首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
Internet of Things and Body area network-an integrated future 物联网与人体区域网络——融合的未来
S. Chatterjee, Shreya Chatterjee, Soumyadeep Chowdhury, S. Basak, Srijan Dey, Suparna Sain, K. S. Ghosal, N. Dalmia, Sachet Sircar
Modern technological advancement in sensors technology, miniaturization of devices and wireless networking facilitated the design and proliferation of wireless sensor networks by making it capable to monitor independently and controlling the ambience. One of the most important applications of sensor networks is for human health monitoring using minuscule wireless sensors, placed strategically on the human body, constitute a wireless network over the human body, termed as wireless body area network (WBAN) capable of administering various crucial implications and provides feedback on real-time basis to the user and supervising medical personnel. The Internet of Things (IoT) can be measured as the futuristic appraisal of the internet that realizes machine-to-machine learning and communication. As a result, IoT offers connectivity for everyone and everything. These two networks in integration provides connectivity between everything and anything. This paper is a study on integrated IoT and WBAN.
传感器技术的现代技术进步,设备的小型化和无线网络通过使无线传感器网络能够独立监测和控制环境,促进了无线传感器网络的设计和扩散。传感器网络最重要的应用之一是人体健康监测,使用微型无线传感器,战略性地放置在人体上,构成人体上的无线网络,称为无线身体区域网络(WBAN),能够管理各种关键影响,并实时向用户和监督医务人员提供反馈。物联网(IoT)是对实现机器对机器学习和通信的互联网的未来评价。因此,物联网为每个人和所有事物提供了连接。这两个集成的网络提供了所有事物之间的连接。本文是对物联网和无线宽带网络的综合研究。
{"title":"Internet of Things and Body area network-an integrated future","authors":"S. Chatterjee, Shreya Chatterjee, Soumyadeep Chowdhury, S. Basak, Srijan Dey, Suparna Sain, K. S. Ghosal, N. Dalmia, Sachet Sircar","doi":"10.1109/UEMCON.2017.8249094","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249094","url":null,"abstract":"Modern technological advancement in sensors technology, miniaturization of devices and wireless networking facilitated the design and proliferation of wireless sensor networks by making it capable to monitor independently and controlling the ambience. One of the most important applications of sensor networks is for human health monitoring using minuscule wireless sensors, placed strategically on the human body, constitute a wireless network over the human body, termed as wireless body area network (WBAN) capable of administering various crucial implications and provides feedback on real-time basis to the user and supervising medical personnel. The Internet of Things (IoT) can be measured as the futuristic appraisal of the internet that realizes machine-to-machine learning and communication. As a result, IoT offers connectivity for everyone and everything. These two networks in integration provides connectivity between everything and anything. This paper is a study on integrated IoT and WBAN.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121712726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A framework for data center site risk metric 数据中心站点风险度量的框架
M. Levy, D. Raviv
Given the mission critical nature of data centers, metrics must provide a holistic understanding of the data center behavior, which is only viable if risks to the actual operation are considered. This paper proposes a framework for measuring data center site risk. The proposed methodology is aimed at standardizing a process to help evaluate data center sites and compare them to each other, or compare different scenarios where the data center operates. It establishes a process under defined criteria for the site risk analysis, despite the fact that much of that criteria is based on standards and expert knowledge. The metric is also a way to communicate and better understand risks due to the data center location, and help evaluate mitigation strategies.
