首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
A novel bandwidth efficient orthogonal frequency division multiplexing scheme 一种新的带宽高效的正交频分复用方案
T. Moazzeni
In this paper, a novel spectrum efficient orthogonal signal multiplexing system based on trigonometric transform is presented. In this system, one half of the complex data is multiplexed using orthogonal real subcarrier signals (i.e., cosw1t, cosw2t,…, sinw1t, sinw2t,…) and transmitted on one carrier signal (i.e., coswct) and similarly the other half is multiplexed and transmitted on another carrier (i.e., sinwct). In this way, the number of subcarriers will be reduced by half of the conventional OFDM systems and as a consequent; (i): the occupied bandwidth will be reduced by about half, (ii): the maximum value of the peak to average power ratio of transmitted signal will be also reduced by half, and it is more robust against the Doppler effect. Also, it is shown that the proposed signaling scheme has cyclic convolutional property such that the channel equalization in a multipath fading channel can be accomplished as simple as in OFDM systems by pointwise multiplication.
本文提出了一种基于三角变换的频谱高效正交信号复用系统。在该系统中,复数据的一半使用正交实子载波信号(即cosw1t, cosw2t,…,sinw1t, sinw2t,…)复用并在一个载波信号(即coswct)上传输,同样,另一半复用并在另一个载波(即sinwct)上传输。通过这种方式,子载波的数量将减少传统OFDM系统的一半,因此;(1):占用的带宽将减少一半左右;(2):发射信号的峰值与平均功率比的最大值也将减少一半,并且对多普勒效应更加稳健。此外,所提出的信令方案具有循环卷积特性,使得多径衰落信道中的信道均衡可以像在OFDM系统中一样简单地通过点向乘法实现。
{"title":"A novel bandwidth efficient orthogonal frequency division multiplexing scheme","authors":"T. Moazzeni","doi":"10.1109/UEMCON.2017.8249035","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249035","url":null,"abstract":"In this paper, a novel spectrum efficient orthogonal signal multiplexing system based on trigonometric transform is presented. In this system, one half of the complex data is multiplexed using orthogonal real subcarrier signals (i.e., cosw1t, cosw2t,…, sinw1t, sinw2t,…) and transmitted on one carrier signal (i.e., coswct) and similarly the other half is multiplexed and transmitted on another carrier (i.e., sinwct). In this way, the number of subcarriers will be reduced by half of the conventional OFDM systems and as a consequent; (i): the occupied bandwidth will be reduced by about half, (ii): the maximum value of the peak to average power ratio of transmitted signal will be also reduced by half, and it is more robust against the Doppler effect. Also, it is shown that the proposed signaling scheme has cyclic convolutional property such that the channel equalization in a multipath fading channel can be accomplished as simple as in OFDM systems by pointwise multiplication.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LTE downlink throughput modeling using neural networks 基于神经网络的LTE下行链路吞吐量建模
T. Rehman, M. I. Baig, Armaghan Ahmad
With the advancements made in the field of telecommunication, the quality of service is increasing day by day whilst the user load is simultaneously increasing on the service providers. In order to keep up with the tougher standards, a fairly large amount of money is spend on resource allocation, majority of which often ends up unused and as a result end up being wasted. In this paper we used LTE data obtained on hourly basis for a period of 60 days from a Telecommunication company and carried out its quantitative analysis using deep neural nets. The results have shown stark difference in utilization of resources across rural and urban areas. Also we were able to obtain a handful of key features, which play major role in determining the quality of data transmission, and emphasis on theses could ensure better quality at lesser cost.
