首页 > 最新文献

2019 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters 自然灾害条件下基于码分复用的地面/无人机综合移动通信系统性能分析
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718128
Ryoichi Hasegawa, E. Okamoto, H. Tsuji, A. Miura
The unmanned aerial vehicle (UAV) is expected to play a role as a substitute cellular base station in mountainous regions without base stations or in natural disaster situations. To communicate with mobile phones, it is necessary to share the same frequency band between the terrestrial system and UAV system. However, the signals of both base stations cause interference with each other, and then the link quality is deteriorated. Therefore, we propose an application of code division multiplexing for UAV downlink in the terrestrial/UAvintegrated mobile communications system to improve the transmission performance. To evaluate the performance in a practical environment, we consider a cell model in which active terrestrial base stations are partially recovered in the target UAV cell area. The bit error rate performance is then numerically calculated in the cell model.
无人机(UAV)将在没有基站的山区或自然灾害情况下发挥替代蜂窝基站的作用。为了与手机通信,地面系统和无人机系统必须共用同一频段。但是,两个基站的信号相互干扰,导致链路质量下降。因此,我们提出了将码分复用技术应用于无人机下行链路,以提高地面/无人机集成移动通信系统的传输性能。为了在实际环境中评估性能,我们考虑了一个在目标无人机小区区域中部分恢复有源地面基站的小区模型。然后在单元模型中对误码率性能进行数值计算。
{"title":"Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters","authors":"Ryoichi Hasegawa, E. Okamoto, H. Tsuji, A. Miura","doi":"10.1109/ICOIN.2019.8718128","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718128","url":null,"abstract":"The unmanned aerial vehicle (UAV) is expected to play a role as a substitute cellular base station in mountainous regions without base stations or in natural disaster situations. To communicate with mobile phones, it is necessary to share the same frequency band between the terrestrial system and UAV system. However, the signals of both base stations cause interference with each other, and then the link quality is deteriorated. Therefore, we propose an application of code division multiplexing for UAV downlink in the terrestrial/UAvintegrated mobile communications system to improve the transmission performance. To evaluate the performance in a practical environment, we consider a cell model in which active terrestrial base stations are partially recovered in the target UAV cell area. The bit error rate performance is then numerically calculated in the cell model.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115966560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Communication Optimization in Multi-SDN Controller 多sdn控制器通信优化研究
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718110
Woo-sup Shim, Keecheon Kim
Software defined network (SDN) is the most critical technology required for a new type of network. But SDN is actively researched only within the scope of the TCP / IP protocol software. Therefore, the SDN based on the TCP / IP protocol is limited to accommodate the volume of data which is continuously increasing. To overcome the problems of the TCP / IP protocol, researches on the ICN protocol that performs routing through the data identifier have been actively conducted. In this paper, we propose a communication optimization method that constructs information centric network (ICN) instead of TCP/IP Internet environment in multi-SDN controller.
软件定义网络(SDN)是一种新型网络所需要的最关键技术。但SDN的积极研究仅限于TCP / IP协议范围内的软件。因此,基于TCP / IP协议的SDN难以满足不断增长的数据量。为了克服TCP / IP协议存在的问题,人们积极开展了通过数据标识符进行路由的ICN协议的研究。本文提出了一种在多sdn控制器中构建信息中心网络(ICN)而不是TCP/IP网络环境的通信优化方法。
{"title":"A Study on Communication Optimization in Multi-SDN Controller","authors":"Woo-sup Shim, Keecheon Kim","doi":"10.1109/ICOIN.2019.8718110","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718110","url":null,"abstract":"Software defined network (SDN) is the most critical technology required for a new type of network. But SDN is actively researched only within the scope of the TCP / IP protocol software. Therefore, the SDN based on the TCP / IP protocol is limited to accommodate the volume of data which is continuously increasing. To overcome the problems of the TCP / IP protocol, researches on the ICN protocol that performs routing through the data identifier have been actively conducted. In this paper, we propose a communication optimization method that constructs information centric network (ICN) instead of TCP/IP Internet environment in multi-SDN controller.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Post-Mining of Generalized Association Rules from Data Cubes 基于数据集的广义关联规则后挖掘
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718147
H. Brahmi
Data warehouses provide decision makers with the necessary tools to help them understand their data. The structural complexity of the data is maintained through multidimensional data views commonly called data cubes. Mining such data is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, measures). In this paper, we introduce a novel approach that post-mines generalized association rules by exploiting the dimension hierarchies that feature data warehouses. We define the concepts related to our problem as well as the associated algorithm. Carried out experiments show the significance of our approach.
