首页 > 最新文献

2016 19th International Conference on Network-Based Information Systems (NBiS)最新文献

英文 中文
A Proposal of Distributed Autonomous Cooperative System about Exclusive Web Crawling for Cyber Security 一种面向网络安全的排他性网络抓取分布式自治协作系统
Yoshihiro Kawano, Eiji Nunohiro
Recently, cyber security to protect information systems or personal information against threats of the internet is big issue. We are studying a distributed autonomous cooperative system about exclusive Web crawling for cyber security. The system is divided into three subsystems, that is, Web space projection system, autonomous cooperative Web crawler, and the crawler runtime environment. The Web crawlers to collect Web sites effectively and exclusively. In addition, by introduction of virtualization technology to crawler runtime environment, dynamic reconstruction for effective detection of malicious Web sites is realized. This paper only discusses about design of the Web crawler and its runtime environment. Future works are development of the crawler and the runtime environment, and evaluation.
最近,保护信息系统或个人信息免受互联网威胁的网络安全是一个大问题。针对网络安全问题,我们正在研究一种分布式的网络独占抓取自治协作系统。该系统分为三个子系统,即Web空间投影系统、自主协作Web爬虫和爬虫运行环境。网络爬虫收集网站有效和专门。此外,通过将虚拟化技术引入爬虫运行环境,实现动态重构,有效检测恶意网站。本文只讨论了网络爬虫的设计及其运行环境。未来的工作是开发爬虫和运行环境,以及评估。
{"title":"A Proposal of Distributed Autonomous Cooperative System about Exclusive Web Crawling for Cyber Security","authors":"Yoshihiro Kawano, Eiji Nunohiro","doi":"10.1109/NBiS.2016.34","DOIUrl":"https://doi.org/10.1109/NBiS.2016.34","url":null,"abstract":"Recently, cyber security to protect information systems or personal information against threats of the internet is big issue. We are studying a distributed autonomous cooperative system about exclusive Web crawling for cyber security. The system is divided into three subsystems, that is, Web space projection system, autonomous cooperative Web crawler, and the crawler runtime environment. The Web crawlers to collect Web sites effectively and exclusively. In addition, by introduction of virtualization technology to crawler runtime environment, dynamic reconstruction for effective detection of malicious Web sites is realized. This paper only discusses about design of the Web crawler and its runtime environment. Future works are development of the crawler and the runtime environment, and evaluation.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering for Similar Recipes in User-Generated Recipe Sites Based on Main Ingredients and Main Seasoning 基于主配料和主调味料的用户生成菜谱网站相似菜谱聚类
Akiyo Nadamoto, Shunsuke Hanai, Hidetsugu Nanba
Today, many people are constantly using user-generated recipe sites when they prepare their meals. Users search for recipes for their meals from the recipe sites. However, when they search for a recipe using an ingredient name, numerous similar pages which are coincidentally similar or which have been plagiarized are found for them. Moreover, a user who searches for a recipe usually does not select a high-ranking recipe from the search results, reacting better than one might with usual web searches. Given many similar recipes included in the search results, it appears to be difficult for them to compare multiple recipes. Actually, when users compare similar recipes, they must better understand the different points of similar recipes. That need for comparison imposes a great burden on users. Therefore, a system classifying the results of user searches according to similar pages in real time would be beneficial for users. In this paper, we propose a clustering method for user-generated recipe sites based on page structure and main ingredient and main seasoning of the food. It provides a means of classifying the user search results according to similar pages. We conducted an experiment to measure the benefits of our proposed method. The experiment results presents the benefits of our proposed method, which classifies similar recipes based on the main ingredients and main seasonings.