考虑到数据中心的关键任务性质,度量标准必须提供对数据中心行为的全面理解,这只有在考虑到实际操作的风险时才可行。本文提出了一种测量数据中心站点风险的框架。提出的方法旨在标准化一个过程,以帮助评估数据中心站点并相互比较,或比较数据中心运行的不同场景。它在确定的场地风险分析标准下建立了一个过程,尽管该标准的大部分是基于标准和专家知识。该指标也是沟通和更好地了解由于数据中心位置而导致的风险的一种方式,并有助于评估缓解策略。
{"title":"A framework for data center site risk metric","authors":"M. Levy, D. Raviv","doi":"10.1109/UEMCON.2017.8248970","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248970","url":null,"abstract":"Given the mission critical nature of data centers, metrics must provide a holistic understanding of the data center behavior, which is only viable if risks to the actual operation are considered. This paper proposes a framework for measuring data center site risk. The proposed methodology is aimed at standardizing a process to help evaluate data center sites and compare them to each other, or compare different scenarios where the data center operates. It establishes a process under defined criteria for the site risk analysis, despite the fact that much of that criteria is based on standards and expert knowledge. The metric is also a way to communicate and better understand risks due to the data center location, and help evaluate mitigation strategies.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134594813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient infrastructure damage detection and localization using wireless sensor networks, with cluster generation for monitoring damage progression 利用无线传感器网络进行高效的基础设施损伤检测和定位,并通过集群生成监测损伤进展
W. Contreras, S. Ziavras
Structural health monitoring (SHM) involves the development of strategies to assess the condition of instrumented engineering structures. One of the most critical applications of SHM systems is civil infrastructure. For this application, it is particularly important that SHM systems be inexpensive and easy to deploy, since the maintenance of infrastructure is often inadequately funded. Wireless sensor networks (WSN) can be very useful toward this end. We present an efficient WSN-based SHM algorithm for detecting, localizing, and monitoring the progression of damage in infrastructure applications. The algorithm utilizes a novel vibration-based pattern matching technique that is very well suited for low-power WSN nodes. During a training phase, a body of reference patterns is formed from vibrations observed at sensor nodes distributed throughout the structure. During the operational phase, observed patterns are compared to the reference patterns to determine if a match exists. Through the use of an innovative distributed algorithm, a time complexity of O(logN) is achieved for the matching process. If a match does not exist, potential damage is indicated and the reference pattern closest to the observed pattern is determined using Euclidean distance. The difference between the two patterns indicates the sensor nodes at which potential damage exists. Clusters are then formed around these sensor nodes in order to monitor the progression of local damage. Simulations are performed in MATLAB for a typical bridge deployment in order to determine the degree of overlapping that occurs as clusters are generated in response to potential damage. The simulations indicate that overlapping increases gracefully as the number of nodes experiencing damage increases.
结构健康监测(SHM)涉及制定评估仪器化工程结构状况的策略。SHM系统最关键的应用之一是民用基础设施。对于这个应用程序,特别重要的是SHM系统价格低廉且易于部署,因为基础设施的维护通常没有足够的资金。无线传感器网络(WSN)在这方面非常有用。我们提出了一种高效的基于wsn的SHM算法,用于检测、定位和监测基础设施应用中损坏的进展。该算法采用了一种新颖的基于振动的模式匹配技术,非常适合于低功耗WSN节点。在训练阶段,从分布在整个结构中的传感器节点观察到的振动形成一个参考模式体。在操作阶段,将观察到的模式与参考模式进行比较,以确定是否存在匹配。通过使用一种创新的分布式算法,实现了匹配过程的时间复杂度为O(logN)。如果不存在匹配,则指示潜在的损坏,并使用欧几里得距离确定最接近观察到的图案的参考图案。两种模式之间的差异表明存在潜在损伤的传感器节点。然后在这些传感器节点周围形成集群,以便监测局部损伤的进展。在MATLAB中对典型的桥梁部署进行了模拟,以确定在响应潜在损坏而产生的集群时发生的重叠程度。仿真结果表明,随着节点受损数量的增加,重叠也会优雅地增加。
{"title":"Efficient infrastructure damage detection and localization using wireless sensor networks, with cluster generation for monitoring damage progression","authors":"W. Contreras, S. Ziavras","doi":"10.1109/UEMCON.2017.8249020","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249020","url":null,"abstract":"Structural health monitoring (SHM) involves the development of strategies to assess the condition of instrumented engineering structures. One of the most critical applications of SHM systems is civil infrastructure. For this application, it is particularly important that SHM systems be inexpensive and easy to deploy, since the maintenance of infrastructure is often inadequately funded. Wireless sensor networks (WSN) can be very useful toward this end. We present an efficient WSN-based SHM algorithm for detecting, localizing, and monitoring the progression of damage in infrastructure applications. The algorithm utilizes a novel vibration-based pattern matching technique that is very well suited for low-power WSN nodes. During a training phase, a