首页 > 最新文献

2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

英文 中文
IoT Standardization - The Approach in the Field of Data Protection as a Model for Ensuring Compliance of IoT Applications? 物联网标准化——数据保护领域的方法作为确保物联网应用合规性的模型?
K. Stuurman, Irene Kamara
The IoT applications will have an unprecedented influence on our private and professional lives. IoT promises, next to advanced machine-to-machine interaction, delivery of a next level of man-to-machine communication based on a smart, global communications infrastructure. One of the characteristics setting the IoT apart is a broad range of critical issues that can be associated with the use, and hence development of IoT applications. Next to data protection and security issues, this could include ethics, responsibility, liability, insurance, accountability and autonomy, to issues relating to conditions for market access. To the extent standards play a role, it is of utmost importance to choose the right regulatory model, given the fundamental issues at stake. The existing New Approach, being the dominant regulatory model for applying standards in relation to EU product legislation, has been criticized for lacking legitimacy of standard-setting procedures and lacking judicial review. The global nature of IoT standardization will put further pressure on the role of the European Standardization System and give rise to further concerns regarding these issues. Recently, the General Data Protection Regulation, a legal instrument to regulate the processing of personal data, was adopted in the European Union. The Regulation endorses standardization, both explicitly and implicitly, but in a different way from the New Approach model. One could speak of a 'data protection model' in that respect, given the 'sensitive' nature of data protection on the one hand and ethics, liability, accountability issues in the IoT context on the other, the new model might prove to be appropriate for using standards in regulating those critical issues as well.
物联网应用将对我们的私人生活和职业生活产生前所未有的影响。物联网承诺,除了先进的机器对机器交互之外,还将提供基于智能全球通信基础设施的下一级人机通信。使物联网与众不同的特征之一是与物联网应用的使用和开发相关的广泛关键问题。除了数据保护和安全问题,这可能包括道德、责任、责任、保险、问责制和自主权,以及与市场准入条件有关的问题。就标准发挥作用的程度而言,选择正确的监管模式至关重要,因为这涉及到一些根本问题。现有的新方法作为欧盟产品立法中应用标准的主要监管模式,因缺乏标准制定程序的合法性和缺乏司法审查而受到批评。物联网标准化的全球性将对欧洲标准化体系的作用施加进一步的压力,并引起对这些问题的进一步关注。最近,欧盟通过了《一般数据保护条例》,这是一项规范个人数据处理的法律文书。《条例》明确和含蓄地支持标准化,但方式不同于《新办法》模式。在这方面,人们可以称之为“数据保护模型”,一方面考虑到数据保护的“敏感”性质,另一方面考虑到物联网背景下的道德、责任、问责问题,新模型可能被证明适用于使用标准来规范这些关键问题。
{"title":"IoT Standardization - The Approach in the Field of Data Protection as a Model for Ensuring Compliance of IoT Applications?","authors":"K. Stuurman, Irene Kamara","doi":"10.1109/W-FiCloud.2016.74","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.74","url":null,"abstract":"The IoT applications will have an unprecedented influence on our private and professional lives. IoT promises, next to advanced machine-to-machine interaction, delivery of a next level of man-to-machine communication based on a smart, global communications infrastructure. One of the characteristics setting the IoT apart is a broad range of critical issues that can be associated with the use, and hence development of IoT applications. Next to data protection and security issues, this could include ethics, responsibility, liability, insurance, accountability and autonomy, to issues relating to conditions for market access. To the extent standards play a role, it is of utmost importance to choose the right regulatory model, given the fundamental issues at stake. The existing New Approach, being the dominant regulatory model for applying standards in relation to EU product legislation, has been criticized for lacking legitimacy of standard-setting procedures and lacking judicial review. The global nature of IoT standardization will put further pressure on the role of the European Standardization System and give rise to further concerns regarding these issues. Recently, the General Data Protection Regulation, a legal instrument to regulate the processing of personal data, was adopted in the European Union. The Regulation endorses standardization, both explicitly and implicitly, but in a different way from the New Approach model. One could speak of a 'data protection model' in that respect, given the 'sensitive' nature of data protection on the one hand and ethics, liability, accountability issues in the IoT context on the other, the new model might prove to be appropriate for using standards in regulating those critical issues as well.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey on Network Security Monitoring Systems 网络安全监控系统综述
Ibrahim Ghafir, Václav Přenosil, Jakub Svoboda, Mohammad Hammoudeh
Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time, productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. There are several approaches to network security monitoring. This paper provides the readers with a critical review of the prominent implementations of the current network monitoring approaches.
