首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
Proactive algorithm to reduce power consumption and handovers in heterogeneous mobile networks 在异构移动网络中减少功耗和切换的主动算法
M. Nahas, M. Sabati, Rana Kanso, M. Azizi
Energy consumption of communication and cellular networks has recently received increased attention in the research community. Moreover, a large number of base stations (BSs) have been deployed in order to meet these demands on cellular traffic. This leads to considerable increase in the operational cost and contributes as a major portion of the energy consumption of cellular networks. Therefore, network operators are considering how to reduce the energy consumption and design “Green Communication”. The concept of Green Communication is to manage energy consumption and maintain reasonable costs while keeping high quality of service and benefits. In this paper, we present some techniques for reducing power consumption by developing solutions in terms of the network architecture and the base stations components. We use some of these solutions to develop and implement a novel algorithm that combines Cell Zooming and Heterogeneous Networks with many types of base station while taking into consideration user's mobility. The efficiency and the power management of our algorithm, especially in high traffic networks, are achieved and approved by simulations.
通信和蜂窝网络的能量消耗最近受到了研究界越来越多的关注。此外,为了满足蜂窝通信的这些需求,已经部署了大量的基站(BSs)。这导致了运营成本的大幅增加,并成为蜂窝网络能源消耗的主要部分。因此,网络运营商正在考虑如何降低能耗,设计“绿色通信”。绿色通讯的理念是管理能源消耗和保持合理的成本,同时保持高质量的服务和效益。在本文中,我们从网络架构和基站组件的角度出发,提出了一些降低功耗的解决方案。我们使用其中的一些解决方案来开发和实现一种新的算法,该算法将蜂窝缩放和异构网络与多种类型的基站结合起来,同时考虑到用户的移动性。通过仿真验证了该算法的效率和功耗管理,特别是在高流量网络中。
{"title":"Proactive algorithm to reduce power consumption and handovers in heterogeneous mobile networks","authors":"M. Nahas, M. Sabati, Rana Kanso, M. Azizi","doi":"10.1109/UEMCON.2017.8249011","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249011","url":null,"abstract":"Energy consumption of communication and cellular networks has recently received increased attention in the research community. Moreover, a large number of base stations (BSs) have been deployed in order to meet these demands on cellular traffic. This leads to considerable increase in the operational cost and contributes as a major portion of the energy consumption of cellular networks. Therefore, network operators are considering how to reduce the energy consumption and design “Green Communication”. The concept of Green Communication is to manage energy consumption and maintain reasonable costs while keeping high quality of service and benefits. In this paper, we present some techniques for reducing power consumption by developing solutions in terms of the network architecture and the base stations components. We use some of these solutions to develop and implement a novel algorithm that combines Cell Zooming and Heterogeneous Networks with many types of base station while taking into consideration user's mobility. The efficiency and the power management of our algorithm, especially in high traffic networks, are achieved and approved by simulations.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125557885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consensus protocols for blockchain-based data provenance: Challenges and opportunities 基于区块链的数据来源共识协议:挑战与机遇
Deepak K. Tosh, S. Shetty, Xueping Liang, C. Kamhoua, L. Njilla
Blockchain has recently attracted tremendous interest due to its ability to enhance security and privacy through a immutable shared distributed ledger. Blockchain's ability to detect integrity violations are particularly key in providing assured data provenance in cloud platform. The practical adoption of blockchain will largely hinge on consensus protocols meeting performance and security guarantees. In this paper, we present the design issues for consensus protocols for blockchain based cloud provenance. We present the blockchain based data provenance framework for cloud. We find that there are performance and security challenges in adopting proof-of-work consensus protocol within this framework. We present unique design challenges and opportunities in developing proof-of-stake for data provenance in cloud platform.
