首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Identity management using blockchain for cognitive cellular networks 使用区块链进行认知蜂窝网络的身份管理
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996830
S. Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, J. Deogun
Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning — assertion, authentication, authorization, and accounting — implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.
以云为中心的认知蜂窝网络利用动态频谱接入和机会网络接入技术作为缓解频谱紧张和网络需求的手段。然而,为运营商提供用户设置的个人可识别信息增加了认知蜂窝网络中分析的风险,其中用户在不同时间通过多个运营商寻求二次访问。此外,在传统蜂窝网络中实现的网络访问供应——断言、身份验证、授权和计费——在认知空间中是不够的,因为它既不是自发的,也不是可扩展的。在本文中,我们提出了一种使用区块链技术的隐私增强用户身份管理系统,该系统重视匿名性和归属,并支持从用户断言到使用计费的端到端管理。该设置允许使用假名身份进行网络访问,从而阻碍了订阅者身份的重建。我们的测试结果表明,这种方法将访问供应持续时间缩短了4倍,将网络信令流量减少了近40%,并实现了近乎实时的用户计费,这可能会将支付结算时间缩短约3倍。
{"title":"Identity management using blockchain for cognitive cellular networks","authors":"S. Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, J. Deogun","doi":"10.1109/ICC.2017.7996830","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996830","url":null,"abstract":"Cloud-centric cognitive cellular networks utilize dynamic spectrum access and opportunistic network access technologies as a means to mitigate spectrum crunch and network demand. However, furnishing a carrier with personally identifiable information for user setup increases the risk of profiling in cognitive cellular networks, wherein users seek secondary access at various times with multiple carriers. Moreover, network access provisioning — assertion, authentication, authorization, and accounting — implemented in conventional cellular networks is inadequate in the cognitive space, as it is neither spontaneous nor scalable. In this paper, we propose a privacy-enhancing user identity management system using blockchain technology which places due importance on both anonymity and attribution, and supports end-to-end management from user assertion to usage billing. The setup enables network access using pseudonymous identities, hindering the reconstruction of a subscriber's identity. Our test results indicate that this approach diminishes access provisioning duration by up to 4x, decreases network signaling traffic by almost 40%, and enables near real-time user billing that may lead to approximately 3x reduction in payments settlement time.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82697633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
BotDetector: A robust and scalable approach toward detecting malware-infected devices BotDetector:一种检测恶意软件感染设备的强大且可扩展的方法
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997372
Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto
Damage caused by malware is a serious problem that needs to be addressed. The recent rise in the spread of evasive malware has made it difficult to detect it at the pre-infection timing. Malware detection at post-infection timing is a promising approach that fulfills this gap. Given this background, this work aims to identify likely malware-infected devices from the measurement of Internet traffic. The advantage of the traffic-measurement-based approach is that it enables us to monitor a large number of clients. If we find a client as a source of malicious traffic, the client is likely a malware-infected device. Since the majority of malware today makes use of the web as a means to communicate with the C&C servers that reside on the external network, we leverage information recorded in the HTTP headers to discriminate between malicious and legitimate traffic. To make our approach scalable and robust, we develop the automatic template generation scheme that drastically reduces the amount of information to be kept while achieving the high accuracy of classification; since it does not make use of any domain knowledge, the approach should be robust against changes of malware. We apply several classifiers, which include machine learning algorithms, to the extracted templates and classify traffic into two categories: malicious and legitimate. Our extensive experiments demonstrate that our approach discriminates between malicious and legitimate traffic with up to 97.1% precision while maintaining the false positive below 1.0%.