网络监控是一项困难且要求很高的任务,是网络管理员工作的重要组成部分。网络管理员一直在为维护网络的正常运行而努力。如果网络宕机,哪怕只是一小段时间,公司内部的生产力就会下降,公共服务部门提供基本服务的能力也会受到影响。网络安全监控有几种方法。本文为读者提供了对当前网络监控方法的重要实现的批判性回顾。
{"title":"A Survey on Network Security Monitoring Systems","authors":"Ibrahim Ghafir, Václav Přenosil, Jakub Svoboda, Mohammad Hammoudeh","doi":"10.1109/W-FiCloud.2016.30","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.30","url":null,"abstract":"Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time, productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. There are several approaches to network security monitoring. This paper provides the readers with a critical review of the prominent implementations of the current network monitoring approaches.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124017853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A Social Network Analysis of Tweets during the Gaza War, Summer 2014 2014年夏季,加沙战争期间推文的社会网络分析
W. A. Sarraj, Khalid M. Kahloot, Ashraf Y. A. Maghari, Mahmoud M. Abu-Ghosh
The platforms of social Networks play a growing role in influencing the public opinion. In addition, social Networks can describe the reaction of communities towards the reigning conflicts in the world. As a matter of fact, analysis of Social Networks has been used widely for a better understanding how communities address prominent and influential events. As for Twitter, it has used as a platform for exchanging opinions and showing support for either of parties of a conflict. For instance, Twitter witnessed trending of hashtags such as #Gazawar #GazaUnderAttack or #IsraelUnderFire. In this paper, we discuss the role of Social Networks, particularly Twitter, in influencing the Israeli war on Gaza Strip - Palestine during summer 2014. This study shows the mode of public opinion and its reflections on what is trending on Twitter. We construct a dataset drawn from Social Networks sources to examine the behavior of Israeli, Palestinian and foreigner universe. Moreover, we analyze the dataset including tweets as reactions to Gaza War 2014. The results illustrate the important insight of the Social Networks. As regards influencing, it affects perspective of the international universe as well how they address the conflict.
社交网络平台在影响公众舆论方面发挥着越来越大的作用。此外,社交网络可以描述社区对世界上主要冲突的反应。事实上,社会网络的分析已经被广泛用于更好地理解社区如何处理突出和有影响力的事件。至于推特,它被用作交换意见和支持冲突双方的平台。例如,推特上出现了#加沙#加沙受到攻击或#以色列受到攻击等话题标签。在本文中,我们讨论了社交网络的作用,特别是推特,在2014年夏天影响以色列对加沙地带-巴勒斯坦的战争。这项研究显示了公众舆论的模式及其对Twitter上流行趋势的反映。我们构建了一个从社交网络资源中提取的数据集,以检查以色列人,巴勒斯坦人和外国人的行为。此外,我们分析了包含tweet作为对2014年加沙战争反应的数据集。这些结果说明了社交网络的重要见解。至于影响,它影响到对国际世界的看法以及他们如何处理冲突。
{"title":"A Social Network Analysis of Tweets during the Gaza War, Summer 2014","authors":"W. A. Sarraj, Khalid M. Kahloot, Ashraf Y. A. Maghari, Mahmoud M. Abu-Ghosh","doi":"10.1109/W-FiCloud.2016.54","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.54","url":null,"abstract":"The platforms of social Networks play a growing role in influencing the public opinion. In addition, social Networks can describe the reaction of communities towards the reigning conflicts in the world. As a matter of fact, analysis of Social Networks has been used widely for a better understanding how communities address prominent and influential events. As for Twitter, it has used as a platform for exchanging opinions and showing support for either of parties of a conflict. For instance, Twitter witnessed trending of hashtags such as #Gazawar #GazaUnderAttack or #IsraelUnderFire. In this paper, we discuss the role of Social Networks, particularly Twitter, in influencing the Israeli war on Gaza Strip - Palestine during summer 2014. This study shows the mode of public opinion and its reflections on what is trending on Twitter. We construct a dataset drawn from Social Networks sources to examine the behavior of Israeli, Palestinian and foreigner universe. Moreover, we analyze the dataset including tweets as reactions to Gaza War 2014. The results illustrate the important insight of the Social Networks. As regards influencing, it affects perspective of the international universe as well how they address the conflict.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114895917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spar(k)ql: SPARQL Evaluation Method on Spark GraphX Spar(k)ql: Spark GraphX上的SPARQL评估方法
G. Gombos, G. Rácz, A. Kiss
RDF is a flexible data representation model. Due to its flexibility and simplicity it has become a popular framework, hence the amount of RDF data is increasing fast. Querying massive amount of data is a serious challenge in general and it is true for RDF data as well. In this paper we investigating how to evaluate SPARQL queries on a distributed system. We propose a novel method for evaluating SPARQL queries using the GraphX graph analytical tool. GraphX is built on the top of Spark that is an in-memory data processing system for distributive computation. With this tool we managed to utilize the graph-like structure of the RDF statements which are in form of subject-predicate-object.
