首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems 改进结构光视觉系统的多级随机样本一致性方法
Zhankun Luo, Yaan Zhang, Li Tan
The paper proposes a structured light vision system equipped with multi-cameras and multi-laser emitters for object height measurement or 3D reconstruction. The proposed method offers a better accuracy performance over a single camera system. To tackle the intersections produced by laser emitters in the projected image plane, we propose a multi-level random sample consensus (MLRANSAC) algorithm to separate the intersection points instead of using the traditional methods such as time division and color division techniques. Our experiments demonstrate that the MLRANSAC algorithm can perform effectively.
本文提出了一种由多摄像机和多激光发射器组成的用于物体高度测量或三维重建的结构光视觉系统。该方法比单相机系统具有更好的精度性能。为了解决激光发射器在投影图像平面上产生的相交点问题,我们提出了一种多层随机样本一致性(MLRANSAC)算法来分离相交点,而不是使用传统的时间分割和颜色分割技术。实验结果表明,MLRANSAC算法是有效的。
{"title":"Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems","authors":"Zhankun Luo, Yaan Zhang, Li Tan","doi":"10.1109/UEMCON51285.2020.9298161","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298161","url":null,"abstract":"The paper proposes a structured light vision system equipped with multi-cameras and multi-laser emitters for object height measurement or 3D reconstruction. The proposed method offers a better accuracy performance over a single camera system. To tackle the intersections produced by laser emitters in the projected image plane, we propose a multi-level random sample consensus (MLRANSAC) algorithm to separate the intersection points instead of using the traditional methods such as time division and color division techniques. Our experiments demonstrate that the MLRANSAC algorithm can perform effectively.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simple Dual Band Rectifier Based on Diplexer for Ambient RF Energy Harvesting Application 基于双工器的简易双频整流器在环境射频能量采集中的应用
Hong Tien Vu, Quang Minh Dinh, D. Nguyen, M. Le
In this paper, we present a novel configuration of dual band rectifier for RF energy harvesting application. Unlike traditional dual band rectifiers which employ only one rectifier with the ability to operate at two different frequencies, the proposed design consists of two separated rectifiers, each operates at a distinct frequency, thus simplify the design process significantly. The two rectifiers are connected to the multiband receiving antenna via a microstrip diplexer which carries out the task of distributing the collected power at each frequency to the corresponding rectifier. Numerical simulation and measurement are carried out to evaluate the design, showing a simulated AC - DC conversion efficiency of 52% at 1.8 GHz and 46% at 2.6 GHz and a measured efficiency around 40% for both frequencies under -10 dBm low input power.
本文提出了一种用于射频能量采集的新型双波段整流器结构。与传统的双频整流器不同,传统的双频整流器只使用一个整流器,能够在两个不同的频率下工作,而提出的设计由两个分离的整流器组成,每个整流器在不同的频率下工作,从而大大简化了设计过程。两个整流器通过微带双工器连接到多波段接收天线,该微带双工器执行将每个频率收集的功率分配给相应整流器的任务。通过数值仿真和测量对该设计进行了评估,结果表明,在1.8 GHz和2.6 GHz下,模拟的交直流转换效率分别为52%和46%,在-10 dBm低输入功率下,两个频率的实测效率均在40%左右。
{"title":"Simple Dual Band Rectifier Based on Diplexer for Ambient RF Energy Harvesting Application","authors":"Hong Tien Vu, Quang Minh Dinh, D. Nguyen, M. Le","doi":"10.1109/UEMCON51285.2020.9298180","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298180","url":null,"abstract":"In this paper, we present a novel configuration of dual band rectifier for RF energy harvesting application. Unlike traditional dual band rectifiers which employ only one rectifier with the ability to operate at two different frequencies, the proposed design consists of two separated rectifiers, each operates at a distinct frequency, thus simplify the design process significantly. The two rectifiers are connected to the multiband receiving antenna via a microstrip diplexer which carries out the task of distributing the collected power at each frequency to the corresponding rectifier. Numerical simulation and measurement are carried out to evaluate the design, showing a simulated AC - DC conversion efficiency of 52% at 1.8 GHz and 46% at 2.6 GHz and a measured efficiency around 40% for both frequencies under -10 dBm low input power.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pulse Separation Using Independent Component Analysis 利用独立分量分析进行脉冲分离
Jaron Lin, Jordan Juliano, Alex Erdogan, K. George
This paper intends to demonstrate pulse separation using independent component analysis (ICA). Independent component analysis is related to the blind source separation (BSS) problem when independent components or the original signals are unknown or blind. BSS is explained by the cocktail party problem where groups of people have separate conversations at a cocktail party, and an individual is selectively extracting a conversation from a mix of conversations. The blind source separation problem is like deinterleaving signals. When a radar receiver intercepts multiple signals, the signals go through interleaving, where the waveforms mix with each other. The process of separating the mixed signals is called deinterleaving. In the radar system, finding the pulse descriptor word (PDW) is essential for deinterleaving because the parameters from PDW will help reconstruct the received radar signals. The radar will process the parameters from the PDW to construct pulse trains to help identify all the source signals that were detected by the radar receiver. Independent component analysis is a method to identify all the source signals received by the receiver.
