首页 > 最新文献

2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)最新文献

英文 中文
More Than Old Wine in New Bottles: A Secure Live Virtual Machine Job Migration Framework for Cloud Systems Integrity 新瓶装旧酒:云系统完整性的安全实时虚拟机作业迁移框架
Hanif Deylami, Jairo Gutiérrez, R. Sinha
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing information technology services over the Internet. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance.While existing cloud computing threat detection and prevention techniques are improving, they are still not effective enough to meet the needs of next-generation systems, such as secure dynamic resource pools, high usability, and secure virtual machine migration. This paper aims to provide an understanding of the different potential attack vectors created by virtualization in a public Infrastructure-as-a-Service cloud, in particular, the security associated with the live virtual machine migration of jobs. The vectors will be investigated, concentrating on the threats emerging from various potential attackers (internal/external) to cloud systems. The overarching aim of this study, therefore, is to design and develop a secure live virtual machine migration framework that enables a virtual trusted platform module for multiple virtual machines running on a hardware platform while maintaining the cloud system’s integrity.
云计算是一种灵活的、具有成本效益的、经过验证的交付平台,用于在Internet上提供信息技术服务。然而,云计算带来了额外的风险,因为基本服务通常外包给第三方,这使得维护数据安全和隐私、支持数据和服务可用性以及证明合规性变得更加困难。虽然现有的云计算威胁检测和防护技术正在不断改进,但它们仍然不足以满足下一代系统的需求,例如安全的动态资源池、高可用性和安全的虚拟机迁移。本文旨在提供对公共基础设施即服务云中虚拟化创建的不同潜在攻击向量的理解,特别是与作业的实时虚拟机迁移相关的安全性。将对这些载体进行调查,重点关注来自各种潜在攻击者(内部/外部)对云系统的威胁。因此,本研究的总体目标是设计和开发一个安全的实时虚拟机迁移框架,该框架支持在硬件平台上运行的多个虚拟机的虚拟可信平台模块,同时保持云系统的完整性。
{"title":"More Than Old Wine in New Bottles: A Secure Live Virtual Machine Job Migration Framework for Cloud Systems Integrity","authors":"Hanif Deylami, Jairo Gutiérrez, R. Sinha","doi":"10.23919/ICMU.2018.8653611","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653611","url":null,"abstract":"Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing information technology services over the Internet. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance.While existing cloud computing threat detection and prevention techniques are improving, they are still not effective enough to meet the needs of next-generation systems, such as secure dynamic resource pools, high usability, and secure virtual machine migration. This paper aims to provide an understanding of the different potential attack vectors created by virtualization in a public Infrastructure-as-a-Service cloud, in particular, the security associated with the live virtual machine migration of jobs. The vectors will be investigated, concentrating on the threats emerging from various potential attackers (internal/external) to cloud systems. The overarching aim of this study, therefore, is to design and develop a secure live virtual machine migration framework that enables a virtual trusted platform module for multiple virtual machines running on a hardware platform while maintaining the cloud system’s integrity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of Secure Safety Confirmation System Using Virtual Private Cloud 基于虚拟私有云的安全确认系统开发
M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa
A safety confirmation system is a system intended to enable users to share information about the extent of damage in the event of a disaster. In recent years, these systems have generally been implemented as a Web system using cloud computing. The configuration used for the safety confirmation system included a Web server and DB server, amongst others, and these resources can be easily procured by cloud computing. In addition, implementation in the cloud has many merits such as a shortened development period and accelerated service start time. However, cloud computing is a system on the Internet; thus, there is concern about the risk of illegal access from the outside and information leakage. The safety confirmation system requires a secure system infrastructure in which to store attribute information and users’ personal information. Therefore, a cloud-based safety confirmation system would need to be convenient to use and secure. In this paper, we propose to improve the safety by constructing the safety confirmation system in a virtual private cloud environment. The evaluation of the system showed that it was possible to prevent external illegal access and information leakage and to operate the safety confirmation system such that it was highly convenient to use.
