首页 > 最新文献

Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking最新文献

英文 中文
An IoT Based Disaster Response Solution for Ocean Environment 基于物联网的海洋环境灾害响应解决方案
S. Anand, M. Ramesh
This paper discusses the importance of an emergency response system for the ocean disasters that affect the life of the fisher community. Ocean emergencies can vary from the extreme climatic conditions, collision between boats and ships as well as other unexpected health emergencies that may be faced by the older fishermen while at the ocean. We discuss the challenges in implementing disaster response activities in ocean scenarios and propose an IoT solution for the fisher community to help them during emergencies as well as to maintain frequent communication with the shore. This paper also presents how this IoT solution can bring a change in the fishermen’s life and how our solution can be used when they are in danger. We also proposed a partial-context aware algorithm that helps to monitor the fishing vessel movements and how this algorithm can help during an emergency.
本文讨论了海洋灾害应急响应系统对影响渔民生活的重要性。海洋紧急情况可能因极端气候条件、船与船之间的碰撞以及老年渔民在海上可能面临的其他意外卫生紧急情况而异。我们讨论了在海洋场景中实施灾害响应活动所面临的挑战,并为渔民社区提出了一种物联网解决方案,以帮助他们在紧急情况下以及保持与海岸的频繁通信。本文还介绍了这种物联网解决方案如何改变渔民的生活,以及当他们处于危险中时如何使用我们的解决方案。我们还提出了一种局部上下文感知算法,该算法有助于监测渔船的运动,以及该算法如何在紧急情况下提供帮助。
{"title":"An IoT Based Disaster Response Solution for Ocean Environment","authors":"S. Anand, M. Ramesh","doi":"10.1145/3427477.3429273","DOIUrl":"https://doi.org/10.1145/3427477.3429273","url":null,"abstract":"This paper discusses the importance of an emergency response system for the ocean disasters that affect the life of the fisher community. Ocean emergencies can vary from the extreme climatic conditions, collision between boats and ships as well as other unexpected health emergencies that may be faced by the older fishermen while at the ocean. We discuss the challenges in implementing disaster response activities in ocean scenarios and propose an IoT solution for the fisher community to help them during emergencies as well as to maintain frequent communication with the shore. This paper also presents how this IoT solution can bring a change in the fishermen’s life and how our solution can be used when they are in danger. We also proposed a partial-context aware algorithm that helps to monitor the fishing vessel movements and how this algorithm can help during an emergency.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Effect of Sharing Damaged Road Information via Heterogeneous DTN on Evacuation 基于异构DTN的受损道路信息共享对疏散的影响
Yudai Yahara, Arata Kato, M. Takai, S. Ishihara
Sharing the information on damaged roads is a critical matter in disaster evacuation. We aim to develop a heterogeneous DTN based-disaster information sharing system, which uses both short-range wideband media (e.g., Wi-Fi) and long-range narrowband media (e.g., LoRa) to share disaster information even if communication infrastructures are damaged. In the system, evacuees carry a Wi-Fi mobile device, and fixed relay nodes and devices at disaster headquarters are equipped with Wi-Fi and LoRa. We investigated the influence of the DTN on evacuees’ behavior by using the cellular automaton-based mobility and communication simulation model. The results show that “leaving behind phenomena”, in which evacuees who hold the damaged road information (early comers) leave the damaged road before evacuees who have not obtained the damaged road information (latecomers) come to the vicinity of the damaged road occur. We also derived a strategy for the effective placement of fixed relay nodes to avoid leaving behind phenomena based on the simulation results and confirmed the strategy’s effectiveness.