本文试图用独立分量分析(ICA)来演示脉冲分离。独立分量分析涉及到独立分量或原始信号未知或盲的情况下的盲源分离问题。BSS可以用鸡尾酒会问题来解释,在鸡尾酒会上,一群人进行单独的谈话,而个人则有选择地从各种谈话中提取谈话。盲源分离问题类似于交叉信号的分离。当雷达接收器截获多个信号时,信号会经过交错,波形会相互混合。分离混合信号的过程称为去交织。在雷达系统中,寻找脉冲描述词(PDW)是去交错的关键,因为PDW中的参数将有助于重建接收到的雷达信号。雷达将处理来自PDW的参数来构建脉冲序列,以帮助识别雷达接收器检测到的所有源信号。独立分量分析是一种识别接收机接收到的所有源信号的方法。
{"title":"Pulse Separation Using Independent Component Analysis","authors":"Jaron Lin, Jordan Juliano, Alex Erdogan, K. George","doi":"10.1109/UEMCON51285.2020.9298098","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298098","url":null,"abstract":"This paper intends to demonstrate pulse separation using independent component analysis (ICA). Independent component analysis is related to the blind source separation (BSS) problem when independent components or the original signals are unknown or blind. BSS is explained by the cocktail party problem where groups of people have separate conversations at a cocktail party, and an individual is selectively extracting a conversation from a mix of conversations. The blind source separation problem is like deinterleaving signals. When a radar receiver intercepts multiple signals, the signals go through interleaving, where the waveforms mix with each other. The process of separating the mixed signals is called deinterleaving. In the radar system, finding the pulse descriptor word (PDW) is essential for deinterleaving because the parameters from PDW will help reconstruct the received radar signals. The radar will process the parameters from the PDW to construct pulse trains to help identify all the source signals that were detected by the radar receiver. Independent component analysis is a method to identify all the source signals received by the receiver.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QoS Control for Mission-critical Communication on Vehicles with IEEE802.11 Wireless LAN under Dynamic Interference 动态干扰下IEEE802.11无线局域网车载关键任务通信的QoS控制
Takumi Shiohara, T. Murase
In this research, we propose a velocity-adaptive contention window (CW) control method that reduces the maximum delay under dynamic interference on automobiles with IEEE802.11 wireless LAN communication. The method is developed for mission-critical communications for tiny periodic data. In the proposed method, the average backoff time (random wait time) is reduced as the vehicle velocity decreases, and this is done to reduce the maximum delay in situations where the influence of interference is large. Additionally, increasing the average contention window at the time of retransmission is prohibited, and the window size is fixed. Developing the proposed method, we focused on the condition in which, the slower the velocity of the vehicle is, the smaller the distance to the surrounding vehicles (and therefore the greater the amount of interference). Furthermore, we did not focus on the fact that the CW size is not optimal; instead, we focused on interference as the main cause of retransmission. This can reduce the delay determined by the number of retransmissions (the number of transmission failures) and the backoff time. To research the effect of the proposed method, we evaluated the performance of a sensor network in a vehicle using a model that causes interference when other vehicles pass near the vehicle at various velocities. The effectiveness of the proposed method was clarified by comparing the conventional method with fixed control for interference and the proposed method with control according to vehicle velocity.