区块链最近吸引了巨大的兴趣,因为它能够通过不可变的共享分布式账本增强安全性和隐私性。区块链检测完整性违规的能力对于在云平台中提供可靠的数据来源尤为关键。区块链的实际采用将在很大程度上取决于满足性能和安全保证的共识协议。在本文中,我们提出了基于区块链的云溯源共识协议的设计问题。提出了基于区块链的云数据溯源框架。我们发现在此框架内采用工作量证明共识协议存在性能和安全挑战。我们在开发云平台数据来源的权益证明方面提出了独特的设计挑战和机遇。
{"title":"Consensus protocols for blockchain-based data provenance: Challenges and opportunities","authors":"Deepak K. Tosh, S. Shetty, Xueping Liang, C. Kamhoua, L. Njilla","doi":"10.1109/UEMCON.2017.8249088","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249088","url":null,"abstract":"Blockchain has recently attracted tremendous interest due to its ability to enhance security and privacy through a immutable shared distributed ledger. Blockchain's ability to detect integrity violations are particularly key in providing assured data provenance in cloud platform. The practical adoption of blockchain will largely hinge on consensus protocols meeting performance and security guarantees. In this paper, we present the design issues for consensus protocols for blockchain based cloud provenance. We present the blockchain based data provenance framework for cloud. We find that there are performance and security challenges in adopting proof-of-work consensus protocol within this framework. We present unique design challenges and opportunities in developing proof-of-stake for data provenance in cloud platform.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128990869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Mobile sensor-based biometrics using common daily activities 基于移动传感器的生物识别技术,使用日常活动
Kenichi Yoneda, Gary M. Weiss
Research on mobile sensor biometrics increased when mobile devices with powerful sensors, such as smartphones, became ubiquitous. However, existing studies are quite limited, especially with regard to the physical activities that are used to provide the biometric signature — many studies only consider a single activity. In this study, we provide the most comprehensive analysis of mobile biometrics to date. We evaluate eighteen physical activities and nine sensor combinations for their biometric efficacy (the accelerometer and gyroscope sensors from a smartphone and smartwatch are used). Our mobile biometric models are evaluated with respect to identification and authentication performance and are shown to achieve excellent results in both cases. Furthermore, our models perform well even when built from all eighteen activities without activity labels, which represents a big step towards achieving the goal of continuous biometrics using only a smartwatch and smartphone.
随着智能手机等具有强大传感器的移动设备的普及,对移动传感器生物识别技术的研究也越来越多。然而,现有的研究相当有限,特别是关于用于提供生物特征签名的身体活动-许多研究只考虑单一活动。在这项研究中,我们提供了迄今为止最全面的移动生物识别分析。我们评估了18种身体活动和9种传感器组合的生物识别功效(使用了智能手机和智能手表上的加速度计和陀螺仪传感器)。我们的移动生物识别模型在识别和认证性能方面进行了评估,并在这两种情况下都取得了优异的结果。此外,即使在没有活动标签的情况下,我们的模型也表现良好,这意味着仅使用智能手表和智能手机就可以实现连续生物识别的目标。
{"title":"Mobile sensor-based biometrics using common daily activities","authors":"Kenichi Yoneda, Gary M. Weiss","doi":"10.1109/UEMCON.2017.8249001","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249001","url":null,"abstract":"Research on mobile sensor biometrics increased when mobile devices with powerful sensors, such as smartphones, became ubiquitous. However, existing studies are quite limited, especially with regard to the physical activities that are used to provide the biometric signature — many studies only consider a single activity. In this study, we provide the most comprehensive analysis of mobile biometrics to date. We evaluate eighteen physical activities and nine sensor combinations for their biometric efficacy (the accelerometer and gyroscope sensors from a smartphone and smartwatch are used). Our mobile biometric models are evaluated with respect to identification and authentication performance and are shown to achieve excellent results in both cases. Furthermore, our models perform well even when built from all eighteen activities without activity labels, which represents a big step towards achieving the goal of continuous biometrics using only a smartwatch and smartphone.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Chirp pulse envelope evaluation for SAR image formation SAR图像形成的啁啾脉冲包络评估
E. Balster, Andrew M. Kordik, F. Scarpino, Kerry L. Hill
In this paper, a number of pulse envelopes in a spotlight SAR simulation environment are tested. The simulation environment generates SAR phase history data from digital imagery so that the resulting SAR image formed from the phase history may be compared to the original with traditional image processing metrics such as peak signal-to-noise ratio (PSNR) and structured similarity index (SSIM). The results of this study show that a raised cosine envelope with rolloff factor β = 0.1 provides imagery of the best quality of the different envelopes tested, and provides an average of 1.06 dB gain in PSNR and 0.036 gain in SSIM when compared to a pulse with a rectangular envelope applied.