数据仓库为决策者提供了必要的工具,帮助他们理解数据。数据的结构复杂性是通过通常称为数据立方体的多维数据视图来维护的。挖掘这样的数据仍然是一个开放的问题,因为很少有方法真正考虑到这个框架的特殊性(例如多维度、层次结构、度量)。在本文中,我们引入了一种新的方法,通过利用数据仓库特征的维度层次结构,对广义关联规则进行后挖掘。我们定义了与问题相关的概念以及相关的算法。实验结果表明了该方法的意义。
{"title":"Post-Mining of Generalized Association Rules from Data Cubes","authors":"H. Brahmi","doi":"10.1109/ICOIN.2019.8718147","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718147","url":null,"abstract":"Data warehouses provide decision makers with the necessary tools to help them understand their data. The structural complexity of the data is maintained through multidimensional data views commonly called data cubes. Mining such data is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, measures). In this paper, we introduce a novel approach that post-mines generalized association rules by exploiting the dimension hierarchies that feature data warehouses. We define the concepts related to our problem as well as the associated algorithm. Carried out experiments show the significance of our approach.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132509649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Service Function Path Selection for IoT Devices Using Virtual Network Function Performance Data 基于虚拟网络功能性能数据的物联网设备业务功能路径优化
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718150
W. Abeysiriwardhana, J. Wijekoon, H. Nishi
Software defined networking (SDN) and network function virtualization (NFV) are proposed as software based applications to cater to smart services requirements of smart communities. The services are linked together to support different sets of clients using service function chaining (SFC). Service functions (SFs) in an SFC must be distributed among available computing resources by creating a service function path (SFP) allowing resource management and optimal SF execution. This paper proposes a novel SFP allocation algorithm considering the computation capabilities of hardware resources while minimizing the completion time of SFCs. The proposed algorithm shows 10% performance increment compared to recently developed algorithms such as nearly optimal service function path and optimal service function selection algorithms.
软件定义网络(SDN)和网络功能虚拟化(NFV)作为基于软件的应用被提出,以满足智慧社区对智能业务的需求。使用服务功能链(SFC)将服务链接在一起以支持不同的客户端集。SFC中的业务功能通过创建SFP (Service function path)分布在可用的计算资源中,实现资源管理和最优的业务功能执行。本文提出了一种新的SFP分配算法,在考虑硬件资源计算能力的同时最小化SFP的完成时间。该算法与近最优业务功能路径和最优业务功能选择算法相比,性能提升10%。
{"title":"Optimized Service Function Path Selection for IoT Devices Using Virtual Network Function Performance Data","authors":"W. Abeysiriwardhana, J. Wijekoon, H. Nishi","doi":"10.1109/ICOIN.2019.8718150","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718150","url":null,"abstract":"Software defined networking (SDN) and network function virtualization (NFV) are proposed as software based applications to cater to smart services requirements of smart communities. The services are linked together to support different sets of clients using service function chaining (SFC). Service functions (SFs) in an SFC must be distributed among available computing resources by creating a service function path (SFP) allowing resource management and optimal SF execution. This paper proposes a novel SFP allocation algorithm considering the computation capabilities of hardware resources while minimizing the completion time of SFCs. The proposed algorithm shows 10% performance increment compared to recently developed algorithms such as nearly optimal service function path and optimal service function selection algorithms.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125935690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reservation-Based Intersection Crossing Scheme for Autonomous Vehicles Traveling in a Speed Range 基于预定的自动驾驶车辆在速度区间内的交叉口穿越方案
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718170
Myungwhan Choi, Areeya Rubenecia, Hyohyun Choi
This paper presents an autonomous intersection management scheme using reservation-based scheduling. The scheme coordinates the access of the autonomous vehicles to an intersection without a traffic light such that all vehicles can travel across the intersection without collision. In this paper, we make our model applicable to real-world system by allowing the vehicles to move within a predefined speed range while in the intersection. Simulation shows the effect of the speed range size to the efficiency of the system.
