首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks 一种用于自组织无线传感器网络中未知空间相关信号跟踪的高效加速学习算法
H. Alasti
An efficient accelerated learning algorithm is proposed and discussed for tracking of spatially correlated signals in ad-hoc wireless sensor networks. The proposed algorithm is low-cost and computationally efficient. It models an unknown, spatially correlated signal using a number of its contour lines at equally spaced levels. In the proposed algorithm, each sensor is modeled as one neuron in a neural network. The accelerated learning’s agent is implemented at the fusion center (FC). The algorithm is performed in two phases of spatial modeling and spatial tracking. In spatial modeling phase that accelerated learning is implemented, the algorithm discovers the model parameters. In spatial tracking phase, the model parameters are updated to track the varying, unknown spatial signal. Those sensors (neurons) that their observation are in a given margin of at least one of the contour levels, report their filtered observations to the FC. The FC updates the model parameters based on the reported observations and returns the model features to the sensor network for the next iteration step. The performance evaluation results show that the proposed accelerated learning is low cost and converges faster than single layer machine learning approach. The modeling performance, convergence speed and the cost of the proposed algorithm are compared with those of single layer machine learning algorithm. The algorithm is proposed for environmental monitoring.
提出并讨论了一种用于自组织无线传感器网络中空间相关信号跟踪的快速学习算法。该算法成本低,计算效率高。它使用等距水平的等高线对未知的空间相关信号进行建模。在该算法中,每个传感器被建模为神经网络中的一个神经元。加速学习的代理在融合中心(FC)实现。该算法分为空间建模和空间跟踪两个阶段。在空间建模阶段,该算法实现了加速学习,发现模型参数。在空间跟踪阶段,更新模型参数以跟踪变化的未知空间信号。这些传感器(神经元)的观察结果至少在一个轮廓水平的给定边缘上,它们将过滤后的观察结果报告给脑皮层。FC根据报告的观测值更新模型参数,并将模型特征返回给传感器网络,用于下一个迭代步骤。性能评估结果表明,所提出的加速学习方法成本低,收敛速度快于单层机器学习方法。将该算法的建模性能、收敛速度和成本与单层机器学习算法进行了比较。提出了一种用于环境监测的算法。
{"title":"An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks","authors":"H. Alasti","doi":"10.1109/UEMCON51285.2020.9298182","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298182","url":null,"abstract":"An efficient accelerated learning algorithm is proposed and discussed for tracking of spatially correlated signals in ad-hoc wireless sensor networks. The proposed algorithm is low-cost and computationally efficient. It models an unknown, spatially correlated signal using a number of its contour lines at equally spaced levels. In the proposed algorithm, each sensor is modeled as one neuron in a neural network. The accelerated learning’s agent is implemented at the fusion center (FC). The algorithm is performed in two phases of spatial modeling and spatial tracking. In spatial modeling phase that accelerated learning is implemented, the algorithm discovers the model parameters. In spatial tracking phase, the model parameters are updated to track the varying, unknown spatial signal. Those sensors (neurons) that their observation are in a given margin of at least one of the contour levels, report their filtered observations to the FC. The FC updates the model parameters based on the reported observations and returns the model features to the sensor network for the next iteration step. The performance evaluation results show that the proposed accelerated learning is low cost and converges faster than single layer machine learning approach. The modeling performance, convergence speed and the cost of the proposed algorithm are compared with those of single layer machine learning algorithm. The algorithm is proposed for environmental monitoring.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology 混合finfet -忆阻器技术中250mhz -1.6 GHz锁相环设计
Naheem Olakunle Adesina, A. Srivastava
There are tremendous improvements in performance of transistor in CMOS technology by scaling down its size. However, there are various challenges, such as short channel effects (SCE), that are associated with miniaturization. FinFET technology is a promising technique to overcome these issues because it offers better electrostatic control of the channel than planar CMOS transistor as the technology scales down. In this work, we have proposed a phase locked loop (PLL) design with FinFET and memristor. The resistive and capacitive (R-C) components of loop filter are replaced with memristor and memcapacitor, respectively, in order to minimize the die area and reduce power consumption. The designed PLL produces a tuning range of 0.25 - 1.60 GHz at center frequency of 1 GHz with 2.05 mW average power consumption. The voltage-controlled oscillator (VCO), which contributes majorly to the total phase noise in phase locked loop, has a phase noise -135.2 dBc/Hz at 1 MHz offset frequency. In addition, the PLL shows high reliability with wide variations in temperature.