随着通信技术的不断进步,服务质量日益提高,同时用户对服务提供商的负荷也在不断增加。为了跟上更严格的标准,在资源配置上花费了相当大的一笔钱,其中大部分往往没有被使用,结果被浪费了。在本文中,我们使用从一家电信公司获得的60天内每小时的LTE数据,并使用深度神经网络进行定量分析。调查结果显示,农村和城市地区在资源利用方面存在明显差异。此外,我们还能够获得一些关键特性,这些特性在决定数据传输质量方面起着重要作用,并且强调这些特性可以确保以更低的成本获得更好的质量。
{"title":"LTE downlink throughput modeling using neural networks","authors":"T. Rehman, M. I. Baig, Armaghan Ahmad","doi":"10.1109/UEMCON.2017.8249044","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249044","url":null,"abstract":"With the advancements made in the field of telecommunication, the quality of service is increasing day by day whilst the user load is simultaneously increasing on the service providers. In order to keep up with the tougher standards, a fairly large amount of money is spend on resource allocation, majority of which often ends up unused and as a result end up being wasted. In this paper we used LTE data obtained on hourly basis for a period of 60 days from a Telecommunication company and carried out its quantitative analysis using deep neural nets. The results have shown stark difference in utilization of resources across rural and urban areas. Also we were able to obtain a handful of key features, which play major role in determining the quality of data transmission, and emphasis on theses could ensure better quality at lesser cost.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
MATLAB-GUI based simulation framework for spintronics 基于MATLAB-GUI的自旋电子学仿真框架
J. Gope, B. Kar, S. Koly, R. Shome, S. Bhadra, A. Bhattacharyya, R. Banerjee
The electronic device industry is an age old industry. Several new electronic ICs evolved day by day with more and more components being cramped into smaller and smaller spaces. Presently, advanced VLSI and ULSI devices are made commercially available to the consumers. On the other hand, the micro-electronics industry suffers from physical limitation as well as from technological limitation. Thereby, the search for new device principle cannot be avoided. In this regard Spintronics technology is vividly significant as it employs spin degree of freedom in quantum dot. Since the last decade Spintronics ushered numerous scope in device vicinity. Even though the hands of researchers are tied as there is no simulator for simulating Spintronics circuits and spin based logic devices. The authors now propose a MATLAB based tool which can be incorporated in SIMULINK for simulation of single spin logic devices. Here, GUI based approach is made to create spin environment to design dynamic part of simulation.
电子设备行业是一个历史悠久的行业。几种新的电子集成电路一天天发展,越来越多的组件被挤进越来越小的空间。目前,先进的VLSI和ULSI器件已经商业化。另一方面,微电子工业既受到物理限制,也受到技术限制。因此,寻找新的器件原理是不可避免的。在这方面,自旋电子学技术具有生动的意义,因为它利用了量子点的自旋自由度。自上个十年以来,自旋电子学在设备附近迎来了许多范围。尽管研究人员的双手被束缚,因为没有模拟器来模拟自旋电子电路和自旋逻辑器件。作者提出了一种基于MATLAB的工具,该工具可以集成到SIMULINK中用于单自旋逻辑器件的仿真。在此,采用基于GUI的方法创建旋转环境来设计仿真的动态部分。
{"title":"MATLAB-GUI based simulation framework for spintronics","authors":"J. Gope, B. Kar, S. Koly, R. Shome, S. Bhadra, A. Bhattacharyya, R. Banerjee","doi":"10.1109/UEMCON.2017.8249099","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249099","url":null,"abstract":"The electronic device industry is an age old industry. Several new electronic ICs evolved day by day with more and more components being cramped into smaller and smaller spaces. Presently, advanced VLSI and ULSI devices are made commercially available to the consumers. On the other hand, the micro-electronics industry suffers from physical limitation as well as from technological limitation. Thereby, the search for new device principle cannot be avoided. In this regard Spintronics technology is vividly significant as it employs spin degree of freedom in quantum dot. Since the last decade Spintronics ushered numerous scope in device vicinity. Even though the hands of researchers are tied as there is no simulator for simulating Spintronics circuits and spin based logic devices. The authors now propose a MATLAB based tool which can be incorporated in SIMULINK for simulation of single spin logic devices. Here, GUI based approach is made to create spin environment to design dynamic part of simulation.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handling changes of update reviewers in distributed free and open-source software meta-recommendations 处理分布式免费和开源软件元推荐中更新审查器的更改
Shakre Elmane, M. Silaghi
In Free and Open-Source Software (FOSS) world, newer is not always better! Automatically updating to the latest version of FOSS applications involves real risks. The newer version could be missing some features, that are essential to some users, but are dropped by the developers. Another possible scenario, with even more serious consequences, is a project taken over by malicious developers who target users' sensitive data, or do other types of damage to their systems. In this research, we improve on the existing FOSS Updates Meta-Recommendations framework, which is shown (in [2], [3]) to increase resistance to certain attacks. We study how to handle more efficiently the situations where reviewers join and/or leave the P2P network, without a significant impact on the accuracy of recommendations or the performance of the system. We investigate some approaches: self-announcement by reviewer, the use of Zero/negative trust weights, introducing Drop/remove messages, and Message Aging. We also introduce some improvements on the message exchanging mechanism utilized by the current framework, to accommodate the newly added functionalities.