RDF是一种灵活的数据表示模型。由于它的灵活性和简单性,它已经成为一个流行的框架,因此RDF数据的数量正在快速增长。通常,查询大量数据是一项严峻的挑战,对于RDF数据也是如此。在本文中,我们研究了如何评估分布式系统上的SPARQL查询。我们提出了一种使用GraphX图分析工具评估SPARQL查询的新方法。GraphX是建立在Spark之上的,Spark是一个用于分布式计算的内存数据处理系统。通过这个工具,我们成功地利用了主体-谓词-对象形式的RDF语句的类图结构。
{"title":"Spar(k)ql: SPARQL Evaluation Method on Spark GraphX","authors":"G. Gombos, G. Rácz, A. Kiss","doi":"10.1109/W-FiCloud.2016.48","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.48","url":null,"abstract":"RDF is a flexible data representation model. Due to its flexibility and simplicity it has become a popular framework, hence the amount of RDF data is increasing fast. Querying massive amount of data is a serious challenge in general and it is true for RDF data as well. In this paper we investigating how to evaluate SPARQL queries on a distributed system. We propose a novel method for evaluating SPARQL queries using the GraphX graph analytical tool. GraphX is built on the top of Spark that is an in-memory data processing system for distributive computation. With this tool we managed to utilize the graph-like structure of the RDF statements which are in form of subject-predicate-object.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors 一种基于资源受限体面积传感器的物联网认证与密钥协议
M. Iqbal, M. Bayoumi
Secrecy and integrity of communication, as well as the authenticity of messages must be ensured by the security primitives and is critical element in Internet of Things (IoT). Devices in IoT applications such as smart healthcare applications deal with sensitive data of our health and daily lives and thus can execute malicious actuating commands with serious safety consequences. Therefore, it is important to ensure secure communication channel establishment among the medical sensors or devices and the remote servers. In this work, we propose a novel authentication and key agreement protocol that is lightweight for resource-constrained sensors and suitable to protect sensitive health related data in the context of IoT. The protocol is based on cooperation by offloading the heavy cryptographic functions of resource-constrained sensors to the trustful neighboring sensors. This trust verification is ensured by finding the data correlations from the data of embedded accelerometers in the smartphone acting as gateway and the sensors installed on the body. Security analysis and performance evaluation results show that the proposed protocol is secure and is energy efficient.