安全确认系统是一种系统,旨在使用户能够共享有关灾难发生时损害程度的信息。近年来,这些系统通常被实现为使用云计算的Web系统。用于安全确认系统的配置包括Web服务器和DB服务器等,这些资源可以通过云计算轻松获取。此外,在云中实现有许多优点,如缩短开发周期和加快服务启动时间。然而,云计算是一个在互联网上的系统;因此,存在外界非法访问和信息泄露的风险。安全确认系统需要一个安全的系统基础设施来存储属性信息和用户的个人信息。因此,基于云的安全确认系统需要方便使用和安全。本文提出通过构建虚拟私有云环境下的安全确认系统来提高安全性。评价结果表明,该系统可以防止外部非法访问和信息泄露,并且可以操作安全确认系统,使用起来非常方便。
{"title":"Development of Secure Safety Confirmation System Using Virtual Private Cloud","authors":"M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa","doi":"10.23919/ICMU.2018.8653589","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653589","url":null,"abstract":"A safety confirmation system is a system intended to enable users to share information about the extent of damage in the event of a disaster. In recent years, these systems have generally been implemented as a Web system using cloud computing. The configuration used for the safety confirmation system included a Web server and DB server, amongst others, and these resources can be easily procured by cloud computing. In addition, implementation in the cloud has many merits such as a shortened development period and accelerated service start time. However, cloud computing is a system on the Internet; thus, there is concern about the risk of illegal access from the outside and information leakage. The safety confirmation system requires a secure system infrastructure in which to store attribute information and users’ personal information. Therefore, a cloud-based safety confirmation system would need to be convenient to use and secure. In this paper, we propose to improve the safety by constructing the safety confirmation system in a virtual private cloud environment. The evaluation of the system showed that it was possible to prevent external illegal access and information leakage and to operate the safety confirmation system such that it was highly convenient to use.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transmit Power and Carrier Sense Control for Massive Machine-to-Machine Communication in Wireless Ultra-dense Networks 无线超密集网络中大规模机对机通信的发射功率和载波感知控制
Yu Yu, Yuto Lim, Yasuo Tan
Besides the traditional voice and data services, 5G is expected to support new communication paradigm, i.e., Internet of Things (IoT) and Machine-to-Machine (M2M) services. Nonetheless, the system designs of transmit power control (TPC) and carrier sense threshold (CST) will be crucial when the huge number of these user equipment (UE) are densely engaged in vast number of data traffic transmissions. One practical and effective approach is to study the system design through numerical simulation. In this paper, we formalize the problem of minimizing the energy consumption and maximizing the average end-to-end throughput of massive M2M communication by optimally using a proposed consensus TPC scheme. To validate the effectiveness of our proposed scheme, we also focus the impact of the CST on the trade-off in between UE experienced data rate and network energy efficiency.
除了传统的语音和数据服务,5G还有望支持新的通信模式,即物联网(IoT)和机器对机器(M2M)服务。然而,当大量用户设备(UE)密集地从事大量数据流量传输时,发射功率控制(TPC)和载波感知阈值(CST)的系统设计将变得至关重要。通过数值模拟研究系统设计是一种实用有效的方法。在本文中,我们通过最优地使用提出的共识TPC方案,形式化了最小化能源消耗和最大化大规模M2M通信的平均端到端吞吐量的问题。为了验证我们提出的方案的有效性,我们还关注了CST对UE经验数据速率和网络能源效率之间权衡的影响。
{"title":"Transmit Power and Carrier Sense Control for Massive Machine-to-Machine Communication in Wireless Ultra-dense Networks","authors":"Yu Yu, Yuto Lim, Yasuo Tan","doi":"10.23919/ICMU.2018.8653615","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653615","url":null,"abstract":"Besides the traditional voice and data services, 5G is expected to support new communication paradigm, i.e., Internet of Things (IoT) and Machine-to-Machine (M2M) services. Nonetheless, the system designs of transmit power control (TPC) and carrier sense threshold (CST) will be crucial when the huge number of these user equipment (UE) are densely engaged in vast number of data traffic transmissions. One practical and effective approach is to study the system design through numerical simulation. In this paper, we formalize the problem of minimizing the energy consumption and maximizing the average end-to-end throughput of massive M2M communication by optimally using a proposed consensus TPC scheme. To validate the effectiveness of our proposed scheme, we also focus the impact of the CST on the trade-off in between UE experienced data rate and network energy efficiency.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Congestion Control for Handover in Heterogeneous Mobile Content-Centric Networking 异构移动内容中心网络中切换的自适应拥塞控制
Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto
CCN (Content-Centric Networking) is receiver-driven architecture whose communication is triggered by consumer requests. When a consumer changes its access point (handover), it cannot receive requested Data packets. However, the consumer can retransmit in-flight Interest packets to a new route and reconstruct its route to obtain corresponding Data packets. Each consumer has its own parameters for congestion control, e.g. congestion window size, congestion threshold and timeout value. In the case of a handover to a heterogeneous network, e.g. from LTE to Wi-Fi, when congestion parameters set just before the handover are carried over, they probably are inadequate for new network environments. In this paper, we propose an effective receiver-driven control, Congestion Parameter Initialization. Our policy is quite simple and a consumer initializes its congestion parameters just after the handover. Our simulation results show that our proposal can adapt its congestion parameters to new network environment quickly.