在自由和开源软件(FOSS)的世界里,更新并不总是更好!自动更新到最新版本的自由/开源软件应用程序涉及真正的风险。新版本可能会缺少一些功能,这些功能对一些用户来说是必不可少的,但开发人员却放弃了这些功能。另一种可能的情况是,项目被恶意开发人员接管,他们以用户的敏感数据为目标,或者对他们的系统造成其他类型的破坏,这种情况会带来更严重的后果。在这项研究中,我们改进了现有的自由/开源软件更新元建议框架(在[2],[3]中),以增加对某些攻击的抵抗力。我们研究如何更有效地处理评论者加入和/或离开P2P网络的情况,而不会对推荐的准确性或系统的性能产生重大影响。我们研究了一些方法:审稿人自我宣布,使用零/负信任权重,引入删除/删除消息和消息老化。我们还介绍了对当前框架所使用的消息交换机制的一些改进,以适应新添加的功能。
{"title":"Handling changes of update reviewers in distributed free and open-source software meta-recommendations","authors":"Shakre Elmane, M. Silaghi","doi":"10.1109/UEMCON.2017.8249083","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249083","url":null,"abstract":"In Free and Open-Source Software (FOSS) world, newer is not always better! Automatically updating to the latest version of FOSS applications involves real risks. The newer version could be missing some features, that are essential to some users, but are dropped by the developers. Another possible scenario, with even more serious consequences, is a project taken over by malicious developers who target users' sensitive data, or do other types of damage to their systems. In this research, we improve on the existing FOSS Updates Meta-Recommendations framework, which is shown (in [2], [3]) to increase resistance to certain attacks. We study how to handle more efficiently the situations where reviewers join and/or leave the P2P network, without a significant impact on the accuracy of recommendations or the performance of the system. We investigate some approaches: self-announcement by reviewer, the use of Zero/negative trust weights, introducing Drop/remove messages, and Message Aging. We also introduce some improvements on the message exchanging mechanism utilized by the current framework, to accommodate the newly added functionalities.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy risks in electronic communications: A user's assessment 电子通信中的安全和隐私风险:一个用户的评估
Fariborz Farahmand, Joshua Ripple, M. Atallah, R. Dillon-Merrill
Most research today in electronic communications focuses on developing new technologies and “best practices” to enhance security and privacy. However, these technologies and best-practice codes are all too often not used, and in this failure the users are often their own worst enemies. It is thus important to develop an enhanced understanding of why users indicate concern about security and privacy, but when given the opportunity act contrary to their stated intention. We collect data from 435 participants about 24 electronic activities with a survey and a mixed effects model. We find a significant inverse relationship between their assessed risk and benefit (recognizing that the particular technology matters where some technologies are inherently perceived as more risky than others). This significant inverse relationship represents a departure from decision theories that assume purely cognitive information processing, and the separation of the probabilities and the utilities. We shed light on the role of affect, which commonly competes with cognition, and works as an orienting mechanism in security and privacy behaviors, and discuss business and policy implications of our findings.