恶意软件造成的损害是一个需要解决的严重问题。最近,规避性恶意软件的传播有所增加,这使得在感染前的时间检测它变得困难。在感染后进行恶意软件检测是一种很有前途的方法,可以填补这一空白。在此背景下,本工作旨在通过测量互联网流量来识别可能被恶意软件感染的设备。基于流量测量的方法的优点是,它使我们能够监控大量的客户端。如果我们发现客户端是恶意流量的来源,则该客户端很可能是受恶意软件感染的设备。由于今天大多数恶意软件都利用网络作为与驻留在外部网络上的C&C服务器通信的手段,我们利用记录在HTTP标头中的信息来区分恶意和合法流量。为了使我们的方法具有可扩展性和鲁棒性,我们开发了自动模板生成方案,该方案在实现高精度分类的同时大大减少了需要保留的信息量;由于它不使用任何领域知识,因此该方法对于恶意软件的更改应该是健壮的。我们将几种分类器(包括机器学习算法)应用于提取的模板,并将流量分为两类:恶意和合法。我们的大量实验表明,我们的方法区分恶意和合法流量的准确率高达97.1%,同时保持误报低于1.0%。
{"title":"BotDetector: A robust and scalable approach toward detecting malware-infected devices","authors":"Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto","doi":"10.1109/ICC.2017.7997372","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997372","url":null,"abstract":"Damage caused by malware is a serious problem that needs to be addressed. The recent rise in the spread of evasive malware has made it difficult to detect it at the pre-infection timing. Malware detection at post-infection timing is a promising approach that fulfills this gap. Given this background, this work aims to identify likely malware-infected devices from the measurement of Internet traffic. The advantage of the traffic-measurement-based approach is that it enables us to monitor a large number of clients. If we find a client as a source of malicious traffic, the client is likely a malware-infected device. Since the majority of malware today makes use of the web as a means to communicate with the C&C servers that reside on the external network, we leverage information recorded in the HTTP headers to discriminate between malicious and legitimate traffic. To make our approach scalable and robust, we develop the automatic template generation scheme that drastically reduces the amount of information to be kept while achieving the high accuracy of classification; since it does not make use of any domain knowledge, the approach should be robust against changes of malware. We apply several classifiers, which include machine learning algorithms, to the extracted templates and classify traffic into two categories: malicious and legitimate. Our extensive experiments demonstrate that our approach discriminates between malicious and legitimate traffic with up to 97.1% precision while maintaining the false positive below 1.0%.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"46 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83283953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cost aware caching and streaming scheduling for efficient cloud based TV 具有成本意识的缓存和流调度,用于高效的基于云的电视
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997150
Zinelaabidine Nadir, Miloud Bagaa, T. Taleb
Internet Protocol Television (IPTV) has become widely used to deliver TV channels over the Internet. Tremendous efforts have been carried out for making IPTV services an alternative to traditional TV by offering low-cost TV channels. The cloud network offers many advantages that give more flexibility for sharing the content and reducing the cost for endusers. In this paper, we explore the strength of cloud by allowing different users to create cost-efficient TV channels on top of the cloud. The proposed algorithm reduces the cost by exploring the shared content in the cloud network. The simultaneous streaming of the content shared among different channels will reduce the number of streams in the network, and consequently the otherwise incurred cost. This can be achieved through a smart scheduling mechanism that schedules the streaming of the same video to a large number of channels at the same time. The obtained results prove the efficiency of the proposed solution in terms of cost efficiency.
互联网协议电视(IPTV)已被广泛用于通过互联网传送电视频道。通过提供低成本的电视频道,为使IPTV服务成为传统电视的替代品而进行了巨大的努力。云网络提供了许多优势,为共享内容和降低最终用户的成本提供了更大的灵活性。在本文中,我们通过允许不同的用户在云上创建具有成本效益的电视频道来探索云的力量。该算法通过探索云网络中的共享内容来降低成本。在不同频道之间共享内容的同时流将减少网络中的流数量,从而减少其他方面的成本。这可以通过一种智能调度机制来实现,该机制可以同时将同一视频的流媒体安排到大量频道。所得结果从成本效率的角度证明了所提方案的有效性。
{"title":"Cost aware caching and streaming scheduling for efficient cloud based TV","authors":"Zinelaabidine Nadir, Miloud Bagaa, T. Taleb","doi":"10.1109/ICC.2017.7997150","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997150","url":null,"abstract":"Internet Protocol Television (IPTV) has become widely used to deliver TV channels over the Internet. Tremendous efforts have been carried out for making IPTV services an alternative to traditional TV by offering low-cost TV channels. The cloud network offers many advantages that give more flexibility for sharing the content and reducing the cost for endusers. In this paper, we explore the strength of cloud by allowing different users to create cost-efficient TV channels on top of the cloud. The proposed algorithm reduces the cost by exploring the shared content in the cloud network. The simultaneous streaming of the content shared among different channels will reduce the number of streams in the network, and consequently the otherwise incurred cost. This can be achieved through a smart scheduling mechanism that schedules the streaming of the same video to a large number of channels at the same time. The obtained results prove the efficiency of the proposed solution in terms of cost efficiency.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86428520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Content delivery network slicing: QoE and cost awareness 内容分发网络切片:QoE和成本意识
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996499
Sara Retal, Miloud Bagaa, T. Taleb, H. Flinck
Content Delivery Networks (CDNs) emerged to manage the great amount of content, as well as the transmissions over long distances. In recent years, this concept proves to be a promising solution for emergent enterprises. In this paper, we present a Content Delivery Network as a Service (CDNaaS) platform which can create virtual machines (VMs) through a network of data centers and provide a customized slice of CDN to users. CDNaaS manages a great number of videos by means of caches, transcoders, and streamers hosted in different VMs. However, an optimal placement of VMs with adequate flavors for the different images is required to obtain an efficient slice of CDN. In this work, we argue the need to find a convenient slice for the CDN owner while respecting his performance requirements and minimizing as much as possible the incurred cost. We first formulate the VMs placement problem as two Linear Integer problem solutions, aiming at minimizing the cost and maximizing the quality of experience of streaming. Then, extensive simulation results are presented to illustrate the effectiveness of the proposed models.