今天,许多人在准备食物时经常使用用户生成的食谱网站。用户从食谱网站上搜索菜谱。然而,当他们使用配料名称搜索食谱时,他们会发现许多相似的页面,这些页面恰好相似或被抄袭。此外,搜索菜谱的用户通常不会从搜索结果中选择排名靠前的菜谱,这比通常的网络搜索反应要好。鉴于搜索结果中包含许多相似的食谱,他们似乎很难对多个食谱进行比较。其实,当用户比较相似的食谱时,他们必须更好地理解相似食谱的不同点。这种比较的需要给用户带来了很大的负担。因此,一个根据相似页面对用户搜索结果进行实时分类的系统将对用户有益。在本文中,我们提出了一种基于页面结构和食物的主要成分和主要调味料的用户生成食谱网站聚类方法。它提供了一种根据相似页面对用户搜索结果进行分类的方法。我们做了一个实验来衡量我们提出的方法的好处。实验结果表明,基于主配料和主调味料对相似菜谱进行分类的方法是有效的。
{"title":"Clustering for Similar Recipes in User-Generated Recipe Sites Based on Main Ingredients and Main Seasoning","authors":"Akiyo Nadamoto, Shunsuke Hanai, Hidetsugu Nanba","doi":"10.1109/NBiS.2016.49","DOIUrl":"https://doi.org/10.1109/NBiS.2016.49","url":null,"abstract":"Today, many people are constantly using user-generated recipe sites when they prepare their meals. Users search for recipes for their meals from the recipe sites. However, when they search for a recipe using an ingredient name, numerous similar pages which are coincidentally similar or which have been plagiarized are found for them. Moreover, a user who searches for a recipe usually does not select a high-ranking recipe from the search results, reacting better than one might with usual web searches. Given many similar recipes included in the search results, it appears to be difficult for them to compare multiple recipes. Actually, when users compare similar recipes, they must better understand the different points of similar recipes. That need for comparison imposes a great burden on users. Therefore, a system classifying the results of user searches according to similar pages in real time would be beneficial for users. In this paper, we propose a clustering method for user-generated recipe sites based on page structure and main ingredient and main seasoning of the food. It provides a means of classifying the user search results according to similar pages. We conducted an experiment to measure the benefits of our proposed method. The experiment results presents the benefits of our proposed method, which classifies similar recipes based on the main ingredients and main seasonings.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127395410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network 基于用户视角的移动Ad Hoc网络风险评估
S. Tanimoto, Shunsuke Shiraki, M. Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai
Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This paper describes the risk assessment supposing the case where a mobile or smart phone is used for an ad hoc network. Thus, the risk factor of the mobile ad hoc network on the mobile or smart phone is extracted and analyzed, and future proposed measures are clarified. This contributes to achieving a mobile ad hoc network that is safe and secure from a user's viewpoint.
需要在灾难期间建立临时通信网络,例如地震。因此,自组织网络一直吸引着人们的注意,特别是移动或智能电话用于移动自组织网络。然而,手机或智能手机包含许多个人信息,电话号码列表等。因此,必须对移动自组网的安全性进行研究。本文描述了假设移动或智能手机用于自组织网络的情况下的风险评估。因此,提取和分析移动自组网对手机或智能手机的风险因素,并明确未来提出的措施。这有助于实现从用户的角度来看安全可靠的移动自组织网络。
{"title":"Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network","authors":"S. Tanimoto, Shunsuke Shiraki, M. Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai","doi":"10.1109/NBiS.2016.30","DOIUrl":"https://doi.org/10.1109/NBiS.2016.30","url":null,"abstract":"Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This paper describes the risk assessment supposing the case where a mobile or smart phone is used for an ad hoc network. Thus, the risk factor of the mobile ad hoc network on the mobile or smart phone is extracted and analyzed, and future proposed measures are clarified. This contributes to achieving a mobile ad hoc network that is safe and secure from a user's viewpoint.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EEORS: Energy Efficient Optimal Relay Selection Protocol for Underwater WSNs 水下无线传感器网络节能中继选择协议
A. Khan, Mudassir Ejaz, N. Javaid, Muhammad Qaisar Azeemi, U. Qasim, Z. Khan
In this paper, an energy efficient optimal relay selection protocol is proposed for underwater wireless sensor networks (UWSNs). Sensor nodes are randomly deployed in a three dimensional underwater network and is partitioned into three zones based on depth. The mid zone contains the relay nodes. Nodes in the relay zone are assigned values on the bases of location and depth. Nodes residing in the center of the relay zone are assigned highest location values. These values decrease as the nodes become farther from the center. Values are also assigned to the relay nodes based on depth. The optimal relay is the one having the highest (maximum) location and depth values. If the optimal relay is within the transmission range of the source nodes in the bottom zone, they send the data packets to the optimal relay that further forwards them to the sink. Direct transmission from source to sink at the expense of more energy is accomplished when the optimal relay lies outside the transmission range of the source nodes. Nodes in the top zone send data directly to sink. Relay nodes in the mid zone send the data to sink either directly or through the optimal relay node. When the most optimal relay node dies, the second optimal node becomes the most optimal relay node. Simulation results show that the proposed scheme outperforms the counterpart scheme in terms of energy efficiency due to the selection of the optimal relay.