在本研究中,我们提出了一种速度自适应竞争窗口(CW)控制方法,以减少使用IEEE802.11无线局域网通信的汽车在动态干扰下的最大延迟。该方法适用于微小周期数据的关键任务通信。在该方法中,平均后退时间(随机等待时间)随着车速的减小而减小,从而在干扰影响较大的情况下减小最大延迟。此外,禁止在重传时增加平均争用窗口,并且窗口大小是固定的。在开发所提出的方法时,我们关注的是车辆速度越慢,与周围车辆的距离越小(因此干扰量越大)的情况。此外,我们没有关注连续波大小不是最优的事实;相反,我们把重点放在干扰上,认为这是导致重传的主要原因。这可以减少由重传次数(传输失败次数)和回退时间决定的延迟。为了研究提出的方法的效果,我们使用一个模型来评估车辆传感器网络的性能,当其他车辆以不同的速度经过车辆附近时,该模型会产生干扰。通过对常规干扰固定控制方法和按车速控制方法的比较,验证了该方法的有效性。
{"title":"QoS Control for Mission-critical Communication on Vehicles with IEEE802.11 Wireless LAN under Dynamic Interference","authors":"Takumi Shiohara, T. Murase","doi":"10.1109/UEMCON51285.2020.9298088","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298088","url":null,"abstract":"In this research, we propose a velocity-adaptive contention window (CW) control method that reduces the maximum delay under dynamic interference on automobiles with IEEE802.11 wireless LAN communication. The method is developed for mission-critical communications for tiny periodic data. In the proposed method, the average backoff time (random wait time) is reduced as the vehicle velocity decreases, and this is done to reduce the maximum delay in situations where the influence of interference is large. Additionally, increasing the average contention window at the time of retransmission is prohibited, and the window size is fixed. Developing the proposed method, we focused on the condition in which, the slower the velocity of the vehicle is, the smaller the distance to the surrounding vehicles (and therefore the greater the amount of interference). Furthermore, we did not focus on the fact that the CW size is not optimal; instead, we focused on interference as the main cause of retransmission. This can reduce the delay determined by the number of retransmissions (the number of transmission failures) and the backoff time. To research the effect of the proposed method, we evaluated the performance of a sensor network in a vehicle using a model that causes interference when other vehicles pass near the vehicle at various velocities. The effectiveness of the proposed method was clarified by comparing the conventional method with fixed control for interference and the proposed method with control according to vehicle velocity.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122555236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical Networks 软件定义光网络中云数据中心资源分配的LSTM
Michal Aibin
Nowadays, artificial intelligence provides an excellent opportunity for scientists to improve the efficiency of resource allocation in communication networks. In this paper, we focus on applying two methods: Long-Short Term Memory and Monte Carlo Tree Search, to solve the problem of cloud resource allocation in dynamic, real-time traffic scenarios. We use a framework of Software Defined Elastic Optical Networks and cloud resources available from Amazon Web Services. Results show that the application of Monte Carlo Tree Search and Long-Short Term Memory provides superior performance, which is an excellent opportunity for network operators to achieve better utilization of their networks, with lower operational costs.
如今,人工智能为科学家提高通信网络资源配置效率提供了绝佳的机会。在本文中,我们重点应用长短期记忆和蒙特卡罗树搜索两种方法来解决动态实时交通场景下的云资源分配问题。我们使用软件定义弹性光网络框架和Amazon Web Services提供的云资源。结果表明,蒙特卡罗树搜索和长短期记忆的应用提供了优越的性能,这为网络运营商提供了一个很好的机会,可以更好地利用他们的网络,降低运营成本。
{"title":"LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical Networks","authors":"Michal Aibin","doi":"10.1109/UEMCON51285.2020.9298133","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298133","url":null,"abstract":"Nowadays, artificial intelligence provides an excellent opportunity for scientists to improve the efficiency of resource allocation in communication networks. In this paper, we focus on applying two methods: Long-Short Term Memory and Monte Carlo Tree Search, to solve the problem of cloud resource allocation in dynamic, real-time traffic scenarios. We use a framework of Software Defined Elastic Optical Networks and cloud resources available from Amazon Web Services. Results show that the application of Monte Carlo Tree Search and Long-Short Term Memory provides superior performance, which is an excellent opportunity for network operators to achieve better utilization of their networks, with lower operational costs.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Maintenance Over Time of Random Forest-based Malware Detection Models 基于随机森林的恶意软件检测模型的性能维护
Colin Galen, Robert Steele
It has been recognized that machine learning-based malware detection models, trained on features statically extractable from binary executable files, offer a number of promising benefits, such as the ability to detect malware that has not been previously encountered and an ability to re-train and adapt over time as threats evolve. Nevertheless, many academic studies of machine learning-based malware detection consider and evaluate performance on datasets that do not evolve with time, although it is recognized in practice that malware detection models will necessarily deteriorate in performance over time due to the emergence of novel malware threats. In this study, we make use of a large dataset comprised of the features extracted from malware/goodware executable samples in the very common Portable Executable (PE) format, that are orderable by time of first appearance, to analyze the deterioration of machine learning-based malware detection models over time from training. Of the large number of models we trained and then evaluated on later occurring subsets of the dataset, we note the relative strength of Random Forest to maintain predictive performance into the future. We then consider in greater depth, Random Forest-based models for malware detection, considering Random Forest hyperparameter choices to achieve better maintenance of performance and discuss the significance of the findings for PE malware detection approaches.