在灾害疏散中,共享受损道路的信息是至关重要的。我们的目标是开发一种基于异构DTN的灾害信息共享系统,即使通信基础设施遭到破坏,也可以同时使用短距离宽带媒体(如Wi-Fi)和远距离窄带媒体(如LoRa)共享灾害信息。在该系统中,疏散人员携带Wi-Fi移动设备,灾害总部的固定中继节点和设备配备Wi-Fi和LoRa。我们利用基于元胞自动机的移动和通信仿真模型研究了DTN对疏散人员行为的影响。结果表明,持有受损道路信息的疏散人员(先到者)在未获得受损道路信息的疏散人员(后到者)到达受损道路附近之前已经离开受损道路,出现了“离开现象”。在仿真结果的基础上,推导出了避免遗留现象的固定中继节点的有效放置策略,并验证了该策略的有效性。
{"title":"An Effect of Sharing Damaged Road Information via Heterogeneous DTN on Evacuation","authors":"Yudai Yahara, Arata Kato, M. Takai, S. Ishihara","doi":"10.1145/3427477.3428192","DOIUrl":"https://doi.org/10.1145/3427477.3428192","url":null,"abstract":"Sharing the information on damaged roads is a critical matter in disaster evacuation. We aim to develop a heterogeneous DTN based-disaster information sharing system, which uses both short-range wideband media (e.g., Wi-Fi) and long-range narrowband media (e.g., LoRa) to share disaster information even if communication infrastructures are damaged. In the system, evacuees carry a Wi-Fi mobile device, and fixed relay nodes and devices at disaster headquarters are equipped with Wi-Fi and LoRa. We investigated the influence of the DTN on evacuees’ behavior by using the cellular automaton-based mobility and communication simulation model. The results show that “leaving behind phenomena”, in which evacuees who hold the damaged road information (early comers) leave the damaged road before evacuees who have not obtained the damaged road information (latecomers) come to the vicinity of the damaged road occur. We also derived a strategy for the effective placement of fixed relay nodes to avoid leaving behind phenomena based on the simulation results and confirmed the strategy’s effectiveness.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Random Forest for Privacy-Preserving IoT Devices 保护物联网设备隐私的合作随机森林
Yui Yamashita, Akihito Taya, Y. Tobe
Recently, various Internet of things (IoT) devices have become widely used in our daily lives and made houses and cities easier to live in. This paper proposes a machine learning scheme to take advantage of IoT devices. The proposed scheme realizes cooperation between devices to improve their performance, rather than learning independently. However, it is difficult to share local data directly because those data may contain private information, such as a picture with a user's face or lifelog data. Therefore, this paper provides a way of preserving privacy in interconnected IoT devices by sharing only learners from each device without sharing the original data directly. The proposed algorithm shares decision trees locally learned at each device and utilizes a random forest as a way of combining them together.
最近,各种物联网(IoT)设备已经广泛应用于我们的日常生活中,使房屋和城市更容易居住。本文提出了一种利用物联网设备的机器学习方案。该方案实现了设备之间的协作,以提高设备的性能,而不是独立学习。然而,直接共享本地数据是很困难的,因为这些数据可能包含私人信息,比如带有用户脸部的照片或生活日志数据。因此,本文提供了一种在互联物联网设备中保护隐私的方法,即只共享来自每个设备的学习器,而不直接共享原始数据。该算法共享在每个设备上本地学习到的决策树,并利用随机森林作为将它们组合在一起的方法。
{"title":"Cooperative Random Forest for Privacy-Preserving IoT Devices","authors":"Yui Yamashita, Akihito Taya, Y. Tobe","doi":"10.1145/3427477.3428188","DOIUrl":"https://doi.org/10.1145/3427477.3428188","url":null,"abstract":"Recently, various Internet of things (IoT) devices have become widely used in our daily lives and made houses and cities easier to live in. This paper proposes a machine learning scheme to take advantage of IoT devices. The proposed scheme realizes cooperation between devices to improve their performance, rather than learning independently. However, it is difficult to share local data directly because those data may contain private information, such as a picture with a user's face or lifelog data. Therefore, this paper provides a way of preserving privacy in interconnected IoT devices by sharing only learners from each device without sharing the original data directly. The proposed algorithm shares decision trees locally learned at each device and utilizes a random forest as a way of combining them together.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Contact In-Home Activity Recognition System Utilizing Doppler Sensors 利用多普勒传感器的非接触式家庭活动识别系统
Shinya Misaki, Keisuke Umakoshi, Tomokazu Matsui, Hyuckjin Choi, Manato Fujimoto, K. Yasumoto
In recent years, various approaches for smart home technology have been developed, such as home appliances control, services for energy saving and support of daily life. In order to realize such services, we need a system which is able to accurately recognize various human activities using low-cost devices. To realize such a system, we need to address several problems: the required sensors are too expensive (P1); it is difficult to precisely recognize place-independent activities like reading (P2), and putting on a device causes a burden to people (P3) the information such as images infringe on the privacy of the occupants (P4). In this paper, we propose a method for activity recognition by utilizing a doppler sensor as a motion detection sensor and a machine learning technique to solve the problems above (P1-P4). Specifically, frequency characteristic is obtained from the signals of the doppler sensor and we construct a machine learning model using effective features, which is presented by Anguita, and speed of target calculated from the doppler frequency. In order to examine the usefulness of the proposed method and find out critical issues of realizing activity recognition, we have collected sensor data of 6 kinds of activities(stationary, smartphone operation, PC operation, reading, writing, and eating) performed by 10 participants. For leave-one-session-out cross-validation, the maximum average recognition accuracy was 95.7%, and the average for 10 participants was 81.0%. For leave-one-person-out cross validation, the average recognition accuracy of logistic regression shows maximum accuracy of 42.1%.