提出了一种基于预约调度的自主交叉口管理方案。该方案协调自动驾驶车辆进入没有红绿灯的十字路口,这样所有车辆都可以在没有碰撞的情况下穿过十字路口。在本文中,我们通过允许车辆在一个预定义的速度范围内移动,使我们的模型适用于现实世界的系统。仿真结果表明了调速范围大小对系统效率的影响。
{"title":"Reservation-Based Intersection Crossing Scheme for Autonomous Vehicles Traveling in a Speed Range","authors":"Myungwhan Choi, Areeya Rubenecia, Hyohyun Choi","doi":"10.1109/ICOIN.2019.8718170","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718170","url":null,"abstract":"This paper presents an autonomous intersection management scheme using reservation-based scheduling. The scheme coordinates the access of the autonomous vehicles to an intersection without a traffic light such that all vehicles can travel across the intersection without collision. In this paper, we make our model applicable to real-world system by allowing the vehicles to move within a predefined speed range while in the intersection. Simulation shows the effect of the speed range size to the efficiency of the system.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing 车载云计算中的轻量级认证与通信协议
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718143
Harsha Vasudev, Debasis Das
With the increased number of vehicles, the traditional VANETs (Vehicular Ad-hoc Networks) experiencing new face transitions. One such concept is Vehicular Cloud Computing (VCC), where the data exchanges between vehicles or any entities, in traffic condition or in an emergency situation can be easily done. Establishing authentication and secure communication in VCC is a major problem because of the highly dynamic nature of vehicles. False messages may mislead the drivers which may cause serious issues. In this paper, we propose a lightweight protocol for authentication and secure communication in the VCC. More specifically, we design a lightweight protocol with hash operations, XORs, concatenations, etc., to ensure security. In-depth security analysis is done to check various attacks in the VCC system. In addition to that, we have done hardware implementation on a desktop computer, on a small single board computer-Raspberry Pi and verified the execution time needed. The performance analysis reveals that our protocol outperforms well in different scenarios like communication cost, storage overhead, computation time, and energy consumption.
随着车辆数量的增加,传统的vanet(车载自组织网络)正在经历新的转变。其中一个概念是车辆云计算(VCC),在交通状况或紧急情况下,车辆或任何实体之间的数据交换都可以很容易地完成。由于车辆的高度动态性,在VCC中建立认证和安全通信是一个主要问题。错误信息可能会误导驱动程序,从而导致严重的问题。在本文中,我们提出了一个轻量级的VCC认证和安全通信协议。更具体地说,我们设计了一个带有哈希操作、xor、连接等的轻量级协议,以确保安全性。对VCC系统中的各种攻击进行了深入的安全分析。除此之外,我们还在桌面计算机、小型单板计算机raspberry Pi上进行了硬件实现,并验证了所需的执行时间。性能分析表明,我们的协议在通信成本、存储开销、计算时间和能耗等不同场景下都表现出色。
{"title":"A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing","authors":"Harsha Vasudev, Debasis Das","doi":"10.1109/ICOIN.2019.8718143","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718143","url":null,"abstract":"With the increased number of vehicles, the traditional VANETs (Vehicular Ad-hoc Networks) experiencing new face transitions. One such concept is Vehicular Cloud Computing (VCC), where the data exchanges between vehicles or any entities, in traffic condition or in an emergency situation can be easily done. Establishing authentication and secure communication in VCC is a major problem because of the highly dynamic nature of vehicles. False messages may mislead the drivers which may cause serious issues. In this paper, we propose a lightweight protocol for authentication and secure communication in the VCC. More specifically, we design a lightweight protocol with hash operations, XORs, concatenations, etc., to ensure security. In-depth security analysis is done to check various attacks in the VCC system. In addition to that, we have done hardware implementation on a desktop computer, on a small single board computer-Raspberry Pi and verified the execution time needed. The performance analysis reveals that our protocol outperforms well in different scenarios like communication cost, storage overhead, computation time, and energy consumption.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114921322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on Fault Tolerance Technique for AGR-MAC Protocol Based Sensor Networks 基于AGR-MAC协议的传感器网络容错技术研究
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718139
Myeongseung Han, Eunsung Cho, Jun-Hyuk Lee, Intae Ryoo
Sensors collect data in many ways and provide various services based on that data. Sensors can be distributed or placed anywhere unreachable from human beings. In wireless sensor network environment, it is hard to replace sensor nodes when they fail to operate. In an anchor-based group relay MAC(AGR-MAC), an anchor node can be isolated when any other anchor nodes do not exist in the communication range. And data collected into isolated sensor nodes could be discarded. In order for solving this kind of node isolation phenomenon, we have proposed isolation detection and recovery method for AGR-MAC and prevented the nodes from unwantedly discarding the data.
