首页 > 最新文献

Ad Hoc & Sensor Wireless Networks最新文献

英文 中文
A Multidimensional Authentication and Secure Framework for Cloud-Based Human Health Monitoring System 基于云的人体健康监测系统多维认证与安全框架
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.2196/preprints.30247
Narahari Narasimhaiah, R. Sam
BACKGROUND Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. OBJECTIVE Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. METHODS In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. RESULTS Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. CONCLUSIONS Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system requires more efficient monitoring of the patient's health status, thereby preserving human life on time. CLINICALTRIAL Background: Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. Objective: Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. Methods: In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. Results: Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system
医疗监控系统已成为最重要的系统之一,并且在过去十年中已成为以技术为导向的系统。人们面临着因各种疾病而导致的不必要的死亡危机,因为没有在最合适的时间对病人进行医疗护理。我们的目标是为基于云的医疗保健系统开发应用程序。网络攻击是基于云的卫生保健控制面临的主要挑战。在医疗保健监控领域,最严重的问题是拒绝服务、节点故障、节点之间的交通堵塞和恶意攻击。方法为应对上述挑战,提出了基于云的人体健康监测系统的安全架构。首先,提出了一种新的多维身份验证设计方法,该方法为数据提供了安全的身份验证,可以防止未经授权的人入侵。结果为安全可靠的患者健康监测提供了一种有效的、单一的新的稳态Pawn检测和控制论安全框架。因此,为了提高雾计算的可扩展性,建议使用隐藏滴检测来阻止入侵者获取雾中的信息。综上所述,通过在单一框架内使用上述技术,可以预防医疗保健系统中的主要数据风险,并且基于云的健康监测系统可以更有效地监测患者的健康状况,从而及时保存人的生命。临床试验背景:医疗监测系统已经成为最重要的系统之一,并且在过去的十年中已经变得以技术为导向。人们面临着因各种疾病而导致的不必要的死亡危机,因为没有在最合适的时间对病人进行医疗护理。我们的目标是为基于云的医疗保健系统开发应用程序。目的:网络攻击是基于云的医疗控制面临的主要挑战。在医疗保健监控领域,最严重的问题是拒绝服务、节点故障、节点之间的交通堵塞和恶意攻击。方法:为了应对上述挑战,本文提出了一种基于云的人体健康监测系统的安全架构。首先,提出了一种新的多维身份验证设计方法,该方法为数据提供了安全的身份验证,可以防止未经授权的人入侵。结果:为安全可靠的患者健康监测提供了一种有效的、单一的新的稳态Pawn检测和控制论安全框架。因此,为了提高雾计算的可扩展性,建议使用隐藏滴检测来阻止入侵者获取雾中的信息。因此,通过在单一框架中使用上述所有技术,可以防止医疗保健系统中的主要数据风险,并且基于云的健康监测系统需要更有效地监测患者的健康状况,从而及时保护人类的生命。
{"title":"A Multidimensional Authentication and Secure Framework for Cloud-Based Human Health Monitoring System","authors":"Narahari Narasimhaiah, R. Sam","doi":"10.2196/preprints.30247","DOIUrl":"https://doi.org/10.2196/preprints.30247","url":null,"abstract":"BACKGROUND Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. OBJECTIVE Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. METHODS In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. RESULTS Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. CONCLUSIONS Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system requires more efficient monitoring of the patient's health status, thereby preserving human life on time. CLINICALTRIAL Background: Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. Objective: Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. Methods: In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. Results: Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system ","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75612240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings 无线传感器网络:第16届中国会议,CWSN 2022,中国广州,2022年11月10-13日,论文集
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.1007/978-981-19-8350-4
{"title":"Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings","authors":"","doi":"10.1007/978-981-19-8350-4","DOIUrl":"https://doi.org/10.1007/978-981-19-8350-4","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87839311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks 第19届ACM无线自组织、传感器和无处不在网络性能评估国际研讨会论文集
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.1145/3551663
{"title":"Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks","authors":"","doi":"10.1145/3551663","DOIUrl":"https://doi.org/10.1145/3551663","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79895081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote Speaker 主讲人
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-12-16 DOI: 10.1109/WIOPT.2007.4480016
B. Hassibi
Entropic Vectors, Convex Optimization and Wireless Networks Information theory is well poised to have an impact on the manner in which future networks are designed and maintained, both because wired networks are ripe for applications such as network coding and also because wireless networks cannot be satisfactorily dealt with using conventional networking tools. The challenge is that most network information theory problems are notoriously difficult and so the barriers that must be overcome are often quite high. In particular, there are only a limited number of tools available and so fresh approaches are quite welcome. We describe an approach based on the definition of the space of "normalized" entropic vectors. In this framework, for a large class of acyclic memoryless networks, the capacity region for an arbitrary set of sources and destinations can be found by maximization of a linear function over the set of channel-constrained normalized entropic vectors and some linear constraints. The key point is that the closure of this set is convex and compact. While this may not necessarily make the problem simpler, it certainly circumvents the "infinite-letter characterization" issue, as well as the nonconvexity of earlier formulations. It also exposes the core of the problem as that of determining the space of normalized entropic vectors.
