首页 > 最新文献

Journal of Internet Technology最新文献

英文 中文
A Privacy-preserving Multi-dimensional Data Aggregation Scheme with Forward Security in Smart Grid 智能电网中具有前向安全保护隐私的多维数据聚合方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.3966/160792642021012201009
Guojun Wang, Xueya Xia, S. Ji, C. Lai
Smart grid is a new generation of power system on the strength of rapid-speed bidirectional communication network. In smart grid, the electricity data from users needs to be collected to realize efficient energy management, which may reveal their privacy. In the past period of time, data aggregation protocols have been extensively studied to solve this problem. However, these protocols treat users’ electricity data as single-dimensional data, which is inconsistent with reality. Moreover, key leakage is also a serious security threat in the smart grid. Therefore, we propose a multi-dimensional data aggregation protocol with forward security. In this protocol, a cube data structure is designed to represent the multi-dimensional electricity consumption data of users in a region over multiple time periods, realizing the dual aggregation of electricity data both in time and space. In addition, security analysis shows that the proposed protocol satisfies multiple security properties and performance analysis shows that our protocol is more superior in the smart grid environment.
智能电网是以高速双向通信网络为基础的新一代电力系统。在智能电网中,为了实现高效的能源管理,需要收集用户的用电数据,这可能会泄露用户的隐私。在过去的一段时间里,为了解决这个问题,数据聚合协议得到了广泛的研究。然而,这些协议将用户用电数据视为一维数据,这与现实不符。此外,密钥泄露也是智能电网的一个严重安全威胁。为此,我们提出了一种具有前向安全性的多维数据聚合协议。在该协议中,设计了多维数据结构来表示一个地区用户在多个时间段内的多维用电量数据,实现了用电量数据在时间和空间上的双重聚合。此外,安全性分析表明,该协议满足多种安全属性,性能分析表明,该协议在智能电网环境下更加优越。
{"title":"A Privacy-preserving Multi-dimensional Data Aggregation Scheme with Forward Security in Smart Grid","authors":"Guojun Wang, Xueya Xia, S. Ji, C. Lai","doi":"10.3966/160792642021012201009","DOIUrl":"https://doi.org/10.3966/160792642021012201009","url":null,"abstract":"Smart grid is a new generation of power system on the strength of rapid-speed bidirectional communication network. In smart grid, the electricity data from users needs to be collected to realize efficient energy management, which may reveal their privacy. In the past period of time, data aggregation protocols have been extensively studied to solve this problem. However, these protocols treat users’ electricity data as single-dimensional data, which is inconsistent with reality. Moreover, key leakage is also a serious security threat in the smart grid. Therefore, we propose a multi-dimensional data aggregation protocol with forward security. In this protocol, a cube data structure is designed to represent the multi-dimensional electricity consumption data of users in a region over multiple time periods, realizing the dual aggregation of electricity data both in time and space. In addition, security analysis shows that the proposed protocol satisfies multiple security properties and performance analysis shows that our protocol is more superior in the smart grid environment.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"91-99"},"PeriodicalIF":1.6,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure federated learning with efficient communication in vehicle network 车辆网络中具有高效通信的安全联合学习
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-01 DOI: 10.3966/160792642020122107022
Yinglong Li, Zhenjiang Zhang, Zhiyuan Zhang, Yi-Chih Kao
Internet of Vehicles (IoV) generates large amounts of data at the network edge. Machine learning models are often built on these data, to enable the detection, classification, and prediction of traffic events. Due to network bandwidth, storage, and especially privacy concerns, it is often impossible to send all the IoV data to the edge server for centralized model training . Federated learning is a promising paradigm for distributed machine learning, which enables edge nodes to train models locally. As vehicle usually has unreliable and relatively slow network connection, reducing the communication overhead is importance. In this paper, we propose a secure federated learning with efficient communication (SFLEC) scheme in vehicle network. To protect the privacy of local update, we upload the updated parameters of the model with local differential privacy. We further propose a client selection approach that identifies relevant updates trained by vehicles and prevents irrelevant updates from being uploaded for reduced network footprint to achieve efficient communication. Then we prove the loss function of the trained FL in our scheme exits a theoretical convergence. Finally, we evaluate our scheme on two datasets and compare with basic FL. Our proposed scheme improves the communication efficiency, while preserves the data privacy.
