首页 > 最新文献

International Journal of Space-Based and Situated Computing最新文献

英文 中文
Acceleration of the K-means algorithm by removing stable items 通过去除稳定项加速K-means算法
Pub Date : 2017-10-03 DOI: 10.1504/IJSSC.2017.10008032
A. Mexicano, Ricardo Rodriguez Jorge, Pascual Noradino Montes Dorantes, Joaquín Pérez Ortega
This work presents an approach for enhancing the K-means algorithm in the classification phase. The approach consists in a heuristic, which at each time that an object remains in the same group, between the current and the previous iteration, it is identified as stable and it is removed from computations in the classification phase in the current and subsequent iterations. This approach helps to reduce the execution time of the standard version. It can be useful in big data applications. For evaluating computational results, both the standard and the proposal were implemented and executed using three synthetic and seven well-known real instances. After testing both versions, it was possible to validate that the proposed approach spends less time than the standard one. The best result was obtained for the transactions instance when it was grouped into 200 clusters, achieving a time reduction of 90.1% with a reduction in quality of 3.97%.
本文提出了一种在分类阶段增强K-means算法的方法。该方法包含一个启发式方法,在当前迭代和前一个迭代之间,每次一个对象保持在同一组中,它都被识别为稳定的,并且在当前迭代和后续迭代的分类阶段将其从计算中删除。这种方法有助于减少标准版本的执行时间。它在大数据应用中很有用。为了评估计算结果,使用3个合成实例和7个众所周知的实际实例对标准和建议进行了实现和执行。在测试了两个版本之后,可以验证所建议的方法比标准方法花费的时间更少。当事务实例被分成200个集群时,获得了最好的结果,时间减少了90.1%,质量降低了3.97%。
{"title":"Acceleration of the K-means algorithm by removing stable items","authors":"A. Mexicano, Ricardo Rodriguez Jorge, Pascual Noradino Montes Dorantes, Joaquín Pérez Ortega","doi":"10.1504/IJSSC.2017.10008032","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10008032","url":null,"abstract":"This work presents an approach for enhancing the K-means algorithm in the classification phase. The approach consists in a heuristic, which at each time that an object remains in the same group, between the current and the previous iteration, it is identified as stable and it is removed from computations in the classification phase in the current and subsequent iterations. This approach helps to reduce the execution time of the standard version. It can be useful in big data applications. For evaluating computational results, both the standard and the proposal were implemented and executed using three synthetic and seven well-known real instances. After testing both versions, it was possible to validate that the proposed approach spends less time than the standard one. The best result was obtained for the transactions instance when it was grouped into 200 clusters, achieving a time reduction of 90.1% with a reduction in quality of 3.97%.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72699994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proactive vs. reactive multipath routing for mobility enabled RPL 支持移动性的RPL的主动与被动多路径路由
Pub Date : 2017-10-03 DOI: 10.1504/IJSSC.2017.10008039
Fatma Somaa, I. Korbi, L. Saïdane
The IPv6 routing protocol for low power and lossy networks (RPL) was proposed as a routing standard for wireless sensor networks (WSNs). However, the RPL performance drastically degrade in the case of nodes' mobility. Therefore, we propose in this paper multipath routing schemes to adapt RPL to mobility scenarios. The first mobility-based braided multipath RPL (MBM-RPL) scheme establishes an alternative path braided with the primary one to replace the loose link (the up to fail link) along the first network route. The second proactive multipath mobility-based RPL (PMM-RPL) approach establishes all node disjoint routes between each node in the network and the sink. Data would not be duplicated on secondary paths until a primary path vulnerability detection. Both MBM-RPL and PMM-RPL performance are evaluated in terms of packet loss rate (PLR), average transmission delay (ADT) and the generated network overhead using the Cooja/Contiki simulation environment.