近年来,智能家居技术的发展方向多种多样,如家电控制、节能服务、日常生活支持等。为了实现这样的服务,我们需要一个能够使用低成本设备准确识别各种人类活动的系统。为了实现这样一个系统,我们需要解决几个问题:所需的传感器太昂贵(P1);难以准确识别阅读等与地点无关的活动(P2),佩戴设备给人带来负担(P3),图像等信息侵犯了居住者的隐私(P4)。在本文中,我们提出了一种利用多普勒传感器作为运动检测传感器和机器学习技术来解决上述问题的活动识别方法(P1-P4)。具体来说,从多普勒传感器的信号中获得频率特性,并利用Anguita提出的有效特征和多普勒频率计算的目标速度构建机器学习模型。为了检验所提出方法的有效性,并找出实现活动识别的关键问题,我们收集了10名参与者进行的6种活动(静止、智能手机操作、PC操作、阅读、写作和进食)的传感器数据。对于留一段时间的交叉验证,最高平均识别准确率为95.7%,10名参与者的平均识别准确率为81.0%。对于留一人交叉验证,逻辑回归的平均识别准确率最高可达42.1%。
{"title":"Non-Contact In-Home Activity Recognition System Utilizing Doppler Sensors","authors":"Shinya Misaki, Keisuke Umakoshi, Tomokazu Matsui, Hyuckjin Choi, Manato Fujimoto, K. Yasumoto","doi":"10.1145/3427477.3429463","DOIUrl":"https://doi.org/10.1145/3427477.3429463","url":null,"abstract":"In recent years, various approaches for smart home technology have been developed, such as home appliances control, services for energy saving and support of daily life. In order to realize such services, we need a system which is able to accurately recognize various human activities using low-cost devices. To realize such a system, we need to address several problems: the required sensors are too expensive (P1); it is difficult to precisely recognize place-independent activities like reading (P2), and putting on a device causes a burden to people (P3) the information such as images infringe on the privacy of the occupants (P4). In this paper, we propose a method for activity recognition by utilizing a doppler sensor as a motion detection sensor and a machine learning technique to solve the problems above (P1-P4). Specifically, frequency characteristic is obtained from the signals of the doppler sensor and we construct a machine learning model using effective features, which is presented by Anguita, and speed of target calculated from the doppler frequency. In order to examine the usefulness of the proposed method and find out critical issues of realizing activity recognition, we have collected sensor data of 6 kinds of activities(stationary, smartphone operation, PC operation, reading, writing, and eating) performed by 10 participants. For leave-one-session-out cross-validation, the maximum average recognition accuracy was 95.7%, and the average for 10 participants was 81.0%. For leave-one-person-out cross validation, the average recognition accuracy of logistic regression shows maximum accuracy of 42.1%.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Optimal Resource Allocation Method for IIoT Network 工业物联网网络资源最优分配方法
Pratik Goswami, A. Mukherjee, Pushpita Chatterjee, Lixia Yang
The recent technical evolution is revolving around Internet of Things (IoT). The Internet of Softwarized Things (IoST) as a subset of IoT, is making its mark mostly towards industrial applications to connect all the devices and improve the computation capability and networking flexibility. The Industrial IoT (IIoT) consists of a large network, where the multiple works are processed continuously at a time. Therefore, multi-objective interference issue in the path remains as obstacle, for which the networking resources are lost. The existing works were performed with fixed resources and dedicated channel states which make the network less flexible with more time response. In this paper, the problem is addressed with optimal resource allocation using convolutional neural network (CNN) to extract the optimal channel state for different applications, which ease the computations along with efficiency. Furthermore, the proposed method is validated with the mathematical analysis and simulation.
