首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
Resource scheduling in non-orthogonal multiple access (NOMA) based cloud-RAN systems 基于非正交多址(NOMA)的云- ran系统中的资源调度
R. Rai, Huiling Zhu, Jiangzhou Wang
Cloud radio access network (C-RAN) is enabling innovation which can address a number of challenges that cellular network operators (CNOs) face while trying to support ever growing end users' needs towards 5th generation (5G) of mobile networks. This paper investigates a scheduling problem to enhance the performance of non-orthogonal multiple access (NOMA) based cloud radio access networks (C-RAN). We consider the downlink of a C-RAN where cloud is responsible for the scheduling policy and formulate the scheduling problem. In this paper non-orthogonal multiple access (NOMA) is adopted and resource scheduling techniques in an unconstrained C-RAN networks are proposed. We design an efficient resource scheduling algorithm to assist the resource scheduling process in NOMA based C-RAN systems. We formulate the problem as binary integer programming (BIP) optimization problem and propose a suboptimal BIP algorithm and a greedy heuristic allocation algorithm which leads to the maximization of throughput in terms of sum rate when compared with the standard techniques. Simulation results shows significant performance improvement with the proposed algorithms.
云无线接入网(C-RAN)正在实现创新,可以解决蜂窝网络运营商(CNOs)在努力支持不断增长的终端用户对第五代(5G)移动网络需求的同时面临的许多挑战。研究了提高非正交多址(NOMA)云无线接入网(C-RAN)性能的调度问题。我们考虑C-RAN的下行链路,其中云负责调度策略,并制定调度问题。本文采用非正交多址(NOMA)技术,提出了无约束C-RAN网络中的资源调度技术。设计了一种高效的资源调度算法来辅助基于NOMA的C-RAN系统的资源调度过程。我们将该问题表述为二进制整数规划(BIP)优化问题,并提出了次优BIP算法和贪婪启发式分配算法,与标准技术相比,该算法在求和速率方面使吞吐量最大化。仿真结果表明,该算法的性能得到了显著提高。
{"title":"Resource scheduling in non-orthogonal multiple access (NOMA) based cloud-RAN systems","authors":"R. Rai, Huiling Zhu, Jiangzhou Wang","doi":"10.1109/UEMCON.2017.8249102","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249102","url":null,"abstract":"Cloud radio access network (C-RAN) is enabling innovation which can address a number of challenges that cellular network operators (CNOs) face while trying to support ever growing end users' needs towards 5th generation (5G) of mobile networks. This paper investigates a scheduling problem to enhance the performance of non-orthogonal multiple access (NOMA) based cloud radio access networks (C-RAN). We consider the downlink of a C-RAN where cloud is responsible for the scheduling policy and formulate the scheduling problem. In this paper non-orthogonal multiple access (NOMA) is adopted and resource scheduling techniques in an unconstrained C-RAN networks are proposed. We design an efficient resource scheduling algorithm to assist the resource scheduling process in NOMA based C-RAN systems. We formulate the problem as binary integer programming (BIP) optimization problem and propose a suboptimal BIP algorithm and a greedy heuristic allocation algorithm which leads to the maximization of throughput in terms of sum rate when compared with the standard techniques. Simulation results shows significant performance improvement with the proposed algorithms.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Issues and challenges of data security in a cloud computing environment 云计算环境下数据安全的问题与挑战
P. Sharma, P. Kaushik, Prerna Agarwal, P. Jain, Shivangi Agarwal, Kamlesh Dixit
Now customers can opt for software and information technology services according to his requirements and can get these services on a leased basis from the network service provider and this has the facility to scale its requirements to up or down. This service is known as cloud computing, provided by the infrastructure provider which is a third party provider. Cloud computing provides many advantages to the customer like scalability, better economics of scaling, its ability to recover from problems, its ability to outsource non-core activities and flexibility. Cloud computing is a better option for the organizations to take as their best option without any initial investment and day by day frequent and heavy use of cloud computing is increasing but despite all the benefits a cloud offers to an organization there are certain doubts and threats regarding the security issues associated with a cloud computing platform. The security issues primarily involve the external control over organizational structure and management and personal and private data of the organization can be compromised. Personal and private data in this computing environment has a very high risk of breach of confidentiality, integrity and availability. Growth of cloud computing is mainly hampered due to these security concerns and challenges. Proper security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment. This detailed study discusses about some of the challenges associated with cloud computing services and security issues related to this platform.