提出了面向低功耗损耗网络(RPL)的IPv6路由协议作为无线传感器网络(WSNs)的路由标准。然而,在节点移动的情况下,RPL性能会急剧下降。因此,我们在本文中提出了多路径路由方案,以使RPL适应移动场景。MBM-RPL (first mobility-based braided multi - path RPL)是一种基于第一移动性的编织多路径RPL (MBM-RPL)方案,它建立了一条与主路径编织的替代路径,以取代第一条网络路由上的松散链路(up to fail链路)。第二种基于主动多路径移动的RPL (PMM-RPL)方法在网络中每个节点和sink之间建立所有节点不相交的路由。在检测到主路径漏洞之前,不会在辅助路径上复制数据。使用Cooja/Contiki仿真环境,根据丢包率(PLR)、平均传输延迟(ADT)和生成的网络开销来评估MBM-RPL和PMM-RPL的性能。
{"title":"Proactive vs. reactive multipath routing for mobility enabled RPL","authors":"Fatma Somaa, I. Korbi, L. Saïdane","doi":"10.1504/IJSSC.2017.10008039","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10008039","url":null,"abstract":"The IPv6 routing protocol for low power and lossy networks (RPL) was proposed as a routing standard for wireless sensor networks (WSNs). However, the RPL performance drastically degrade in the case of nodes' mobility. Therefore, we propose in this paper multipath routing schemes to adapt RPL to mobility scenarios. The first mobility-based braided multipath RPL (MBM-RPL) scheme establishes an alternative path braided with the primary one to replace the loose link (the up to fail link) along the first network route. The second proactive multipath mobility-based RPL (PMM-RPL) approach establishes all node disjoint routes between each node in the network and the sink. Data would not be duplicated on secondary paths until a primary path vulnerability detection. Both MBM-RPL and PMM-RPL performance are evaluated in terms of packet loss rate (PLR), average transmission delay (ADT) and the generated network overhead using the Cooja/Contiki simulation environment.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86204495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and adaptive overlay for efficient forwarding in volunteer clouds 可扩展和自适应覆盖在志愿者云有效转发
Pub Date : 2017-10-01 DOI: 10.1504/IJSSC.2017.10010831
F. Hrizi, A. Laouiti
Volunteer cloud is a new concept of cloud computing where volunteers, i.e., user machines are used instead of or in addition to dedicated resources. Although volunteer clouds offer potential benefits in terms of energy and cost saving as well as elasticity, the volatility and the scalability of the volunteer resources are still open challenges that need to be investigated. In this paper, we focus on managing the connectivity in a scalable and dynamic fashion in volunteer clouds. We show that volunteer clouds could be modelled by a hierarchical small-world structure, characterised by short average path lengths among nodes, and strong local clustering, which implies small latency between nodes and therefore robust forwarding. Furthermore, we explore the benefits of the use of the recursive internetwork architecture (RINA) as a networking solution. Finally, simulation results show that our proposal achieves a trade-off between bounding the routing table size and ensuring transmission efficiency.