车联网(IoV)在网络边缘生成大量数据。机器学习模型通常建立在这些数据之上,以实现交通事件的检测、分类和预测。由于网络带宽、存储,尤其是隐私问题,通常不可能将所有IoV数据发送到边缘服务器进行集中的模型训练。联合学习是分布式机器学习的一种很有前途的范例,它使边缘节点能够在本地训练模型。由于车辆通常具有不可靠且相对较慢的网络连接,因此减少通信开销非常重要。在本文中,我们提出了一种在车辆网络中具有高效通信的安全联合学习(SFLEC)方案。为了保护局部更新的隐私,我们上传了具有局部差分隐私的模型的更新参数。我们进一步提出了一种客户端选择方法,该方法可以识别车辆训练的相关更新,并防止上传不相关的更新,以减少网络占用,从而实现高效通信。然后我们证明了在我们的方案中训练的FL的损失函数存在理论收敛性。最后,我们在两个数据集上对我们的方案进行了评估,并与基本FL进行了比较。我们提出的方案提高了通信效率,同时保留了数据隐私。
{"title":"Secure federated learning with efficient communication in vehicle network","authors":"Yinglong Li, Zhenjiang Zhang, Zhiyuan Zhang, Yi-Chih Kao","doi":"10.3966/160792642020122107022","DOIUrl":"https://doi.org/10.3966/160792642020122107022","url":null,"abstract":"Internet of Vehicles (IoV) generates large amounts of data at the network edge. Machine learning models are often built on these data, to enable the detection, classification, and prediction of traffic events. Due to network bandwidth, storage, and especially privacy concerns, it is often impossible to send all the IoV data to the edge server for centralized model training . Federated learning is a promising paradigm for distributed machine learning, which enables edge nodes to train models locally. As vehicle usually has unreliable and relatively slow network connection, reducing the communication overhead is importance. In this paper, we propose a secure federated learning with efficient communication (SFLEC) scheme in vehicle network. To protect the privacy of local update, we upload the updated parameters of the model with local differential privacy. We further propose a client selection approach that identifies relevant updates trained by vehicles and prevents irrelevant updates from being uploaded for reduced network footprint to achieve efficient communication. Then we prove the loss function of the trained FL in our scheme exits a theoretical convergence. Finally, we evaluate our scheme on two datasets and compare with basic FL. Our proposed scheme improves the communication efficiency, while preserves the data privacy.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"2075-2084"},"PeriodicalIF":1.6,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47602368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reinforcement learning based computation-aware mobility management in ultra dense networks 超密集网络中基于强化学习的计算感知移动性管理
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-11-01 DOI: 10.3966/160792642020112106019
Ziyue Zhang, Jie Gong, Xiang Chen, Terng-Yin Hsu
Computation-aware delay optimal mobility management (MM) is an important problem in ultra-dense network (UDN) with mobile edge computing (MEC). Since the additional time delay caused by task computation is not taken into consideration, traditional radio access-oriented mobility management scheme cannot guarantee the overall delay performance of delay-sensitive user equipment (UE). In this paper, we propose a novel dynamic programming-based mobility management (DPMM) scheme to minimize the average delay under an energy consumption constraint. DPMM makes MM decisions using statistic information to handle the inaccurate state information. Cooperative data transmission is adopted to improve the delay performance. Simulation shows that the proposed DPMM scheme can achieve delay performance close to optimal and reduce the frequency of handover. However, the wireless link, computation resources and UE’s location in UDN environment is dynamic, which leads to information uncertainties. We further propose an MM scheme based on deep Q-network (DQN) to learn the system information from the environment. In this scheme, UE takes the current and past observed delay as experience, learning the optimal mobility management strategy through DQN training. Simulation shows that DQN-based MM can learn from experience and reduce the handover frequency to a certain degree.