CCN(内容中心网络)是接收器驱动的体系结构,其通信由使用者请求触发。当使用者更改其访问点(切换)时,它无法接收请求的数据包。但是,消费者可以将飞行中的兴趣数据包重传到新的路由上,并重构其路由以获得相应的数据包。每个消费者都有自己的拥塞控制参数,例如拥塞窗口大小、拥塞阈值和超时值。在切换到异构网络的情况下,例如从LTE到Wi-Fi,当切换之前设置的拥塞参数被保留时,它们可能不足以适应新的网络环境。在本文中,我们提出了一个有效的接收端驱动控制,拥塞参数初始化。我们的策略非常简单,用户只需在交接后初始化其拥塞参数。仿真结果表明,该算法能够快速适应新的网络环境。
{"title":"Adaptive Congestion Control for Handover in Heterogeneous Mobile Content-Centric Networking","authors":"Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto","doi":"10.23919/ICMU.2018.8653625","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653625","url":null,"abstract":"CCN (Content-Centric Networking) is receiver-driven architecture whose communication is triggered by consumer requests. When a consumer changes its access point (handover), it cannot receive requested Data packets. However, the consumer can retransmit in-flight Interest packets to a new route and reconstruct its route to obtain corresponding Data packets. Each consumer has its own parameters for congestion control, e.g. congestion window size, congestion threshold and timeout value. In the case of a handover to a heterogeneous network, e.g. from LTE to Wi-Fi, when congestion parameters set just before the handover are carried over, they probably are inadequate for new network environments. In this paper, we propose an effective receiver-driven control, Congestion Parameter Initialization. Our policy is quite simple and a consumer initializes its congestion parameters just after the handover. Our simulation results show that our proposal can adapt its congestion parameters to new network environment quickly.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fall Detection Using Smartphones to Enhance Safety and Security of Older Adults at Home 使用智能手机进行跌倒检测以增强老年人在家中的安全和保障
H. Nguyen, F. Zhou, Farhaan Mirza, M. Naeem
Falling is a global common health problem among older adults which causes minor to serious injuries such as fracture or even death. In recent years, many falls detection systems have been developed to support early detection and timely care to eliminate grave consequences. This research evaluates the potential of using smartphones for fall detection. In this research, two smartphones were used to collect acceleration data. Threshold approaches were applied on the collected data to detect potential falls. Evaluation results show that with proper chosen thresholds, the tested fall detection algorithm performs well with both sensitivity and specificity.
跌倒是全球老年人常见的健康问题,可导致轻微到严重的伤害,如骨折甚至死亡。近年来,已经开发了许多跌倒检测系统,以支持早期发现和及时护理,以消除严重后果。这项研究评估了使用智能手机进行跌倒检测的潜力。在这项研究中,我们使用两部智能手机来收集加速度数据。对收集到的数据应用阈值方法来检测潜在的跌倒。评价结果表明,在适当选择阈值的情况下,所测试的跌倒检测算法具有良好的灵敏度和特异性。
{"title":"Fall Detection Using Smartphones to Enhance Safety and Security of Older Adults at Home","authors":"H. Nguyen, F. Zhou, Farhaan Mirza, M. Naeem","doi":"10.23919/ICMU.2018.8653613","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653613","url":null,"abstract":"Falling is a global common health problem among older adults which causes minor to serious injuries such as fracture or even death. In recent years, many falls detection systems have been developed to support early detection and timely care to eliminate grave consequences. This research evaluates the potential of using smartphones for fall detection. In this research, two smartphones were used to collect acceleration data. Threshold approaches were applied on the collected data to detect potential falls. Evaluation results show that with proper chosen thresholds, the tested fall detection algorithm performs well with both sensitivity and specificity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Access Network Integrated with Radio-over-Fiber and Passive Optical Network 光纤上无线电和无源光网络的混合接入网
Liwei Yang, Junning Zhang, Wenjie Zhang
A RoF system based on the OCS modulation for WDM-PON is presented and experimentally evaluated as a solution for next generation broadband access networks. 20-GHz subcarrier system over 25 km transmission is established and verified. Suppressing the optical carrier enables the baseband signals and radio frequency (RF) signals to be detected by photodiode. Experimental results demonstrate BER of 10-4 at the received Rx 3.25dBm with the link length of about 25km. A technique for source-less upstream transmission is also experimentally demonstrated, as downstream transmission channels can transfer the baseband signals and RF signals simultaneously.