body of reference patterns is formed from vibrations observed at sensor nodes distributed throughout the structure. During the operational phase, observed patterns are compared to the reference patterns to determine if a match exists. Through the use of an innovative distributed algorithm, a time complexity of O(logN) is achieved for the matching process. If a match does not exist, potential damage is indicated and the reference pattern closest to the observed pattern is determined using Euclidean distance. The difference between the two patterns indicates the sensor nodes at which potential damage exists. Clusters are then formed around these sensor nodes in order to monitor the progression of local damage. Simulations are performed in MATLAB for a typical bridge deployment in order to determine the degree of overlapping that occurs as clusters are generated in response to potential damage. The simulations indicate that overlapping increases gracefully as the number of nodes experiencing damage increases.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power efficiency of cooperative broadcast in 1-D dense networks with interference 干扰下一维密集网络协同广播的功率效率
S. Moballegh, B. Sirkeci-Mergen
In this paper, we study the power efficiency of cooperative broadcast in high-density 1D networks. This is an extension to our previous work which assumed interference-free transmission using single-shot transmission protocol [1]. In this work, interference is taken into account by introducing continuous source transmission protocol. Sufficient condition for successful broadcast is derived and the power consumption is compared with noncooperative multihop broadcast. Received signals are assumed to be attenuated under simple deterministic pathloss such that the pathloss exponent is greater than 1. We use continuum approximation which effectively models high node-density networks. We compare cooperative and noncooperative broadcast in terms of power efficiency and show that cooperative broadcast is more efficient under the bidirectional transmission while it is power inefficient if the transmission is unidirectional.
本文研究了高密度一维网络中协同广播的功率效率问题。这是我们之前的工作的扩展,该工作假设使用单次传输协议进行无干扰传输[1]。在这项工作中,通过引入连续源传输协议来考虑干扰。推导了广播成功的充分条件,并与非合作多跳广播进行了功耗比较。假设接收信号在简单确定性路径损耗下衰减,路径损耗指数大于1。我们使用连续统近似有效地模拟高节点密度网络。比较了合作广播和非合作广播的功率效率,发现在双向传输下,合作广播的功率效率更高,而在单向传输下,合作广播的功率效率较低。
{"title":"Power efficiency of cooperative broadcast in 1-D dense networks with interference","authors":"S. Moballegh, B. Sirkeci-Mergen","doi":"10.1109/UEMCON.2017.8249069","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249069","url":null,"abstract":"In this paper, we study the power efficiency of cooperative broadcast in high-density 1D networks. This is an extension to our previous work which assumed interference-free transmission using single-shot transmission protocol [1]. In this work, interference is taken into account by introducing continuous source transmission protocol. Sufficient condition for successful broadcast is derived and the power consumption is compared with noncooperative multihop broadcast. Received signals are assumed to be attenuated under simple deterministic pathloss such that the pathloss exponent is greater than 1. We use continuum approximation which effectively models high node-density networks. We compare cooperative and noncooperative broadcast in terms of power efficiency and show that cooperative broadcast is more efficient under the bidirectional transmission while it is power inefficient if the transmission is unidirectional.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131187520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PulsePrint: Single-arm-ECG biometric human identification using deep learning PulsePrint:使用深度学习的单臂- ecg生物识别人体识别
Qingxue Zhang, Dian Zhou, Xuan Zeng
Focusing on the privacy and security challenges brought by emerging/promising smart health applications, we propose a single-arm-ECG biometric human identification system, with two major contributions. Firstly, to replace the traditional inconvenient/uncomfortable ECG leads like the chest and two-wrist lead configurations, we propose a highly wearable single-arm-ECG lead configuration. Secondly, to prevent time-consuming and information-missing feature engineering work, we introduce advanced deep learning techniques to automatically learn from the raw ECG data highly level features. To achieve this goal, the 1D ECG time series is transform to a new domain, where a 2D ECG representation is obtained. Afterwards, a convolutional neural network is applied to the 2D ECG data and learn the hidden patterns for user identification purpose. The proposed system is validated on a single-arm-ECG dataset. This study demonstrates the feasibility of this highly wearable deep learning-empowered human identification system.