现在,客户可以根据自己的需求选择软件和信息技术服务,并可以从网络服务提供商那里以租赁的方式获得这些服务,并且可以根据自己的需求进行调整。这种服务被称为云计算,由基础设施提供商提供,而基础设施提供商是第三方提供商。云计算为客户提供了许多优势,比如可伸缩性、更好的伸缩经济性、从问题中恢复的能力、外包非核心活动的能力和灵活性。对于组织来说,云计算是一个更好的选择,无需任何初始投资,云计算的频繁和大量使用正在增加,但是尽管云为组织提供了所有好处,但与云计算平台相关的安全问题仍然存在某些疑问和威胁。安全问题主要涉及对组织结构和管理的外部控制,组织的个人和私人数据可能受到损害。在此计算环境中的个人和私人数据具有非常高的违反机密性、完整性和可用性的风险。云计算的发展主要受到这些安全问题和挑战的阻碍。在为任何云计算服务选择服务提供商之前,需要进行适当的安全安排,客户需要非常小心地了解安全漏洞的风险和使用这种新计算环境的挑战。本研究详细讨论了与云计算服务相关的一些挑战以及与此平台相关的安全问题。
{"title":"Issues and challenges of data security in a cloud computing environment","authors":"P. Sharma, P. Kaushik, Prerna Agarwal, P. Jain, Shivangi Agarwal, Kamlesh Dixit","doi":"10.1109/UEMCON.2017.8249113","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249113","url":null,"abstract":"Now customers can opt for software and information technology services according to his requirements and can get these services on a leased basis from the network service provider and this has the facility to scale its requirements to up or down. This service is known as cloud computing, provided by the infrastructure provider which is a third party provider. Cloud computing provides many advantages to the customer like scalability, better economics of scaling, its ability to recover from problems, its ability to outsource non-core activities and flexibility. Cloud computing is a better option for the organizations to take as their best option without any initial investment and day by day frequent and heavy use of cloud computing is increasing but despite all the benefits a cloud offers to an organization there are certain doubts and threats regarding the security issues associated with a cloud computing platform. The security issues primarily involve the external control over organizational structure and management and personal and private data of the organization can be compromised. Personal and private data in this computing environment has a very high risk of breach of confidentiality, integrity and availability. Growth of cloud computing is mainly hampered due to these security concerns and challenges. Proper security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment. This detailed study discusses about some of the challenges associated with cloud computing services and security issues related to this platform.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Finger printing on the web 网上的指纹
Preethi Josephina Mudialba, Siddharth Nair, Jun Ma
Nowadays, companies such as Google [1] and Facebook [2] are present on most websites either through advertising services or through social plugins. They follow users around the web collecting information to create unique user profiles. This serious threat to privacy is a major cause for concern, as this reveals that there are no restrictions on the type of information that can be collected, the duration it can be stored, the people who can access it and the purpose of use or misuse. In order to determine if there indeed is any statistically significant evidence that fingerprinting occurs on certain web services, we integrated 2 software namely, FPBlock [6], a prototype browser extension that blocks web-based device fingerprinting, and AdFisher [10], an automated tool that sending out thousands of automated Web browser instances, in such a manner so that the data collected by FP-Block could be fed to AdFisher for analysis.