志愿者云是云计算的一个新概念,其中志愿者(即用户机器)被用来代替专用资源或作为专用资源的补充。尽管志愿云在能源和成本节约以及弹性方面提供了潜在的好处,但志愿资源的波动性和可扩展性仍然是需要调查的开放挑战。在本文中,我们专注于在志愿者云中以可扩展和动态的方式管理连接。我们表明志愿者云可以通过分层小世界结构建模,其特征是节点之间的平均路径长度短,以及强局部聚类,这意味着节点之间的延迟小,因此具有鲁棒转发能力。此外,我们还探讨了使用递归网络架构(RINA)作为网络解决方案的好处。最后,仿真结果表明,我们的方案在限制路由表大小和保证传输效率之间取得了平衡。
{"title":"Scalable and adaptive overlay for efficient forwarding in volunteer clouds","authors":"F. Hrizi, A. Laouiti","doi":"10.1504/IJSSC.2017.10010831","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10010831","url":null,"abstract":"Volunteer cloud is a new concept of cloud computing where volunteers, i.e., user machines are used instead of or in addition to dedicated resources. Although volunteer clouds offer potential benefits in terms of energy and cost saving as well as elasticity, the volatility and the scalability of the volunteer resources are still open challenges that need to be investigated. In this paper, we focus on managing the connectivity in a scalable and dynamic fashion in volunteer clouds. We show that volunteer clouds could be modelled by a hierarchical small-world structure, characterised by short average path lengths among nodes, and strong local clustering, which implies small latency between nodes and therefore robust forwarding. Furthermore, we explore the benefits of the use of the recursive internetwork architecture (RINA) as a networking solution. Finally, simulation results show that our proposal achieves a trade-off between bounding the routing table size and ensuring transmission efficiency.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91088097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and experimental evaluation of an omnidirectional wheelchair for sports and moving in rooms with narrow spaces 窄空间运动及移动全向轮椅的实现与实验评估
Pub Date : 2017-05-15 DOI: 10.1504/IJSSC.2017.10004976
Keita Matsuo
The aged tendency of population and rapid growth in the number of disabled people caused by diseases or injuries require to build wheelchairs with good performance. Also, the wheelchair should provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough and should be able to make different movements in order to have many applications. In this paper, we present the implementation and experimental evaluation of an omnidirectional wheelchair for sports and moving in rooms with narrow spaces. The experimental evaluation shows that the implemented wheelchair has a good behaviour and can be used for real applications.
人口的老龄化趋势和因病或受伤而致残的人数的迅速增加,要求制造性能良好的轮椅。此外,轮椅应该为使用者提供许多好处,如保持行动能力,继续或扩大社区和社会活动,保存力量和能量,提高生活质量。轮椅的身体必须足够紧凑,应该能够做出不同的运动,以便有许多应用。在本文中,我们提出了一种全向轮椅的实现和实验评估,用于运动和运动的房间狭窄的空间。实验结果表明,所设计的轮椅具有良好的性能,可用于实际应用。
{"title":"Implementation and experimental evaluation of an omnidirectional wheelchair for sports and moving in rooms with narrow spaces","authors":"Keita Matsuo","doi":"10.1504/IJSSC.2017.10004976","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10004976","url":null,"abstract":"The aged tendency of population and rapid growth in the number of disabled people caused by diseases or injuries require to build wheelchairs with good performance. Also, the wheelchair should provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough and should be able to make different movements in order to have many applications. In this paper, we present the implementation and experimental evaluation of an omnidirectional wheelchair for sports and moving in rooms with narrow spaces. The experimental evaluation shows that the implemented wheelchair has a good behaviour and can be used for real applications.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77696255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and evaluation of an ambient intelligence testbed for improving quality of life 提高生活质量的环境智能试验台的设计与评价
Pub Date : 2017-05-15 DOI: 10.1504/IJSSC.2017.10004982
Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Makoto Ikeda, L. Barolli
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyse the optimised link state routing (OLSR) and wired equivalent privacy (WEP) protocol in an indoor scenario, and mean shift clustering algorithm considering sensing data. For evaluation we considered throughput, delay and jitter metrics, and respiratory rate and heart rate metrics. The experimental and simulation results show that the nodes in the testbed were communicating smoothly and the mean shift clustering algorithm have a good performance.