最近的技术发展是围绕物联网(IoT)展开的。软件物联网(IoST)作为物联网的一个子集,主要面向工业应用,以连接所有设备,提高计算能力和网络灵活性。工业物联网(IIoT)由一个大型网络组成,其中多个工作同时连续处理。因此,路径上的多目标干扰问题仍然是一个障碍,导致网络资源的损失。现有的工作是在固定的资源和专用的信道状态下完成的,这使得网络的灵活性较低,时间响应较多。本文采用卷积神经网络(convolutional neural network, CNN)对资源进行最优分配,提取不同应用的最优信道状态,在简化计算的同时提高效率。通过数学分析和仿真验证了该方法的有效性。
{"title":"An Optimal Resource Allocation Method for IIoT Network","authors":"Pratik Goswami, A. Mukherjee, Pushpita Chatterjee, Lixia Yang","doi":"10.1145/3427477.3429988","DOIUrl":"https://doi.org/10.1145/3427477.3429988","url":null,"abstract":"The recent technical evolution is revolving around Internet of Things (IoT). The Internet of Softwarized Things (IoST) as a subset of IoT, is making its mark mostly towards industrial applications to connect all the devices and improve the computation capability and networking flexibility. The Industrial IoT (IIoT) consists of a large network, where the multiple works are processed continuously at a time. Therefore, multi-objective interference issue in the path remains as obstacle, for which the networking resources are lost. The existing works were performed with fixed resources and dedicated channel states which make the network less flexible with more time response. In this paper, the problem is addressed with optimal resource allocation using convolutional neural network (CNN) to extract the optimal channel state for different applications, which ease the computations along with efficiency. Furthermore, the proposed method is validated with the mathematical analysis and simulation.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129384364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ProceThings: Data Processing Platform with In-situ IoT Devices for Smart Community Services 项目进展:面向智慧社区服务的原位物联网设备数据处理平台
Yugo Nakamura, J. P. Talusan, Teruhiro Mizumoto, H. Suwa, Yutaka Arakawa, H. Yamaguchi, K. Yasumoto
In this paper, we propose ProceThings, a new middleware platform to provide smart community services by utilizing computational resources of IoT devices in a target community area. To realize ProceThings, we address three key challenges: (1) dynamic load balance management among numerous IoT devices; (2) distributed task assignment/execution over the IoT devices taking into account fault-tolerance; and (3) fulfillment of a service level agreement (SLA) for each service. For (1), ProceThings employs a heuristic monitoring mechanism which hierarchically aggregates load and resource conditions from all IoT devices in the target area (or belonging to a service). For (2), ProceThings employs a cluster-based architecture where proximity IoT devices are grouped into clusters with a fail over function, where they are allocated processing tasks from user queries. For (3), ProceThings employs demand-aware in-situ resource provisioning which dynamically predicts and assigns a sufficient amount of computational resources within the area where the service is provided to meet the SLA while preventing over-provisioning of resources. We have implemented a prototype of ProceThings running on commodity small computers consisting of Raspberry Pis and Intel NUCs and confirmed that the above mechanisms can properly work satisfying the corresponding SLAs when running smart community services.