提出了一种基于OCS调制的WDM-PON RoF系统,并进行了实验评估。建立并验证了超过25公里传输的20 ghz副载波系统。抑制光载波使光电二极管能够检测基带信号和射频(RF)信号。实验结果表明,在接收Rx为3.25dBm,链路长度约为25km时,误码率为10-4。实验还证明了一种无源上游传输技术,因为下游传输通道可以同时传输基带信号和射频信号。
{"title":"Hybrid Access Network Integrated with Radio-over-Fiber and Passive Optical Network","authors":"Liwei Yang, Junning Zhang, Wenjie Zhang","doi":"10.23919/ICMU.2018.8653623","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653623","url":null,"abstract":"A RoF system based on the OCS modulation for WDM-PON is presented and experimentally evaluated as a solution for next generation broadband access networks. 20-GHz subcarrier system over 25 km transmission is established and verified. Suppressing the optical carrier enables the baseband signals and radio frequency (RF) signals to be detected by photodiode. Experimental results demonstrate BER of 10-4 at the received Rx 3.25dBm with the link length of about 25km. A technique for source-less upstream transmission is also experimentally demonstrated, as downstream transmission channels can transfer the baseband signals and RF signals simultaneously.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126987140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactive Video CAPTCHA for Better Resistance to Automated Attack 交互式视频验证码,更好地抵抗自动攻击
Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki
A “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA’s resistance to relay and automated attacks. Our results show that, if our CAPTHCA’s parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
一个“完全自动化的公共图灵测试来区分计算机和人类”(CAPTCHA)广泛应用于在线服务,以防止机器人自动获得大量账户。交互式视频类型的captcha试图通过使用由于通信中继造成的延迟时间来检测这种攻击。然而,这些方法仍然不足以抵抗机器人。我们提出了一种结合了自动攻击和中继攻击的CAPTCHA。在我们的CAPTCHA中,用户从许多随机出现的诱饵对象中识别移动对象(目标对象),并使用鼠标光标跟踪目标。当用户能够在一段时间内跟踪目标时,他们就通过了测试。由于目标对象移动迅速,延迟使得远程求解器在中继攻击期间难以破解CAPTCHA。机器人也很难使用图像处理来跟踪目标,因为它与诱饵有相同的外观。我们评估了验证码对中继和自动攻击的抵抗力。我们的研究结果表明,如果我们的CAPTHCA参数设置合适的值,可以经济地建立中继攻击,并且在不影响人工成功率的情况下,机器人的错误接受率可以降低到0.01%。
{"title":"Interactive Video CAPTCHA for Better Resistance to Automated Attack","authors":"Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki","doi":"10.23919/ICMU.2018.8653624","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653624","url":null,"abstract":"A “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA’s resistance to relay and automated attacks. Our results show that, if our CAPTHCA’s parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128275229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sidewalk-level People Flow Estimation Using Dashboard Cameras Based on Deep Learning 基于深度学习的仪表盘摄像头行人流量估计
Yusuke Hara, A. Uchiyama, T. Umedu, T. Higashino
In future smart cities, understanding people flow is essential for a wide variety of applications such as urban planning and event detection. In this paper, we propose a method to estimate low of pedestrians walking on the sidewalks. Our goal is to achieve high accuracy with wide area coverage at low cost. For this purpose, we use dashboard cameras (dashcams) recently wide-spreading for providing evidence on accidents, etc.Our method combines Deep Learning-based pedestrian detection and model-based tracking to overcome the challenges of frequent occlusion (overlaps of objects in images) and false positives. In pedestrian detection, faces and backs of heads are separately detected to understand moving directions of pedestrians as well as their existence by applying CNN (Convolutional Neural Networks) and LSTM (Long-Short-Term-Memory). Then, the trajectories of the detected bounding boxes are estimated based on location and color similarities with the knowledge about moving speeds of vehicles and pedestrians.Through the evaluation using real dashcam videos, we have confirmed that our method works well, showing within ±13.6% mean absolute error rate of bi-directional people low estimation.