针对新兴/有前景的智能健康应用带来的隐私和安全挑战,我们提出了一种单臂-心电生物识别人体识别系统,主要有两个贡献。首先,我们提出了一种高度可穿戴的单臂心电图导联配置,以取代传统的胸前导联和双手腕导联等不方便/不舒服的导联配置。其次,为了避免特征工程耗时和信息缺失,我们引入了先进的深度学习技术,从原始心电数据中自动学习高级特征。为了实现这一目标,将一维心电时间序列变换到一个新的域,在这个域中得到二维心电表示。然后,将卷积神经网络应用于二维心电数据,并学习隐藏模式用于用户识别。该系统在单臂心电数据集上进行了验证。这项研究证明了这种高度可穿戴的深度学习人类识别系统的可行性。
{"title":"PulsePrint: Single-arm-ECG biometric human identification using deep learning","authors":"Qingxue Zhang, Dian Zhou, Xuan Zeng","doi":"10.1109/UEMCON.2017.8249111","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249111","url":null,"abstract":"Focusing on the privacy and security challenges brought by emerging/promising smart health applications, we propose a single-arm-ECG biometric human identification system, with two major contributions. Firstly, to replace the traditional inconvenient/uncomfortable ECG leads like the chest and two-wrist lead configurations, we propose a highly wearable single-arm-ECG lead configuration. Secondly, to prevent time-consuming and information-missing feature engineering work, we introduce advanced deep learning techniques to automatically learn from the raw ECG data highly level features. To achieve this goal, the 1D ECG time series is transform to a new domain, where a 2D ECG representation is obtained. Afterwards, a convolutional neural network is applied to the 2D ECG data and learn the hidden patterns for user identification purpose. The proposed system is validated on a single-arm-ECG dataset. This study demonstrates the feasibility of this highly wearable deep learning-empowered human identification system.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132748347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Detection and prevention of crypto-ransomware 加密勒索软件的检测和预防
Daniel Gonzalez, T. Hayajneh
Crypto-ransomware is a challenging threat that ciphers a user's files while hiding the decryption key until a ransom is paid by the victim. This type of malware is a lucrative business for cybercriminals, generating millions of dollars annually. The spread of ransomware is increasing as traditional detection-based protection, such as antivirus and anti-malware, has proven ineffective at preventing attacks. Additionally, this form of malware is incorporating advanced encryption algorithms and expanding the number of file types it targets. Cybercriminals have found a lucrative market and no one is safe from being the next victim. Encrypting ransomware targets business small and large as well as the regular home user. This paper discusses ransomware methods of infection, technology behind it and what can be done to help prevent becoming the next victim. The paper investigates the most common types of crypto-ransomware, various payload methods of infection, typical behavior of crypto ransomware, its tactics, how an attack is ordinarily carried out, what files are most commonly targeted on a victim's computer, and recommendations for prevention and safeguards are listed as well.