计算感知延迟最优移动性管理(MM)是具有移动边缘计算(MEC)的超密集网络(UDN)中的一个重要问题。由于没有考虑任务计算引起的额外时延,传统的面向无线电接入的移动性管理方案无法保证时延敏感用户设备(UE)的整体时延性能。在本文中,我们提出了一种新的基于动态规划的移动性管理(DPMM)方案,以在能耗约束下最小化平均延迟。DPMM使用统计信息来处理不准确的状态信息,从而做出MM决策。采用协同数据传输的方式来提高延迟性能。仿真结果表明,所提出的DPMM方案可以实现接近最优的延迟性能,并降低切换频率。然而,UDN环境中的无线链路、计算资源和UE的位置是动态的,这导致了信息的不确定性。我们进一步提出了一种基于深度Q网络(DQN)的MM方案,以从环境中学习系统信息。在该方案中,UE以当前和过去观测到的延迟为经验,通过DQN训练学习最优的移动管理策略。仿真表明,基于DQN的MM可以借鉴经验,在一定程度上降低切换频率。
{"title":"Reinforcement learning based computation-aware mobility management in ultra dense networks","authors":"Ziyue Zhang, Jie Gong, Xiang Chen, Terng-Yin Hsu","doi":"10.3966/160792642020112106019","DOIUrl":"https://doi.org/10.3966/160792642020112106019","url":null,"abstract":"Computation-aware delay optimal mobility management (MM) is an important problem in ultra-dense network (UDN) with mobile edge computing (MEC). Since the additional time delay caused by task computation is not taken into consideration, traditional radio access-oriented mobility management scheme cannot guarantee the overall delay performance of delay-sensitive user equipment (UE). In this paper, we propose a novel dynamic programming-based mobility management (DPMM) scheme to minimize the average delay under an energy consumption constraint. DPMM makes MM decisions using statistic information to handle the inaccurate state information. Cooperative data transmission is adopted to improve the delay performance. Simulation shows that the proposed DPMM scheme can achieve delay performance close to optimal and reduce the frequency of handover. However, the wireless link, computation resources and UE’s location in UDN environment is dynamic, which leads to information uncertainties. We further propose an MM scheme based on deep Q-network (DQN) to learn the system information from the environment. In this scheme, UE takes the current and past observed delay as experience, learning the optimal mobility management strategy through DQN training. Simulation shows that DQN-based MM can learn from experience and reduce the handover frequency to a certain degree.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1785-1794"},"PeriodicalIF":1.6,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49649375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient peer-to-peer E-payment based on asynchronous dual blockchain 基于异步双区块链的高效对等电子支付
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-01 DOI: 10.3966/160792642020092105013
Wei-Chih Hong, Y. Chen, Ren-Kai Yang, Bo Li, Jung-San Lee
The number of people surfing over the e-commerce has reached to 1.6 billion, while the transaction scale has approached to 2,304 billion dollars at the end of 2017. No doubt that the security and efficiency of an e-payment system have attracted lots of attention in the field of e-commerce. That is the reason why the blockchain technique has been widely spread to most of the e-commerce mechanisms. A blockchain employment can be used to guarantee the properties of decentralization and non-tampering, which provide users a more stable and reliable trading process and prevent malicious behaviors, including double-spending and sybil attack. Nevertheless, the overhead of each transaction process is too heavy to realize immediate transaction. In this study, we aim to speed up the performance of transaction through an asynchronous dual blockchain. Moreover, we have exploited the reputation mechanism to reduce resource consumption. The new method has inherited the security from a blockchain technique. Specifically, the experimental results have demonstrated that the asynchronous dual block-chain is fairly safe and efficient.