针对水下无线传感器网络,提出了一种节能的中继优化选择协议。传感器节点随机部署在三维水下网络中,并根据深度划分为三个区域。中间区域包含中继节点。中继区内的节点根据位置和深度赋值。驻留在中继区域中心的节点被分配最高的位置值。这些值随着节点离中心越远而减小。还根据深度为中继节点分配值。最佳继电器是具有最高(最大)位置和深度值的继电器。如果最优中继在底部区域的源节点的传输范围内,它们将数据包发送给最优中继,再由最优中继转发到sink。当最优中继位于源节点的传输范围之外时,以更多的能量完成从源到汇聚的直接传输。顶部区域的节点直接向sink发送数据。中间区域的中继节点直接或通过最优中继节点将数据发送到sink。当最优中继节点死亡时,第二个最优节点成为最优中继节点。仿真结果表明,由于选择了最优继电器,该方案在能效方面优于同类方案。
{"title":"EEORS: Energy Efficient Optimal Relay Selection Protocol for Underwater WSNs","authors":"A. Khan, Mudassir Ejaz, N. Javaid, Muhammad Qaisar Azeemi, U. Qasim, Z. Khan","doi":"10.1109/NBiS.2016.74","DOIUrl":"https://doi.org/10.1109/NBiS.2016.74","url":null,"abstract":"In this paper, an energy efficient optimal relay selection protocol is proposed for underwater wireless sensor networks (UWSNs). Sensor nodes are randomly deployed in a three dimensional underwater network and is partitioned into three zones based on depth. The mid zone contains the relay nodes. Nodes in the relay zone are assigned values on the bases of location and depth. Nodes residing in the center of the relay zone are assigned highest location values. These values decrease as the nodes become farther from the center. Values are also assigned to the relay nodes based on depth. The optimal relay is the one having the highest (maximum) location and depth values. If the optimal relay is within the transmission range of the source nodes in the bottom zone, they send the data packets to the optimal relay that further forwards them to the sink. Direct transmission from source to sink at the expense of more energy is accomplished when the optimal relay lies outside the transmission range of the source nodes. Nodes in the top zone send data directly to sink. Relay nodes in the mid zone send the data to sink either directly or through the optimal relay node. When the most optimal relay node dies, the second optimal node becomes the most optimal relay node. Simulation results show that the proposed scheme outperforms the counterpart scheme in terms of energy efficiency due to the selection of the optimal relay.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Control of Envelope Pulse through Nonlinear and Dispersive Medium 非线性色散介质中包络脉冲的控制
H. Maeda, Jianming Jin, Kazuya Tomiura
Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable behavior for variety of electric field amplitudes, showing the spreading and the concentrating envelope wave form. The spreading and compressing effect for small and large input amplitudes are considered to be caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.
用约束插值剖面法模拟了光脉冲波在非线性色散介质中的传播。在具有色散和非线性的一维空间中,经光载波调制的高斯包络脉冲在各种电场振幅下均能成功传播,表现出扩张性和聚光性包络波形。大小输入幅值的扩频和压缩效应被认为是由介质的线性色散和非线性折射率调制之间的权衡引起的。
{"title":"Control of Envelope Pulse through Nonlinear and Dispersive Medium","authors":"H. Maeda, Jianming Jin, Kazuya Tomiura","doi":"10.1109/NBiS.2016.65","DOIUrl":"https://doi.org/10.1109/NBiS.2016.65","url":null,"abstract":"Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable behavior for variety of electric field amplitudes, showing the spreading and the concentrating envelope wave form. The spreading and compressing effect for small and large input amplitudes are considered to be caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114630676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Model for Energy-Aware Migration of Virtual Machines 虚拟机能量感知迁移模型
Dilawaer Duolikun, Ryoma Watanabe, T. Enokido, M. Takizawa
In order to realize eco-society, we have to reduce the electric energy consumed by servers in a cluster in addition to satisfying performance requirements. Virtual machines are now widely used to support applications with virtual computation service in clusters like cloud computing systems. Here, a virtual machine on a host server can migrate to a guest server while processes are being performed on the virtual machine. For example, if the host server of a virtual machine is heavily loaded and a guest server is less loaded, the virtual machine migrates to the guest server. In our previous studies, the EAMV (Energy-Aware Migration of Virtual machines) algorithm is proposed where a virtual machine migrates to a guest server which is expected to consume smaller electric energy to perform processes on the virtual machines. Here, the termination time of each process on each virtual machine is estimated. It is not easy to obtain the state of each process and take time to calculate the expected termination time. In this paper, a virtual machine is considered to be a unit of computation. Termination time of a virtual machine, i.e. time when every process is to terminate on the virtual machine'C is estimated by considering the virtual machines.