如今,谷歌[1]和Facebook[2]等公司通过广告服务或社交插件出现在大多数网站上。他们跟踪用户在网络上收集信息,以创建独特的用户档案。这种对隐私的严重威胁是令人担忧的主要原因,因为这表明可以收集的信息类型,可以存储的时间,可以访问它的人以及使用或滥用的目的没有限制。为了确定指纹识别在某些网络服务上是否确实存在统计学上显著的证据,我们集成了两款软件,即FPBlock[6]和AdFisher[10]。FPBlock是一款阻止基于网络设备指纹识别的原型浏览器扩展,而AdFisher[10]是一款发送数千个自动网络浏览器实例的自动化工具,通过这种方式,FP-Block收集的数据可以馈送给AdFisher进行分析。
{"title":"Finger printing on the web","authors":"Preethi Josephina Mudialba, Siddharth Nair, Jun Ma","doi":"10.1109/UEMCON.2017.8249089","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249089","url":null,"abstract":"Nowadays, companies such as Google [1] and Facebook [2] are present on most websites either through advertising services or through social plugins. They follow users around the web collecting information to create unique user profiles. This serious threat to privacy is a major cause for concern, as this reveals that there are no restrictions on the type of information that can be collected, the duration it can be stored, the people who can access it and the purpose of use or misuse. In order to determine if there indeed is any statistically significant evidence that fingerprinting occurs on certain web services, we integrated 2 software namely, FPBlock [6], a prototype browser extension that blocks web-based device fingerprinting, and AdFisher [10], an automated tool that sending out thousands of automated Web browser instances, in such a manner so that the data collected by FP-Block could be fed to AdFisher for analysis.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DOA using uniform/nonuniform linear and uniform circular antenna arrays with Bayesian compressive sensing 基于贝叶斯压缩感知的均匀/非均匀线性和均匀圆形天线阵列的DOA
I. Jouny
Directions of Arrival (DOA) estimation of coherent or incoherent signals impinging on uniformly or non-uniformly spaced linear or uniformly spaced circular antenna arrays are investigated in this paper. DOA is accomplished by using Bayesian compressive sensing reconstruction method. This approach eliminates the need for spatial smoothing and/or array interpolation that are often used when dealing with correlated arrivals and when using non-uniformly spaced antenna arrays or circular arrays. Simulations show that reliable DOA estimates are attainable at signal-to-noise ratios above 5 dB.
本文研究了均匀或非均匀间隔线性或均匀间隔圆形天线阵列上相干或非相干信号的到达方向估计。采用贝叶斯压缩感知重构方法实现方位定位。这种方法消除了在处理相关到达和使用非均匀间隔天线阵列或圆形阵列时经常使用的空间平滑和/或阵列插值的需要。仿真表明,在信噪比大于5db的情况下,可以获得可靠的DOA估计。
{"title":"DOA using uniform/nonuniform linear and uniform circular antenna arrays with Bayesian compressive sensing","authors":"I. Jouny","doi":"10.1109/UEMCON.2017.8249017","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249017","url":null,"abstract":"Directions of Arrival (DOA) estimation of coherent or incoherent signals impinging on uniformly or non-uniformly spaced linear or uniformly spaced circular antenna arrays are investigated in this paper. DOA is accomplished by using Bayesian compressive sensing reconstruction method. This approach eliminates the need for spatial smoothing and/or array interpolation that are often used when dealing with correlated arrivals and when using non-uniformly spaced antenna arrays or circular arrays. Simulations show that reliable DOA estimates are attainable at signal-to-noise ratios above 5 dB.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133211491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of several supervised target detection algorithms for hyperspectral images 几种高光谱图像监督目标检测算法的比较研究
D. Nguyen, C. Kwan, B. Ayhan
Target detection using hyperspectral images has gained popularity in recent years. In this paper, we present a preliminary comparative study of several simple, easy to use, and supervised target detection algorithms, including constrained signal detector (CSD), adaptive CSD, matched subspace detector (MSD), and adaptive subspace detector (ASD). Actual hyperspectral data have been used in our studies. Receiver operating characteristics (ROC) curves were used to compare the various algorithms. It was found that ASD yielded the best performance under the same set of conditions.
近年来,利用高光谱图像进行目标检测得到了广泛的应用。在本文中,我们提出了几种简单,易于使用和监督的目标检测算法,包括约束信号检测器(CSD),自适应CSD,匹配子空间检测器(MSD)和自适应子空间检测器(ASD)的初步比较研究。实际的高光谱数据已用于我们的研究。采用受试者工作特征(ROC)曲线对各种算法进行比较。结果发现,在相同的条件下,ASD的表现最好。
{"title":"A comparative study of several supervised target detection algorithms for hyperspectral images","authors":"D. Nguyen, C. Kwan, B. Ayhan","doi":"10.1109/UEMCON.2017.8249024","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249024","url":null,"abstract":"Target detection using hyperspectral images has gained popularity in recent years. In this paper, we present a preliminary comparative study of several simple, easy to use, and supervised target detection algorithms, including constrained signal detector (CSD), adaptive CSD, matched subspace detector (MSD), and adaptive subspace detector (ASD). Actual hyperspectral data have been used in our studies. Receiver operating characteristics (ROC) curves were used to compare the various algorithms. It was found that ASD yielded the best performance under the same set of conditions.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132290926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A mechanism to detect urdu Spam emails 检测乌尔都垃圾邮件的机制
Ayesha Akhtar, Ghulam Rasool Tahir, Khadija Shakeel
Electronic mail (Email) is being used for communication in all over the world as a basic communicational media. Few decades ago English was the only language of email but now almost facility of each language for email is present. Now people can use Urdu language as medium of Emails, social media and blog discussions. This Paper finds approaches of Spam/Ham categorization of English Emails are not able to categorize the Urdu emails because Urdu and English script are totally different in many aspects, so these are not directly applicable to Urdu. To categorization of emails into spam and ham is called Emails Spam filtering. Moreover, we need to develop tool by using machine learning technique that is appropriate in Urdu Language. In our work we have performed spam classification for Emails in Urdu language. We have collected different Spam and Ham Urdu Emails from different users. Most of the algorithms and techniques that are used for Spam classification in English and others languages are discussed and evaluated from different countries in this paper.