通信的保密性和完整性以及消息的真实性必须由安全原语来确保,这是物联网(IoT)的关键要素。智能医疗保健等物联网应用中的设备处理我们健康和日常生活的敏感数据,因此可能会执行恶意执行命令,造成严重的安全后果。因此,确保医疗传感器或设备与远程服务器之间建立安全的通信通道至关重要。在这项工作中,我们提出了一种新的身份验证和密钥协议,该协议对于资源受限的传感器来说是轻量级的,适合于保护物联网环境中敏感的健康相关数据。该协议基于协作,将资源受限传感器繁重的加密功能卸载给可信的相邻传感器。这种信任验证是通过从作为网关的智能手机中嵌入的加速度计和安装在身体上的传感器的数据中找到数据相关性来确保的。安全性分析和性能评估结果表明,该协议安全、节能。
{"title":"A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors","authors":"M. Iqbal, M. Bayoumi","doi":"10.1109/W-FiCloud.2016.70","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.70","url":null,"abstract":"Secrecy and integrity of communication, as well as the authenticity of messages must be ensured by the security primitives and is critical element in Internet of Things (IoT). Devices in IoT applications such as smart healthcare applications deal with sensitive data of our health and daily lives and thus can execute malicious actuating commands with serious safety consequences. Therefore, it is important to ensure secure communication channel establishment among the medical sensors or devices and the remote servers. In this work, we propose a novel authentication and key agreement protocol that is lightweight for resource-constrained sensors and suitable to protect sensitive health related data in the context of IoT. The protocol is based on cooperation by offloading the heavy cryptographic functions of resource-constrained sensors to the trustful neighboring sensors. This trust verification is ensured by finding the data correlations from the data of embedded accelerometers in the smartphone acting as gateway and the sensors installed on the body. Security analysis and performance evaluation results show that the proposed protocol is secure and is energy efficient.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123702805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Correlation of Weather and Moods of the Italy Residents through an Analysis of Their Tweets 从推特分析意大利居民天气与情绪的相关性
G. Modoni, Davide Tosi
In the last years there has been a strong interest in the aggregated data extracted from social networks such as Twitter, Facebook or Instagram, whose contents provide streams of information about the users' behavior. Analyzing these large data sets reveals trends that can be utilized in various fields. An interesting field of application of these data is presented in this paper, which illustrates an approach to perform a psycholinguistic analysis of the Twitter contents written in Italian language by Italy residents. In this way the predisposition of the latter to mental disorders such as the depression can be in particular measured. Moreover, the results of this analysis can be then correlated with the conditions of the weather in order to understand whether the correlation between weather and health is a common cliché or it can be demonstrated in some way e.g. through a mathematical relationship.
在过去的几年里,人们对从Twitter、Facebook或Instagram等社交网络中提取的汇总数据产生了浓厚的兴趣,这些数据的内容提供了有关用户行为的信息流。分析这些大型数据集揭示了可以在各个领域使用的趋势。本文提出了这些数据的一个有趣的应用领域,这说明了一种方法来执行意大利居民用意大利语写的推特内容的心理语言学分析。通过这种方式,后者对精神障碍(如抑郁症)的倾向可以特别衡量。此外,这种分析的结果可以与天气状况相关联,以便了解天气与健康之间的相关性是一种常见的陈词滥调,还是可以通过某种方式(例如通过数学关系)来证明。
{"title":"Correlation of Weather and Moods of the Italy Residents through an Analysis of Their Tweets","authors":"G. Modoni, Davide Tosi","doi":"10.1109/W-FiCloud.2016.53","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.53","url":null,"abstract":"In the last years there has been a strong interest in the aggregated data extracted from social networks such as Twitter, Facebook or Instagram, whose contents provide streams of information about the users' behavior. Analyzing these large data sets reveals trends that can be utilized in various fields. An interesting field of application of these data is presented in this paper, which illustrates an approach to perform a psycholinguistic analysis of the Twitter contents written in Italian language by Italy residents. In this way the predisposition of the latter to mental disorders such as the depression can be in particular measured. Moreover, the results of this analysis can be then correlated with the conditions of the weather in order to understand whether the correlation between weather and health is a common cliché or it can be demonstrated in some way e.g. through a mathematical relationship.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimised QoS-Aware DBA Mechanisms in XG-PON for Upstream Traffic in LTE Backhaul LTE回程上行流量XG-PON中qos感知DBA机制的优化
Jerome A. Arokkiam, Kenneth N. Brown, C. Sreenan
Passive Optical Networks (PON) are viewed as an attractive choice to provide flexible and cost-efficient backhaul for Long Term Evolution (LTE) cellular base stations (eNB). PONs, such as the 10-Gigabit capable PON (XG-PON), use a Dynamic Bandwidth Allocation (DBA) mechanism to multiplex the shared upstream medium between competing sending nodes. Due to the complex definitions of QoS for DBA in XG-PON, it is a challenge for the XG-PON to respect the Quality of Service (QoS) requirements for different aggregated upstream applications in the LTE backhaul, in particular voice, live video and best-effort Internet traffic. In this paper, we first evaluate two recent XG-PON-standard-compliant DBAs - XGIANT and Efficient Bandwidth Utilisation (EBU) - for mean queuing-delay performance, with regard to priority and fairness, when the realistically-generated upstream voice, video and best-effort applications are aggregated at the evolved Node B (eNB) in LTE. We show that neither XGIANT nor EBU satisfy the priority and fairness requirements for mean queuing-delay. We propose and evaluate two optimised DBAs - Deficit XGIANT (XGIANT-D) and Proportional XGIANT (XGIANT-P). Our evaluations of the optimised DBAs, in the ns-3 network simulator, show that both XGIANT-D and XGIANT-P are able to ensure strictly prioritised, low and fair mean-queuing-delays for eNB-aggregated voice, video and best-effort traffic in two loaded conditions in XG-PON upstream. XGIANT-D and XGIANT-P, when compared with XGIANT and EBU, also ensure lower packet losses for eNB-aggregated upstream traffic in the XG-PON-based LTE backhaul.