截至2017年底,在电子商务上冲浪的人数已达到16亿,交易规模已接近2.304万亿美元。毫无疑问,电子支付系统的安全性和效率已经引起了电子商务领域的广泛关注。这就是区块链技术被广泛应用于大多数电子商务机制的原因。区块链雇佣可以保证去中心化和不可篡改的特性,为用户提供更稳定可靠的交易过程,防止双重支出和sybil攻击等恶意行为。然而,每个事务进程的开销太大,无法实现即时事务。在本研究中,我们的目标是通过异步双区块链来提高事务的性能。此外,我们还利用声誉机制来减少资源消耗。新方法继承了区块链技术的安全性。具体而言,实验结果表明,异步双区块链是相当安全高效的。
{"title":"Efficient peer-to-peer E-payment based on asynchronous dual blockchain","authors":"Wei-Chih Hong, Y. Chen, Ren-Kai Yang, Bo Li, Jung-San Lee","doi":"10.3966/160792642020092105013","DOIUrl":"https://doi.org/10.3966/160792642020092105013","url":null,"abstract":"The number of people surfing over the e-commerce has reached to 1.6 billion, while the transaction scale has approached to 2,304 billion dollars at the end of 2017. No doubt that the security and efficiency of an e-payment system have attracted lots of attention in the field of e-commerce. That is the reason why the blockchain technique has been widely spread to most of the e-commerce mechanisms. A blockchain employment can be used to guarantee the properties of decentralization and non-tampering, which provide users a more stable and reliable trading process and prevent malicious behaviors, including double-spending and sybil attack. Nevertheless, the overhead of each transaction process is too heavy to realize immediate transaction. In this study, we aim to speed up the performance of transaction through an asynchronous dual blockchain. Moreover, we have exploited the reputation mechanism to reduce resource consumption. The new method has inherited the security from a blockchain technique. Specifically, the experimental results have demonstrated that the asynchronous dual block-chain is fairly safe and efficient.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1375-1385"},"PeriodicalIF":1.6,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48283478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks 一种新的基于身份的无线传感器网络批验证广播认证方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-01 DOI: 10.3966/160792642020092105007
Meng Feng, Chin-Feng Lai, Hong Liu, Qian Rongxin, Jian Shen
Message broadcasting is a fundamental data transmission service in wireless sensor networks (WSNs), which enables a great many users to join the network dynamically and spread messages. However, due to the open network environment, attackers can easily eavesdrop on traffic, inject false data messages, or modify legitimate content. So, many broadcast authentication schemes have been proposed to ensure the integrity and authenticity of messages transmitted in WSN, but these schemes suffer from higher computational overhead due to hash-to-point operation or certification management. To reduce the computational and communication costs, we first propose a novel Identity (ID)-based signature scheme with message recovery, and then construct an identity-based signature broadcast authentication scheme (ISBAS). In our scheme, the original messages do not require to be transmitted with its generated signature. Authentication process can recover the original message. Moreover, a larger number of messages can be verified simultaneously with batch verification. The security analysis indicates our scheme achieve known security requirements and the performance analysis proves it to be efficient.
消息广播是无线传感器网络中的一项基本数据传输服务,它使大量用户能够动态地加入网络并传播消息。然而,由于开放的网络环境,攻击者可以轻松窃听流量、注入虚假数据消息或修改合法内容。因此,已经提出了许多广播认证方案来确保在WSN中传输的消息的完整性和真实性,但由于散列到点操作或证书管理,这些方案遭受更高的计算开销。为了降低计算和通信成本,我们首先提出了一种新的基于身份(ID)的消息恢复签名方案,然后构造了一种基于身份的签名广播认证方案(ISBAS)。在我们的方案中,原始消息不需要使用其生成的签名进行传输。身份验证过程可以恢复原始消息。此外,可以在批量验证的同时验证大量消息。安全性分析表明,我们的方案达到了已知的安全性要求,性能分析证明了它的有效性。
{"title":"A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks","authors":"Meng Feng, Chin-Feng Lai, Hong Liu, Qian Rongxin, Jian Shen","doi":"10.3966/160792642020092105007","DOIUrl":"https://doi.org/10.3966/160792642020092105007","url":null,"abstract":"Message broadcasting is a fundamental data transmission service in wireless sensor networks (WSNs), which enables a great many users to join the network dynamically and spread messages. However, due to the open network environment, attackers can easily eavesdrop on traffic, inject false data messages, or modify legitimate content. So, many broadcast authentication schemes have been proposed to ensure the integrity and authenticity of messages transmitted in WSN, but these schemes suffer from higher computational overhead due to hash-to-point operation or certification management. To reduce the computational and communication costs, we first propose a novel Identity (ID)-based signature scheme with message recovery, and then construct an identity-based signature broadcast authentication scheme (ISBAS). In our scheme, the original messages do not require to be transmitted with its generated signature. Authentication process can recover the original message. Moreover, a larger number of messages can be verified simultaneously with batch verification. The security analysis indicates our scheme achieve known security requirements and the performance analysis proves it to be efficient.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1303-1311"},"PeriodicalIF":1.6,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49152610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An automated learning content classification model for open education repositories: Case of MERLOT II 开放教育存储库的自动学习内容分类模型:以MERLOT II为例
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-01 DOI: 10.3966/160792642020092105005
W. Gunarathne, T. Shih, Chalothon Chootong, Worapot Sommool, A. Ochirbat
The value of OERs mainly depends on how easy they can be searched or located through a web search engine. Currently, the MERLOT II metadata repository requests resource providers to choose the relevant discipline category manually while adding material to its repository. This practice appears very time-consuming and also bound to involve human errors. If a member picks an incorrect discipline category, then the learning resource may not be correctly categorized in the repository. This situation may result in a learning resource to be not shortlisted for a given keyword search of the “MERLOT Smart Search” or in the “Advanced search.” Above investigations motivated us to recognize the importance of developing an automated learning content classification solution for OER repositories. In this study, we proposed a novel automated learning content classification model (LCCM) to classify learning resources into relevant discipline categories while adding them to the MERLOT repository. The research goal incorporated in this paper include dataset preparation, data preprocessing, feature extraction using LDA topic model, and calculating the semantic similarity using a pre-trained word embedding matrix. These methods serve as a base for classifying learning resources more effectively within a short time.