在CMOS技术中,通过缩小晶体管的尺寸,晶体管的性能得到了巨大的提高。然而,存在着各种各样的挑战,例如与小型化相关的短通道效应(SCE)。FinFET技术是一种很有前途的技术,可以克服这些问题,因为随着技术的缩小,它比平面CMOS晶体管提供更好的通道静电控制。在这项工作中,我们提出了一个锁相环(PLL)设计与FinFET和忆阻器。回路滤波器的阻性和容性(R-C)元件分别替换为忆阻器和忆电容,以减小芯片面积,降低功耗。所设计的锁相环在中心频率为1ghz时的调谐范围为0.25 ~ 1.60 GHz,平均功耗为2.05 mW。在锁相环中,压控振荡器(VCO)对总相位噪声的贡献最大,在1 MHz偏移频率下,其相位噪声为-135.2 dBc/Hz。此外,锁相环在温度变化范围很广的情况下具有很高的可靠性。
{"title":"A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology","authors":"Naheem Olakunle Adesina, A. Srivastava","doi":"10.1109/UEMCON51285.2020.9298155","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298155","url":null,"abstract":"There are tremendous improvements in performance of transistor in CMOS technology by scaling down its size. However, there are various challenges, such as short channel effects (SCE), that are associated with miniaturization. FinFET technology is a promising technique to overcome these issues because it offers better electrostatic control of the channel than planar CMOS transistor as the technology scales down. In this work, we have proposed a phase locked loop (PLL) design with FinFET and memristor. The resistive and capacitive (R-C) components of loop filter are replaced with memristor and memcapacitor, respectively, in order to minimize the die area and reduce power consumption. The designed PLL produces a tuning range of 0.25 - 1.60 GHz at center frequency of 1 GHz with 2.05 mW average power consumption. The voltage-controlled oscillator (VCO), which contributes majorly to the total phase noise in phase locked loop, has a phase noise -135.2 dBc/Hz at 1 MHz offset frequency. In addition, the PLL shows high reliability with wide variations in temperature.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel 具有Nakagami-m衰落信道的云无线接入网性能分析
Ayad N. Bihnam, Xian Liu
In this letter, the performance analysis of Cloud Radio Access Network (C-RAN) is investigated in terms of Ergodic Capacity (EC) under the well-known Nakagami-m fading channel. In this study, the C-RAN model is based on two nearest Remote Radio Head (2-RRH) association. The user is considered at the center of a disk equipped with a single antenna while each RRH has L antennas. The outage probability equation is defined and a closed form formula of EC has been derived with arbitrary path loss exponent. Numerical and analytical results show nonlinear behavior of channel capacity versus signal to noise ratio.
在这篇文章中,从遍历容量(EC)的角度分析了云无线接入网(C-RAN)在众所周知的Nakagami-m衰落信道下的性能。在本研究中,C-RAN模型基于两个最近的远程无线电头(2-RRH)关联。用户被认为是在配有单个天线的磁盘的中心,而每个RRH有L个天线。定义了停电概率方程,导出了任意路径损耗指数下的EC的封闭形式公式。数值分析结果表明,信道容量随信噪比呈非线性变化。
{"title":"Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel","authors":"Ayad N. Bihnam, Xian Liu","doi":"10.1109/UEMCON51285.2020.9298112","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298112","url":null,"abstract":"In this letter, the performance analysis of Cloud Radio Access Network (C-RAN) is investigated in terms of Ergodic Capacity (EC) under the well-known Nakagami-m fading channel. In this study, the C-RAN model is based on two nearest Remote Radio Head (2-RRH) association. The user is considered at the center of a disk equipped with a single antenna while each RRH has L antennas. The outage probability equation is defined and a closed form formula of EC has been derived with arbitrary path loss exponent. Numerical and analytical results show nonlinear behavior of channel capacity versus signal to noise ratio.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OPSCAN: Density-based Spatial Clustering in Opportunistic Networks 机会网络中基于密度的空间聚类
Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, S. Aly
In modern opportunistic networks, network operations can be improved through knowledge of spatial information of low and high density areas, predictions of the mobility of nodes in the space, as well as the spatial distribution of nodes. Such information can be used to adapt forwarding decisions. In this paper, we introduce an efficient opportunistic spatial clustering algorithm, OPSCAN (Opportunistic Spatial Clustering of Applications with Noise). Based on DBSCAN (Density-Based Spatial Clustering of Applications with Noise), a density-based clustering algorithm that discovers arbitrary-shaped clusters in a dataset and distinguishes noise points. OPSCAN is capable of clustering network nodes into high density clusters, while maintaining sparse areas of nodes between clusters. Clusters share spatial information of the network such as area density, mobility statistics and information about other clusters and their nodes. Knowledge of edge nodes in the clusters is also made available for utilization in more efficient forwarding decisions. Simulations show that our algorithm is capable of producing dense, homogeneous clusters and accurately outlining cluster edges. We have used the Silhouette Coefficient to measure cluster homogeneity against density-based clustering algorithms DBSCAN and ST-DBSCAN (Spatial-Temporal DBSCAN), a DBSCAN-based spatial-temporal variant on "GeoLife" dataset. We have found OPSCAN outperforms DBSCAN by a coefficient of 0.81 to 0.73 for the same minimum distance, under-performing ST-DBSCAN by 0.87 to 0.81 for that distance. OPSCAN requires only two inputs as compared to four for ST-DBSCAN. As the distance parameter is increased, OPSCAN produces homogeneous clusters more closely to ST-DBSCAN.