加密勒索软件是一种具有挑战性的威胁,它对用户的文件进行加密,同时隐藏解密密钥,直到受害者支付赎金。这种类型的恶意软件对网络罪犯来说是一项有利可图的业务,每年可产生数百万美元的收入。随着传统的基于检测的保护措施(如防病毒和反恶意软件)在防止攻击方面被证明是无效的,勒索软件的传播正在增加。此外,这种形式的恶意软件正在结合先进的加密算法,并扩大其目标文件类型的数量。网络犯罪分子已经找到了一个利润丰厚的市场,没有人能避免成为下一个受害者。加密勒索软件的目标是小型和大型企业以及普通家庭用户。本文讨论了勒索软件的感染方法,背后的技术,以及可以做些什么来帮助防止成为下一个受害者。本文调查了最常见的加密勒索软件类型,各种有效载荷感染方法,加密勒索软件的典型行为,其策略,通常如何进行攻击,受害者计算机上最常见的目标文件,以及列出了预防和保障措施的建议。
{"title":"Detection and prevention of crypto-ransomware","authors":"Daniel Gonzalez, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249052","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249052","url":null,"abstract":"Crypto-ransomware is a challenging threat that ciphers a user's files while hiding the decryption key until a ransom is paid by the victim. This type of malware is a lucrative business for cybercriminals, generating millions of dollars annually. The spread of ransomware is increasing as traditional detection-based protection, such as antivirus and anti-malware, has proven ineffective at preventing attacks. Additionally, this form of malware is incorporating advanced encryption algorithms and expanding the number of file types it targets. Cybercriminals have found a lucrative market and no one is safe from being the next victim. Encrypting ransomware targets business small and large as well as the regular home user. This paper discusses ransomware methods of infection, technology behind it and what can be done to help prevent becoming the next victim. The paper investigates the most common types of crypto-ransomware, various payload methods of infection, typical behavior of crypto ransomware, its tactics, how an attack is ordinarily carried out, what files are most commonly targeted on a victim's computer, and recommendations for prevention and safeguards are listed as well.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Cellular image processing using morphological analysis 使用形态学分析的细胞图像处理
Mousomi Roy, Shouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Soumen Banerjee, Shibjit Mitra, Rajarshee Naskar, Anubhab Bhattacharjee
Cellular image analysis is considered one of the important job in biomedical image analysis. Analysis of cellular images obtained using a microscope is necessary in various disciplines including engineering and medical imaging. Cell detection is necessary in various jobs of microscopic analysis that helps physicians to diagnose and extract features. Accurate identification of cells is necessary for precise diagnosis. Analysis methods based on morphology is one of the major research area and also useful in biomedical image analysis as well as in bioinformatics. Morphology based analysis acts as the helping hand for physicians. Morphology based analysis methods are useful in determining cell shape, irregularity, feature extraction and classification. In this work, some of the methods have been reported which can be helpful in analyzing some practical problem by employing a suitable technique.
细胞图像分析是生物医学图像分析的重要内容之一。在包括工程和医学成像在内的各个学科中,使用显微镜获得的细胞图像分析是必要的。细胞检测在各种显微分析工作中是必要的,它可以帮助医生诊断和提取特征。准确的细胞鉴定是精确诊断的必要条件。基于形态学的分析方法是生物医学图像分析和生物信息学的重要研究方向之一。基于形态学的分析为医生提供了帮助。基于形态学的分析方法在确定细胞形状、不规则性、特征提取和分类方面非常有用。在本工作中,我们报告了一些方法,这些方法可以帮助我们采用合适的技术来分析一些实际问题。
{"title":"Cellular image processing using morphological analysis","authors":"Mousomi Roy, Shouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Soumen Banerjee, Shibjit Mitra, Rajarshee Naskar, Anubhab Bhattacharjee","doi":"10.1109/UEMCON.2017.8249037","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249037","url":null,"abstract":"Cellular image analysis is considered one of the important job in biomedical image analysis. Analysis of cellular images obtained using a microscope is necessary in various disciplines including engineering and medical imaging. Cell detection is necessary in various jobs of microscopic analysis that helps physicians to diagnose and extract features. Accurate identification of cells is necessary for precise diagnosis. Analysis methods based on morphology is one of the major research area and also useful in biomedical image analysis as well as in bioinformatics. Morphology based analysis acts as the helping hand for physicians. Morphology based analysis methods are useful in determining cell shape, irregularity, feature extraction and classification. In this work, some of the methods have been reported which can be helpful in analyzing some practical problem by employing a suitable technique.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Efficient exact paths for dyck and semi-dyck labeled path reachability (extended abstract) dyck和半dyck标记路径可达性的有效精确路径(扩展抽象)
