptance of our tool with 33 participants. The evaluation showed a high rate of acceptance for the tool among the participants. The results also highlighted improvement areas for our tool, such as optimizing the rate of requests for feedback. We plan to address these aspects in future work and to continue improving our tool.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Operation of Motorcycle Taxi Drivers in Nigeria Using Causal Loop Diagram 利用因果循环图了解尼日利亚摩托车出租车司机的经营状况
Pub Date : 2022-01-01 DOI: 10.5383/juspn.16.01.001
O. Aluko, A. Gühnemann, P. Timms
Road safety is a subject of concern the world over and many studies have looked into how to improve safe travel. Motorcycles, including motorcycle taxis, are particularly vulnerable. This paper reports the outcome of a study conducted on motorcycle taxi safety problems using a system dynamics method. Qualitative data was obtained from the field and analysed using qualitative analysis methods. The outcome of the qualitative analysis led to the formulation of a dynamic hypothesis for a system dynamics approach, whose first step was to develop and analyse a causal loop diagram [CLD]. This CLD demonstrates how deterrence, a behavioural pattern that can be produced by the appropriate application of sanctions, is both strengthened and weakened within the system. The paper uses this analysis to provide insights about the behavioural patterns of motorcycle taxi operation in Nigeria. These insights include the possibility of maintaining the system at equilibrium for a desired level of deterrence as well as the possibility of breaking undesirable cycles of bribery and jumping arrest loops. These insights can also be useful in other countries of the world where motorcycle taxis operate.
道路安全是全世界都关注的问题,许多研究都在探讨如何提高安全出行。摩托车,包括摩托车出租车,尤其容易受到伤害。本文报告了用系统动力学方法对摩托车出租车安全问题进行研究的结果。从野外获得定性资料,采用定性分析方法进行分析。定性分析的结果导致了系统动力学方法的动态假设的形成,其第一步是开发和分析因果循环图[CLD]。这一案例说明了威慑是一种通过适当实施制裁而产生的行为模式,如何在系统内得到加强和削弱。本文利用这一分析来提供有关尼日利亚摩托车出租车运营行为模式的见解。这些见解包括维持系统平衡的可能性,以达到期望的威慑水平,以及打破不受欢迎的贿赂循环和跳跃逮捕循环的可能性。这些见解对世界上其他经营摩托出租车的国家也很有用。
{"title":"Understanding the Operation of Motorcycle Taxi Drivers in Nigeria Using Causal Loop Diagram","authors":"O. Aluko, A. Gühnemann, P. Timms","doi":"10.5383/juspn.16.01.001","DOIUrl":"https://doi.org/10.5383/juspn.16.01.001","url":null,"abstract":"Road safety is a subject of concern the world over and many studies have looked into how to improve safe travel. Motorcycles, including motorcycle taxis, are particularly vulnerable. This paper reports the outcome of a study conducted on motorcycle taxi safety problems using a system dynamics method. Qualitative data was obtained from the field and analysed using qualitative analysis methods. The outcome of the qualitative analysis led to the formulation of a dynamic hypothesis for a system dynamics approach, whose first step was to develop and analyse a causal loop diagram [CLD]. This CLD demonstrates how deterrence, a behavioural pattern that can be produced by the appropriate application of sanctions, is both strengthened and weakened within the system. The paper uses this analysis to provide insights about the behavioural patterns of motorcycle taxi operation in Nigeria. These insights include the possibility of maintaining the system at equilibrium for a desired level of deterrence as well as the possibility of breaking undesirable cycles of bribery and jumping arrest loops. These insights can also be useful in other countries of the world where motorcycle taxis operate.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fire Risk Prediction Using Cloud-based Weather Data Services 利用基于云的天气数据服务预测火灾风险
Pub Date : 2022-01-01 DOI: 10.5383/juspn.16.01.005
R. Strand, Sindre Stokkenes, L. Kristensen, T. Log
Dry and cold winter seasons result in very dry indoor conditions and have historically contributed to severe fires in the high and dense representation of wooden homes in Norway. The fire in Lærdalsøyri, January 2014, is a devastating reminder of town fires still posing a threat to a modern society. In order to reduce conflagration probability and consequences, it is necessary to have an accurate estimate of the current and near future fire risk to take proper planning precautions. Cloud computing services providing access to weather data in the form of measurements and forecasts, combined with recent developments in fire risk modelling, may enable smart and fine-grained fire risk prediction services. The main contribution of this study is implementation and experimental validation of a wooden home predictive fire risk indication model, as well as outlining a wooden home fire risk concept. The wooden home fire risk model focuses on the first house catching fire (indoors) in a potential conflagration event. Such a fire would be critical to intervene prior to the fire developing exterior flames and embers post flashover, and thus high likelihood of fire spread. The implemented model exploits cloud-provided weather measurements and forecasts, to predict the current- and near future fire risk at given geographical locations. It computes the indoor wooden fuel moisture content of houses that may catch fire, using measured and forecasted outdoor temperature and relative humidity, and estimates the time to flashover. The latter is found through an empirical relation with the fuel moisture content, and can be used as an indication of the fire risk, beyond the modelled single house. The model implementation was integrated into a micro-service based software system and experimentally validated at selected geographical locations, relying on weather data provided by the RESTful API’s of the Norwegian Meteorological Institute. The validation took place by applying the model to predefined cases, with an outcome known from observations or theory. The first part is a general evaluation of the outputs, considering three historical fires. Then, seasonal changes and natural climate variations were considered. Our evaluation demonstrates the ability to provide trustworthy and accurate fire risk indications using a combination of recorded weather data and forecasts. Further, our cloud- and micro-service based software system implementation is efficient with respect to data storage and computation time. Finally, the novel fire risk concept is demonstrated for a selected city, based on model output. It successfully depicts the implications following reduced indoor humidity by utilizing location specific fire risk contours.