OER的价值主要取决于通过网络搜索引擎搜索或定位OER的容易程度。目前,MERLOT II元数据存储库要求资源提供者在向其存储库添加材料时手动选择相关学科类别。这种做法似乎非常耗时,而且必然会涉及人为错误。如果成员选择了不正确的学科类别,则学习资源可能无法在存储库中正确分类。这种情况可能会导致学习资源无法入围“MERLOT智能搜索”或“高级搜索”的给定关键字搜索。上述调查促使我们认识到为OER存储库开发自动学习内容分类解决方案的重要性。在这项研究中,我们提出了一种新的自动学习内容分类模型(LCCM),将学习资源分类到相关的学科类别中,同时将它们添加到MERLOT存储库中。本文的研究目标包括数据集的准备、数据预处理、使用LDA主题模型的特征提取,以及使用预先训练的单词嵌入矩阵计算语义相似度。这些方法为在短时间内更有效地对学习资源进行分类奠定了基础。
{"title":"An automated learning content classification model for open education repositories: Case of MERLOT II","authors":"W. Gunarathne, T. Shih, Chalothon Chootong, Worapot Sommool, A. Ochirbat","doi":"10.3966/160792642020092105005","DOIUrl":"https://doi.org/10.3966/160792642020092105005","url":null,"abstract":"The value of OERs mainly depends on how easy they can be searched or located through a web search engine. Currently, the MERLOT II metadata repository requests resource providers to choose the relevant discipline category manually while adding material to its repository. This practice appears very time-consuming and also bound to involve human errors. If a member picks an incorrect discipline category, then the learning resource may not be correctly categorized in the repository. This situation may result in a learning resource to be not shortlisted for a given keyword search of the “MERLOT Smart Search” or in the “Advanced search.” Above investigations motivated us to recognize the importance of developing an automated learning content classification solution for OER repositories. In this study, we proposed a novel automated learning content classification model (LCCM) to classify learning resources into relevant discipline categories while adding them to the MERLOT repository. The research goal incorporated in this paper include dataset preparation, data preprocessing, feature extraction using LDA topic model, and calculating the semantic similarity using a pre-trained word embedding matrix. These methods serve as a base for classifying learning resources more effectively within a short time.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1277-1288"},"PeriodicalIF":1.6,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46254111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New RSS Distance Calculation Algorithm Based on Tree-ring Distance in APs Rich Indoor Localization Environments 丰富室内定位环境下基于树轮距离的RSS距离计算新算法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-01 DOI: 10.3966/160792642020092105017
Baofeng Wang, Liming Chen, Zumin Wang, Mengmeng Xu, Shuai Tao
The fingerprint-based localization technique is one of the most popular indoor localization technologies. There are quite a few localization algorithms that use the RSS distance of position pairs to characterize their physical distance. In this paper, we introduce two coefficients to measure the relationship between RSS distance and physical distance. Based on the definition of tree-ring distance, we found that the characterization capability of RSS distance to physical distance is closely related to APs’ tree-ring distance. To exploit this, through an in-depth analysis of the relationship between tree-ring distance and physical distance, we pointed out that the APs sets composed of APs at the edge positions of the positioning area makes the RSS distance better to characterize the physical distance. Further, we proposed a novel RSS distance calculation algorithm based on the comparison of tree-ring distances. In the algorithm, for each pairwise position, the abnormal APs are eliminated by the Mean+3S method, and the APs with larger tree-ring distance are selected to participate in the calculation of RSS distance, namely, for different pairwise positions, different APs subsets of all APs are selected to participate in RSS distance calculation. We evaluate the algorithm in a simulation study and initial results show that an APs set with 3 APs is sufficient to guarantee very strong correlation (the correlation coefficient>0.8) and very high consistency (the consistency coefficient>0.8) between RSS distance and physical distance, which demonstrates the effectiveness and the practicability of the algorithm.