电子邮件(Email)作为一种基本的通信媒介在世界各地被用于通信。几十年前,英语是电子邮件的唯一语言,但现在几乎每种语言都能收发电子邮件。现在人们可以使用乌尔都语作为电子邮件、社交媒体和博客讨论的媒介。本文发现英语电子邮件的Spam/Ham分类方法不能对乌尔都语电子邮件进行分类,因为乌尔都语和英语文字在很多方面完全不同,所以这些方法不能直接适用于乌尔都语。将电子邮件分为垃圾邮件和非垃圾邮件,称为垃圾邮件过滤。此外,我们需要利用机器学习技术开发适合乌尔都语的工具。在我们的工作中,我们对乌尔都语的电子邮件进行了垃圾邮件分类。我们从不同的用户收集了不同的垃圾邮件和火腿乌尔都邮件。本文从不同的国家对英语和其他语言的垃圾邮件分类中使用的大多数算法和技术进行了讨论和评估。
{"title":"A mechanism to detect urdu Spam emails","authors":"Ayesha Akhtar, Ghulam Rasool Tahir, Khadija Shakeel","doi":"10.1109/UEMCON.2017.8249019","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249019","url":null,"abstract":"Electronic mail (Email) is being used for communication in all over the world as a basic communicational media. Few decades ago English was the only language of email but now almost facility of each language for email is present. Now people can use Urdu language as medium of Emails, social media and blog discussions. This Paper finds approaches of Spam/Ham categorization of English Emails are not able to categorize the Urdu emails because Urdu and English script are totally different in many aspects, so these are not directly applicable to Urdu. To categorization of emails into spam and ham is called Emails Spam filtering. Moreover, we need to develop tool by using machine learning technique that is appropriate in Urdu Language. In our work we have performed spam classification for Emails in Urdu language. We have collected different Spam and Ham Urdu Emails from different users. Most of the algorithms and techniques that are used for Spam classification in English and others languages are discussed and evaluated from different countries in this paper.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Outage probability and system optimization of SSD-based dual-hop relaying system with multiple relays 基于ssd的多中继双跳中继系统的中断概率及系统优化
Muhammad Ajmal Khan, R. Rao, Xianbin Wang
The conventional dual-hop relaying system, without a direct link between the source and the destination, transmits one symbol in two time slots. However, if signal space diversity (SSD) is integrated into the conventional dual-hop relaying system, it transmits two symbols in three time slots to enhance the spectral efficiency of the conventional dual-hop relaying system. In this paper, the outage performance of an SSD-based dual-hop relaying system with multiple decode-and-forward (DF) relays over Rayleigh fading channel is analyzed, and its closed-form expression is derived. Moreover, an asymptotic approximation of the outage probability is obtained and it is used to investigate the impact of different system parameters. Furthermore, system optimization for power is investigated to enhance the outage performance by allocating optimal powers to transmitting nodes. In the end, extensive computer simulations are performed to validate the analytical results.