环境智能(AmI)处理的是一个无处不在的计算设备的新世界,在这个世界中,物理环境可以智能地、不显眼地与人进行交互。AmI环境可以是多种多样的,例如家庭、办公室、会议室、学校、医院、控制中心、车辆、旅游景点、商店、体育设施和音乐设备。在本文中,我们设计并实现了一个基于树莓派的AmI测试平台。我们分析了室内场景下优化的链路状态路由(OLSR)和有线等效隐私(WEP)协议,以及考虑感知数据的平均移位聚类算法。为了评估,我们考虑了吞吐量、延迟和抖动指标、呼吸率和心率指标。实验和仿真结果表明,试验台节点间通信顺畅,平均移位聚类算法具有良好的性能。
{"title":"Design and evaluation of an ambient intelligence testbed for improving quality of life","authors":"Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1504/IJSSC.2017.10004982","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10004982","url":null,"abstract":"Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyse the optimised link state routing (OLSR) and wired equivalent privacy (WEP) protocol in an indoor scenario, and mean shift clustering algorithm considering sensing data. For evaluation we considered throughput, delay and jitter metrics, and respiratory rate and heart rate metrics. The experimental and simulation results show that the nodes in the testbed were communicating smoothly and the mean shift clustering algorithm have a good performance.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76373482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An energy-aware algorithm to migrate virtual machines in a server cluster 一种能量感知算法,用于迁移服务器集群中的虚拟机
Pub Date : 2017-05-15 DOI: 10.1504/IJSSC.2017.10004986
Dilawaer Duolikun, T. Enokido, M. Takizawa
In order to realise eco-society, we have to reduce the electric energy consumed by servers in a cluster in addition to satisfying performance requirements. Virtual machines are now widely used to support applications with virtual computation service in clusters of servers. Here, a virtual machine on a host server can migrate to a guest server while processes are being performed on the virtual machine. In this paper, we propose an energy-aware migration of virtual machines (EAMV) algorithm where not only a virtual machine is selected to perform a process issued by a client but also a virtual machine migrates to a guest server which is expected to consume smaller electric energy to perform processes on the virtual machine. In the evaluation, we show the total electric energy consumption of servers and the average execution time of processes can be reduced in the EAMV algorithm compared with non-migration algorithms.
为了实现生态社会,除了满足性能要求外,我们还必须减少集群中服务器消耗的电能。虚拟机现在被广泛用于支持服务器集群中具有虚拟计算服务的应用程序。在这里,主机服务器上的虚拟机可以在虚拟机上执行进程时迁移到客户服务器。在本文中,我们提出了一种能量感知的虚拟机迁移(EAMV)算法,该算法不仅选择虚拟机来执行客户端发出的进程,还将虚拟机迁移到客户服务器上,该客户服务器预计将消耗更少的电能来执行虚拟机上的进程。在评估中,我们证明了与非迁移算法相比,EAMV算法可以减少服务器的总电能消耗和进程的平均执行时间。
{"title":"An energy-aware algorithm to migrate virtual machines in a server cluster","authors":"Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1504/IJSSC.2017.10004986","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10004986","url":null,"abstract":"In order to realise eco-society, we have to reduce the electric energy consumed by servers in a cluster in addition to satisfying performance requirements. Virtual machines are now widely used to support applications with virtual computation service in clusters of servers. Here, a virtual machine on a host server can migrate to a guest server while processes are being performed on the virtual machine. In this paper, we propose an energy-aware migration of virtual machines (EAMV) algorithm where not only a virtual machine is selected to perform a process issued by a client but also a virtual machine migrates to a guest server which is expected to consume smaller electric energy to perform processes on the virtual machine. In the evaluation, we show the total electric energy consumption of servers and the average execution time of processes can be reduced in the EAMV algorithm compared with non-migration algorithms.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81718476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Using trust to detect denial of service attacks in the internet of things over MANETs 基于信任的物联网manet拒绝服务攻击检测
Pub Date : 2017-05-15 DOI: 10.1504/IJSSC.2017.10004987
Albandari Alsumayt, J. Haggerty, Ahmad Lotfi
The rapid growth of employing devices as tools in daily life and the technological revolution have led to the invention of a novel paradigm; the Internet of Things (IoT). It includes a group of ubiquitous devices that communicate and share data with each other. These devices use the Internet Protocol (IP) to manage network nodes through mobile ad hoc networks (MANET). IoT is beneficial to MANET as the nodes are self-organising and the information reach can be expanded according to the network range. Due to the nature of MANET, such as dynamic topology, a number of challenges are inherent, such as Denial of Service (DoS) attacks. DoS attacks prohibit legitimate users from accessing their authorised services. In addition, because of the high mobility of MANET, the network can merge with other networks. In this situation, two or more networks of untrusted nodes may join one another leaving each of the networks open to attack. This paper proposes a novel method to detect DoS attacks immediately prior to the merger of two MANETs. To demonstrate the applicability of the proposed approach, a Grayhole attack is used in this study to evaluate the performance of the proposed method in detecting attacks.