基于指纹的定位技术是最流行的室内定位技术之一。有相当多的定位算法使用位置对的RSS距离来表征它们的物理距离。在本文中,我们引入了两个系数来测量RSS距离和物理距离之间的关系。基于树环距离的定义,我们发现RSS距离对物理距离的表征能力与AP的树环距离密切相关。为了利用这一点,通过深入分析树环距离与物理距离之间的关系,我们指出,定位区域边缘位置的AP组成的AP集使RSS距离更好地表征物理距离。此外,我们提出了一种新的基于树环距离比较的RSS距离计算算法。在算法中,对于每个成对位置,通过Mean+3S方法消除异常AP,并选择树环距离较大的AP参与RSS距离的计算,即对于不同的成对位置,选择所有AP的不同AP子集参与RSS距离计算。我们在模拟研究中对该算法进行了评估,初步结果表明,一个包含3个AP的AP集足以保证RSS距离和物理距离之间的非常强的相关性(相关系数>0.8)和非常高的一致性(一致性系数>0.8。
{"title":"A New RSS Distance Calculation Algorithm Based on Tree-ring Distance in APs Rich Indoor Localization Environments","authors":"Baofeng Wang, Liming Chen, Zumin Wang, Mengmeng Xu, Shuai Tao","doi":"10.3966/160792642020092105017","DOIUrl":"https://doi.org/10.3966/160792642020092105017","url":null,"abstract":"The fingerprint-based localization technique is one of the most popular indoor localization technologies. There are quite a few localization algorithms that use the RSS distance of position pairs to characterize their physical distance. In this paper, we introduce two coefficients to measure the relationship between RSS distance and physical distance. Based on the definition of tree-ring distance, we found that the characterization capability of RSS distance to physical distance is closely related to APs’ tree-ring distance. To exploit this, through an in-depth analysis of the relationship between tree-ring distance and physical distance, we pointed out that the APs sets composed of APs at the edge positions of the positioning area makes the RSS distance better to characterize the physical distance. Further, we proposed a novel RSS distance calculation algorithm based on the comparison of tree-ring distances. In the algorithm, for each pairwise position, the abnormal APs are eliminated by the Mean+3S method, and the APs with larger tree-ring distance are selected to participate in the calculation of RSS distance, namely, for different pairwise positions, different APs subsets of all APs are selected to participate in RSS distance calculation. We evaluate the algorithm in a simulation study and initial results show that an APs set with 3 APs is sufficient to guarantee very strong correlation (the correlation coefficient>0.8) and very high consistency (the consistency coefficient>0.8) between RSS distance and physical distance, which demonstrates the effectiveness and the practicability of the algorithm.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"26 65","pages":"1423-1436"},"PeriodicalIF":1.6,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41260726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CloudIoT-based Jukebox Platform: A Music Player for Mobile Users in Café 基于CloudIoT的自动点唱机平台:咖啡馆移动用户的音乐播放器
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-01 DOI: 10.3966/160792642020092105012
Byungseok Kang, Joohyun Lee, O. Bagdasar, Hyunseung Choo
Contents services have been provided to people in a variety of ways. Jukebox service is one of the contents streaming which provides an automated music-playing service. User inserts coin and presses a play button, the jukebox automatically selects and plays the record. The Disk Jockey (DJ) in Korean cafeteria (cafe) received contents desired of customer and played them through the speakers in the store. In this paper, we propose a service platform that reinvented the Korean cafe DJ in an integrated environment of IoT and cloud computing. The user in a store can request contents (music, video, and message) through the service platform. The contents are provided through the public screen and speaker in the store where the user is located. This allows people in the same location store to enjoy the contents together. The user information and the usage history are collected and managed in the cloud. Therefore, users can receive customized services regardless of stores. We compare our platform to exist services. As a result of the performance evaluation, the proposed platform shows that contents can be efficiently provided to users and adapts IoT-Cloud integrated environments.