干燥和寒冷的冬季导致非常干燥的室内条件,并且在历史上导致了挪威高而密集的木质房屋的严重火灾。2014年1月发生在伊里耶尔达尔斯岛的大火是一个毁灭性的提醒,提醒人们城镇火灾仍然对现代社会构成威胁。为了减少火灾发生的可能性和后果,有必要对当前和近期的火灾风险进行准确的估计,并采取适当的规划预防措施。云计算服务以测量和预报的形式提供对天气数据的访问,结合火灾风险建模的最新发展,可以实现智能和细粒度的火灾风险预测服务。本研究的主要贡献在于木质房屋火灾风险预测指示模型的实施和实验验证,以及木质房屋火灾风险概念的概述。木制房屋火灾风险模型关注的是在潜在的火灾事件中第一个着火的房屋(室内)。这样的火灾将是至关重要的,在火灾发展外部火焰和余烬后闪燃,因此高可能性的火灾蔓延之前进行干预。实现的模型利用云提供的天气测量和预报来预测给定地理位置当前和近期的火灾风险。它利用测量和预测的室外温度和相对湿度,计算可能着火的房屋的室内木质燃料含水率,并估计闪络时间。后者是通过与燃料水分含量的经验关系发现的,并且可以用作火灾风险的指示,超出了模拟的单个房屋。该模型的实现被集成到一个基于微服务的软件系统中,并在选定的地理位置进行了实验验证,实验依据是挪威气象研究所RESTful API提供的天气数据。通过将模型应用于预定义的案例,并从观察或理论中获得已知的结果,从而进行验证。第一部分是对产出的总体评价,考虑到三次历史火灾。然后考虑季节变化和自然气候变化。我们的评估显示,我们有能力结合记录的天气数据和预报,提供可靠和准确的火灾风险指示。此外,我们基于云和微服务的软件系统实现在数据存储和计算时间方面是高效的。最后,基于模型输出,对选定的城市进行了新的火灾风险概念论证。它通过利用特定位置的火灾风险轮廓成功地描述了室内湿度降低后的影响。
{"title":"Fire Risk Prediction Using Cloud-based Weather Data Services","authors":"R. Strand, Sindre Stokkenes, L. Kristensen, T. Log","doi":"10.5383/juspn.16.01.005","DOIUrl":"https://doi.org/10.5383/juspn.16.01.005","url":null,"abstract":"Dry and cold winter seasons result in very dry indoor conditions and have historically contributed to severe fires in the high and dense representation of wooden homes in Norway. The fire in Lærdalsøyri, January 2014, is a devastating reminder of town fires still posing a threat to a modern society. In order to reduce conflagration probability and consequences, it is necessary to have an accurate estimate of the current and near future fire risk to take proper planning precautions. Cloud computing services providing access to weather data in the form of measurements and forecasts, combined with recent developments in fire risk modelling, may enable smart and fine-grained fire risk prediction services. The main contribution of this study is implementation and experimental validation of a wooden home predictive fire risk indication model, as well as outlining a wooden home fire risk concept. The wooden home fire risk model focuses on the first house catching fire (indoors) in a potential conflagration event. Such a fire would be critical to intervene prior to the fire developing exterior flames and embers post flashover, and thus high likelihood of fire spread. The implemented model exploits cloud-provided weather measurements and forecasts, to predict the current- and near future fire risk at given geographical locations. It computes the indoor wooden fuel moisture content of houses that may catch fire, using measured and forecasted outdoor temperature and relative humidity, and estimates the time to flashover. The latter is found through an empirical relation with the fuel moisture content, and can be used as an indication of the fire risk, beyond the modelled single house. The model implementation was integrated into a micro-service based software system and experimentally validated at selected geographical locations, relying on weather data provided by the RESTful API’s of the Norwegian Meteorological Institute. The validation took place by applying the model to predefined cases, with an outcome known from observations or theory. The first part is a general evaluation of the outputs, considering three historical fires. Then, seasonal changes and natural climate variations were considered. Our evaluation demonstrates the ability to provide trustworthy and accurate fire risk indications using a combination of recorded weather data and forecasts. Further, our cloud- and micro-service based software system implementation is efficient with respect to data storage and computation time. Finally, the novel fire risk concept is demonstrated for a selected city, based on model output. It successfully depicts the implications following reduced indoor humidity by utilizing location specific fire risk contours.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116068776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective and Efficient Framework for Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Cloud Data 基于加密外包云数据的快速保密关键字搜索框架
Pub Date : 2021-12-01 DOI: 10.5383/juspn.15.02.006
A. Cuzzocrea, C. Leung, S. Sourav, Bryan H. Wodi