在日常生活中使用设备作为工具的快速增长和技术革命导致了一种新的范式的发明;物联网(IoT)。它包括一组无处不在的相互通信和共享数据的设备。这些设备使用互联网协议(IP)通过移动自组织网络(MANET)来管理网络节点。由于物联网节点具有自组织特性,且信息覆盖范围可以根据网络范围扩展,因此物联网有利于MANET的发展。由于MANET的性质,如动态拓扑,许多挑战是固有的,如拒绝服务(DoS)攻击。DoS攻击禁止合法用户访问其授权的服务。此外,由于MANET的高移动性,该网络可以与其他网络合并。在这种情况下,两个或多个不受信任节点的网络可能会相互连接,使每个网络都容易受到攻击。本文提出了一种在两个manet合并之前立即检测DoS攻击的新方法。为了证明所提出方法的适用性,本研究中使用了一个灰洞攻击来评估所提出方法在检测攻击方面的性能。
{"title":"Using trust to detect denial of service attacks in the internet of things over MANETs","authors":"Albandari Alsumayt, J. Haggerty, Ahmad Lotfi","doi":"10.1504/IJSSC.2017.10004987","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10004987","url":null,"abstract":"The rapid growth of employing devices as tools in daily life and the technological revolution have led to the invention of a novel paradigm; the Internet of Things (IoT). It includes a group of ubiquitous devices that communicate and share data with each other. These devices use the Internet Protocol (IP) to manage network nodes through mobile ad hoc networks (MANET). IoT is beneficial to MANET as the nodes are self-organising and the information reach can be expanded according to the network range. Due to the nature of MANET, such as dynamic topology, a number of challenges are inherent, such as Denial of Service (DoS) attacks. DoS attacks prohibit legitimate users from accessing their authorised services. In addition, because of the high mobility of MANET, the network can merge with other networks. In this situation, two or more networks of untrusted nodes may join one another leaving each of the networks open to attack. This paper proposes a novel method to detect DoS attacks immediately prior to the merger of two MANETs. To demonstrate the applicability of the proposed approach, a Grayhole attack is used in this study to evaluate the performance of the proposed method in detecting attacks.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85081928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive security provisioning for vehicular safety applications 车辆安全应用的自适应安全配置
Pub Date : 2017-05-15 DOI: 10.1504/IJSSC.2017.10004983
Elyes Ben Hamida, M. Javed, Wassim Znaidi
Vehicular ad hoc network provides safety applications for next generation intelligent transport systems. By periodically transmitting mobility information in basic safety messages (BSMs), vehicles get an overview of the neighbourhood. As applications involving vehicular networks impact human safety, reliability of BSMs is a key requirement, which however is a challenging task in heavy traffic scenarios where many BSMs are queued up simultaneously for signature verification. This results in long verification delays for many critical BSMs from nearby vehicles. To overcome this challenge, we propose two adaptive security mechanisms in this paper that can be used by the ITS applications to enhance their QoS and maintain good level of security. The first technique is a receiver-oriented technique that uses channel aware mechanism to prioritise the signature verification of BSMs from closer neighbours. The second technique is transmitter based that can adaptively select the best security level for BSMs according to cryptographic loss rate. Simulation results verify the performance enhancement achieved by the proposed framework in terms of several safety awareness metrics as compared with the existing schemes.