熵向量、凸优化和无线网络信息理论将对未来网络的设计和维护方式产生影响,这一方面是因为有线网络在网络编码等应用方面已经成熟,另一方面是因为无线网络不能用传统的网络工具令人满意地处理。挑战在于,大多数网络信息理论问题都非常困难,因此必须克服的障碍通常相当高。特别是,可用的工具数量有限,因此新方法非常受欢迎。我们描述了一种基于“归一化”熵向量空间定义的方法。在这个框架中,对于一类大的无循环无记忆网络,可以通过在信道约束的归一化熵向量集合和一些线性约束上的线性函数的最大化来找到任意一组源和目标的容量区域。关键是这个集合的闭包是凸紧的。虽然这并不一定会使问题变得更简单,但它确实绕过了“无限字母表征”问题,以及早期公式的非凸性。它还揭示了问题的核心是确定归一化熵向量的空间。
{"title":"Keynote Speaker","authors":"B. Hassibi","doi":"10.1109/WIOPT.2007.4480016","DOIUrl":"https://doi.org/10.1109/WIOPT.2007.4480016","url":null,"abstract":"Entropic Vectors, Convex Optimization and Wireless Networks Information theory is well poised to have an impact on the manner in which future networks are designed and maintained, both because wired networks are ripe for applications such as network coding and also because wireless networks cannot be satisfactorily dealt with using conventional networking tools. The challenge is that most network information theory problems are notoriously difficult and so the barriers that must be overcome are often quite high. In particular, there are only a limited number of tools available and so fresh approaches are quite welcome. We describe an approach based on the definition of the space of \"normalized\" entropic vectors. In this framework, for a large class of acyclic memoryless networks, the capacity region for an arbitrary set of sources and destinations can be found by maximization of a linear function over the set of channel-constrained normalized entropic vectors and some linear constraints. The key point is that the closure of this set is convex and compact. While this may not necessarily make the problem simpler, it certainly circumvents the \"infinite-letter characterization\" issue, as well as the nonconvexity of earlier formulations. It also exposes the core of the problem as that of determining the space of normalized entropic vectors.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86837103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DTMR
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488525
Leticia Lemus Cárdenas, A. M. Mezher, Juan Pablo Astudillo León, M. Aguilar Igartua
The emerging application of machine learning (ML) in different areas and the good results obtained have motivated its inclusion in the intelligent transport system (ITS) with smart cities and also in vehicular ad hoc networks (VANETs). In this sense, the main contribution of this work is the proposal of a decision tree-based multimetric routing protocol to make more intelligent forwarding decisions in the selection of the best next-hop neighbour node to transmit packets to the destination. To the best of our knowledge, most of the available datasets regarding vehicular networks are related to mobility patterns. Thus, we have collected our targeted dataset from several simulations runs over different urban vanet scenarios. Besides, we have included the evaluation of the importance of each routing metric by applying regularization. The goal here is to include the more relevant metrics to support the ML in the routing decisions. The performance evaluation shows significant improvements in terms of packet losses and end-to-end delay.