内容服务已经以各种方式提供给人们。自动存储塔服务是提供自动音乐播放服务的内容流之一。用户插入硬币并按下播放按钮,自动点唱机自动选择并播放唱片。韩国自助餐厅(咖啡馆)的Disk Jockey(DJ)收到顾客想要的内容,并通过商店里的扬声器播放。在本文中,我们提出了一个在物联网和云计算的集成环境中重塑韩国咖啡馆DJ的服务平台。商店中的用户可以通过服务平台请求内容(音乐、视频和消息)。内容是通过用户所在商店的公共屏幕和扬声器提供的。这使得同一地点商店的人们可以一起享受内容。用户信息和使用历史记录在云中进行收集和管理。因此,用户可以在不考虑商店的情况下获得定制服务。我们将我们的平台与现有服务进行比较。性能评估的结果表明,所提出的平台可以有效地向用户提供内容,并适应物联网云集成环境。
{"title":"CloudIoT-based Jukebox Platform: A Music Player for Mobile Users in Café","authors":"Byungseok Kang, Joohyun Lee, O. Bagdasar, Hyunseung Choo","doi":"10.3966/160792642020092105012","DOIUrl":"https://doi.org/10.3966/160792642020092105012","url":null,"abstract":"Contents services have been provided to people in a variety of ways. Jukebox service is one of the contents streaming which provides an automated music-playing service. User inserts coin and presses a play button, the jukebox automatically selects and plays the record. The Disk Jockey (DJ) in Korean cafeteria (cafe) received contents desired of customer and played them through the speakers in the store. In this paper, we propose a service platform that reinvented the Korean cafe DJ in an integrated environment of IoT and cloud computing. The user in a store can request contents (music, video, and message) through the service platform. The contents are provided through the public screen and speaker in the store where the user is located. This allows people in the same location store to enjoy the contents together. The user information and the usage history are collected and managed in the cloud. Therefore, users can receive customized services regardless of stores. We compare our platform to exist services. As a result of the performance evaluation, the proposed platform shows that contents can be efficiently provided to users and adapts IoT-Cloud integrated environments.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1363-1374"},"PeriodicalIF":1.6,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48575800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A multimethod approach for supporting reflection and creativity in online collaborative courses 在线协作课程中支持反思和创造力的多种方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-01 DOI: 10.3966/160792642020072104018
Tao-Hua Wang, H. Lin, Ting-Ting Wu, Yueh-Min Huang
Cultivating the capacity to create and reflect has been a prominent feature of professional training in numerous disciplines. Through teaching strategies, creativity and reflection abilities can be enhanced. In this article, we report the findings of a new multimethod approach (including narrative essay writing, high-level prompts, and online collaborative learning strategies) that provides a learning environment to influence students’ creativity and reflection. Graduate students in an online course of a national university in southern Taiwan served as participants. Through the multimethod approach, we analyzed and discussed students’ reflection, creativity, and academic emotions after learning. The results revealed that students’ reflective and creative abilities were enhanced, and the students held positive emotions toward the multimethod approach. This approach may aid teachers in the design of learning activities and guide online collaborative learning activities.