人们已经认识到,基于机器学习的恶意软件检测模型,通过从二进制可执行文件中静态提取的特征进行训练,提供了许多有希望的好处,例如检测以前没有遇到过的恶意软件的能力,以及随着威胁的发展而重新训练和适应的能力。尽管如此,许多基于机器学习的恶意软件检测的学术研究考虑并评估了不随时间发展的数据集上的性能,尽管在实践中人们认识到,由于新的恶意软件威胁的出现,恶意软件检测模型的性能必然会随着时间的推移而恶化。在本研究中,我们使用了一个大型数据集,该数据集由从非常常见的可移植可执行文件(PE)格式的恶意软件/良好软件可执行样本中提取的特征组成,这些特征按首次出现的时间排序,以分析基于机器学习的恶意软件检测模型随着训练时间的推移而恶化。在我们训练的大量模型中,然后在数据集的后续子集上进行评估,我们注意到随机森林在保持未来预测性能方面的相对强度。然后,我们更深入地考虑基于随机森林的恶意软件检测模型,考虑随机森林超参数选择以实现更好的性能维护,并讨论研究结果对PE恶意软件检测方法的意义。
{"title":"Performance Maintenance Over Time of Random Forest-based Malware Detection Models","authors":"Colin Galen, Robert Steele","doi":"10.1109/UEMCON51285.2020.9298068","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298068","url":null,"abstract":"It has been recognized that machine learning-based malware detection models, trained on features statically extractable from binary executable files, offer a number of promising benefits, such as the ability to detect malware that has not been previously encountered and an ability to re-train and adapt over time as threats evolve. Nevertheless, many academic studies of machine learning-based malware detection consider and evaluate performance on datasets that do not evolve with time, although it is recognized in practice that malware detection models will necessarily deteriorate in performance over time due to the emergence of novel malware threats. In this study, we make use of a large dataset comprised of the features extracted from malware/goodware executable samples in the very common Portable Executable (PE) format, that are orderable by time of first appearance, to analyze the deterioration of machine learning-based malware detection models over time from training. Of the large number of models we trained and then evaluated on later occurring subsets of the dataset, we note the relative strength of Random Forest to maintain predictive performance into the future. We then consider in greater depth, Random Forest-based models for malware detection, considering Random Forest hyperparameter choices to achieve better maintenance of performance and discuss the significance of the findings for PE malware detection approaches.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115674598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Localization Methods based on Error Analysis and Modeling in One Dimension 基于一维误差分析和建模的定位方法
Omar A. Zargelin, Fadel M. Lashhab, Walid K. A. Hasan
Wireless sensor networks (WSNs) have shown promise in a broad range of applications. One of the primary challenges in leveraging them lies in gathering accurate position information for the deployed sensors while minimizing power cost. Through analyzing the error associated with acquiring such position information, we developed several novel localization methods based on modeling the analyzed error and applying rigorous mathematical and statistical principles in order to produce improved location estimates compared with existing methods. The methods presented herein have been utilized for a one-dimensional space for proof-of-concept, simplicity of presentation, and to illustrate how viable, single-dimensional applications can be approached. These methods utilize only two mobile beacons that can be mounted to a vehicle, rather than a costly, large array. The primary measurement taken to perform localizations is received signal strength (RSS). Unlike many previously existing methods, the techniques presented herein utilize practical, realistic assumptions and were progressively designed to mitigate incrementally discovered limitations. To exercise and analyze the developed methods, a multiple-layered simulation environment was developed in tandem. The approach, developed methodologies, and software infrastructure presented herein provide a framework for future endeavors within the field of wireless sensor networks.