{"title":"DTMR","authors":"Leticia Lemus Cárdenas, A. M. Mezher, Juan Pablo Astudillo León, M. Aguilar Igartua","doi":"10.1145/3479240.3488525","DOIUrl":"https://doi.org/10.1145/3479240.3488525","url":null,"abstract":"The emerging application of machine learning (ML) in different areas and the good results obtained have motivated its inclusion in the intelligent transport system (ITS) with smart cities and also in vehicular ad hoc networks (VANETs). In this sense, the main contribution of this work is the proposal of a decision tree-based multimetric routing protocol to make more intelligent forwarding decisions in the selection of the best next-hop neighbour node to transmit packets to the destination. To the best of our knowledge, most of the available datasets regarding vehicular networks are related to mobility patterns. Thus, we have collected our targeted dataset from several simulations runs over different urban vanet scenarios. Besides, we have included the evaluation of the importance of each routing metric by applying regularization. The goal here is to include the more relevant metrics to support the ML in the routing decisions. The performance evaluation shows significant improvements in terms of packet losses and end-to-end delay.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76933797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: Session 3: Security, Privacy and Energy in Wireless Ad hoc Networks 会议详情:第三部分:无线自组织网络中的安全、隐私和能源
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3501372
Thomas Begin
{"title":"Session details: Session 3: Security, Privacy and Energy in Wireless Ad hoc Networks","authors":"Thomas Begin","doi":"10.1145/3501372","DOIUrl":"https://doi.org/10.1145/3501372","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79084938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Collision Avoidance Strategy For Multirrotor UAVs Based On Artificial Potential Fields 基于人工势场的多旋翼无人机避碰策略
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488531
Stefan Van Der Veeken, J. Wubben, C. Calafate, Juan-Carlos Cano, P. Manzoni, J. Márquez-Barja
Since some years, research on the use of unmanned aerial vehicles (UAVs) has been very popular, and because of that a wide range of commercial and military applications already exists. Nowadays, the trend towards autonomous flying is growing steadily. Autonomous flying requires UAVs to have the ability to navigate in urban or other challenging environments without causing collisions or endangering humans. To achieve this objective, a safe and reliable collision avoidance system (CAS) needs to be used. In particular, a CAS needs to successfully sense and detect a possible collision with an object to efficiently avoid the obstacle. Multiple different techniques exist to implement a CAS. In this paper, we propose a collision avoidance protocol which is based on magnetic attraction and repulsion forces. The results show that, with the use of our protocol, collisions are safely avoided in various scenarios, while maintaining the overhead time to a minimum.
多年来,无人驾驶飞行器(uav)的应用研究一直很受欢迎,正因为如此,广泛的商业和军事应用已经存在。如今,自主飞行的趋势正在稳步发展。自主飞行要求无人机具有在城市或其他具有挑战性的环境中导航的能力,而不会造成碰撞或危及人类。为了实现这一目标,需要使用安全可靠的避碰系统(CAS)。特别是,CAS需要成功地感知和检测与物体可能发生的碰撞,以有效地避开障碍物。存在多种不同的技术来实现CAS。本文提出了一种基于磁引力和斥力的避碰协议。结果表明,使用我们的协议,可以在各种场景中安全地避免碰撞,同时将开销时间保持在最低限度。
{"title":"A Collision Avoidance Strategy For Multirrotor UAVs Based On Artificial Potential Fields","authors":"Stefan Van Der Veeken, J. Wubben, C. Calafate, Juan-Carlos Cano, P. Manzoni, J. Márquez-Barja","doi":"10.1145/3479240.3488531","DOIUrl":"https://doi.org/10.1145/3479240.3488531","url":null,"abstract":"Since some years, research on the use of unmanned aerial vehicles (UAVs) has been very popular, and because of that a wide range of commercial and military applications already exists. Nowadays, the trend towards autonomous flying is growing steadily. Autonomous flying requires UAVs to have the ability to navigate in urban or other challenging environments without causing collisions or endangering humans. To achieve this objective, a safe and reliable collision avoidance system (CAS) needs to be used. In particular, a CAS needs to successfully sense and detect a possible collision with an object to efficiently avoid the obstacle. Multiple different techniques exist to implement a CAS. In this paper, we propose a collision avoidance protocol which is based on magnetic attraction and repulsion forces. The results show that, with the use of our protocol, collisions are safely avoided in various scenarios, while maintaining the overhead time to a minimum.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91047778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
POI-RGNN: Using Recurrent and Graph Neural Networks to Predict the Category of the Next Point of Interest POI-RGNN:使用递归和图神经网络来预测下一个兴趣点的类别
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488532
C. G. S. Capanema, Fabrício A. Silva, T. R. Silva, A. Loureiro
Recommendation systems have been used to predict the next place a user is willing to visit. However, these methods commonly achieve low hit rates because they aim to recommend exact locations among many possibilities. A higher-level approach that is more effective is to predict the category of the next location since it can be helpful in a variety of services. For example, it is possible to do category-based location recommendations, more assertive advertising programs, among others. In this work, we present POI-RGNN (Points of Interest (PoI) - Recurrent and Graph-based Neural Network), a neural network for predicting the category of the next PoI that an individual will visit. Our proposal leverages Recurrent Neural Networks (RNN) and Graph Neural Networks (GNN) and combines them in a novel architecture. Additionally, the POI-RGNN explores new types of inputs that are sent to recurrent and graph layers. Results show that the proposed model improves macro and weighted f1-score among all PoI categories. We evaluate POI-RGNN in two distinct types of real-world datasets, showing its effectiveness in different contexts.