为了实现生态社会,除了满足性能要求外,我们还必须减少集群中服务器消耗的电能。虚拟机现在被广泛用于支持云计算系统等集群中具有虚拟计算服务的应用程序。在这里,主机服务器上的虚拟机可以在虚拟机上执行进程时迁移到客户服务器。例如,如果虚拟机的主机服务器负载过重,而客户机服务器负载较轻,则虚拟机将迁移到客户机服务器。在我们之前的研究中,我们提出了EAMV (energy - aware Migration of Virtual machines)算法,其中虚拟机迁移到客户服务器上,预计会消耗更少的电能来执行虚拟机上的进程。这里,估计每个虚拟机上每个进程的终止时间。获取每个进程的状态并不容易,并且需要花费一定的时间来计算预期的终止时间。在本文中,虚拟机被认为是一个计算单元。虚拟机的终止时间,即每个进程在虚拟机上终止的时间,通过考虑虚拟机来估计。
{"title":"A Model for Energy-Aware Migration of Virtual Machines","authors":"Dilawaer Duolikun, Ryoma Watanabe, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2016.86","DOIUrl":"https://doi.org/10.1109/NBiS.2016.86","url":null,"abstract":"In order to realize eco-society, we have to reduce the electric energy consumed by servers in a cluster in addition to satisfying performance requirements. Virtual machines are now widely used to support applications with virtual computation service in clusters like cloud computing systems. Here, a virtual machine on a host server can migrate to a guest server while processes are being performed on the virtual machine. For example, if the host server of a virtual machine is heavily loaded and a guest server is less loaded, the virtual machine migrates to the guest server. In our previous studies, the EAMV (Energy-Aware Migration of Virtual machines) algorithm is proposed where a virtual machine migrates to a guest server which is expected to consume smaller electric energy to perform processes on the virtual machines. Here, the termination time of each process on each virtual machine is estimated. It is not easy to obtain the state of each process and take time to calculate the expected termination time. In this paper, a virtual machine is considered to be a unit of computation. Termination time of a virtual machine, i.e. time when every process is to terminate on the virtual machine'C is estimated by considering the virtual machines.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117224572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transient Stability Analysis of an Islanded Microgrid under Variable Load 变负荷下孤岛微电网暂态稳定性分析
M. B. Rasheed, M. Awais, N. Javaid, Waseem Nazar, U. Qasim, Z. Khan
In this paper, we investigate some aspects related to microgrid (MG) stability. Due to different applications of MG, its structure and deployment topology vary depending upon the nature of application and operating modes (islanded or grid connected). So, the stability of MGs varies accordingly. This paper precisely explains the stability aspects (e.g., phase angle and power losses) of remotely located islanded MG having the capability to integrate distributed energy sources. Initially, the stability of three bus system is assessed under variable load and find some gaps related to stability as MG involves a high penetration of distributed energy sources. These gaps indicate that stability of a MG is not only in the control of generation/load but also in its coordination with other loads. After that, we implement the load coordination technique and analyze the stability against fixed and dynamic loads. For comprehensive analysis, four different cases are considered in which we vary load at different bus bars and check the performance. Lastly, we integrate the distributed energy source to islanded MG and perform the stability analysis. For validation purpose, extensive simulations of the proposed cases are conducted using Matlab. Simulation results depict that load coordination technique is more efficient regarding MG stability.