无线传感器网络(WSNs)已经显示出广泛的应用前景。利用它们的主要挑战之一是为部署的传感器收集准确的位置信息,同时最大限度地降低功耗。通过对定位误差的分析,提出了几种基于误差建模的定位方法,并应用严格的数学和统计原理,以获得比现有方法更好的定位估计。本文介绍的方法已用于一维空间,以进行概念验证,简化表示,并说明如何实现可行的单维应用程序。这些方法只利用两个可以安装在车辆上的移动信标,而不是一个昂贵的大型阵列。用于定位的主要测量是接收信号强度(RSS)。与许多先前存在的方法不同,本文提出的技术利用实际的、现实的假设,并逐步设计以减轻逐渐发现的限制。为了验证和分析所开发的方法,串联开发了一个多层仿真环境。本文提出的方法、开发方法和软件基础设施为无线传感器网络领域的未来努力提供了一个框架。
{"title":"Localization Methods based on Error Analysis and Modeling in One Dimension","authors":"Omar A. Zargelin, Fadel M. Lashhab, Walid K. A. Hasan","doi":"10.1109/UEMCON51285.2020.9298065","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298065","url":null,"abstract":"Wireless sensor networks (WSNs) have shown promise in a broad range of applications. One of the primary challenges in leveraging them lies in gathering accurate position information for the deployed sensors while minimizing power cost. Through analyzing the error associated with acquiring such position information, we developed several novel localization methods based on modeling the analyzed error and applying rigorous mathematical and statistical principles in order to produce improved location estimates compared with existing methods. The methods presented herein have been utilized for a one-dimensional space for proof-of-concept, simplicity of presentation, and to illustrate how viable, single-dimensional applications can be approached. These methods utilize only two mobile beacons that can be mounted to a vehicle, rather than a costly, large array. The primary measurement taken to perform localizations is received signal strength (RSS). Unlike many previously existing methods, the techniques presented herein utilize practical, realistic assumptions and were progressively designed to mitigate incrementally discovered limitations. To exercise and analyze the developed methods, a multiple-layered simulation environment was developed in tandem. The approach, developed methodologies, and software infrastructure presented herein provide a framework for future endeavors within the field of wireless sensor networks.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-platform for the development environment of smart home system 跨平台的智能家居系统开发环境
Hong Yu, Joushua Lorrain, Fanming Liu, C. Lo
The multiple embedded sensors of the cross-platform in Internet of Things (IoT) have influenced the aspects of human life, especially for smart home system. Android, iOS and Window OS are the leading representative in the terminal operating system of networks. As one of the applications in IoT, a smart home system included the cross-platforms with various software and hardware is programmable to enhance the network motive efficiently. In this paper, we discuss a cross-platform with the embedded devices such as sensors to support the realization of a smart home system, the network technologies of a smart home network, the varieties of devices and circuits, software-based systems and standards.
物联网中跨平台的多个嵌入式传感器已经影响到人类生活的方方面面,尤其是智能家居系统。Android、iOS和windows操作系统是网络终端操作系统的主要代表。智能家居系统是物联网的应用之一,它包含了多种软件和硬件的跨平台可编程,可以有效地增强网络动力。本文讨论了支持智能家居系统实现的传感器等嵌入式设备的跨平台、智能家居网络的网络技术、各种设备和电路、基于软件的系统和标准。
{"title":"Cross-platform for the development environment of smart home system","authors":"Hong Yu, Joushua Lorrain, Fanming Liu, C. Lo","doi":"10.1109/UEMCON51285.2020.9298058","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298058","url":null,"abstract":"The multiple embedded sensors of the cross-platform in Internet of Things (IoT) have influenced the aspects of human life, especially for smart home system. Android, iOS and Window OS are the leading representative in the terminal operating system of networks. As one of the applications in IoT, a smart home system included the cross-platforms with various software and hardware is programmable to enhance the network motive efficiently. In this paper, we discuss a cross-platform with the embedded devices such as sensors to support the realization of a smart home system, the network technologies of a smart home network, the varieties of devices and circuits, software-based systems and standards.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127362092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Data Center Risk Assessment 一种新的数据中心风险评估框架
M. Levy
Data center risk assessment must provide an understanding of the risks that the mission critical facility is exposed to. This paper proposes a novel framework for data center site risk assessment, as an important tool for data center due diligence. The proposed methodology is aimed at standardizing a process to help quantify and prioritize external risks to enable comparisons. It consists of three steps: risk identification, risk analysis, and risk evaluation. The risk analysis incorporates the infrastructure resiliency rating and a data center site risk metric to quantify the weighted risk level, as well as criteria based on standards, best practices and expert knowledge. Based on the results from the risk assessment, the risk level may be treated, to adjust it to the desired level. The risk assessment is a way to better communicate and understand risks associated to the data center location, and help evaluate mitigation strategies.