P. Bradford
Consider any two vertices in a weighted digraph. The exact path length problem is to determine if there is a path of a given fixed cost between these vertices. This paper focuses on the exact path problem for costs −1,0 or +1 between all pairs of vertices. This special case is also restricted to original edge weights from {−1, +1}. In this special case, this paper gives an O(nω log2 n) exact path solution, where ω is the best exponent for matrix multiplication. Basic variations of this algorithm determine which pairs of digraph nodes have Dyck or semi-Dyck labeled paths between them, assuming two terminals or parenthesis. Therefore, determining reachability for Dyck or semi-Dyck labeled paths costs O(nω log2 n). Both the exact path and labeled path solutions can be improved by poly-log factors, but these improvements are not given here. To find Dyck or semi-Dyck reachability in a labeled digraph, each edge has a single symbol on it. A path label is made by concatenating all symbols along the path. Cycles are allowed without any repeated edges. These paths have the same number of balanced parenthesizations (semi-Dyck languages) or have an equal numbers of matching symbols (Dyck languages). The exact path length problem has many applications. These applications include the labeled path problems given here, which in turn, have many applications.
考虑一个加权有向图中的任意两个顶点。确切的路径长度问题是确定这些顶点之间是否存在给定固定代价的路径。本文主要研究所有顶点对之间代价为−1,0或+1的精确路径问题。这种特殊情况也仅限于{−1,+1}的原始边权值。在这种特殊情况下,本文给出了一个O(nω log2 n)的精确路径解,其中ω是矩阵乘法的最佳指数。该算法的基本变体确定有向图节点的哪些对之间有Dyck或半Dyck标记路径,假设有两个终端或括号。因此,确定Dyck或半Dyck标记路径的可达性需要花费O(nω log2 n)。精确路径和标记路径的解都可以通过多对数因子来改进,但这里没有给出这些改进。要在标记有向图中找到Dyck或半Dyck可达性,每条边上都有一个符号。路径标签是通过连接路径上的所有符号来生成的。允许没有任何重复边的循环。这些路径具有相同数量的平衡括号(半戴克语言)或具有相同数量的匹配符号(戴克语言)。精确路径长度问题有许多应用。这些应用包括这里给出的标记路径问题,这些问题又有许多应用。
{"title":"Efficient exact paths for dyck and semi-dyck labeled path reachability (extended abstract)","authors":"P. Bradford","doi":"10.1109/UEMCON.2017.8249039","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249039","url":null,"abstract":"Consider any two vertices in a weighted digraph. The exact path length problem is to determine if there is a path of a given fixed cost between these vertices. This paper focuses on the exact path problem for costs −1,0 or +1 between all pairs of vertices. This special case is also restricted to original edge weights from {−1, +1}. In this special case, this paper gives an O(nω log2 n) exact path solution, where ω is the best exponent for matrix multiplication. Basic variations of this algorithm determine which pairs of digraph nodes have Dyck or semi-Dyck labeled paths between them, assuming two terminals or parenthesis. Therefore, determining reachability for Dyck or semi-Dyck labeled paths costs O(nω log2 n). Both the exact path and labeled path solutions can be improved by poly-log factors, but these improvements are not given here. To find Dyck or semi-Dyck reachability in a labeled digraph, each edge has a single symbol on it. A path label is made by concatenating all symbols along the path. Cycles are allowed without any repeated edges. These paths have the same number of balanced parenthesizations (semi-Dyck languages) or have an equal numbers of matching symbols (Dyck languages). The exact path length problem has many applications. These applications include the labeled path problems given here, which in turn, have many applications.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Topology maintenance of Ad Hoc wireless sensor networks with an optimum distributed power saving scheduling learning automata based algorithm 基于最优分布式节能调度学习自动机算法的Ad Hoc无线传感器网络拓扑维护