本文提出了一种新的中间件平台procthings,利用目标社区内物联网设备的计算资源提供智能社区服务。为了实现procthings,我们解决了三个关键挑战:(1)众多物联网设备之间的动态负载平衡管理;(2)在考虑容错的物联网设备上进行分布式任务分配/执行;(3)履行每项服务的服务水平协议(SLA)。对于(1),procthings采用启发式监控机制,分层次地聚合目标区域(或属于服务)中所有IoT设备的负载和资源条件。对于(2),ProceThings采用了基于集群的架构,其中邻近的物联网设备被分组到具有故障转移功能的集群中,其中它们被分配处理用户查询的任务。对于(3),procthings采用需求感知的原位资源分配,在提供服务的区域内动态预测和分配足够数量的计算资源,以满足SLA,同时防止资源过度供应。我们在由Raspberry Pis和Intel NUCs组成的商用小型计算机上实现了procthings的原型,并确认上述机制在运行智能社区服务时可以正常工作,满足相应的sla。
{"title":"ProceThings: Data Processing Platform with In-situ IoT Devices for Smart Community Services","authors":"Yugo Nakamura, J. P. Talusan, Teruhiro Mizumoto, H. Suwa, Yutaka Arakawa, H. Yamaguchi, K. Yasumoto","doi":"10.1145/3427477.3429275","DOIUrl":"https://doi.org/10.1145/3427477.3429275","url":null,"abstract":"In this paper, we propose ProceThings, a new middleware platform to provide smart community services by utilizing computational resources of IoT devices in a target community area. To realize ProceThings, we address three key challenges: (1) dynamic load balance management among numerous IoT devices; (2) distributed task assignment/execution over the IoT devices taking into account fault-tolerance; and (3) fulfillment of a service level agreement (SLA) for each service. For (1), ProceThings employs a heuristic monitoring mechanism which hierarchically aggregates load and resource conditions from all IoT devices in the target area (or belonging to a service). For (2), ProceThings employs a cluster-based architecture where proximity IoT devices are grouped into clusters with a fail over function, where they are allocated processing tasks from user queries. For (3), ProceThings employs demand-aware in-situ resource provisioning which dynamically predicts and assigns a sufficient amount of computational resources within the area where the service is provided to meet the SLA while preventing over-provisioning of resources. We have implemented a prototype of ProceThings running on commodity small computers consisting of Raspberry Pis and Intel NUCs and confirmed that the above mechanisms can properly work satisfying the corresponding SLAs when running smart community services.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131495937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Delivery of Social Media Posts to Appropriate First Responders for Disaster Response 将社交媒体上的帖子在线传递给适当的救灾第一响应者
Viyom Mittal, Mohammad Jahanian, K. Ramakrishnan
Delivering the right information to the right people in a timely manner can greatly improve outcomes and save lives in emergency response. A communication framework that flexibly and efficiently brings victims, volunteers, and first responders together for timely assistance can be very helpful. With the burden of more frequent and intense disaster situations and first responder resources stretched thin, people increasingly depend on social media for communicating vital information. This paper proposes ONSIDE, a framework for coordination of disaster response leveraging social media, integrating it with Information-Centric dissemination for timely and relevant dissemination. We use a graph-based pub/sub namespace that captures the complex hierarchy of the incident management roles. Regular citizens and volunteers using social media may not know of or have access to the full namespace. Thus, we utilize a social media engine (SME) to identify disaster-related social media posts and then automatically map them to the right name(s) in near-real-time. Using NLP and classification techniques, we direct the posts to appropriate first responder(s) that can help with the posted issue. A major challenge for classifying social media in real-time is the labeling effort for model training. Furthermore, as disasters hits, there may be not enough data points available for labeling, and there may be concept drift in the content of the posts over time. To address these issues, our SME employs stream-based active learning methods, adapting as social media posts come in. Preliminary evaluation results show the proposed solution can be effective.