车载自组织网络为下一代智能交通系统提供了安全应用。通过定期在基本安全信息(BSMs)中传输移动信息,车辆可以获得周围环境的概况。由于车载网络应用影响人身安全,bsm的可靠性是一个关键要求,但在交通繁忙的情况下,许多bsm同时排队进行签名验证,这是一项具有挑战性的任务。这导致对来自附近车辆的许多关键bsm的验证延迟很长时间。为了克服这一挑战,本文提出了两种可用于ITS应用的自适应安全机制,以增强其QoS并保持良好的安全水平。第一种技术是面向接收方的技术,它使用通道感知机制来优先考虑来自更近邻的bsm的签名验证。第二种技术是基于发送器的,可以根据密码丢失率自适应选择最佳安全级别。与现有方案相比,仿真结果验证了该框架在多个安全意识指标方面的性能增强。
{"title":"Adaptive security provisioning for vehicular safety applications","authors":"Elyes Ben Hamida, M. Javed, Wassim Znaidi","doi":"10.1504/IJSSC.2017.10004983","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10004983","url":null,"abstract":"Vehicular ad hoc network provides safety applications for next generation intelligent transport systems. By periodically transmitting mobility information in basic safety messages (BSMs), vehicles get an overview of the neighbourhood. As applications involving vehicular networks impact human safety, reliability of BSMs is a key requirement, which however is a challenging task in heavy traffic scenarios where many BSMs are queued up simultaneously for signature verification. This results in long verification delays for many critical BSMs from nearby vehicles. To overcome this challenge, we propose two adaptive security mechanisms in this paper that can be used by the ITS applications to enhance their QoS and maintain good level of security. The first technique is a receiver-oriented technique that uses channel aware mechanism to prioritise the signature verification of BSMs from closer neighbours. The second technique is transmitter based that can adaptively select the best security level for BSMs according to cryptographic loss rate. Simulation results verify the performance enhancement achieved by the proposed framework in terms of several safety awareness metrics as compared with the existing schemes.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79470445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An intelligent approach for qualified voting in P2P mobile collaborative team: a comparison study for two fuzzy-based systems 一种P2P移动协同团队中合格投票的智能方法——基于两种模糊系统的比较研究
Pub Date : 2017-01-01 DOI: 10.1504/IJSSC.2017.10010830
Yi Liu, Kosuke Ozera, Keita Matsuo, L. Barolli
Mobile computing has many application domains. One important domain is that of mobile applications supporting collaborative work. In a collaborative work, the members of the team have to take decision or solve conflicts in project development and therefore members have to vote. In this work, we present a voting model, that we call qualified voting, in which every member has a voting score according to four parameters: number of activities that member participates (NAMP), number of activities that member successfully finished (NAMSF), number of online discussions that member participated (NODMP), number of activities the member fails (NAMF). Then, we use fuzzy approach to compute a voting score for the member. We present two fuzzy based voting systems (called FPVS1 and FPVS2). The simulation results show that when NAMP, NAMSF and NODMP are high, the voting score is high, but with increasing of the NAMF, the VS is decreased. Comparing the complexity of FPVS1 and FPVS2, the FPVS2 is more complex than FPVS1, but FPVS2 can select better peers for the collaborative work.
移动计算有许多应用领域。一个重要的领域是支持协作工作的移动应用程序。在协作工作中,团队成员必须做出决定或解决项目开发中的冲突,因此成员必须投票。在这项工作中,我们提出了一个投票模型,我们称之为合格投票,其中每个成员根据四个参数有一个投票分数:成员参与的活动数量(NAMP),成员成功完成的活动数量(NAMSF),成员参与的在线讨论数量(NODMP),成员失败的活动数量(NAMF)。然后,我们使用模糊方法计算成员的投票分数。我们提出了两个基于模糊的投票系统(称为FPVS1和FPVS2)。仿真结果表明,当NAMP、NAMSF和NODMP较高时,投票得分较高,但随着NAMF的增大,投票VS降低。比较FPVS1和FPVS2的复杂性,FPVS2比FPVS1更复杂,但FPVS2可以选择更好的对等体进行协同工作。