无源光网络(PON)被认为是为长期演进(LTE)蜂窝基站(eNB)提供灵活且经济高效的回程的一种有吸引力的选择。PON,例如具有10千兆能力的PON (XG-PON),使用动态带宽分配(DBA)机制在竞争发送节点之间复用共享的上游介质。由于XG-PON中DBA的QoS定义复杂,因此对XG-PON来说,尊重LTE回程中不同聚合上游应用的服务质量(QoS)要求是一个挑战,特别是语音、实时视频和尽力而为的互联网流量。在本文中,我们首先评估了两个最新的符合xg - pon标准的dba——XGIANT和高效带宽利用率(EBU)——在优先级和公平性方面的平均排队延迟性能,当实际生成的上游语音、视频和尽力而为的应用在演进的LTE节点B (eNB)上聚合时。我们证明XGIANT和EBU都不满足平均排队延迟的优先级和公平性要求。我们提出并评估了两种优化的dba -赤字XGIANT (XGIANT- d)和比例XGIANT (XGIANT- p)。我们在ns-3网络模拟器中对优化后的dba进行的评估表明,XGIANT-D和XGIANT-P都能够确保在XG-PON上游的两种负载条件下,对enb聚合的语音、视频和尽力而为流量具有严格的优先级、低且公平的平均排队延迟。与XGIANT和EBU相比,XGIANT- d和XGIANT- p还确保在基于xg - pon的LTE回程中,enb聚合的上游流量的丢包率更低。
{"title":"Optimised QoS-Aware DBA Mechanisms in XG-PON for Upstream Traffic in LTE Backhaul","authors":"Jerome A. Arokkiam, Kenneth N. Brown, C. Sreenan","doi":"10.1109/W-FiCloud.2016.79","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.79","url":null,"abstract":"Passive Optical Networks (PON) are viewed as an attractive choice to provide flexible and cost-efficient backhaul for Long Term Evolution (LTE) cellular base stations (eNB). PONs, such as the 10-Gigabit capable PON (XG-PON), use a Dynamic Bandwidth Allocation (DBA) mechanism to multiplex the shared upstream medium between competing sending nodes. Due to the complex definitions of QoS for DBA in XG-PON, it is a challenge for the XG-PON to respect the Quality of Service (QoS) requirements for different aggregated upstream applications in the LTE backhaul, in particular voice, live video and best-effort Internet traffic. In this paper, we first evaluate two recent XG-PON-standard-compliant DBAs - XGIANT and Efficient Bandwidth Utilisation (EBU) - for mean queuing-delay performance, with regard to priority and fairness, when the realistically-generated upstream voice, video and best-effort applications are aggregated at the evolved Node B (eNB) in LTE. We show that neither XGIANT nor EBU satisfy the priority and fairness requirements for mean queuing-delay. We propose and evaluate two optimised DBAs - Deficit XGIANT (XGIANT-D) and Proportional XGIANT (XGIANT-P). Our evaluations of the optimised DBAs, in the ns-3 network simulator, show that both XGIANT-D and XGIANT-P are able to ensure strictly prioritised, low and fair mean-queuing-delays for eNB-aggregated voice, video and best-effort traffic in two loaded conditions in XG-PON upstream. XGIANT-D and XGIANT-P, when compared with XGIANT and EBU, also ensure lower packet losses for eNB-aggregated upstream traffic in the XG-PON-based LTE backhaul.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Microblogging Hash Tag Recommendation System Based on Semantic TF-IDF: Twitter Use Case 基于语义TF-IDF的微博哈希标签推荐系统:Twitter用例
M. S. Tajbakhsh, J. Bagherzadeh
Limitation in the number of characters in microblogging systems, such as Twitter, forces users to use various terms for the same meaning, object, or concept. Sometimes the same term is used in a shorter form (e.g. #friend and #frnd) in a tweet. This problem makes finding similarities between such tags and their corresponding tweets harder. The classical text mining methods cannot be used efficiently in the short tweets. Thus tweets similarity and subsequently tag recommendation, as one of the problems in microblogging social networks, needs a new method with higher efficiency. In this paper we have defined a new semantic based method to find similarities among short messages. We have modeled each short message as a semantic vector which can be used along with any similarity method such as cosine similarity. Then we evaluated the accuracy of the new semantic similarity based tag recommendation system using various semantic based algorithms and compare their results. The semantic based algorithms used are: Shortest Path, Wu & Palmer, Lin, JiangConrath, Resnik, Lesk, LeacockChodorow, and Hirst-StOnge. Results are evaluated using 8396744 real English tweets and show around 6 times improvement in accuracy over normal TF-IDF.