在现代机会网络中,可以通过了解低密度和高密度区域的空间信息,预测空间中节点的移动性以及节点的空间分布来改进网络运营。这些信息可以用来调整转发决策。本文介绍了一种高效的机会空间聚类算法OPSCAN (opportunistic spatial clustering of Applications with Noise)。DBSCAN (Density-Based Spatial Clustering of Applications with Noise)是一种基于密度的聚类算法,可以发现数据集中任意形状的聚类并区分噪声点。OPSCAN能够将网络节点聚为高密度簇,同时保持簇间节点的稀疏区域。集群共享网络的空间信息,如区域密度、流动性统计数据以及其他集群及其节点的信息。集群中边缘节点的知识也可用于更有效的转发决策。仿真结果表明,该算法能够生成密集、均匀的聚类,并能准确地勾勒出聚类的边缘。我们使用廓形系数来衡量基于密度的聚类算法DBSCAN和ST-DBSCAN(时空DBSCAN)的聚类同质性,ST-DBSCAN是基于DBSCAN的“GeoLife”数据集的时空变体。我们发现,对于相同的最小距离,OPSCAN的性能优于DBSCAN的系数为0.81至0.73,而ST-DBSCAN的性能差为0.87至0.81。OPSCAN只需要两个输入,而ST-DBSCAN需要四个输入。随着距离参数的增加,OPSCAN产生的均匀簇更接近ST-DBSCAN。
{"title":"OPSCAN: Density-based Spatial Clustering in Opportunistic Networks","authors":"Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, S. Aly","doi":"10.1109/UEMCON51285.2020.9298179","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298179","url":null,"abstract":"In modern opportunistic networks, network operations can be improved through knowledge of spatial information of low and high density areas, predictions of the mobility of nodes in the space, as well as the spatial distribution of nodes. Such information can be used to adapt forwarding decisions. In this paper, we introduce an efficient opportunistic spatial clustering algorithm, OPSCAN (Opportunistic Spatial Clustering of Applications with Noise). Based on DBSCAN (Density-Based Spatial Clustering of Applications with Noise), a density-based clustering algorithm that discovers arbitrary-shaped clusters in a dataset and distinguishes noise points. OPSCAN is capable of clustering network nodes into high density clusters, while maintaining sparse areas of nodes between clusters. Clusters share spatial information of the network such as area density, mobility statistics and information about other clusters and their nodes. Knowledge of edge nodes in the clusters is also made available for utilization in more efficient forwarding decisions. Simulations show that our algorithm is capable of producing dense, homogeneous clusters and accurately outlining cluster edges. We have used the Silhouette Coefficient to measure cluster homogeneity against density-based clustering algorithms DBSCAN and ST-DBSCAN (Spatial-Temporal DBSCAN), a DBSCAN-based spatial-temporal variant on \"GeoLife\" dataset. We have found OPSCAN outperforms DBSCAN by a coefficient of 0.81 to 0.73 for the same minimum distance, under-performing ST-DBSCAN by 0.87 to 0.81 for that distance. OPSCAN requires only two inputs as compared to four for ST-DBSCAN. As the distance parameter is increased, OPSCAN produces homogeneous clusters more closely to ST-DBSCAN.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform 利用离散Hartley变换缓解车载安全中的里程表欺诈
G. Baldini, Raimondo Giuliani, M. Gemo
Odometer fraud is a serious offense in the automotive sector and indicates the disconnection, resetting, or alteration of a vehicle’s odometer and the related sensor with the intent to change the number of miles/Kms indicated or recorded to report false information. This paper focuses specifically on the threat scenario where the odometer sensor (i.e., Hall Sensor) is manipulated or replaced to implement an odometer fraud. This paper proposes a technique to mitigate odometer fraud by performing a physical layer authentication of the Hall Sensor, which takes in consideration the limitation of the in-vehicle networks and microprocessors. In particular, the Discrete Hartley Transform (DHT) in combination with machine learning algorithms is used to perform the authentication on an experimental data set of 12 Hall Sensors, which has been collected by the authors. The results shows that features extracted with DHT have more discriminating power than the original time domain and the frequency domain representations based on the Fast Fourier Transform (FFT) especially in presence of noise.