{"title":"An intelligent approach for qualified voting in P2P mobile collaborative team: a comparison study for two fuzzy-based systems","authors":"Yi Liu, Kosuke Ozera, Keita Matsuo, L. Barolli","doi":"10.1504/IJSSC.2017.10010830","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10010830","url":null,"abstract":"Mobile computing has many application domains. One important domain is that of mobile applications supporting collaborative work. In a collaborative work, the members of the team have to take decision or solve conflicts in project development and therefore members have to vote. In this work, we present a voting model, that we call qualified voting, in which every member has a voting score according to four parameters: number of activities that member participates (NAMP), number of activities that member successfully finished (NAMSF), number of online discussions that member participated (NODMP), number of activities the member fails (NAMF). Then, we use fuzzy approach to compute a voting score for the member. We present two fuzzy based voting systems (called FPVS1 and FPVS2). The simulation results show that when NAMP, NAMSF and NODMP are high, the voting score is high, but with increasing of the NAMF, the VS is decreased. Comparing the complexity of FPVS1 and FPVS2, the FPVS2 is more complex than FPVS1, but FPVS2 can select better peers for the collaborative work.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76553831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation and comparison of two intelligent systems based on fuzzy logic for actor selection in WSANs: effect of node density on actor selection 基于模糊逻辑的WSANs行为者选择智能系统的实现与比较:节点密度对行为者选择的影响
Pub Date : 2017-01-01 DOI: 10.1504/IJSSC.2017.10010832
Donald Elmazi, Miralda Cuka, Elis Kulla, Tetsuya Oda, Makoto Ikeda, L. Barolli
Wireless sensor and actor network (WSAN) is formed by the collaboration of micro-sensor and actor nodes. Whenever there is any special event, i.e., fire, earthquake, flood or enemy attack in the network, sensor nodes are responsible to sense it and send information towards an actor node. The actor node is responsible to take prompt decision and react accordingly. In this work, we propose and implement two fuzzy based actor selection systems (FBASS): FBASS1 and FBASS2 for actor selection in WSANs. The systems decide whether the actor will be selected for the required job or not based on data supplied by sensors and actual actor condition. We evaluated the proposed system by computer simulations. Comparing FBASS1 with FBASS2, the FBASS2 is more complex than FBASS1, because it has more rules in fuzzy rule base (FRB). By increasing node density, the FBASS2 can save better the energy.
无线传感器与行动者网络(WSAN)是由微传感器与行动者节点协同形成的网络。每当网络中发生火灾、地震、洪水或敌人攻击等特殊事件时,传感器节点负责感知并向行为节点发送信息。参与者节点负责迅速做出决定并做出相应的反应。在这项工作中,我们提出并实现了两个基于模糊的行动者选择系统(FBASS): FBASS1和FBASS2。系统根据传感器提供的数据和操作者的实际情况来决定是否选择操作者进行所需的作业。我们通过计算机模拟对所提出的系统进行了评估。比较FBASS1和FBASS2, FBASS2比FBASS1更复杂,因为FBASS1在模糊规则库(FRB)中包含更多的规则。通过增加节点密度,FBASS2可以更好地节省能量。
{"title":"Implementation and comparison of two intelligent systems based on fuzzy logic for actor selection in WSANs: effect of node density on actor selection","authors":"Donald Elmazi, Miralda Cuka, Elis Kulla, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1504/IJSSC.2017.10010832","DOIUrl":"https://doi.org/10.1504/IJSSC.2017.10010832","url":null,"abstract":"Wireless sensor and actor network (WSAN) is formed by the collaboration of micro-sensor and actor nodes. Whenever there is any special event, i.e., fire, earthquake, flood or enemy attack in the network, sensor nodes are responsible to sense it and send information towards an actor node. The actor node is responsible to take prompt decision and react accordingly. In this work, we propose and implement two fuzzy based actor selection systems (FBASS): FBASS1 and FBASS2 for actor selection in WSANs. The systems decide whether the actor will be selected for the required job or not based on data supplied by sensors and actual actor condition. We evaluated the proposed system by computer simulations. Comparing FBASS1 with FBASS2, the FBASS2 is more complex than FBASS1, because it has more rules in fuzzy rule base (FRB). By increasing node density, the FBASS2 can save better the energy.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89549874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Space-Based and Situated Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1