当今电子通信领域的大多数研究都集中在开发新技术和“最佳实践”上,以增强安全性和隐私性。然而,这些技术和最佳实践代码往往没有被使用,在这种失败中,用户往往是他们自己最大的敌人。因此,重要的是要进一步了解为什么用户表示关心安全和隐私,但在有机会时却采取与他们声明的意图相反的行动。我们通过调查和混合效应模型收集了435名参与者关于24项电子活动的数据。我们发现它们评估的风险和收益之间存在显著的反比关系(认识到某些技术在本质上被认为比其他技术风险更大的情况下,特定技术很重要)。这种重要的反向关系代表了对纯认知信息处理的决策理论的背离,以及概率和效用的分离。我们阐明了情感的作用,它通常与认知竞争,并作为安全和隐私行为的导向机制,并讨论了我们的研究结果对商业和政策的影响。
{"title":"Security and privacy risks in electronic communications: A user's assessment","authors":"Fariborz Farahmand, Joshua Ripple, M. Atallah, R. Dillon-Merrill","doi":"10.1109/UEMCON.2017.8249009","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249009","url":null,"abstract":"Most research today in electronic communications focuses on developing new technologies and “best practices” to enhance security and privacy. However, these technologies and best-practice codes are all too often not used, and in this failure the users are often their own worst enemies. It is thus important to develop an enhanced understanding of why users indicate concern about security and privacy, but when given the opportunity act contrary to their stated intention. We collect data from 435 participants about 24 electronic activities with a survey and a mixed effects model. We find a significant inverse relationship between their assessed risk and benefit (recognizing that the particular technology matters where some technologies are inherently perceived as more risky than others). This significant inverse relationship represents a departure from decision theories that assume purely cognitive information processing, and the separation of the probabilities and the utilities. We shed light on the role of affect, which commonly competes with cognition, and works as an orienting mechanism in security and privacy behaviors, and discuss business and policy implications of our findings.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bit Error Rate (BER) analysis of Discrete Fractional Fourier Transform (DFrFT) based OFDM systems 基于离散分数傅里叶变换(DFrFT)的OFDM系统误码率分析
A. Nafchi, E. Hamke, Ramiro Jordan, Balu Santhanam
This paper investigates the performance of Orthogonal Frequency Division Multiplex (OFDM) system by integrating the Discrete Fractional Fourier Transform (DFrFT). Here the total number of OFDM subcarriers are 64 where 48 of them are data carriers, and bandwidth allocated to OFDM is 20 MHz. The transmitted signals are assumed to travel through an Additive White Gaussian Noise (AWGN) channel. Simulations are conducted to investigate the Bit Error Rate (BER) performance of OFDM system as a function of energy per bit to noise power spectral density ratio Eb/N0 for both cases of conventional OFDM (FFT-OFDM) and proposed OFDM in this paper based on DFrFT (Fr-OFDM). Simulations confirm the proposed Fr-OFDM performance.
通过对离散分数阶傅里叶变换(DFrFT)进行积分,研究正交频分复用(OFDM)系统的性能。这里OFDM子载波总数为64个,其中48个为数据载波,分配给OFDM的带宽为20mhz。假定传输的信号通过加性高斯白噪声(AWGN)信道。本文通过仿真研究了传统OFDM (FFT-OFDM)和基于DFrFT (Fr-OFDM)的OFDM系统误码率(BER)性能作为每比特能量与噪声功率谱密度比Eb/N0的函数。仿真验证了该算法的性能。
{"title":"Bit Error Rate (BER) analysis of Discrete Fractional Fourier Transform (DFrFT) based OFDM systems","authors":"A. Nafchi, E. Hamke, Ramiro Jordan, Balu Santhanam","doi":"10.1109/UEMCON.2017.8249056","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249056","url":null,"abstract":"This paper investigates the performance of Orthogonal Frequency Division Multiplex (OFDM) system by integrating the Discrete Fractional Fourier Transform (DFrFT). Here the total number of OFDM subcarriers are 64 where 48 of them are data carriers, and bandwidth allocated to OFDM is 20 MHz. The transmitted signals are assumed to travel through an Additive White Gaussian Noise (AWGN) channel. Simulations are conducted to investigate the Bit Error Rate (BER) performance of OFDM system as a function of energy per bit to noise power spectral density ratio Eb/N0 for both cases of conventional OFDM (FFT-OFDM) and proposed OFDM in this paper based on DFrFT (Fr-OFDM). Simulations confirm the proposed Fr-OFDM performance.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices SPEProxy:在未修改的移动设备上实施细粒度的安全和隐私控制
Brian Krupp, Dan Jesenseky, Amanda Szampias