本文研究了与微电网稳定性有关的几个方面。由于MG的应用不同,其结构和部署拓扑根据应用的性质和运行模式(孤岛或并网)而有所不同。因此,mg的稳定性也随之变化。本文精确地解释了具有集成分布式能源能力的远程孤岛MG的稳定性方面(例如相角和功率损耗)。首先,对三母线系统在变负荷下的稳定性进行了评估,并发现了一些与稳定性相关的差距,因为MG涉及分布式能源的高渗透。这些间隙表明,电网的稳定性不仅在于对发电负荷的控制,还在于与其他负荷的协调。在此基础上,实现了载荷协调技术,分析了系统在固定载荷和动载荷作用下的稳定性。为了全面分析,我们考虑了四种不同的情况,我们在不同的母线上改变负载并检查性能。最后,将分布式能源集成到孤岛MG中,并进行了稳定性分析。为了验证目的,使用Matlab对所提出的案例进行了广泛的模拟。仿真结果表明,负荷协调技术对于MG的稳定性更为有效。
{"title":"Transient Stability Analysis of an Islanded Microgrid under Variable Load","authors":"M. B. Rasheed, M. Awais, N. Javaid, Waseem Nazar, U. Qasim, Z. Khan","doi":"10.1109/NBiS.2016.79","DOIUrl":"https://doi.org/10.1109/NBiS.2016.79","url":null,"abstract":"In this paper, we investigate some aspects related to microgrid (MG) stability. Due to different applications of MG, its structure and deployment topology vary depending upon the nature of application and operating modes (islanded or grid connected). So, the stability of MGs varies accordingly. This paper precisely explains the stability aspects (e.g., phase angle and power losses) of remotely located islanded MG having the capability to integrate distributed energy sources. Initially, the stability of three bus system is assessed under variable load and find some gaps related to stability as MG involves a high penetration of distributed energy sources. These gaps indicate that stability of a MG is not only in the control of generation/load but also in its coordination with other loads. After that, we implement the load coordination technique and analyze the stability against fixed and dynamic loads. For comprehensive analysis, four different cases are considered in which we vary load at different bus bars and check the performance. Lastly, we integrate the distributed energy source to islanded MG and perform the stability analysis. For validation purpose, extensive simulations of the proposed cases are conducted using Matlab. Simulation results depict that load coordination technique is more efficient regarding MG stability.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluations of Wireless V2X Communication Systems of for Winter Road Surveillance Systems 冬季道路监控系统无线V2X通信系统评估
Noriki Uchida, Kenta Ito, Go Hirakawa, Y. Shibata
With the recent rapid growth of V2X (Vehicle-to-X) developments, there are many expectations for the purpose of safety driving, road guidance, and the road surveillance system during the winter. However, in case of the road surveillance system during the winter, there are some difficulties for the recognition of the frozen road conditions by the current sensor system such as the locations or elapsed time of the observed data. Therefore, this paper proposes Wireless V2X Communication Systems of for Winter Road Surveillance Systems by the Delay Tolerant Networks (DTN). In the proposed systems, the vehicles equip the wireless V2X networks, and the observed data by the sensor of Quasi Electrostatic Field (QEF) are transferred to the target node with the DTN routing. Then, this papers are evaluated the various wireless networks such as IEEE802.11a/b/g/p, Wi-SUN, and the radio directional controls, and the results are discussed for the effectiveness of the proposed systems and the future studies.
随着近年来V2X (Vehicle-to-X)技术的快速发展,人们对冬季安全驾驶、道路引导和道路监控系统有了很多期望。然而,在冬季道路监控系统中,现有传感器系统对冰冻路况的识别存在一些困难,例如观测数据的位置或经过的时间。为此,本文提出了一种基于容延迟网络(DTN)的冬季道路监控无线V2X通信系统。在该系统中,车辆配备无线V2X网络,准静电场(QEF)传感器的观测数据通过DTN路由传输到目标节点。然后,本文对IEEE802.11a/b/g/p、Wi-SUN、无线定向控制等无线网络进行了评估,并对所提系统的有效性和未来的研究进行了讨论。
{"title":"Evaluations of Wireless V2X Communication Systems of for Winter Road Surveillance Systems","authors":"Noriki Uchida, Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/NBiS.2016.83","DOIUrl":"https://doi.org/10.1109/NBiS.2016.83","url":null,"abstract":"With the recent rapid growth of V2X (Vehicle-to-X) developments, there are many expectations for the purpose of safety driving, road guidance, and the road surveillance system during the winter. However, in case of the road surveillance system during the winter, there are some difficulties for the recognition of the frozen road conditions by the current sensor system such as the locations or elapsed time of the observed data. Therefore, this paper proposes Wireless V2X Communication Systems of for Winter Road Surveillance Systems by the Delay Tolerant Networks (DTN). In the proposed systems, the vehicles equip the wireless V2X networks, and the observed data by the sensor of Quasi Electrostatic Field (QEF) are transferred to the target node with the DTN routing. Then, this papers are evaluated the various wireless networks such as IEEE802.11a/b/g/p, Wi-SUN, and the radio directional controls, and the results are discussed for the effectiveness of the proposed systems and the future studies.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems M2M系统中基于K-Means聚类的子群管理方案
Jihoon Hong, Mirang Park, N. Okazaki
Secure group key management is an important task to realize reliable machine-to-machine (M2M) systems. Although many group key management schemes have been proposed, most of them do not consider the communication cost and the number of keys held by each node. In this paper, we address these challenges by proposing a novel subgroup key management scheme, which we called SGM. SGM is a key tree hierarchy scheme which uses an alternative node to the key management server. Since the SGM node encrypts and distributes the group key during a rekeying process, the communication cost and the number of keys can be decreased. We also present a cost-efficient deployment method for the SGM node using a k-means clustering algorithm. Simulation results show that our proposed scheme can improve the energy efficiency of M2M networks, compared with the conventional scheme, logical key hierarchy (LKH).