本文在聚光SAR仿真环境下对多个脉冲包络进行了测试。仿真环境从数字图像中生成SAR相位历史数据,从而可以使用峰值信噪比(PSNR)和结构化相似指数(SSIM)等传统图像处理指标将相位历史形成的SAR图像与原始图像进行比较。本研究结果表明,与应用矩形包络的脉冲相比,滚动因子β = 0.1的上升余弦包络提供了不同包络测试中质量最好的图像,并且在PSNR中提供了1.06 dB的平均增益,在SSIM中提供了0.036增益。
{"title":"Chirp pulse envelope evaluation for SAR image formation","authors":"E. Balster, Andrew M. Kordik, F. Scarpino, Kerry L. Hill","doi":"10.1109/UEMCON.2017.8248973","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248973","url":null,"abstract":"In this paper, a number of pulse envelopes in a spotlight SAR simulation environment are tested. The simulation environment generates SAR phase history data from digital imagery so that the resulting SAR image formed from the phase history may be compared to the original with traditional image processing metrics such as peak signal-to-noise ratio (PSNR) and structured similarity index (SSIM). The results of this study show that a raised cosine envelope with rolloff factor β = 0.1 provides imagery of the best quality of the different envelopes tested, and provides an average of 1.06 dB gain in PSNR and 0.036 gain in SSIM when compared to a pulse with a rectangular envelope applied.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New sparsity based pansharpening algorithms for hyperspectral images 基于稀疏度的高光谱图像泛锐化新算法
C. Kwan, Bence Budavari, Minh Dao, Jin Zhou
In this paper, we present new sparsity based algorithms in generating a high resolution hyperspectral image by fusing a high resolution color image with a low resolution hyperspectral image. Mathematical formulation of the sparsity based approaches is presented. Comparison with other pansharpening algorithms using actual data has been carried out using two hyperspectral image data sets. Initial results are encouraging. Most importantly, the new sparsity formulation points to a new direction in generating high resolution hyperspectral images where the raw images may be noisy.
在本文中,我们提出了一种新的基于稀疏度的算法,通过融合高分辨率彩色图像和低分辨率高光谱图像来生成高分辨率高光谱图像。给出了基于稀疏度方法的数学表达式。利用两组高光谱图像数据,与其他泛锐化算法进行了对比。初步结果令人鼓舞。最重要的是,新的稀疏性公式指出了生成高分辨率高光谱图像的新方向,其中原始图像可能有噪声。
{"title":"New sparsity based pansharpening algorithms for hyperspectral images","authors":"C. Kwan, Bence Budavari, Minh Dao, Jin Zhou","doi":"10.1109/UEMCON.2017.8248993","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248993","url":null,"abstract":"In this paper, we present new sparsity based algorithms in generating a high resolution hyperspectral image by fusing a high resolution color image with a low resolution hyperspectral image. Mathematical formulation of the sparsity based approaches is presented. Comparison with other pansharpening algorithms using actual data has been carried out using two hyperspectral image data sets. Initial results are encouraging. Most importantly, the new sparsity formulation points to a new direction in generating high resolution hyperspectral images where the raw images may be noisy.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Autonomic security for zero trust networks 零信任网络的自主安全
Dayna Eidle, S. Ni, C. DeCusatis, Anthony Sager
There is a long-standing need for improved cybersecurity through automation of attack signature detection, classification, and response. In this paper, we present experimental test bed results from an implementation of autonomic control plane feedback based on the Observe, Orient, Decide, Act (OODA) framework. This test bed modeled the building blocks for a proposed zero trust cloud data center network. We present test results of trials in which identity management with automated threat response and packet-based authentication were combined with dynamic management of eight distinct network trust levels. The log parsing and orchestration software we created work alongside open source log management tools to coordinate and integrate threat response from firewalls, authentication gateways, and other network devices. Threat response times are measured and shown to be a significant improvement over conventional methods.