Cloud providers offer storage as a service to the data owners to store emails and files on the cloud server. However, sensitive data should be encrypted before storing on the cloud server to avoid privacy concerns. With the encryption of documents, it is not feasible for data owners to retrieve documents based on keyword search as they can do with plain text documents. Hence, it is desirable to perform a multi-keyword search on encrypted data. To achieve this goal, we present a fast privacy-preserving model for keyword search on encrypted outsourced data in this paper. Specifically, the model first performs a keyword search on encrypted data and checks its support for dynamic operations. Based on keyword search results, it then sorts all the relevant data documents using the number of keywords matched for a given query. To evaluate its performance of our model, we applied the standard metrics like precision and recall. The results show the effectiveness of our privacy-preserving keyword search on encrypted outsourced data.
云提供商为数据所有者提供存储服务,将电子邮件和文件存储在云服务器上。但是,敏感数据在存储到云服务器之前应该进行加密,以避免隐私问题。对文档进行加密后,数据所有者无法像处理纯文本文档那样基于关键字搜索检索文档。因此,需要对加密数据执行多关键字搜索。为了实现这一目标,本文提出了一种用于加密外包数据关键字搜索的快速隐私保护模型。具体来说,该模型首先对加密数据执行关键字搜索,并检查其对动态操作的支持。然后根据关键字搜索结果,使用与给定查询匹配的关键字数量对所有相关数据文档进行排序。为了评估我们模型的性能,我们应用了精度和召回率等标准指标。结果表明,我们的隐私保护关键字搜索在加密外包数据上的有效性。
{"title":"An Effective and Efficient Framework for Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Cloud Data","authors":"A. Cuzzocrea, C. Leung, S. Sourav, Bryan H. Wodi","doi":"10.5383/juspn.15.02.006","DOIUrl":"https://doi.org/10.5383/juspn.15.02.006","url":null,"abstract":"Cloud providers offer storage as a service to the data owners to store emails and files on the cloud server. However, sensitive data should be encrypted before storing on the cloud server to avoid privacy concerns. With the encryption of documents, it is not feasible for data owners to retrieve documents based on keyword search as they can do with plain text documents. Hence, it is desirable to perform a multi-keyword search on encrypted data. To achieve this goal, we present a fast privacy-preserving model for keyword search on encrypted outsourced data in this paper. Specifically, the model first performs a keyword search on encrypted data and checks its support for dynamic operations. Based on keyword search results, it then sorts all the relevant data documents using the number of keywords matched for a given query. To evaluate its performance of our model, we applied the standard metrics like precision and recall. The results show the effectiveness of our privacy-preserving keyword search on encrypted outsourced data.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multistage Arabic and Turkish Text Compression via Characters Encoding and 7-Zip 多级阿拉伯语和土耳其语文本压缩通过字符编码和7-Zip
Pub Date : 2021-03-01 DOI: 10.5383/JUSPN.15.01.002
Tariq Abu Hilal, H. A. Hilal, Ala Abu Hilal
Turkish lossless text compression was proposed by converting the character’s from UTF-8 to ANSI system for space-preserving. Likewise, we present a decoding method that transforms the encoded ANSI string back to its original format. Unlike the one-byte ANSI characters, some of the Turkish alphabets are being stored in 2 bytes size. All that space comes at a price. The developed sequential encoding technique will reduce the size of the text file up to 9%. Moreover, the Turkish encoded text will retain its original form after decoding. According to our proposal, it is considered as a lossless text compression, where it’s a common concern today. Thus, many parties have become interested in Unicode compression. Basically, our algorithm is mapping Unicode Turkish characters into ANSI, by using the available 8-bit legacy. For Arabic Text Compression, a sequential encoding technique was suggested that efficiently converts Arabic characters string from UTF-8 to ANSI characters coding. The encoding algorithm presented in this paper significantly reduces the file size. The decoding method transforms the encoded ANSI string back to its original format. Unlike the one-byte ANSI characters, Arabic alphabets are currently being stored in 2 bytes size which leads to inefficient space utilization. The newly developed sequential encoding technique reduces the space required for storage up to fifty percent. In addition, the proposed technique will retain the Arabic encoded text to its original form after decoding, which is leading to a lossless text compression. Thus, addressing the common concern of the currently available Arabic characters compression techniques. In this research, a multistage compression process was implemented on Turkish and Arabic languages, by using the new encoding technique, in addition to the 7-Zip application, which has shown a significant file size reduction.