传感器通过多种方式收集数据,并根据这些数据提供各种服务。传感器可以分布或放置在人类无法到达的任何地方。在无线传感器网络环境中,当传感器节点无法正常工作时,很难对其进行替换。在基于锚点的组中继MAC(AGR-MAC)中,当通信范围内不存在任何其他锚点时,可以隔离一个锚点节点。采集到孤立的传感器节点的数据可以被丢弃。为了解决这种节点隔离现象,我们提出了AGR-MAC的隔离检测和恢复方法,防止节点不必要地丢弃数据。
{"title":"A Study on Fault Tolerance Technique for AGR-MAC Protocol Based Sensor Networks","authors":"Myeongseung Han, Eunsung Cho, Jun-Hyuk Lee, Intae Ryoo","doi":"10.1109/ICOIN.2019.8718139","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718139","url":null,"abstract":"Sensors collect data in many ways and provide various services based on that data. Sensors can be distributed or placed anywhere unreachable from human beings. In wireless sensor network environment, it is hard to replace sensor nodes when they fail to operate. In an anchor-based group relay MAC(AGR-MAC), an anchor node can be isolated when any other anchor nodes do not exist in the communication range. And data collected into isolated sensor nodes could be discarded. In order for solving this kind of node isolation phenomenon, we have proposed isolation detection and recovery method for AGR-MAC and prevented the nodes from unwantedly discarding the data.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115132396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Ledger Technologies for M2M Communications 面向M2M通信的分布式账本技术
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718115
N. Zivic, C. Ruland, J. Sassmannshausen
Distributed Ledger Technologies (DLT) are seen as data bases of the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. They are considered as one of the main drivers of future applications, especially in field of Machine to Machine (M2) communications which are one of the basic technologies for Internet of Things (IoT). Therefore, Distributed Ledger Technologies with their inherent property to provide security, privacy and decentralized operation are engine for todays and future reliable, autonomous and trusted IoT platforms. For this reason, IoT using DLT can be considered as “Internet of Trusted Things”. This paper considers tree basic DLT technologies according to their architecture: blockchain, tangle and hashgraph. Their characteristics are compared considering number of criteria, with the aim to find a proper architecture for a specific M2M application.
分布式账本技术(DLT)被视为未来的数据库,它降低了信任成本,并彻底改变了个人、公司和政府之间的交易。它们被认为是未来应用的主要驱动力之一,特别是在机器对机器(M2)通信领域,这是物联网(IoT)的基本技术之一。因此,分布式账本技术以其提供安全、隐私和分散操作的固有属性,是当今和未来可靠、自主和可信的物联网平台的引擎。因此,使用DLT的物联网可以被认为是“可信物联网”。本文根据其架构考虑了三种基本的DLT技术:区块链,缠结和哈希图。将它们的特性根据标准数量进行比较,目的是为特定的M2M应用程序找到合适的体系结构。
{"title":"Distributed Ledger Technologies for M2M Communications","authors":"N. Zivic, C. Ruland, J. Sassmannshausen","doi":"10.1109/ICOIN.2019.8718115","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718115","url":null,"abstract":"Distributed Ledger Technologies (DLT) are seen as data bases of the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. They are considered as one of the main drivers of future applications, especially in field of Machine to Machine (M2) communications which are one of the basic technologies for Internet of Things (IoT). Therefore, Distributed Ledger Technologies with their inherent property to provide security, privacy and decentralized operation are engine for todays and future reliable, autonomous and trusted IoT platforms. For this reason, IoT using DLT can be considered as “Internet of Trusted Things”. This paper considers tree basic DLT technologies according to their architecture: blockchain, tangle and hashgraph. Their characteristics are compared considering number of criteria, with the aim to find a proper architecture for a specific M2M application.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Quantifying Activity Levels of Community-Dwelling Seniors Through Beacon Monitoring 通过信标监测量化社区居住老年人的活动水平
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8717984
Jin Qiang Goh, Hwee-Pink Tan, H. Tan
The ageing population is rapidly increasing, both in Singapore and worldwide. Due to the shortage of healthcare professionals and institutionalized care, there is a pertinent need for seniors to age-in-place - safely and in the familiarity of their neighborhoods. In addition, changing family structures and rising divorce rates, coupled with the desire for more personal space and independence, have resulted in a significant proportion of seniors who live alone at home. In this paper, we describe a scalable and low-cost monitoring system that can help to identify community-dwelling seniors who are at risk of social isolation and/or frailty. This is achieved by monitoring the seniors' activity levels (which are computed based on the timings and durations that seniors spend in their residential homes), through the use of Bluetooth beacons and the seniors' smartphones. The system has been implemented and deployed in 81 residential homes, over a period of 3 weeks. Preliminary results show that the system can provide a low-cost and efficient way of providing caregivers with insights on each senior's well-being, based on his/her activity levels.