Mobile applications have grown from knowing basic personal information to knowing intimate details of consumer's lives. The explosion of knowledge that applications contain and share can be contributed to many factors. Mobile devices are equipped with advanced sensors including GPS and cameras, while storing large amounts of personal information including photos and contacts. With millions of applications available to install, personal data is at constant risk of being misused. While mobile operating systems provide basic security and privacy controls, they are insufficient, leaving the consumer unaware of how applications are using permissions that were granted. In this paper, we propose a solution that aims to provide consumers awareness of applications misusing data and policies that can protect their data. From this investigation we present SPEProxy. SPEProxy utilizes a knowledge based approach to provide consumer's an ability to understand how applications are using permissions beyond their stated intent. Additionally, SPEProxy provides an awareness of fine grained policies that would allow the user to protect their data. SPEProxy is device and mobile operating system agnostic, meaning it does not require a specific device or operating system nor modification to the operating system or applications. This approach allows consumers to utilize the solution without requiring a high degree of technical expertise. We evaluated SPEProxy across 817 of the most popular applications in the iOS App Store and Google Play. In our evaluation, SPEProxy was highly effective across 86.55% applications where several well known applications exhibited misusing granted permissions.
移动应用程序已经从了解基本的个人信息发展到了解消费者生活的私密细节。应用程序包含和共享的知识的爆炸式增长可以由许多因素促成。移动设备配备了包括GPS和摄像头在内的先进传感器,同时存储了包括照片和联系人在内的大量个人信息。随着数以百万计的应用程序可供安装,个人数据不断面临被滥用的风险。虽然移动操作系统提供了基本的安全和隐私控制,但它们还不够,这使得用户不知道应用程序是如何使用被授予的权限的。在本文中,我们提出了一种解决方案,旨在让消费者了解应用程序误用数据以及可以保护其数据的策略。从这次调查中,我们提出了SPEProxy。SPEProxy利用一种基于知识的方法,让用户能够了解应用程序如何使用超出其声明意图的权限。此外,SPEProxy还提供细粒度策略,允许用户保护他们的数据。SPEProxy与设备和移动操作系统无关,这意味着它不需要特定的设备或操作系统,也不需要修改操作系统或应用程序。这种方法允许用户使用解决方案,而不需要高度的技术专业知识。我们在iOS App Store和Google Play中最受欢迎的817款应用中评估了SPEProxy。在我们的评估中,SPEProxy在86.55%的应用程序中非常有效,其中几个著名的应用程序滥用了授予的权限。
{"title":"SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices","authors":"Brian Krupp, Dan Jesenseky, Amanda Szampias","doi":"10.1109/UEMCON.2017.8248985","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248985","url":null,"abstract":"Mobile applications have grown from knowing basic personal information to knowing intimate details of consumer's lives. The explosion of knowledge that applications contain and share can be contributed to many factors. Mobile devices are equipped with advanced sensors including GPS and cameras, while storing large amounts of personal information including photos and contacts. With millions of applications available to install, personal data is at constant risk of being misused. While mobile operating systems provide basic security and privacy controls, they are insufficient, leaving the consumer unaware of how applications are using permissions that were granted. In this paper, we propose a solution that aims to provide consumers awareness of applications misusing data and policies that can protect their data. From this investigation we present SPEProxy. SPEProxy utilizes a knowledge based approach to provide consumer's an ability to understand how applications are using permissions beyond their stated intent. Additionally, SPEProxy provides an awareness of fine grained policies that would allow the user to protect their data. SPEProxy is device and mobile operating system agnostic, meaning it does not require a specific device or operating system nor modification to the operating system or applications. This approach allows consumers to utilize the solution without requiring a high degree of technical expertise. We evaluated SPEProxy across 817 of the most popular applications in the iOS App Store and Google Play. In our evaluation, SPEProxy was highly effective across 86.55% applications where several well known applications exhibited misusing granted permissions.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129388844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Single-phase cascaded multilevel inverter topology for distributed DC sources 分布式直流电源单相级联多电平逆变器拓扑