推荐系统已经被用来预测用户愿意访问的下一个地方。然而,这些方法通常实现较低的命中率,因为它们的目标是在许多可能性中推荐准确的位置。一种更有效的高级方法是预测下一个位置的类别,因为它可以在各种服务中有所帮助。例如,可以做基于类别的位置推荐,更自信的广告计划,等等。在这项工作中,我们提出了PoI - rgnn(兴趣点(PoI) -循环和基于图的神经网络),这是一种用于预测个人将访问的下一个兴趣点类别的神经网络。我们的建议利用递归神经网络(RNN)和图神经网络(GNN),并将它们结合在一个新的架构中。此外,POI-RGNN探索发送到循环层和图层的新类型输入。结果表明,该模型提高了所有PoI类别的宏观和加权f1得分。我们在两种不同类型的现实世界数据集中评估了POI-RGNN,显示了它在不同背景下的有效性。
{"title":"POI-RGNN: Using Recurrent and Graph Neural Networks to Predict the Category of the Next Point of Interest","authors":"C. G. S. Capanema, Fabrício A. Silva, T. R. Silva, A. Loureiro","doi":"10.1145/3479240.3488532","DOIUrl":"https://doi.org/10.1145/3479240.3488532","url":null,"abstract":"Recommendation systems have been used to predict the next place a user is willing to visit. However, these methods commonly achieve low hit rates because they aim to recommend exact locations among many possibilities. A higher-level approach that is more effective is to predict the category of the next location since it can be helpful in a variety of services. For example, it is possible to do category-based location recommendations, more assertive advertising programs, among others. In this work, we present POI-RGNN (Points of Interest (PoI) - Recurrent and Graph-based Neural Network), a neural network for predicting the category of the next PoI that an individual will visit. Our proposal leverages Recurrent Neural Networks (RNN) and Graph Neural Networks (GNN) and combines them in a novel architecture. Additionally, the POI-RGNN explores new types of inputs that are sent to recurrent and graph layers. Results show that the proposed model improves macro and weighted f1-score among all PoI categories. We evaluate POI-RGNN in two distinct types of real-world datasets, showing its effectiveness in different contexts.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89965920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
STGT: SUMO-Based Traffic Mobility Generation Tool for Evaluation of Vehicular Networks 基于sumo的车辆网络交通移动性生成工具
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488523
Pablo Andrés Barbecho Bautista, L. Urquiza-Aguiar, M. Aguilar-Igartua
An approach to evaluate vehicular networks is to make use of simulators. A simulation engine allows the vehicular network to control the traffic simulation on run time. In this regard, researchers can assess their vehicular network models under realistic scenarios (e.g., highway, urban, rural). However, setting up these traffic mobility scenarios may result in a time-consuming task requiring the definition of several elements: (i) the road map, (ii) the traffic elements (e.g., traffic lights), (iii) the type of vehicles, and (iv) vehicle traces/routes. This paper focuses on facilitating this process, taking advantage of a well-known open-source traffic simulator called SUMO (Simulation of Urban MObility). Even though the SUMO simulator builds in several facilities to generate traffic mobility scenarios, it requires a considerable learning time. This paper proposes an open-source traffic simulator SUMO extension that encapsulates most SUMO facilities in an easy-to-use traffic generation tool called SUMO-based Traffic Mobility Generation Tool (STGT). The STGT tool facilities the scenario generation avoiding the learning curve of the SUMO framework, and provides performance statistics of the generated vehicular movements. The STGT tool copes with the whole traffic simulation process, including a graphical user interface for novice users and a command-line interface for advanced users.