长期以来,人们一直需要通过攻击签名检测、分类和响应的自动化来改善网络安全。在本文中,我们给出了基于观察、定位、决定、行动(OODA)框架的自主控制平面反馈实现的实验测试平台结果。该试验台为提议的零信任云数据中心网络构建模块建模。我们给出了将具有自动威胁响应和基于数据包的身份验证的身份管理与八个不同网络信任级别的动态管理相结合的试验测试结果。我们创建的日志解析和编排软件与开源日志管理工具一起工作,以协调和集成来自防火墙、身份验证网关和其他网络设备的威胁响应。对威胁响应时间进行了测量,并显示出比传统方法有显著改进。
{"title":"Autonomic security for zero trust networks","authors":"Dayna Eidle, S. Ni, C. DeCusatis, Anthony Sager","doi":"10.1109/UEMCON.2017.8249053","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249053","url":null,"abstract":"There is a long-standing need for improved cybersecurity through automation of attack signature detection, classification, and response. In this paper, we present experimental test bed results from an implementation of autonomic control plane feedback based on the Observe, Orient, Decide, Act (OODA) framework. This test bed modeled the building blocks for a proposed zero trust cloud data center network. We present test results of trials in which identity management with automated threat response and packet-based authentication were combined with dynamic management of eight distinct network trust levels. The log parsing and orchestration software we created work alongside open source log management tools to coordinate and integrate threat response from firewalls, authentication gateways, and other network devices. Threat response times are measured and shown to be a significant improvement over conventional methods.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127326403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Data analysis of cyber-activity within high performance computing environments 高性能计算环境中网络活动的数据分析
L. Ji, S. Kolhe, A. Clark
High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.
高性能计算(HPC)环境正在成为日常使用的标准。然而,这些系统的弹性是值得怀疑的,因为它们复杂的基础设施使得故障的位置和原因的故障排除非常困难。同样的原因使HPCs易于产生毒性活动。本文提出了一个数据分析框架,用于分析恶意活动导致的故障观测范围。考虑到内部可靠性基础设施,将数据网络外推作为一种预处理工具来执行,以准确计算归一化故障率。接下来,考虑到幅度、增长率和中点行为,对观测谱进行非线性回归。此外,还进行了考虑外围观测值的影响分析。使用模拟的超级计算建模和仿真框架的经验结果显示,在表征性能方面有所改善,其中大约91%的节点被正确表征。这项工作的结果可以应用于在超级计算架构中开发健壮的任务调度框架。
{"title":"Data analysis of cyber-activity within high performance computing environments","authors":"L. Ji, S. Kolhe, A. Clark","doi":"10.1109/UEMCON.2017.8249003","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249003","url":null,"abstract":"High performance computing (HPC) environments are becoming the norm for daily use. However, the resilience of these systems is questionable because their complex infrastructure makes troubleshooting both the location and cause of failures extremely difficult. These same reasons make HPCs prone to virulent activity. This paper presents a data analysis framework for analyzing ranges of failure observations as a result of malicious activity. Taking into account the internal reliability infrastructure, data network extrapolation is performed as a preprocessing tool that accurately calculates the normalized failure rates. Next, nonlinear regression is performed on the spectrum of observations taking into account the magnitude, growth rate, and midpoint behavior. Additionally, influence analysis is performed that considers outlying observations. The empirical results using a simulated supercomputing modeling and simulation framework show improvement, in terms of characterization performance, where approximately 91% of the nodes were properly characterized. The results of this work can be applied to develop robust task-scheduling frameworks within supercomputing architectures.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep CNN-LSTM with combined kernels from multiple branches for IMDb review sentiment analysis 深度CNN-LSTM结合多个分支的核,用于IMDb评论情感分析
Alec Yenter, Abhishek Verma
Deep learning neural networks have made significant progress in the area of image and video analysis. This success of neural networks can be directed towards improvements in textual sentiment classification. In this paper, we describe a novel approach to sentiment analysis through the use of combined kernel from multiple branches of convolutional neural network (CNN) with Long Short-term Memory (LSTM) layers. Our combination of CNN and LSTM schemes produces a model with the highest reported accuracy on the Internet Movie Database (IMDb) review sentiment dataset. Additionally, we present multiple architecture variations of our proposed model to illustrate our attempts to increase accuracy while minimizing overfitting. We experiment with numerous regularization techniques, network structures, and kernel sizes to create five high-performing models for comparison. These models are capable of predicting the sentiment polarity of reviews from the IMDb dataset with accuracy above 89%. Firstly, the accuracy of our best performing proposed model surpasses the previously published models and secondly it vastly improves upon the baseline CNN+LSTM model. The capability of the combined kernel from multiple branches of CNN based LSTM architecture could also be lucrative towards other datasets for sentiment analysis or simply text classification. Furthermore, the proposed model has the potential in machine learning in video and audio.