里程表欺诈在汽车行业是一种严重的犯罪行为,它指的是断开、重置或更改车辆的里程表和相关传感器,目的是改变显示或记录的英里数/公里数,以报告虚假信息。本文特别关注里程表传感器(即霍尔传感器)被操纵或替换以实现里程表欺诈的威胁场景。考虑到车载网络和微处理器的局限性,本文提出了一种通过对霍尔传感器进行物理层认证来减少里程表欺诈的技术。特别是,使用离散哈特利变换(DHT)与机器学习算法相结合,对作者收集的12个霍尔传感器的实验数据集进行认证。结果表明,在噪声存在的情况下,DHT提取的特征比基于快速傅里叶变换(FFT)的原始时域和频域表示具有更强的识别能力。
{"title":"Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform","authors":"G. Baldini, Raimondo Giuliani, M. Gemo","doi":"10.1109/UEMCON51285.2020.9298039","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298039","url":null,"abstract":"Odometer fraud is a serious offense in the automotive sector and indicates the disconnection, resetting, or alteration of a vehicle’s odometer and the related sensor with the intent to change the number of miles/Kms indicated or recorded to report false information. This paper focuses specifically on the threat scenario where the odometer sensor (i.e., Hall Sensor) is manipulated or replaced to implement an odometer fraud. This paper proposes a technique to mitigate odometer fraud by performing a physical layer authentication of the Hall Sensor, which takes in consideration the limitation of the in-vehicle networks and microprocessors. In particular, the Discrete Hartley Transform (DHT) in combination with machine learning algorithms is used to perform the authentication on an experimental data set of 12 Hall Sensors, which has been collected by the authors. The results shows that features extracted with DHT have more discriminating power than the original time domain and the frequency domain representations based on the Fast Fourier Transform (FFT) especially in presence of noise.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115580345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process 一种用于量子控制和读出的1.2 v 6ghz双路电荷泵锁相环频率合成器
V. Manthena, S. Miryala, G. Deptuch, G. Carini
This paper presents a low jitter dual-path charge-pump phase locked loop (PLL) synthesizer in a CMOS 65-nm process for quantum readout applications. The PLL incorporates a programmable dual charge-pump and a loop filter with both proportional and integral paths that can be driven independently providing flexible control of the loop bandwidth to achieve low jitter performance. The design is implemented at 300 K and critical blocks like voltage-controlled oscillator (VCO) and charge-pump (CP) are analyzed at 77 K based on the characterized results. The LC-VCO is realized with the class-C NMOS only architecture with 5-bit coarse control and quadrature signals are generated with poly phase filter. The VCO is designed with the tuning range of 1 GHz around the center frequency of 6 GHz with Phase Noise of -123 dBc/Hz and -132 dBc/Hz at 1MHz offset at 300 K and 77 K temperature. The simulated PLL rms jitter is 125 fs at 6 GHz with a power consumption of 8 mW at the 1.2 V power supply.