及时向正确的人提供正确的信息可以大大改善应急工作的成果并挽救生命。一个灵活有效地将受害者、志愿者和第一反应者聚集在一起及时提供援助的沟通框架是非常有用的。随着越来越频繁和激烈的灾害情况的负担和第一响应者资源的捉襟见肘,人们越来越依赖社交媒体来交流重要信息。本文提出了ONSIDE,这是一个利用社交媒体的灾害响应协调框架,将其与以信息为中心的传播相结合,以实现及时和相关的传播。我们使用基于图的发布/订阅名称空间来捕获事件管理角色的复杂层次结构。使用社交媒体的普通公民和志愿者可能不知道或无法访问完整的名称空间。因此,我们利用社交媒体引擎(SME)来识别与灾害相关的社交媒体帖子,然后在接近实时的情况下自动将它们映射到正确的名称。使用自然语言处理和分类技术,我们将帖子引导到合适的第一响应者,他们可以帮助解决所发布的问题。对社交媒体进行实时分类的一个主要挑战是模型训练的标签工作。此外,当灾难发生时,可能没有足够的数据点可用于标记,并且随着时间的推移,帖子的内容可能会出现概念漂移。为了解决这些问题,我们的中小企业采用了基于流的主动学习方法,并根据社交媒体上的帖子进行调整。初步评价结果表明,该方案是有效的。
{"title":"Online Delivery of Social Media Posts to Appropriate First Responders for Disaster Response","authors":"Viyom Mittal, Mohammad Jahanian, K. Ramakrishnan","doi":"10.1145/3427477.3429272","DOIUrl":"https://doi.org/10.1145/3427477.3429272","url":null,"abstract":"Delivering the right information to the right people in a timely manner can greatly improve outcomes and save lives in emergency response. A communication framework that flexibly and efficiently brings victims, volunteers, and first responders together for timely assistance can be very helpful. With the burden of more frequent and intense disaster situations and first responder resources stretched thin, people increasingly depend on social media for communicating vital information. This paper proposes ONSIDE, a framework for coordination of disaster response leveraging social media, integrating it with Information-Centric dissemination for timely and relevant dissemination. We use a graph-based pub/sub namespace that captures the complex hierarchy of the incident management roles. Regular citizens and volunteers using social media may not know of or have access to the full namespace. Thus, we utilize a social media engine (SME) to identify disaster-related social media posts and then automatically map them to the right name(s) in near-real-time. Using NLP and classification techniques, we direct the posts to appropriate first responder(s) that can help with the posted issue. A major challenge for classifying social media in real-time is the labeling effort for model training. Furthermore, as disasters hits, there may be not enough data points available for labeling, and there may be concept drift in the content of the posts over time. To address these issues, our SME employs stream-based active learning methods, adapting as social media posts come in. Preliminary evaluation results show the proposed solution can be effective.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining 一种用于隐私保护数据挖掘的深度q -学习净化方法
Usman Ahmed, Chun-Wei Lin, Gautam Srivastava, Y. Djenouri
With the establishment of the 5G network, a number of data-intensive applications will be developed. Privacy of information over the network is increasingly relevant, and require protection. The privacy of information while utilizing data is a trade-off that needs to be addressed. In this paper, we propose data privacy of 5G connected devices over heterogeneous networks (5G-Hetnets). A deep Q learning (DQL) based technique is applied to sensitize sensitive information from a given database while keeping the balance between privacy protection and knowledge discovery during the sanitization process. It takes transaction states as input and results in state and action pair. The DQL discovers the transactions dynamically, then the sanitization operation hide the sensitive information by minimizing side effects. The proposed approach shows significant improvement of performance compared to greedy and meta-heuristics and heuristics approaches.