传统的双跳中继系统在源和目的之间没有直接连接,在两个时隙中传输一个符号。然而,如果将信号空间分集(SSD)集成到传统的双跳中继系统中,它可以在三个时隙中传输两个符号,以提高传统双跳中继系统的频谱效率。本文分析了基于固态硬盘的多中继双跳中继系统在瑞利衰落信道上的中断性能,并推导了其封闭表达式。此外,还得到了中断概率的渐近逼近,并用于研究不同系统参数对系统中断概率的影响。此外,还研究了系统的功率优化问题,通过向传输节点分配最优功率来提高系统的停电性能。最后,进行了大量的计算机模拟来验证分析结果。
{"title":"Outage probability and system optimization of SSD-based dual-hop relaying system with multiple relays","authors":"Muhammad Ajmal Khan, R. Rao, Xianbin Wang","doi":"10.1109/UEMCON.2017.8249104","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249104","url":null,"abstract":"The conventional dual-hop relaying system, without a direct link between the source and the destination, transmits one symbol in two time slots. However, if signal space diversity (SSD) is integrated into the conventional dual-hop relaying system, it transmits two symbols in three time slots to enhance the spectral efficiency of the conventional dual-hop relaying system. In this paper, the outage performance of an SSD-based dual-hop relaying system with multiple decode-and-forward (DF) relays over Rayleigh fading channel is analyzed, and its closed-form expression is derived. Moreover, an asymptotic approximation of the outage probability is obtained and it is used to investigate the impact of different system parameters. Furthermore, system optimization for power is investigated to enhance the outage performance by allocating optimal powers to transmitting nodes. In the end, extensive computer simulations are performed to validate the analytical results.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of a parallel algorithm on pipelined computation of the finite difference schemes on FPGA 基于FPGA的有限差分格式并行计算算法研究
Wenshi Wang, Zhangqin Huang, Shuo Zhang
With the rapid increase of data, stream computation contributes to the improvement of data real time processing. One of characters of stream computing is in the pipeline to exploit parallelism in the MIMD way. Moreover, pipelined parallel implementation is a common problem and often yields much better parallel efficiency with respect to other commonly used methods. Plentiful physical modeling in the field of image processing and machine vision deals with the solution of partial differential equations, typical representative by Poisson's equation. The finite difference schemes as the main method for the solution of partial difference equation for physical modeling can be time-consuming and computationally expensive. Constructing highly parallel computation models can greatly solve the problem and it is important that quickly and efficiently carry out it. The paper mainly studies the parallel implementation of the mix of Jacobi iterative and Gauss-Seidel method for the finite difference schemes to solve Poisson equations in a pipelined fashion on FPGA.
随着数据量的快速增长,流计算有助于提高数据的实时性。流计算的特点之一是在管道中利用MIMD方式的并行性。此外,流水线并行实现是一个常见的问题,相对于其他常用方法,它通常产生更好的并行效率。在图像处理和机器视觉领域中,大量的物理建模涉及偏微分方程的求解,以泊松方程为典型代表。有限差分格式作为求解物理建模偏差分方程的主要方法,耗时长,计算量大。构建高度并行的计算模型可以极大地解决这一问题,快速有效地实现这一问题至关重要。本文主要研究了用Jacobi迭代法和gaas - seidel方法混合求解泊松方程的有限差分格式在FPGA上的并行实现。
{"title":"Study of a parallel algorithm on pipelined computation of the finite difference schemes on FPGA","authors":"Wenshi Wang, Zhangqin Huang, Shuo Zhang","doi":"10.1109/UEMCON.2017.8248989","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248989","url":null,"abstract":"With the rapid increase of data, stream computation contributes to the improvement of data real time processing. One of characters of stream computing is in the pipeline to exploit parallelism in the MIMD way. Moreover, pipelined parallel implementation is a common problem and often yields much better parallel efficiency with respect to other commonly used methods. Plentiful physical modeling in the field of image processing and machine vision deals with the solution of partial differential equations, typical representative by Poisson's equation. The finite difference schemes as the main method for the solution of partial difference equation for physical modeling can be time-consuming and computationally expensive. Constructing highly parallel computation models can greatly solve the problem and it is important that quickly and efficiently carry out it. The paper mainly studies the parallel implementation of the mix of Jacobi iterative and Gauss-Seidel method for the finite difference schemes to solve Poisson equations in a pipelined fashion on FPGA.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114896402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalFire: Malware firewall for malicious content detection and protection MalFire:恶意软件防火墙,用于检测和保护恶意内容
Wyatt Yost, Chetan Jaiswal
The online portion of modern life is growing at an astonishing rate, with the consequence that more of the user's critical information is stored online. This poses an immediate threat to privacy and security of the user's data. This work will cover the increasing dangers and security risks of adware, adware injection, and malware injection. These programs increase in direct proportion to the number of users on the Internet. Each of these programs presents an imminent threat to a user's privacy and sensitive information, anytime they utilize the Internet. We will discuss how current ad blockers are not the actual solution to these threats, but rather a premise to our work. Current ad blocking tools can be discovered by the web servers which often requires suppression of the ad blocking tool. Suppressing the tool creates vulnerabilities in a user's system, but even when the tool is active their system is still susceptible to peril. It is possible, even when an ad blocking tool is functioning, for it to allow adware content through. Our solution to the contemporary threats is our tool, MalFire.