安全的组密钥管理是实现可靠的机器对机器(M2M)系统的重要任务。虽然已经提出了许多组密钥管理方案,但大多数方案都没有考虑通信成本和每个节点持有的密钥数量。在本文中,我们通过提出一种新的子组密钥管理方案来解决这些挑战,我们称之为SGM。SGM是一种密钥树层次结构方案,它使用密钥管理服务器的替代节点。由于SGM节点在重钥过程中加密和分发组密钥,因此可以减少通信成本和密钥数量。我们还提出了一种使用k-means聚类算法的成本高效的SGM节点部署方法。仿真结果表明,与传统的逻辑密钥层次(LKH)方案相比,我们提出的方案可以提高M2M网络的能源效率。
{"title":"SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems","authors":"Jihoon Hong, Mirang Park, N. Okazaki","doi":"10.1109/NBiS.2016.14","DOIUrl":"https://doi.org/10.1109/NBiS.2016.14","url":null,"abstract":"Secure group key management is an important task to realize reliable machine-to-machine (M2M) systems. Although many group key management schemes have been proposed, most of them do not consider the communication cost and the number of keys held by each node. In this paper, we address these challenges by proposing a novel subgroup key management scheme, which we called SGM. SGM is a key tree hierarchy scheme which uses an alternative node to the key management server. Since the SGM node encrypts and distributes the group key during a rekeying process, the communication cost and the number of keys can be decreased. We also present a cost-efficient deployment method for the SGM node using a k-means clustering algorithm. Simulation results show that our proposed scheme can improve the energy efficiency of M2M networks, compared with the conventional scheme, logical key hierarchy (LKH).","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of an Accessory Category Recognition System Using Deep Neural Network 基于深度神经网络的配件类别识别系统性能评价
Yuki Sakai, Tetsuya Oda, Makoto Ikeda, L. Barolli
Deep Learning also called Deep Neural Network (DNN) has a deep hierarchy that connect multiple internal layers for feature detection and recognition learning. DNNs are emerging fast and will continue to grow together with feature detection methods. In previous work, we applied deep learning for vegetable object recognition and explored the Convolutional Neural Network (CNN). In this paper, we propose an enhanced accessory category recognition system which is based on CNN. From the evaluation results, we found that for recognition learning process by CNN, seventy thousand iterations were suitable. The results of learning rate was 99.77% and recognition rate was 99.75%, respectively. We observed that our system can be applied also for accessory category recognition.
深度学习也被称为深度神经网络(DNN),它有一个很深的层次结构,连接多个内部层,用于特征检测和识别学习。深度神经网络正在迅速崛起,并将与特征检测方法一起继续发展。在之前的工作中,我们将深度学习应用于蔬菜物体识别,并探索了卷积神经网络(CNN)。本文提出了一种基于CNN的增强型配件类别识别系统。从评价结果中,我们发现对于CNN的识别学习过程,7万次迭代是合适的。结果学习率为99.77%,识别率为99.75%。结果表明,该系统也可用于配件类别识别。
{"title":"Performance Evaluation of an Accessory Category Recognition System Using Deep Neural Network","authors":"Yuki Sakai, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/NBiS.2016.51","DOIUrl":"https://doi.org/10.1109/NBiS.2016.51","url":null,"abstract":"Deep Learning also called Deep Neural Network (DNN) has a deep hierarchy that connect multiple internal layers for feature detection and recognition learning. DNNs are emerging fast and will continue to grow together with feature detection methods. In previous work, we applied deep learning for vegetable object recognition and explored the Convolutional Neural Network (CNN). In this paper, we propose an enhanced accessory category recognition system which is based on CNN. From the evaluation results, we found that for recognition learning process by CNN, seventy thousand iterations were suitable. The results of learning rate was 99.77% and recognition rate was 99.75%, respectively. We observed that our system can be applied also for accessory category recognition.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 19th International Conference on Network-Based Information Systems (NBiS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1