本文提出了一种低抖动双路电荷泵锁相环合成器(PLL)在65纳米CMOS工艺的量子读出应用。锁相环包含一个可编程的双电荷泵和一个环路滤波器,具有比例和积分路径,可以独立驱动,提供灵活的环路带宽控制,以实现低抖动性能。该设计在300 K下实现,并根据表征结果分析了77 K下的压控振荡器(VCO)和电荷泵(CP)等关键模块。LC-VCO采用5位粗控制的c类NMOS结构实现,正交信号由多相滤波器产生。该VCO的调谐范围为1 GHz,中心频率为6 GHz, 300 K和77 K温度下1MHz偏移时相位噪声分别为-123 dBc/Hz和-132 dBc/Hz。仿真的锁相环有效值抖动在6 GHz时为125 fs,在1.2 V电源下功耗为8 mW。
{"title":"A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process","authors":"V. Manthena, S. Miryala, G. Deptuch, G. Carini","doi":"10.1109/UEMCON51285.2020.9298160","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298160","url":null,"abstract":"This paper presents a low jitter dual-path charge-pump phase locked loop (PLL) synthesizer in a CMOS 65-nm process for quantum readout applications. The PLL incorporates a programmable dual charge-pump and a loop filter with both proportional and integral paths that can be driven independently providing flexible control of the loop bandwidth to achieve low jitter performance. The design is implemented at 300 K and critical blocks like voltage-controlled oscillator (VCO) and charge-pump (CP) are analyzed at 77 K based on the characterized results. The LC-VCO is realized with the class-C NMOS only architecture with 5-bit coarse control and quadrature signals are generated with poly phase filter. The VCO is designed with the tuning range of 1 GHz around the center frequency of 6 GHz with Phase Noise of -123 dBc/Hz and -132 dBc/Hz at 1MHz offset at 300 K and 77 K temperature. The simulated PLL rms jitter is 125 fs at 6 GHz with a power consumption of 8 mW at the 1.2 V power supply.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks 弹性光网络中动态路由的自适应调制再生器和距离感知算法
Siwei Zhao, Sanyami Shah, Kishan N. Patel, Nickyta Patel, Vachana Shetty, Michal Aibin
The Elastic Optical Network is a technology that offers versatile conversion of modulation format, allowing for more effective use of spectrum resources compared to the traditional fixed grid in WDM networks. Additionally, the content-oriented services offered by geographically distributed data centres raise a need for cost-effective and scalable data delivery. In this paper, we discuss Routing, Modulation and Spectrum Allocation (RMSA) in content-oriented networks, based on the Elastic Optical Network. We propose a new adaptive modulation, regenerator and distance-aware algorithm. Our findings discover an interesting trade-off between the request blocking and regenerator use.
弹性光网络是一种提供多种调制格式转换的技术,与WDM网络中的传统固定网格相比,可以更有效地利用频谱资源。此外,地理上分布的数据中心提供的面向内容的服务提出了对具有成本效益和可扩展的数据交付的需求。本文讨论了基于弹性光网络的面向内容网络中的路由、调制和频谱分配(RMSA)。我们提出了一种新的自适应调制、再生器和距离感知算法。我们的发现发现了请求阻塞和再生器使用之间的一个有趣的权衡。
{"title":"Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks","authors":"Siwei Zhao, Sanyami Shah, Kishan N. Patel, Nickyta Patel, Vachana Shetty, Michal Aibin","doi":"10.1109/UEMCON51285.2020.9298105","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298105","url":null,"abstract":"The Elastic Optical Network is a technology that offers versatile conversion of modulation format, allowing for more effective use of spectrum resources compared to the traditional fixed grid in WDM networks. Additionally, the content-oriented services offered by geographically distributed data centres raise a need for cost-effective and scalable data delivery. In this paper, we discuss Routing, Modulation and Spectrum Allocation (RMSA) in content-oriented networks, based on the Elastic Optical Network. We propose a new adaptive modulation, regenerator and distance-aware algorithm. Our findings discover an interesting trade-off between the request blocking and regenerator use.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128429898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach 时域网络活动攻击风险估计:小波变换方法
Soo-Yeon Ji, Bong-Keun Jeong, C. Kamhoua, Nandi O. Leslie, D. Jeong
Analyzing network traffic data to detect suspicious network activities requires tremendous efforts because of continuously changing network traffic patterns and intrusion scenarios. Numerous research has been devoted to the task of identifying network anomalies while maintaining excellent performances. However, most studies focus on identifying network attacks without considering their temporal domain. Time information is useful for discovering patterns in network activities and understanding the changes in network traffic over time. This paper introduces an approach to discover network traffic patterns with time series analysis to estimate the level of attack risks. Classification is performed with machine learning techniques to assess the estimated attack risks. Findings from this study can increase the capability to detect network intrusions by analyzing the behaviors of temporal data and estimating their attack risks.