在未来的智慧城市中,了解人口流动对于城市规划和事件检测等各种应用至关重要。本文提出了一种估算人行道上行人数量的方法。我们的目标是以低成本实现高精度和广域覆盖。为此,我们使用最近广泛传播的仪表盘摄像头(dashcams)来提供事故证据等。我们的方法结合了基于深度学习的行人检测和基于模型的跟踪,以克服频繁遮挡(图像中物体重叠)和误报的挑战。在行人检测中,采用卷积神经网络(CNN)和长短期记忆(LSTM)分别检测行人的脸和后脑,了解行人的移动方向和是否存在。然后,根据车辆和行人的移动速度知识,根据位置和颜色相似性估计检测到的边界框的轨迹。通过使用真实的行车记录仪视频进行评估,我们证实了我们的方法是有效的,双向人估计的平均绝对错误率在±13.6%以内。
{"title":"Sidewalk-level People Flow Estimation Using Dashboard Cameras Based on Deep Learning","authors":"Yusuke Hara, A. Uchiyama, T. Umedu, T. Higashino","doi":"10.23919/ICMU.2018.8653595","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653595","url":null,"abstract":"In future smart cities, understanding people flow is essential for a wide variety of applications such as urban planning and event detection. In this paper, we propose a method to estimate low of pedestrians walking on the sidewalks. Our goal is to achieve high accuracy with wide area coverage at low cost. For this purpose, we use dashboard cameras (dashcams) recently wide-spreading for providing evidence on accidents, etc.Our method combines Deep Learning-based pedestrian detection and model-based tracking to overcome the challenges of frequent occlusion (overlaps of objects in images) and false positives. In pedestrian detection, faces and backs of heads are separately detected to understand moving directions of pedestrians as well as their existence by applying CNN (Convolutional Neural Networks) and LSTM (Long-Short-Term-Memory). Then, the trajectories of the detected bounding boxes are estimated based on location and color similarities with the knowledge about moving speeds of vehicles and pedestrians.Through the evaluation using real dashcam videos, we have confirmed that our method works well, showing within ±13.6% mean absolute error rate of bi-directional people low estimation.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Garbage Collections Delays on Java GUIs Java gui上的垃圾收集延迟
Panagiotis Patros, Michael H. Dawson, K. Kent
Tablets, smartphones, wearables, etc. project a (usually graphical) interface to their human users that offloads the majority of the computation to a cloud/fog system. Graphical User Interface (GUI) applications are frequently written in high-level programming languages, which provide automatic memory management: placement and deletion of memory objects is not performed manually; instead, an underlying software component called a Garbage Collector (GC) handles this. Nevertheless, the GC policies and algorithms that are best suited for large datacenters are not necessarily ideal for a small, embedded device. Therefore, in this paper, we present GUI GC, a JavaFX GUI benchmark, which we use to compare the performance of the four GC policies of the IBM J9 Java runtime on a resource-constrained environment. Overall, our experiments suggest that the default policy Gencon, outperformed its counterparts. Additionally, the region-based policy, Balanced, did not fully utilize blocking times; thus, using GUI GC, we conducted experiments with explicit GC invocations that measured significant improvements of up to 13.22% when multiple CPUs were available.