B. Ahmed, K. Aganah, M. Ndoye, Md Arifin Arif, Cristopher Luciano, G. Murphy
A new single-phase cascaded multilevel inverter topology using an H-bridge inverter is proposed to reduce the number of active components and improve power quality. The topology is comprised of two or more cascaded H-bridges to increase the number of voltage levels and power handling capability. The basic unit of the proposed inverter is comprised of a voltage-level generator (VLG) connected to the input of the classical H-bridge. The main advantage of this setup is a significant reduction in the number of switches and voltage sources required to generate the desired number of voltage levels. As a result, the output power quality, cost and size are significantly improved. To verify the benefits of this topology, in a more complete way, both the symmetric and asymmetric configurations are investigated. MATLAB/Simulink models for symmetric 9-level and asymmetric 31-level cascaded multilevel inverter configurations are used to validate the performance of the proposed topology, and satisfactory results are reported.
提出了一种基于h桥逆变器的单相级联多电平逆变器拓扑结构,以减少有源器件数量,提高电能质量。该拓扑结构由两个或多个级联的h桥组成,以增加电压电平的数量和功率处理能力。该逆变器的基本单元由一个电压级发电机(VLG)组成,该发电机连接到经典h桥的输入端。这种设置的主要优点是大大减少了产生所需数量的电压电平所需的开关和电压源的数量。因此,输出功率质量、成本和尺寸都得到了显著改善。为了更完整地验证这种拓扑结构的优点,对对称和非对称配置进行了研究。利用MATLAB/Simulink模型对对称9电平和非对称31电平级联多电平逆变器配置进行了性能验证,得到了满意的结果。
{"title":"Single-phase cascaded multilevel inverter topology for distributed DC sources","authors":"B. Ahmed, K. Aganah, M. Ndoye, Md Arifin Arif, Cristopher Luciano, G. Murphy","doi":"10.1109/UEMCON.2017.8248980","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248980","url":null,"abstract":"A new single-phase cascaded multilevel inverter topology using an H-bridge inverter is proposed to reduce the number of active components and improve power quality. The topology is comprised of two or more cascaded H-bridges to increase the number of voltage levels and power handling capability. The basic unit of the proposed inverter is comprised of a voltage-level generator (VLG) connected to the input of the classical H-bridge. The main advantage of this setup is a significant reduction in the number of switches and voltage sources required to generate the desired number of voltage levels. As a result, the output power quality, cost and size are significantly improved. To verify the benefits of this topology, in a more complete way, both the symmetric and asymmetric configurations are investigated. MATLAB/Simulink models for symmetric 9-level and asymmetric 31-level cascaded multilevel inverter configurations are used to validate the performance of the proposed topology, and satisfactory results are reported.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Two-way signal space cooperative network with a DF relay — Outage and optimization 具有DF中继的双向信号空间合作网络——中断与优化
Muhammad Ajmal Khan, R. Rao, Xianbin Wang
Two-way cooperative relay network links two source terminals using bidirectional connection to exchange information with the help of a relay. The conventional two-way cooperative network with a decode-and-forward (DF) relay takes six time slots to transfer four symbols due to half-duplex transmission. If signal space diversity is integrated into a conventional two-way cooperative network, the resultant system transfers four symbols in three time slots, which is referred to as two-way signal space cooperative network (2W-SSD-DF). In this paper, 2W-SSD-DF system is investigated for its outage performance and system optimization. Closed-form expression of the outage probability of 2W-SSD-DF system over Rayleigh fading channel is derived and its asymptotic expression is also obtained to study the influence of various system parameters. In addition, system optimization of the system is examined and a framework to allocate optimal power to the transmitting nodes is developed in order to enhance the outage performance of the system. Finally, the analytical work is validated through Monte Carlo simulations.