随着5G网络的建立,许多数据密集型应用将被开发出来。网络上的信息隐私越来越重要,需要保护。在利用数据的同时,信息的隐私是一个需要解决的权衡。在本文中,我们提出了5G连接设备在异构网络(5G- hetnets)上的数据隐私。应用基于深度Q学习(DQL)的技术对给定数据库中的敏感信息进行敏感化处理,同时在处理过程中保持隐私保护和知识发现之间的平衡。它将事务状态作为输入,并产生状态和操作对。DQL动态地发现事务,然后清理操作通过最小化副作用来隐藏敏感信息。与贪心算法、元启发式算法和启发式算法相比,该方法的性能有了显著提高。
{"title":"A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining","authors":"Usman Ahmed, Chun-Wei Lin, Gautam Srivastava, Y. Djenouri","doi":"10.1145/3427477.3429990","DOIUrl":"https://doi.org/10.1145/3427477.3429990","url":null,"abstract":"With the establishment of the 5G network, a number of data-intensive applications will be developed. Privacy of information over the network is increasingly relevant, and require protection. The privacy of information while utilizing data is a trade-off that needs to be addressed. In this paper, we propose data privacy of 5G connected devices over heterogeneous networks (5G-Hetnets). A deep Q learning (DQL) based technique is applied to sensitize sensitive information from a given database while keeping the balance between privacy protection and knowledge discovery during the sanitization process. It takes transaction states as input and results in state and action pair. The DQL discovers the transactions dynamically, then the sanitization operation hide the sensitive information by minimizing side effects. The proposed approach shows significant improvement of performance compared to greedy and meta-heuristics and heuristics approaches.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123134200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks 基于信任感知方案的认知无线网络协同频谱感知恶意节点检测
Abhishek Kumar, Nitin Gupta, Riya Tapwal, Jagdeep Singh
Emerging of Cognitive Radio (CR) technology has provided an optimistic solution for the dearth of the spectrum by improving the spectrum utilization. The opportunistic use of the spectrum is enabled by spectrum sensing which is one of the key functionality of CR systems. To perform the interference-free transmission in cognitive radio networks, an important part for the unlicensed user is to identify a licensed user with the help of spectrum sensing. Recently, the Cooperative Spectrum Sensing has been widely used in the literature where various scattered unlicensed users collaborate to make the final sensing decision. This overcomes the hidden terminal problem and also improve the overall reliability of the decisions made about the presence or absence of a licensed user. Each unlicensed user sends the sensing results to the base station for the final decision. However, there exist some nodes which do not provide the correct sensing results to maximize their own profit which can highly degrade the CR network functionality. In this paper, a trust-aware model is proposed for the detection of misbehaving nodes such that their sensing reports can be filtered out from the final result. The performance evaluation of the proposed scheme is done by checking its robustness and efficiency against various possible attacks.
认知无线电(CR)技术的出现,通过提高频谱利用率,为解决频谱短缺问题提供了一个乐观的解决方案。频谱传感是CR系统的关键功能之一,它使频谱的机会利用成为可能。为了在认知无线网络中实现无干扰传输,利用频谱感知技术对未授权用户进行识别是一个重要环节。近年来,协作频谱感知在文献中得到了广泛的应用,即各种分散的未授权用户协同做出最终的感知决策。这克服了隐藏终端的问题,还提高了关于许可用户是否存在的决策的总体可靠性。每个未经许可的用户将传感结果发送到基站以进行最终决策。然而,存在一些节点不提供正确的感知结果来最大化自己的利益,这将严重降低CR网络的功能。本文提出了一种用于检测行为不端的节点的信任感知模型,使其感知报告可以从最终结果中过滤出来。通过对各种可能攻击的鲁棒性和有效性进行了性能评估。
{"title":"Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks","authors":"Abhishek Kumar, Nitin Gupta, Riya Tapwal, Jagdeep Singh","doi":"10.1145/3427477.3429992","DOIUrl":"https://doi.org/10.1145/3427477.3429992","url":null,"abstract":"Emerging of Cognitive Radio (CR) technology has provided an optimistic solution for the dearth of the spectrum by improving the spectrum utilization. The opportunistic use of the spectrum is enabled by spectrum sensing which is one of the key functionality of CR systems. To perform the interference-free transmission in cognitive radio networks, an important part for the unlicensed user is to identify a licensed user with the help of spectrum sensing. Recently, the Cooperative Spectrum Sensing has been widely used in the literature where various scattered unlicensed users collaborate to make the final sensing decision. This overcomes the hidden terminal problem and also improve the overall reliability of the decisions made about the presence or absence of a licensed user. Each unlicensed user sends the sensing results to the base station for the final decision. However, there exist some nodes which do not provide the correct sensing results to maximize their own profit which can highly degrade the CR network functionality. In this paper, a trust-aware model is proposed for the detection of misbehaving nodes such that their sensing reports can be filtered out from the final result. The performance evaluation of the proposed scheme is done by checking its robustness and efficiency against various possible attacks.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1