提出了土耳其语无损文本压缩,将字符从UTF-8转换为保留空间的ANSI系统。同样,我们提出了一种解码方法,将编码的ANSI字符串转换回其原始格式。与单字节的ANSI字符不同,一些土耳其字母以2字节的大小存储。所有这些空间都是有代价的。所开发的顺序编码技术可以将文本文件的大小减少9%。此外,土耳其语编码文本在解码后将保留其原始形式。根据我们的建议,它被认为是一种无损文本压缩,这是当今普遍关注的问题。因此,很多人都对Unicode压缩感兴趣。基本上,我们的算法是通过使用可用的8位传统将Unicode土耳其字符映射到ANSI。对于阿拉伯文本压缩,提出了一种顺序编码技术,可以有效地将阿拉伯字符串从UTF-8转换为ANSI字符编码。本文提出的编码算法显著减小了文件大小。解码方法将编码的ANSI字符串转换回其原始格式。与单字节的ANSI字符不同,阿拉伯字母目前以2字节的大小存储,这导致了低效的空间利用。新开发的顺序编码技术将所需的存储空间减少了50%。此外,该技术将在解码后保留阿拉伯语编码文本的原始形式,从而实现无损文本压缩。因此,解决了目前可用的阿拉伯字符压缩技术中普遍存在的问题。在本研究中,除了7-Zip应用程序外,还使用新的编码技术对土耳其语和阿拉伯语实施了多阶段压缩过程,这显示了文件大小的显着减少。
{"title":"Multistage Arabic and Turkish Text Compression via Characters Encoding and 7-Zip","authors":"Tariq Abu Hilal, H. A. Hilal, Ala Abu Hilal","doi":"10.5383/JUSPN.15.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.15.01.002","url":null,"abstract":"Turkish lossless text compression was proposed by converting the character’s from UTF-8 to ANSI system for space-preserving. Likewise, we present a decoding method that transforms the encoded ANSI string back to its original format. Unlike the one-byte ANSI characters, some of the Turkish alphabets are being stored in 2 bytes size. All that space comes at a price. The developed sequential encoding technique will reduce the size of the text file up to 9%. Moreover, the Turkish encoded text will retain its original form after decoding. According to our proposal, it is considered as a lossless text compression, where it’s a common concern today. Thus, many parties have become interested in Unicode compression. Basically, our algorithm is mapping Unicode Turkish characters into ANSI, by using the available 8-bit legacy. For Arabic Text Compression, a sequential encoding technique was suggested that efficiently converts Arabic characters string from UTF-8 to ANSI characters coding. The encoding algorithm presented in this paper significantly reduces the file size. The decoding method transforms the encoded ANSI string back to its original format. Unlike the one-byte ANSI characters, Arabic alphabets are currently being stored in 2 bytes size which leads to inefficient space utilization. The newly developed sequential encoding technique reduces the space required for storage up to fifty percent. In addition, the proposed technique will retain the Arabic encoded text to its original form after decoding, which is leading to a lossless text compression. Thus, addressing the common concern of the currently available Arabic characters compression techniques. In this research, a multistage compression process was implemented on Turkish and Arabic languages, by using the new encoding technique, in addition to the 7-Zip application, which has shown a significant file size reduction.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"67 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security - Reinforcement Learning vs Recurrent Networks 人工智能对普适系统和普适网络安全的贡献——强化学习vs循环网络
Pub Date : 2021-03-01 DOI: 10.5383/JUSPN.15.02.001
C. Feltus
Reinforcement learning and recurrent networks are two emerging machine-learning paradigms. The first learns the best actions an agent needs to perform to maximize its rewards in a particular environment and the second has the specificity to use an internal state to remember previous analysis results and consider them for the current one. Research into RL and recurrent network has been proven to have made a real contribution to the protection of ubiquitous systems and pervasive networks against intrusions and malwares. In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research in network security was complete.