平板电脑、智能手机、可穿戴设备等向人类用户投射一个(通常是图形化的)界面,将大部分计算任务转移到云/雾系统上。图形用户界面(GUI)应用程序通常是用高级编程语言编写的,这些语言提供自动内存管理:内存对象的放置和删除不是手动执行的;相反,一个称为垃圾收集器(GC)的底层软件组件会处理这个问题。然而,最适合大型数据中心的GC策略和算法并不一定适合小型嵌入式设备。因此,在本文中,我们提出了GUI GC,这是一个JavaFX GUI基准,我们使用它来比较IBM J9 Java运行时在资源受限环境下的四种GC策略的性能。总的来说,我们的实验表明,默认策略Gencon的表现优于其他策略。此外,基于区域的均衡策略没有充分利用阻塞时间;因此,使用GUI GC,我们进行了显式GC调用的实验,当多个cpu可用时,测试结果显著提高了13.22%。
{"title":"Garbage Collections Delays on Java GUIs","authors":"Panagiotis Patros, Michael H. Dawson, K. Kent","doi":"10.23919/ICMU.2018.8653592","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653592","url":null,"abstract":"Tablets, smartphones, wearables, etc. project a (usually graphical) interface to their human users that offloads the majority of the computation to a cloud/fog system. Graphical User Interface (GUI) applications are frequently written in high-level programming languages, which provide automatic memory management: placement and deletion of memory objects is not performed manually; instead, an underlying software component called a Garbage Collector (GC) handles this. Nevertheless, the GC policies and algorithms that are best suited for large datacenters are not necessarily ideal for a small, embedded device. Therefore, in this paper, we present GUI GC, a JavaFX GUI benchmark, which we use to compare the performance of the four GC policies of the IBM J9 Java runtime on a resource-constrained environment. Overall, our experiments suggest that the default policy Gencon, outperformed its counterparts. Additionally, the region-based policy, Balanced, did not fully utilize blocking times; thus, using GUI GC, we conducted experiments with explicit GC invocations that measured significant improvements of up to 13.22% when multiple CPUs were available.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating User Reactions to Interactive-signage-based Stimulation Toward Behavior Change 调查用户对基于交互标志的刺激对行为改变的反应
Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto
In recent years, many research and developments of behavior change have been conducted. The purpose of behavior change is to improve people’s lifestyle pattern or to maintain the improvement for a long time aiming to achieve a goal of promoting health condition improvement. In order to achieve the foundation of a new lifestyle, it is necessary to recognize the daily life patterns of users and give triggers to users in their daily life for behavior change. To realize this, in this study, we construct an interactive signage which is able to positively talk to the passing user and try to induce behavior change by sending visual stimulation and auditory stimulation. In this paper, we report the result of the investigation on users’ reactions and feelings to the proposed interactive signage. As a survey experiment, we set up 4 interactive signage on a floor of our university and asked 15 participants to carry a name tag with a BLE beacon during their daily life. There are 4 different dialogue scenarios and a scenario is posted to the participants when he/she approaches the interactive signage. Participants can respond to these scenarios through a touchscreen. Based on the result of the experiment, it is found that the interactive signage can induce behavior change effectively.
近年来,人们对行为改变进行了许多研究和发展。行为改变的目的是改善人们的生活方式,或长期保持这种改善,以达到促进健康状况改善的目的。要实现新生活方式的奠基,就必须认识到用户的日常生活模式,并在用户的日常生活中给予行为改变的触发器。为了实现这一点,在本研究中,我们构建了一个能够与过往用户积极对话的交互式标牌,并试图通过发送视觉刺激和听觉刺激来诱导行为改变。在本文中,我们报告了用户对拟议的交互式标牌的反应和感受的调查结果。作为一项调查实验,我们在学校的一层设置了4个互动指示牌,并要求15名参与者在日常生活中携带带有BLE信标的名牌。有4个不同的对话场景,当他/她接近互动标牌时,会向参与者发布一个场景。参与者可以通过触摸屏对这些场景做出反应。实验结果表明,交互式标牌能够有效地诱导行为改变。
{"title":"Investigating User Reactions to Interactive-signage-based Stimulation Toward Behavior Change","authors":"Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto","doi":"10.23919/ICMU.2018.8653587","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653587","url":null,"abstract":"In recent years, many research and developments of behavior change have been conducted. The purpose of behavior change is to improve people’s lifestyle pattern or to maintain the improvement for a long time aiming to achieve a goal of promoting health condition improvement. In order to achieve the foundation of a new lifestyle, it is necessary to recognize the daily life patterns of users and give triggers to users in their daily life for behavior change. To realize this, in this study, we construct an interactive signage which is able to positively talk to the passing user and try to induce behavior change by sending visual stimulation and auditory stimulation. In this paper, we report the result of the investigation on users’ reactions and feelings to the proposed interactive signage. As a survey experiment, we set up 4 interactive signage on a floor of our university and asked 15 participants to carry a name tag with a BLE beacon during their daily life. There are 4 different dialogue scenarios and a scenario is posted to the participants when he/she approaches the interactive signage. Participants can respond to these scenarios through a touchscreen. Based on the result of the experiment, it is found that the interactive signage can induce behavior change effectively.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1