Shekufeh Shafeie, M. Meybodi
The scheduling of nodes in a wireless Ad Hoc Sensor network is getting them to alternate between the sleeping and active mode. If this process of adjusting the wake/sleep schedule of all nodes that is, a topology management mechanism, is maintained in an optimal manner, further energy can be saved, which will have a direct impact on prolonging the lifetime of the network. So, in this paper a distributed power saving coordination algorithm for multi-hop ad hoc wireless networks based on learning automata without significantly diminishing the quality of services of the network such as capacity or connectivity of the network is proposed such that all nodes in the network that are equipped with learning automata don't need to be synchronized with each other. Learning automata abilities such as low computational load, usability in distributed environments with ambiguous information, and adaptability to changes via low environmental feedbacks are all, factors that can provide the mentioned optimal manner for nodes; and cause better fitness with local techniques in ad hoc wireless networks. The proposed protocol, SpanLAQ, consists of two phases: coordinator announcement and coordinator withdrawal which are based on learning automata to ensure fairness, and to make local decisions on whether a node is going to sleep or joining to a forwarding backbone as a coordinator. So, using learning automata with passing of time causes a decrease in energy consumption and an improvement of the network lifetime in SpanLAQ protocol with an 802.11 network in power saving mode, in comparison to other similar protocols such as Span and without any topology management protocols. Simulation results with a practical energy model also show that the above result is being achieved with some improvements in capacity, connectivity and communication latency.
无线自组织传感器网络中节点的调度是使它们在休眠和活动模式之间交替进行。如果将这种调整所有节点的唤醒/休眠时间的过程,即拓扑管理机制保持在最优状态,可以进一步节省能量,这将直接影响到网络生命周期的延长。因此,本文提出了一种基于学习自动机的多跳自组织无线网络分布式节能协调算法,该算法在不显著降低网络容量、连通性等服务质量的前提下,使网络中所有配备学习自动机的节点不需要彼此同步。学习自动机的能力,如低计算负载,在具有模糊信息的分布式环境中的可用性,以及通过低环境反馈对变化的适应性,都是可以为节点提供上述最优方式的因素;并在自组织无线网络中更好地与本地技术相适应。提出的协议SpanLAQ包括协调器宣布和协调器退出两个阶段,这两个阶段基于学习自动机来确保公平性,并对节点是休眠还是作为协调器加入转发骨干做出本地决策。因此,与其他类似的协议(如Span)和没有任何拓扑管理协议相比,使用随时间推移的学习自动机可以减少能耗,并改善具有节能模式的802.11网络的SpanLAQ协议中的网络寿命。在实际能量模型下的仿真结果也表明了上述结果,并且在容量、连通性和通信延迟方面有所改善。
{"title":"Topology maintenance of Ad Hoc wireless sensor networks with an optimum distributed power saving scheduling learning automata based algorithm","authors":"Shekufeh Shafeie, M. Meybodi","doi":"10.1109/UEMCON.2017.8249027","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249027","url":null,"abstract":"The scheduling of nodes in a wireless Ad Hoc Sensor network is getting them to alternate between the sleeping and active mode. If this process of adjusting the wake/sleep schedule of all nodes that is, a topology management mechanism, is maintained in an optimal manner, further energy can be saved, which will have a direct impact on prolonging the lifetime of the network. So, in this paper a distributed power saving coordination algorithm for multi-hop ad hoc wireless networks based on learning automata without significantly diminishing the quality of services of the network such as capacity or connectivity of the network is proposed such that all nodes in the network that are equipped with learning automata don't need to be synchronized with each other. Learning automata abilities such as low computational load, usability in distributed environments with ambiguous information, and adaptability to changes via low environmental feedbacks are all, factors that can provide the mentioned optimal manner for nodes; and cause better fitness with local techniques in ad hoc wireless networks. The proposed protocol, SpanLAQ, consists of two