强化学习和循环网络是两种新兴的机器学习范式。第一个学习代理在特定环境中需要执行的最佳动作以最大化其奖励,第二个具有使用内部状态来记住先前分析结果并将其考虑为当前分析结果的特殊性。对强化学习和循环网络的研究已经被证明对保护无处不在的系统和无处不在的网络免受入侵和恶意软件的侵害做出了真正的贡献。在本文中,对各种攻击进行了系统的回顾,并对网络安全中基于RL和循环网络的研究的趋势和未来感兴趣的领域进行了分析。
{"title":"AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security - Reinforcement Learning vs Recurrent Networks","authors":"C. Feltus","doi":"10.5383/JUSPN.15.02.001","DOIUrl":"https://doi.org/10.5383/JUSPN.15.02.001","url":null,"abstract":"Reinforcement learning and recurrent networks are two emerging machine-learning paradigms. The first learns the best actions an agent needs to perform to maximize its rewards in a particular environment and the second has the specificity to use an internal state to remember previous analysis results and consider them for the current one. Research into RL and recurrent network has been proven to have made a real contribution to the protection of ubiquitous systems and pervasive networks against intrusions and malwares. In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research in network security was complete.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unbounded Spatial Data Stream Query Processing using Spatial Semijoins 使用空间半连接的无界空间数据流查询处理
Pub Date : 2021-03-01 DOI: 10.5383/JUSPN.15.02.005
W. Osborn
In this paper, the problem of query processing in spatial data streams is explored, with a focus on the spatial join operation. Although the spatial join has been utilized in many proposed centralized and distributed query processing strategies, for its application to spatial data streams the spatial join operation has received very little attention. One identified limitation with existing strategies is that a bounded region of space (i.e., spatial extent) from which the spatial objects are generated needs to be known in advance. However, this information may not be available. Therefore, two strategies for spatial data stream join processing are proposed where the spatial extent of the spatial object stream is not required to be known in advance. Both strategies estimate the common region that is shared by two or more spatial data streams in order to process the spatial join. An evaluation of both strategies includes a comparison with a recently proposed approach in which the spatial extent of the data set is known. Experimental results show that one of the strategies performs very well at estimating the common region of space using only incoming objects on the spatial data streams. Other limitations of this work are also identified.
本文探讨了空间数据流中的查询处理问题,重点研究了空间连接操作。尽管空间连接在许多集中式和分布式查询处理策略中得到了应用,但空间连接操作在空间数据流中的应用却很少受到关注。现有策略的一个已确定的限制是,需要事先知道从中产生空间对象的有限空间区域(即空间范围)。但是,这些信息可能无法获得。因此,在不需要预先知道空间对象流空间范围的情况下,提出了两种空间数据流连接处理策略。这两种策略都估计由两个或多个空间数据流共享的公共区域,以便处理空间连接。对这两种策略的评估包括与最近提出的方法进行比较,其中数据集的空间范围是已知的。实验结果表明,其中一种策略在仅使用空间数据流上的传入对象来估计空间公共区域方面表现良好。本文还指出了这项工作的其他局限性。
{"title":"Unbounded Spatial Data Stream Query Processing using Spatial Semijoins","authors":"W. Osborn","doi":"10.5383/JUSPN.15.02.005","DOIUrl":"https://doi.org/10.5383/JUSPN.15.02.005","url":null,"abstract":"In this paper, the problem of query processing in spatial data streams is explored, with a focus on the spatial join operation. Although the spatial join has been utilized in many proposed centralized and distributed query processing strategies, for its application to spatial data streams the spatial join operation has received very little attention. One identified limitation with existing strategies is that a bounded region of space (i.e., spatial extent) from which the spatial objects are generated needs to be known in advance. However, this information may not be available. Therefore, two strategies for spatial data stream join processing are proposed where the spatial extent of the spatial object stream is not required to be known in advance. Both strategies estimate the common region that is shared by two or more spatial data streams in order to process the spatial join. An evaluation of both strategies includes a comparison with a recently proposed approach in which the spatial extent of the data set is known. Experimental results show that one of the strategies performs very well at estimating the common region of space using only incoming objects on the spatial data streams. Other limitations of this work are also identified.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115375246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
J. Ubiquitous Syst. Pervasive Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1