无论是在新加坡还是在世界范围内,老龄化人口都在迅速增加。由于医疗保健专业人员和机构护理的短缺,老年人有必要在安全、熟悉的社区中安度晚年。此外,家庭结构的变化和离婚率的上升,加上对更多个人空间和独立的渴望,导致很大一部分老年人独自住在家里。在本文中,我们描述了一个可扩展和低成本的监测系统,可以帮助识别社区居住的老年人面临社会孤立和/或虚弱的风险。这是通过使用蓝牙信标和老年人的智能手机来监测老年人的活动水平(根据老年人在其住宅中花费的时间和持续时间计算)来实现的。该系统已在81个住宅中实施和部署,为期3周。初步结果表明,该系统可以提供一种低成本、高效的方式,根据每位老年人的活动水平,为护理人员提供对每位老年人健康状况的洞察。
{"title":"Quantifying Activity Levels of Community-Dwelling Seniors Through Beacon Monitoring","authors":"Jin Qiang Goh, Hwee-Pink Tan, H. Tan","doi":"10.1109/ICOIN.2019.8717984","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717984","url":null,"abstract":"The ageing population is rapidly increasing, both in Singapore and worldwide. Due to the shortage of healthcare professionals and institutionalized care, there is a pertinent need for seniors to age-in-place - safely and in the familiarity of their neighborhoods. In addition, changing family structures and rising divorce rates, coupled with the desire for more personal space and independence, have resulted in a significant proportion of seniors who live alone at home. In this paper, we describe a scalable and low-cost monitoring system that can help to identify community-dwelling seniors who are at risk of social isolation and/or frailty. This is achieved by monitoring the seniors' activity levels (which are computed based on the timings and durations that seniors spend in their residential homes), through the use of Bluetooth beacons and the seniors' smartphones. The system has been implemented and deployed in 81 residential homes, over a period of 3 weeks. Preliminary results show that the system can provide a low-cost and efficient way of providing caregivers with insights on each senior's well-being, based on his/her activity levels.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134631819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of MAC Protocol for Power Reduction in LoRa WAn LoRa广域网中MAC协议降功耗的改进
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718148
Keitaro Terada, H. Mukai, T. Yokotani
With the increasing use of the Internet of Things (IoT), various LPWA standards are being introduced. The authors focused on the LoRaWAnstandard with low power consumption and transmission distance of several kilometers. As ALOHA is adopted for the LoRaWAN MAC protocol, its communication collision increases as the number of nodes increases. Therefore, a back-off process becomes necessary, and the power consumption is increased by the back-off process during its operation. In this paper, we propose an enhancement to the LoRaWAN MAC protocol, which enables communication collision avoidance and sleep control of the end nodes.
随着物联网(IoT)的使用越来越多,各种LPWA标准正在引入。重点研究了低功耗、传输距离可达数公里的lorawan标准。由于LoRaWAN MAC协议采用ALOHA,其通信冲突会随着节点数量的增加而增加。因此,必须采用回退工艺,并且回退过程在运行过程中会增加功耗。本文提出了对LoRaWAN MAC协议的改进,使通信冲突避免和终端节点的休眠控制成为可能。
{"title":"Enhancement of MAC Protocol for Power Reduction in LoRa WAn","authors":"Keitaro Terada, H. Mukai, T. Yokotani","doi":"10.1109/ICOIN.2019.8718148","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718148","url":null,"abstract":"With the increasing use of the Internet of Things (IoT), various LPWA standards are being introduced. The authors focused on the LoRaWAnstandard with low power consumption and transmission distance of several kilometers. As ALOHA is adopted for the LoRaWAN MAC protocol, its communication collision increases as the number of nodes increases. Therefore, a back-off process becomes necessary, and the power consumption is increased by the back-off process during its operation. In this paper, we propose an enhancement to the LoRaWAN MAC protocol, which enables communication collision avoidance and sleep control of the end nodes.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114683844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1