现代生活的网络部分正以惊人的速度增长,其结果是越来越多的用户的关键信息被存储在网上。这对用户数据的隐私和安全构成了直接威胁。这项工作将涵盖广告软件、广告软件注入和恶意软件注入日益增加的危险和安全风险。这些程序的增长与互联网用户的数量成正比。这些程序中的每一个都对用户的隐私和敏感信息构成迫在眉睫的威胁,无论他们何时使用互联网。我们将讨论当前的广告拦截器如何不是这些威胁的实际解决方案,而是我们工作的前提。当前的广告拦截工具可以被web服务器发现,这通常需要抑制广告拦截工具。抑制该工具会在用户的系统中创建漏洞,但是即使该工具处于活动状态,他们的系统仍然容易受到危险的影响。这是有可能的,即使当广告拦截工具的功能,它允许广告内容通过。我们解决当代威胁的方法就是我们的工具,MalFire。
{"title":"MalFire: Malware firewall for malicious content detection and protection","authors":"Wyatt Yost, Chetan Jaiswal","doi":"10.1109/UEMCON.2017.8249075","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249075","url":null,"abstract":"The online portion of modern life is growing at an astonishing rate, with the consequence that more of the user's critical information is stored online. This poses an immediate threat to privacy and security of the user's data. This work will cover the increasing dangers and security risks of adware, adware injection, and malware injection. These programs increase in direct proportion to the number of users on the Internet. Each of these programs presents an imminent threat to a user's privacy and sensitive information, anytime they utilize the Internet. We will discuss how current ad blockers are not the actual solution to these threats, but rather a premise to our work. Current ad blocking tools can be discovered by the web servers which often requires suppression of the ad blocking tool. Suppressing the tool creates vulnerabilities in a user's system, but even when the tool is active their system is still susceptible to peril. It is possible, even when an ad blocking tool is functioning, for it to allow adware content through. Our solution to the contemporary threats is our tool, MalFire.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A portable real-time scene recognition system on smartphone 基于智能手机的便携式实时场景识别系统
Zhenwen Gui
In the context of mapping and mobile navigation services, the recognition of the urban infrastructure plays an important role. However, majority of the existing recognition methods cannot be effectively run on the smartphones due to their large computational costs and high storages. In this paper, a fast scene recognition approach is introduced by fusing the outputs of inertial sensors and cameras of smartphones for real-time applications in large scenes. The proposed algorithm possesses the virtues of implementation easiness, storage efficiency and computation significance. Experimental results on the datasets of outdoor scenes and UKBench datasets demonstrate the effectiveness and robustness of the proposed algorithm.
在地图和移动导航服务的背景下,城市基础设施的识别起着重要的作用。然而,现有的大多数识别方法由于其庞大的计算成本和高存储而无法在智能手机上有效运行。本文介绍了一种融合惯性传感器和智能手机摄像头输出的快速场景识别方法,用于大场景下的实时应用。该算法具有实现简单、存储效率高、计算量大等优点。在室外场景数据集和UKBench数据集上的实验结果表明了该算法的有效性和鲁棒性。
{"title":"A portable real-time scene recognition system on smartphone","authors":"Zhenwen Gui","doi":"10.1109/UEMCON.2017.8248969","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248969","url":null,"abstract":"In the context of mapping and mobile navigation services, the recognition of the urban infrastructure plays an important role. However, majority of the existing recognition methods cannot be effectively run on the smartphones due to their large computational costs and high storages. In this paper, a fast scene recognition approach is introduced by fusing the outputs of inertial sensors and cameras of smartphones for real-time applications in large scenes. The proposed algorithm possesses the virtues of implementation easiness, storage efficiency and computation significance. Experimental results on the datasets of outdoor scenes and UKBench datasets demonstrate the effectiveness and robustness of the proposed algorithm.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"437 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1