微博系统(如Twitter)中字符数量的限制迫使用户使用不同的术语来表示相同的含义、对象或概念。有时,同样的词语会以更短的形式出现在tweet中(例如#friend和#frnd)。这个问题使得在这些标签和它们对应的tweet之间寻找相似性变得更加困难。传统的文本挖掘方法无法有效地应用于短推文中。因此,作为微博社交网络中的问题之一,推文相似度以及随后的标签推荐需要一种效率更高的新方法。本文定义了一种新的基于语义的短信相似度查找方法。我们将每个短消息建模为一个语义向量,它可以与任何相似度方法(如余弦相似度)一起使用。然后,我们使用各种基于语义的算法来评估新的基于语义相似度的标签推荐系统的准确性,并比较它们的结果。所使用的基于语义的算法有:最短路径、Wu & Palmer、Lin、JiangConrath、Resnik、Lesk、LeacockChodorow和hirst - stone。使用8396744条真实英语tweet对结果进行评估,结果显示,与正常TF-IDF相比,准确度提高了约6倍。
{"title":"Microblogging Hash Tag Recommendation System Based on Semantic TF-IDF: Twitter Use Case","authors":"M. S. Tajbakhsh, J. Bagherzadeh","doi":"10.1109/W-FiCloud.2016.59","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.59","url":null,"abstract":"Limitation in the number of characters in microblogging systems, such as Twitter, forces users to use various terms for the same meaning, object, or concept. Sometimes the same term is used in a shorter form (e.g. #friend and #frnd) in a tweet. This problem makes finding similarities between such tags and their corresponding tweets harder. The classical text mining methods cannot be used efficiently in the short tweets. Thus tweets similarity and subsequently tag recommendation, as one of the problems in microblogging social networks, needs a new method with higher efficiency. In this paper we have defined a new semantic based method to find similarities among short messages. We have modeled each short message as a semantic vector which can be used along with any similarity method such as cosine similarity. Then we evaluated the accuracy of the new semantic similarity based tag recommendation system using various semantic based algorithms and compare their results. The semantic based algorithms used are: Shortest Path, Wu & Palmer, Lin, JiangConrath, Resnik, Lesk, LeacockChodorow, and Hirst-StOnge. Results are evaluated using 8396744 real English tweets and show around 6 times improvement in accuracy over normal TF-IDF.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
AffinityFinder: A System for Deriving Hidden Affinity Relationships on Twitter Utilizing Sentiment Analysis AffinityFinder:一个利用情感分析在Twitter上派生隐藏亲和关系的系统
A. Rezgui, Daniel Fahey, Ian Smith
Twitter is one of the largest and most popular social networking sites. While it has many interesting features, Twitter has no direct way to determine the relationship status between users. For example, unlike other social networks (e.g., Facebook), Twitter does not have any features for marking users as friends. In this paper, we present AffinityFinder, a system for automatically inferring potential friendship relationships (in terms of affinity) amongst Twitter users. The system collects and analyzes tweets to derive relationship scores that reflect affinity degrees amongst Twitter users. We implemented our tool using the TextBlob Python text processing library and the MongoDB database. Our evaluation shows that the system is able to derive potential friendship relationships with high accuracy. This system could provide useful data both to users and companies.