深度学习神经网络在图像和视频分析领域取得了重大进展。神经网络的这种成功可以直接用于文本情感分类的改进。在本文中,我们描述了一种通过使用具有长短期记忆(LSTM)层的卷积神经网络(CNN)的多个分支的组合核来进行情感分析的新方法。我们将CNN和LSTM方案结合在一起,产生了一个在互联网电影数据库(IMDb)评论情绪数据集上报告准确率最高的模型。此外,我们提出了我们提出的模型的多个架构变体,以说明我们在尽量减少过拟合的同时提高准确性的尝试。我们尝试了许多正则化技术、网络结构和内核大小,以创建五个高性能模型进行比较。这些模型能够预测来自IMDb数据集的评论的情感极性,准确率超过89%。首先,我们提出的表现最好的模型的精度超过了以前发表的模型,其次,它在基线CNN+LSTM模型的基础上大大提高了。基于CNN的LSTM架构的多个分支的组合内核的能力也可以对其他数据集进行情感分析或简单的文本分类。此外,所提出的模型在视频和音频的机器学习中具有潜力。
{"title":"Deep CNN-LSTM with combined kernels from multiple branches for IMDb review sentiment analysis","authors":"Alec Yenter, Abhishek Verma","doi":"10.1109/UEMCON.2017.8249013","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249013","url":null,"abstract":"Deep learning neural networks have made significant progress in the area of image and video analysis. This success of neural networks can be directed towards improvements in textual sentiment classification. In this paper, we describe a novel approach to sentiment analysis through the use of combined kernel from multiple branches of convolutional neural network (CNN) with Long Short-term Memory (LSTM) layers. Our combination of CNN and LSTM schemes produces a model with the highest reported accuracy on the Internet Movie Database (IMDb) review sentiment dataset. Additionally, we present multiple architecture variations of our proposed model to illustrate our attempts to increase accuracy while minimizing overfitting. We experiment with numerous regularization techniques, network structures, and kernel sizes to create five high-performing models for comparison. These models are capable of predicting the sentiment polarity of reviews from the IMDb dataset with accuracy above 89%. Firstly, the accuracy of our best performing proposed model surpasses the previously published models and secondly it vastly improves upon the baseline CNN+LSTM model. The capability of the combined kernel from multiple branches of CNN based LSTM architecture could also be lucrative towards other datasets for sentiment analysis or simply text classification. Furthermore, the proposed model has the potential in machine learning in video and audio.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131512031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
A smart campus internet of things framework 智能校园物联网框架
Yi Wang, Brandon Saez, Joseph Szczechowicz, Jonathan Ruisi, Tyler Kraft, Stephen Toscano, Zachary Vacco, Kervins Nicolas
Smart cities and communities (S&CC) are experiencing transformational change across the nation and globally with the proliferation deployment of Internet of Things (IoT). Smart campus is an important part of S&CC. We built a smart campus IoT framework to address functionality, energy consumption, security and safety in a user-centric perspective. To achieve these, machine learning algorithms are employed in the hardware-software co-design process. During experiment, we focused on energy consumption management using support vector machine to learn the classroom schedule, so that the system can respond to dynamic change of the schedules. The experimental results show that our proposed framework can recognize the classroom regular events and irregular events with high accuracy.