培养创造和反思能力是许多学科专业培训的突出特点。通过教学策略,可以提高学生的创造力和反思能力。在这篇文章中,我们报告了一种新的多方法方法(包括叙事性文章写作、高级提示和在线协作学习策略)的发现,该方法提供了一个影响学生创造力和反思的学习环境。台湾南部一所国立大学的研究生参加了在线课程。通过多元方法,我们分析和讨论了学生在学习后的反思、创造力和学术情绪。结果表明,学生的反思能力和创新能力得到了提高,学生对多元方法持有积极的情绪。这种方法可以帮助教师设计学习活动,并指导在线协作学习活动。
{"title":"A multimethod approach for supporting reflection and creativity in online collaborative courses","authors":"Tao-Hua Wang, H. Lin, Ting-Ting Wu, Yueh-Min Huang","doi":"10.3966/160792642020072104018","DOIUrl":"https://doi.org/10.3966/160792642020072104018","url":null,"abstract":"Cultivating the capacity to create and reflect has been a prominent feature of professional training in numerous disciplines. Through teaching strategies, creativity and reflection abilities can be enhanced. In this article, we report the findings of a new multimethod approach (including narrative essay writing, high-level prompts, and online collaborative learning strategies) that provides a learning environment to influence students’ creativity and reflection. Graduate students in an online course of a national university in southern Taiwan served as participants. Through the multimethod approach, we analyzed and discussed students’ reflection, creativity, and academic emotions after learning. The results revealed that students’ reflective and creative abilities were enhanced, and the students held positive emotions toward the multimethod approach. This approach may aid teachers in the design of learning activities and guide online collaborative learning activities.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1097-1106"},"PeriodicalIF":1.6,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48081773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel data deduplication scheme for encrypted cloud databases 一种新的加密云数据库重复数据删除方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-01 DOI: 10.3966/160792642020072104020
Jung-Shian Li, I. Liu, Chao-Yuan Lee, Chu-Fen Li, Chuan-Gang Liu
As the demand for data sharing and complex access-control policies continues to grow, traditional encryption mechanisms, which are generally established using a Public Key Infrastructure, face the problem of massive processing overheads and huge network bandwidth consumption. Attribute-Based Encryption (ABE) schemes have been proposed as a potential means of addressing these issues and have attracted great attention in recent years. Most previous studies on ABE focus on issues such as the revocation mechanism, multi-authority, the access structure design, and traceability. However, very few studies consider the storage efficiency problem and the present study proposes a novel data deduplication scheme based on ciphertext-policy ABE with convergent encryption and block-level data. The scheme can be deployed in third-party semi-trusted environments, and not only provides flexible, fine-grained access control over encrypted data, but also allows for the in-line elimination of redundancies in order to save cloud storage space. The experimental results show that the proposed scheme has an acceptable computational overhead and provides a promising solution for real-world data cloud storage and access scenarios.
随着数据共享需求和复杂访问控制策略的不断增长,传统的加密机制(通常使用公钥基础设施建立)面临着大量的处理开销和巨大的网络带宽消耗问题。基于属性的加密(ABE)方案被认为是解决这些问题的一种潜在手段,近年来引起了人们的极大关注。以往对ABE的研究主要集中在撤销机制、多授权、访问结构设计和可追溯性等方面。然而,很少有研究考虑到存储效率问题,本研究提出了一种基于密文策略ABE的基于收敛加密和块级数据的重复数据删除方案。该方案可以部署在第三方半可信环境中,不仅可以对加密数据提供灵活、细粒度的访问控制,还可以在线消除冗余,从而节省云存储空间。实验结果表明,该方案具有可接受的计算开销,为实际数据云存储和访问场景提供了一种有希望的解决方案。
{"title":"A novel data deduplication scheme for encrypted cloud databases","authors":"Jung-Shian Li, I. Liu, Chao-Yuan Lee, Chu-Fen Li, Chuan-Gang Liu","doi":"10.3966/160792642020072104020","DOIUrl":"https://doi.org/10.3966/160792642020072104020","url":null,"abstract":"As the demand for data sharing and complex access-control policies continues to grow, traditional encryption mechanisms, which are generally established using a Public Key Infrastructure, face the problem of massive processing overheads and huge network bandwidth consumption. Attribute-Based Encryption (ABE) schemes have been proposed as a potential means of addressing these issues and have attracted great attention in recent years. Most previous studies on ABE focus on issues such as the revocation mechanism, multi-authority, the access structure design, and traceability. However, very few studies consider the storage efficiency problem and the present study proposes a novel data deduplication scheme based on ciphertext-policy ABE with convergent encryption and block-level data. The scheme can be deployed in third-party semi-trusted environments, and not only provides flexible, fine-grained access control over encrypted data, but also allows for the in-line elimination of redundancies in order to save cloud storage space. The experimental results show that the proposed scheme has an acceptable computational overhead and provides a promising solution for real-world data cloud storage and access scenarios.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1115-1125"},"PeriodicalIF":1.6,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41925885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1