Twitter是最大、最受欢迎的社交网站之一。虽然Twitter有许多有趣的功能,但它没有直接的方法来确定用户之间的关系状态。例如,与其他社交网络(如Facebook)不同,Twitter没有任何将用户标记为好友的功能。在本文中,我们提出AffinityFinder,这是一个自动推断Twitter用户之间潜在友谊关系(根据亲和力)的系统。该系统收集并分析推文,得出反映推特用户之间亲和程度的关系分数。我们使用TextBlob Python文本处理库和MongoDB数据库实现了我们的工具。我们的评估表明,该系统能够以很高的准确性推导出潜在的友谊关系。该系统可以为用户和企业提供有用的数据。
{"title":"AffinityFinder: A System for Deriving Hidden Affinity Relationships on Twitter Utilizing Sentiment Analysis","authors":"A. Rezgui, Daniel Fahey, Ian Smith","doi":"10.1109/W-FiCloud.2016.52","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.52","url":null,"abstract":"Twitter is one of the largest and most popular social networking sites. While it has many interesting features, Twitter has no direct way to determine the relationship status between users. For example, unlike other social networks (e.g., Facebook), Twitter does not have any features for marking users as friends. In this paper, we present AffinityFinder, a system for automatically inferring potential friendship relationships (in terms of affinity) amongst Twitter users. The system collects and analyzes tweets to derive relationship scores that reflect affinity degrees amongst Twitter users. We implemented our tool using the TextBlob Python text processing library and the MongoDB database. Our evaluation shows that the system is able to derive potential friendship relationships with high accuracy. This system could provide useful data both to users and companies.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Provable Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol 可证明的安全无配对无证书认证密钥协议
A. Farouk, M. Fouad
Security and efficiency are the main grid authentication protocols objectives. Practical efficient certificate-less public key cryptography-based authentication protocol is widely acknowledged as a challenging issue in grid computing environment. Unfortunately, certificate-less authenticated key agreement protocols rely on bilinear pairing that is extremely computational expensive. A recently published protocol claims meeting some attacks, however, there are some shortcomings in such a protocol. In this paper, such a competing protocol is mathematically criticized. Then, a secure and efficient grid pairing-free certificate-less two-party authenticated key agreement protocol is proposed for grid computing. Finally, the proposed protocol is mathematically proved as secure and efficient in the Lippold model, a very strong security model, under the gap Diffie-Hellman assumption.
安全性和效率是网格身份验证协议的主要目标。在网格计算环境下,高效实用的无证书公钥加密认证协议是一个具有挑战性的问题。不幸的是,不需要证书的身份验证密钥协议依赖于双线性配对,计算成本非常高。最近发布的一个协议声称可以应对一些攻击,然而,这种协议存在一些缺点。本文对这种竞争协议进行了数学上的批判。在此基础上,提出了一种安全高效的网格无配对、无证书的双方认证密钥协议。最后,在间隙Diffie-Hellman假设下,用数学方法证明了该协议在Lippold模型(一个非常强的安全模型)下是安全有效的。
{"title":"Provable Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol","authors":"A. Farouk, M. Fouad","doi":"10.1109/W-FiCloud.2016.32","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.32","url":null,"abstract":"Security and efficiency are the main grid authentication protocols objectives. Practical efficient certificate-less public key cryptography-based authentication protocol is widely acknowledged as a challenging issue in grid computing environment. Unfortunately, certificate-less authenticated key agreement protocols rely on bilinear pairing that is extremely computational expensive. A recently published protocol claims meeting some attacks, however, there are some shortcomings in such a protocol. In this paper, such a competing protocol is mathematically criticized. Then, a secure and efficient grid pairing-free certificate-less two-party authenticated key agreement protocol is proposed for grid computing. Finally, the proposed protocol is mathematically proved as secure and efficient in the Lippold model, a very strong security model, under the gap Diffie-Hellman assumption.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1