phases: coordinator announcement and coordinator withdrawal which are based on learning automata to ensure fairness, and to make local decisions on whether a node is going to sleep or joining to a forwarding backbone as a coordinator. So, using learning automata with passing of time causes a decrease in energy consumption and an improvement of the network lifetime in SpanLAQ protocol with an 802.11 network in power saving mode, in comparison to other similar protocols such as Span and without any topology management protocols. Simulation results with a practical energy model also show that the above result is being achieved with some improvements in capacity, connectivity and communication latency.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image based skin disease detection using hybrid neural network coupled bag-of-features 基于图像的混合神经网络耦合特征袋的皮肤病检测
Shouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Sumit Anand, Aavery Basu, Soumen Banerjee, Mitali Das, Abhishek Bhattacharya
The current work proposes a neural based detection method of two different skin diseases using skin imaging. Skin images of two diseases namely Basel Cell Carcinoma and Skin Angioma are utilized. SIFT feature extractor has been employed followed by a clustering phase on feature space in order to reduce the number of features suitable for neural based models. The extracted bag-of-features modified dataset is used to train metaheuristic supported hybrid Artificial Neural Networks to classify the skin images in order to detect the diseases under study. A well-known multi objective optimization technique called Non-dominated Sorting Genetic Algorithm — II is used to train the ANN (NN-NSGA-II). The proposed model is further compared with two other well-known metaheuristic based classifier namely NN-PSO (ANN trained with PSO) and NN-CS (ANN trained with Cuckoo Search) in terms of testing phase confusion matrix based performance measuring metrics such as accuracy, precision, recall and F-measure. Experimental results indicated towards the superiority of the proposed bag-of-features enabled NN-NSGA-II model.
本研究提出了一种基于神经网络的两种不同皮肤病的皮肤成像检测方法。利用巴塞尔细胞癌和皮肤血管瘤两种疾病的皮肤图像。采用SIFT特征提取器,然后对特征空间进行聚类,以减少适合神经网络模型的特征数量。提取的特征袋修正数据集用于训练元启发式支持混合人工神经网络对皮肤图像进行分类,以检测所研究的疾病。采用非支配排序遗传算法(non - dominant Sorting Genetic Algorithm -II)这一著名的多目标优化技术来训练人工神经网络(NN-NSGA-II)。在基于测试相位混淆矩阵的性能度量指标(准确度、精密度、召回率和F-measure)方面,进一步将该模型与另外两种著名的基于元启发式的分类器NN-PSO(用PSO训练的神经网络)和NN-CS(用布谷鸟搜索训练的神经网络)进行了比较。实验结果表明了所提出的基于特征袋的NN-NSGA-II模型的优越性。
{"title":"Image based skin disease detection using hybrid neural network coupled bag-of-features","authors":"Shouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Sumit Anand, Aavery Basu, Soumen Banerjee, Mitali Das, Abhishek Bhattacharya","doi":"10.1109/UEMCON.2017.8249038","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249038","url":null,"abstract":"The current work proposes a neural based detection method of two different skin diseases using skin imaging. Skin images of two diseases namely Basel Cell Carcinoma and Skin Angioma are utilized. SIFT feature extractor has been employed followed by a clustering phase on feature space in order to reduce the number of features suitable for neural based models. The extracted bag-of-features modified dataset is used to train metaheuristic supported hybrid Artificial Neural Networks to classify the skin images in order to detect the diseases under study. A well-known multi objective optimization technique called Non-dominated Sorting Genetic Algorithm — II is used to train the ANN (NN-NSGA-II). The proposed model is further compared with two other well-known metaheuristic based classifier namely NN-PSO (ANN trained with PSO) and NN-CS (ANN trained with Cuckoo Search) in terms of testing phase confusion matrix based performance measuring metrics such as accuracy, precision, recall and F-measure. Experimental results indicated towards the superiority of the proposed bag-of-features enabled NN-NSGA-II model.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1