数据中心风险评估必须提供对关键任务设施可能面临的风险的理解。本文提出了一种新的数据中心站点风险评估框架,作为数据中心尽职调查的重要工具。拟议的方法旨在使一个过程标准化,以帮助量化和确定外部风险的优先次序,以便进行比较。它包括三个步骤:风险识别、风险分析和风险评价。风险分析结合了基础设施弹性评级和数据中心站点风险度量来量化加权风险水平,以及基于标准、最佳实践和专家知识的标准。根据风险评估的结果,可以对风险级别进行处理,将其调整到所需的级别。风险评估是一种更好地沟通和了解与数据中心位置相关的风险的方法,并有助于评估缓解策略。
{"title":"A Novel Framework for Data Center Risk Assessment","authors":"M. Levy","doi":"10.1109/UEMCON51285.2020.9298072","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298072","url":null,"abstract":"Data center risk assessment must provide an understanding of the risks that the mission critical facility is exposed to. This paper proposes a novel framework for data center site risk assessment, as an important tool for data center due diligence. The proposed methodology is aimed at standardizing a process to help quantify and prioritize external risks to enable comparisons. It consists of three steps: risk identification, risk analysis, and risk evaluation. The risk analysis incorporates the infrastructure resiliency rating and a data center site risk metric to quantify the weighted risk level, as well as criteria based on standards, best practices and expert knowledge. Based on the results from the risk assessment, the risk level may be treated, to adjust it to the desired level. The risk assessment is a way to better communicate and understand risks associated to the data center location, and help evaluate mitigation strategies.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HC-LEACH: Huffman Coding-based energy-efficient LEACH protocol for WSN HC-LEACH:基于Huffman编码的无线传感器网络节能LEACH协议
D. Mechta, S. Harous
Data aggregation is an energy-saving technology in wireless sensor networks (WSNs). Because of the high density of nodes in sensor networks, many nodes discover the same data (in many cases with a large quantity), leading to a lot of energy consumption and may be packets loss. These challenges can be resolved by using a data collection policy when routing packets from the source nodes to the base station (BS). Researchers are still struggling to choose an effective and appropriate data collection method from the current WSN literature. In this paper, we propose an energy-aware Huffman coding-based LEACH protocol for WSN (HC-LEACH). The experiment results show the effectiveness of the proposed scheme in enhancing energy consumption by approximately 38% compared to LEACH.
数据聚合是无线传感器网络中的一种节能技术。由于传感器网络中节点的密度较大,很多节点发现的数据是相同的(很多情况下发现的数据量很大),这会导致大量的能量消耗,还可能导致丢包。这些挑战可以通过在将数据包从源节点路由到基站(BS)时使用数据收集策略来解决。从现有的无线传感器网络文献中选择一种有效且合适的数据收集方法仍然是研究人员所面临的难题。本文提出了一种能量感知的基于Huffman编码的无线传感器网络LEACH协议(HC-LEACH)。实验结果表明,与LEACH相比,该方案的能耗提高了约38%。
{"title":"HC-LEACH: Huffman Coding-based energy-efficient LEACH protocol for WSN","authors":"D. Mechta, S. Harous","doi":"10.1109/UEMCON51285.2020.9298061","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298061","url":null,"abstract":"Data aggregation is an energy-saving technology in wireless sensor networks (WSNs). Because of the high density of nodes in sensor networks, many nodes discover the same data (in many cases with a large quantity), leading to a lot of energy consumption and may be packets loss. These challenges can be resolved by using a data collection policy when routing packets from the source nodes to the base station (BS). Researchers are still struggling to choose an effective and appropriate data collection method from the current WSN literature. In this paper, we propose an energy-aware Huffman coding-based LEACH protocol for WSN (HC-LEACH). The experiment results show the effectiveness of the proposed scheme in enhancing energy consumption by approximately 38% compared to LEACH.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1