由于网络流量模式和入侵场景不断变化,分析网络流量数据检测可疑网络活动需要付出巨大的努力。在保持优异性能的同时识别网络异常已经有了大量的研究。然而,大多数研究都集中在识别网络攻击,而没有考虑其时间域。时间信息对于发现网络活动中的模式和理解网络流量随时间的变化非常有用。本文介绍了一种利用时间序列分析发现网络流量模式的方法,以估计攻击风险等级。使用机器学习技术进行分类,以评估估计的攻击风险。本研究结果可以通过分析时间数据的行为和估计其攻击风险来提高检测网络入侵的能力。
{"title":"Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach","authors":"Soo-Yeon Ji, Bong-Keun Jeong, C. Kamhoua, Nandi O. Leslie, D. Jeong","doi":"10.1109/UEMCON51285.2020.9298153","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298153","url":null,"abstract":"Analyzing network traffic data to detect suspicious network activities requires tremendous efforts because of continuously changing network traffic patterns and intrusion scenarios. Numerous research has been devoted to the task of identifying network anomalies while maintaining excellent performances. However, most studies focus on identifying network attacks without considering their temporal domain. Time information is useful for discovering patterns in network activities and understanding the changes in network traffic over time. This paper introduces an approach to discover network traffic patterns with time series analysis to estimate the level of attack risks. Classification is performed with machine learning techniques to assess the estimated attack risks. Findings from this study can increase the capability to detect network intrusions by analyzing the behaviors of temporal data and estimating their attack risks.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radio-Factor Authentication: Identity Management over the 900MHz Band 无线电因素认证:900MHz频段上的身份管理
Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy
Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.
高度敏感的信息系统需要一种简单、安全的认证方法。为了补充标准的登录过程,我们可以基于特定的用例,通过无线电波实现多种形式的双因素身份验证。这使我们能够实施基于邻近度的身份验证系统,从而实现工作和家庭用户的物理分离。我们还可以确保对需要少量特权用户的系统进行细粒度访问控制。我们将演示两种可能的实现,它们都使用公钥加密的形式。第一种方案向地理区域内所有可用的计算机广播时间同步令牌,第二种方案使用公钥和私钥对进行无线数字签名访问请求。
{"title":"Radio-Factor Authentication: Identity Management over the 900MHz Band","authors":"Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy","doi":"10.1109/UEMCON51285.2020.9298110","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298110","url":null,"abstract":"Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122043503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Digital Service as a Utility and the Unit of Measure 作为实用工具和度量单位的安全数字服务
Salam Ismaeel, M. Kamaludeen, A. Miri
Technology becomes more and more involved in the learning process of K-12 schools. The digital requirements must be assessed for cost-effective and efficient (a reasonable download wait time) access to the Internet. Nowadays, there is an increase in usage of the amount of data incoming and outgoing based on students' activities. This needs to be increased to guarantee ready access and effective usage of technology in K-12 school environments. This paper outlines a useful standard management unit called Digital Resource Unit (DRU), which identifies the ability to be securely connected to the internet and transfer digital contents free from impediments or prying eyes.
科技越来越多地参与到K-12学校的学习过程中。必须对数字需求进行评估,以便具有成本效益和效率(合理的下载等待时间)访问Internet。如今,基于学生活动的数据输入和输出的使用量越来越大。这需要加强,以保证在K-12学校环境中随时获得和有效使用技术。本文概述了一种有用的标准管理单元,称为数字资源单元(DRU),它确定了安全连接到互联网和传输数字内容的能力,而不受阻碍或窥探。
{"title":"Secure Digital Service as a Utility and the Unit of Measure","authors":"Salam Ismaeel, M. Kamaludeen, A. Miri","doi":"10.1109/UEMCON51285.2020.9298151","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298151","url":null,"abstract":"Technology becomes more and more involved in the learning process of K-12 schools. The digital requirements must be assessed for cost-effective and efficient (a reasonable download wait time) access to the Internet. Nowadays, there is an increase in usage of the amount of data incoming and outgoing based on students' activities. This needs to be increased to guarantee ready access and effective usage of technology in K-12 school environments. This paper outlines a useful standard management unit called Digital Resource Unit (DRU), which identifies the ability to be securely connected to the internet and transfer digital contents free from impediments or prying eyes.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1