双向协同中继网络是一种利用中继将两个源终端通过双向连接连接起来进行信息交换的网络。传统的双向合作网络采用半双工传输方式,采用DF中继传输4个符号,需要6个时隙。将信号空间分集集成到传统的双向协作网络中,得到的系统在三个时隙中传输四个符号,称为双向信号空间协作网络(2W-SSD-DF)。本文对2W-SSD-DF系统进行了停电性能研究和系统优化。推导了2W-SSD-DF系统在瑞利衰落信道上的中断概率的封闭表达式,并得到了其渐近表达式,研究了各种系统参数对中断概率的影响。此外,还研究了系统的优化问题,提出了一种分配传输节点最优功率的框架,以提高系统的停机性能。最后,通过蒙特卡罗仿真对分析结果进行了验证。
{"title":"Two-way signal space cooperative network with a DF relay — Outage and optimization","authors":"Muhammad Ajmal Khan, R. Rao, Xianbin Wang","doi":"10.1109/UEMCON.2017.8249105","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249105","url":null,"abstract":"Two-way cooperative relay network links two source terminals using bidirectional connection to exchange information with the help of a relay. The conventional two-way cooperative network with a decode-and-forward (DF) relay takes six time slots to transfer four symbols due to half-duplex transmission. If signal space diversity is integrated into a conventional two-way cooperative network, the resultant system transfers four symbols in three time slots, which is referred to as two-way signal space cooperative network (2W-SSD-DF). In this paper, 2W-SSD-DF system is investigated for its outage performance and system optimization. Closed-form expression of the outage probability of 2W-SSD-DF system over Rayleigh fading channel is derived and its asymptotic expression is also obtained to study the influence of various system parameters. In addition, system optimization of the system is examined and a framework to allocate optimal power to the transmitting nodes is developed in order to enhance the outage performance of the system. Finally, the analytical work is validated through Monte Carlo simulations.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A performance-aware I/O interface for 3D stacked memory systems 一个性能敏感的I/O接口,用于3D堆叠存储器系统
Nahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun
A low-power and high-performance three-dimensional (3D) baseband point-to-point (P2P) memory interface is presented. To improve both signal integrity and power efficiency, an optimization approach is utilized on the entire 3D architecture, including through-silicon via (TSV), and I/O interface channel in a 65 nm CMOS technology. The 3D TSV and μbump channels are modeled to generate S-parameters using a 3D EM solver tool (HFSS). The system performance is demonstrated after the optimization process. The results reveal that the whole structure achieves an energy efficiency of 1.52 pJ/b 2.3 Gb/s data rate.
提出了一种低功耗、高性能的三维基带点对点存储接口。为了提高信号完整性和功率效率,在整个3D架构上采用了优化方法,包括通过硅通孔(TSV)和65纳米CMOS技术的I/O接口通道。利用三维电磁求解工具(HFSS)对三维TSV通道和μbump通道进行建模,生成s参数。优化后的系统性能得到了验证。结果表明,整个结构的能量效率为1.52 pJ/b,数据速率为2.3 Gb/s。
{"title":"A performance-aware I/O interface for 3D stacked memory systems","authors":"Nahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun","doi":"10.1109/UEMCON.2017.8249078","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249078","url":null,"abstract":"A low-power and high-performance three-dimensional (3D) baseband point-to-point (P2P) memory interface is presented. To improve both signal integrity and power efficiency, an optimization approach is utilized on the entire 3D architecture, including through-silicon via (TSV), and I/O interface channel in a 65 nm CMOS technology. The 3D TSV and μbump channels are modeled to generate S-parameters using a 3D EM solver tool (HFSS). The system performance is demonstrated after the optimization process. The results reveal that the whole structure achieves an energy efficiency of 1.52 pJ/b 2.3 Gb/s data rate.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1