随着物联网(IoT)的扩散部署,智慧城市和社区(S&CC)正在全国乃至全球范围内经历转型变革。智慧校园是科技合作的重要组成部分。我们构建了一个智能校园物联网框架,以用户为中心的角度解决功能、能源消耗、安全和安全问题。为了实现这些,在硬件软件协同设计过程中使用了机器学习算法。在实验中,我们重点研究了利用支持向量机学习课堂课程表的能耗管理,使系统能够对课程表的动态变化做出响应。实验结果表明,我们提出的框架能够以较高的准确率识别课堂上的规则事件和不规则事件。
{"title":"A smart campus internet of things framework","authors":"Yi Wang, Brandon Saez, Joseph Szczechowicz, Jonathan Ruisi, Tyler Kraft, Stephen Toscano, Zachary Vacco, Kervins Nicolas","doi":"10.1109/UEMCON.2017.8249106","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249106","url":null,"abstract":"Smart cities and communities (S&CC) are experiencing transformational change across the nation and globally with the proliferation deployment of Internet of Things (IoT). Smart campus is an important part of S&CC. We built a smart campus IoT framework to address functionality, energy consumption, security and safety in a user-centric perspective. To achieve these, machine learning algorithms are employed in the hardware-software co-design process. During experiment, we focused on energy consumption management using support vector machine to learn the classroom schedule, so that the system can respond to dynamic change of the schedules. The experimental results show that our proposed framework can recognize the classroom regular events and irregular events with high accuracy.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
User concerns with personal routers used as public Wi-fi hotspots 用户担心个人路由器被用作公共Wi-fi热点
J. Golbeck
Cable companies and Internet Service Providers have begun to offer public wifi hotspots run through customers' in-home wireless routers. This greatly expands the number of hotspots a company can offer, but it is often done with out the consent of the customers and sometimes without informing them that it is happening. This has led to a range of privacy and security concerns among the customers whose routers are used. In this paper, we analyze 501 online comments posted to news stories about this practice to develop a taxonomy of user concerns and identify their frequency. We found only about 19% of comments were unconcerned about the practice. Of those concerned, over 40% believed the practice was a violation of autonomy. Worries about quality of service impacts were similarly common. Issues of trust, legal liability, deceptive practices, and power were also quite common. We present these results and offer a discussion of the implications.
有线电视公司和互联网服务提供商已经开始通过客户的家庭无线路由器提供公共wifi热点。这大大增加了公司可以提供的热点数量,但这通常是在未经客户同意的情况下进行的,有时甚至没有通知他们这一情况。这在使用路由器的用户中引发了一系列隐私和安全方面的担忧。在本文中,我们分析了501条关于这种做法的新闻报道的在线评论,以开发用户关注的分类并确定其频率。我们发现只有19%的评论不关心这种做法。在这些受访者中,超过40%的人认为这种做法侵犯了自主权。对服务质量影响的担忧同样普遍。信任、法律责任、欺诈行为和权力等问题也很常见。我们提出了这些结果,并对其影响进行了讨论。
{"title":"User concerns with personal routers used as public Wi-fi hotspots","authors":"J. Golbeck","doi":"10.1109/UEMCON.2017.8248978","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248978","url":null,"abstract":"Cable companies and Internet Service Providers have begun to offer public wifi hotspots run through customers' in-home wireless routers. This greatly expands the number of hotspots a company can offer, but it is often done with out the consent of the customers and sometimes without informing them that it is happening. This has led to a range of privacy and security concerns among the customers whose routers are used. In this paper, we analyze 501 online comments posted to news stories about this practice to develop a taxonomy of user concerns and identify their frequency. We found only about 19% of comments were unconcerned about the practice. Of those concerned, over 40% believed the practice was a violation of autonomy. Worries about quality of service impacts were similarly common. Issues of trust, legal liability, deceptive practices, and power were also quite common. We present these results and offer a discussion of the implications.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1