一种评估车辆网络的方法是利用模拟器。仿真引擎允许车辆网络在运行时控制交通仿真。在这方面,研究人员可以在现实场景(如高速公路、城市、农村)下评估他们的车辆网络模型。然而,建立这些交通流动场景可能会导致一项耗时的任务,需要定义以下几个要素:(i)路线图,(ii)交通要素(例如交通灯),(iii)车辆类型,以及(iv)车辆轨迹/路线。本文的重点是促进这一过程,利用一个著名的开源交通模拟器称为SUMO(模拟城市交通)。尽管SUMO模拟器构建了几个设施来生成交通移动场景,但它需要相当长的学习时间。本文提出了一个开源的交通模拟器SUMO扩展,它将大多数SUMO设施封装在一个易于使用的交通生成工具中,称为基于SUMO的交通移动性生成工具(STGT)。STGT工具为场景生成提供了便利,避免了SUMO框架的学习曲线,并提供了生成的车辆运动的性能统计。STGT工具处理整个交通模拟过程,包括面向新手用户的图形用户界面和面向高级用户的命令行界面。
{"title":"STGT: SUMO-Based Traffic Mobility Generation Tool for Evaluation of Vehicular Networks","authors":"Pablo Andrés Barbecho Bautista, L. Urquiza-Aguiar, M. Aguilar-Igartua","doi":"10.1145/3479240.3488523","DOIUrl":"https://doi.org/10.1145/3479240.3488523","url":null,"abstract":"An approach to evaluate vehicular networks is to make use of simulators. A simulation engine allows the vehicular network to control the traffic simulation on run time. In this regard, researchers can assess their vehicular network models under realistic scenarios (e.g., highway, urban, rural). However, setting up these traffic mobility scenarios may result in a time-consuming task requiring the definition of several elements: (i) the road map, (ii) the traffic elements (e.g., traffic lights), (iii) the type of vehicles, and (iv) vehicle traces/routes. This paper focuses on facilitating this process, taking advantage of a well-known open-source traffic simulator called SUMO (Simulation of Urban MObility). Even though the SUMO simulator builds in several facilities to generate traffic mobility scenarios, it requires a considerable learning time. This paper proposes an open-source traffic simulator SUMO extension that encapsulates most SUMO facilities in an easy-to-use traffic generation tool called SUMO-based Traffic Mobility Generation Tool (STGT). The STGT tool facilities the scenario generation avoiding the learning curve of the SUMO framework, and provides performance statistics of the generated vehicular movements. The STGT tool copes with the whole traffic simulation process, including a graphical user interface for novice users and a command-line interface for advanced users.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87224760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental Assessment of IEEE 802.11-based V2I Communications 基于IEEE 802.11的V2I通信实验评估
IF 0.9 4区 计算机科学 Q3 Computer Science Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488506
Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer
Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.
联网和自动驾驶汽车正在成为现实,评估其技术支持因素的性能的必要性在汽车领域发挥着关键作用。不同的标准化机构已经提出了几种技术,目的是实现车辆之间以及车辆与基础设施之间的连接。在部署任何技术之前,执行测试和验证阶段是基本的,这通常是在模拟环境中执行的。然而,为了评估V2X(车对一切)通信技术的实际性能,现场测试至关重要。在本文中,我们介绍了用于V2I(车对基础设施)通信的非毫米波和毫米波IEEE 802.11技术的广泛现场测试活动的结果,即IEEE 802.11p, IEEE 802.11ac和IEEE 802.11ad。我们评估他们每个人的性能,在连接稳定性,接收信号水平,往返时间和UDP吞吐量方面,在视线和非视线条件下。我们的研究结果表明,虽然IEEE 802.11ac和IEEE 802.11ad不是专门为车载通信设计的,但它们是非常有前途的技术。
{"title":"Experimental Assessment of IEEE 802.11-based V2I Communications","authors":"Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer","doi":"10.1145/3479240.3488506","DOIUrl":"https://doi.org/10.1145/3479240.3488506","url":null,"abstract":"Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81840804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Ad Hoc & Sensor Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1