内容传送网络(cdn)的出现是为了管理大量的内容,以及远距离的传输。近年来,这一概念被证明是新兴企业的一个很有前途的解决方案。在本文中,我们提出了一个内容交付网络即服务(CDNaaS)平台,该平台可以通过数据中心网络创建虚拟机(vm),并为用户提供定制的CDN切片。CDNaaS通过托管在不同vm中的缓存、转码器和流媒体来管理大量的视频。然而,为了获得有效的CDN切片,需要为不同的映像配置具有适当风格的vm的最佳位置。在这项工作中,我们认为需要为CDN所有者找到一个方便的切片,同时尊重他的性能要求并尽可能减少所产生的成本。我们首先将虚拟机放置问题表述为两个线性整数问题解决方案,旨在最小化成本和最大化流媒体体验质量。然后,给出了大量的仿真结果来说明所提模型的有效性。
{"title":"Content delivery network slicing: QoE and cost awareness","authors":"Sara Retal, Miloud Bagaa, T. Taleb, H. Flinck","doi":"10.1109/ICC.2017.7996499","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996499","url":null,"abstract":"Content Delivery Networks (CDNs) emerged to manage the great amount of content, as well as the transmissions over long distances. In recent years, this concept proves to be a promising solution for emergent enterprises. In this paper, we present a Content Delivery Network as a Service (CDNaaS) platform which can create virtual machines (VMs) through a network of data centers and provide a customized slice of CDN to users. CDNaaS manages a great number of videos by means of caches, transcoders, and streamers hosted in different VMs. However, an optimal placement of VMs with adequate flavors for the different images is required to obtain an efficient slice of CDN. In this work, we argue the need to find a convenient slice for the CDN owner while respecting his performance requirements and minimizing as much as possible the incurred cost. We first formulate the VMs placement problem as two Linear Integer problem solutions, aiming at minimizing the cost and maximizing the quality of experience of streaming. Then, extensive simulation results are presented to illustrate the effectiveness of the proposed models.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"222 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75547939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Heartbeat detection with Doppler radar based on spectrogram 基于谱图的多普勒雷达心跳检测
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996378
Eriko Mogi, T. Ohtsuki
A variability of R-R intervals that represent the peak-to-peak intervals of the heartbeats indicates the mental condition. Doppler radar can capture the information of heartbeats with less burden on subjects, which leads to less stress of subjects. However, non-contact heartbeat detection using Doppler radar is easily affected by respiration and body movements. In this paper, we propose a detection algorithm of R-R intervals based on the spectrogram. Our algorithm determines the frequency bands containing the heartbeats components from the frequencies that might respond to heartbeats in the spectrogram. We integrate the amplitudes of frequencies due to heartbeats within the frequency band to eliminate the noise caused by respiration and small body movements. Then, we detect peaks in the integrated amplitudes of frequencies corresponding to heartbeats. In general, the R-R intervals do not largely change between two adjacent intervals. Thus, we set a threshold to the difference of two adjacent peak-to-peak intervals that are detected. If the peak-to-peak interval is judged not corresponding to an R-R interval by the threshold, we remove the corresponding peak and interpolate a peak based on the adjacent peak-to-peak intervals. Through experiments, we show that when the subjects were sitting still, our algorithm improved the detection accuracy of the R-R intervals compared with our previous algorithm that was able to achieve a better detection accuracy than the other existing algorithms. Moreover, we confirmed that the improvement of the detection accuracy is effective to accurately calculate the stress index.
R-R间隔的可变性表示心跳的峰值到峰值间隔,表明精神状况。多普勒雷达可以捕获心跳信息,对被测者的负担较小,从而减轻被测者的压力。然而,使用多普勒雷达的非接触式心跳检测容易受到呼吸和身体运动的影响。本文提出了一种基于谱图的R-R区间检测算法。我们的算法从频谱图中可能响应心跳的频率中确定包含心跳成分的频带。我们在频带内整合心跳频率的振幅,以消除呼吸和微小的身体运动引起的噪音。然后,我们在与心跳相对应的频率的综合振幅中检测峰值。一般来说,R-R区间在两个相邻区间之间变化不大。因此,我们为检测到的两个相邻峰到峰间隔的差设置一个阈值。如果通过阈值判断峰到峰间隔不对应于R-R间隔,则移除相应的峰,并根据相邻的峰到峰间隔插入一个峰。通过实验,我们发现当被试静止不动时,我们的算法比我们之前的算法提高了R-R区间的检测精度,能够达到比其他现有算法更好的检测精度。进一步验证了检测精度的提高对于准确计算应力指数是有效的。
{"title":"Heartbeat detection with Doppler radar based on spectrogram","authors":"Eriko Mogi, T. Ohtsuki","doi":"10.1109/ICC.2017.7996378","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996378","url":null,"abstract":"A variability of R-R intervals that represent the peak-to-peak intervals of the heartbeats indicates the mental condition. Doppler radar can capture the information of heartbeats with less burden on subjects, which leads to less stress of subjects. However, non-contact heartbeat detection using Doppler radar is easily affected by respiration and body movements. In this paper, we propose a detection algorithm of R-R intervals based on the spectrogram. Our algorithm determines the frequency bands containing the heartbeats components from the frequencies that might respond to heartbeats in the spectrogram. We integrate the amplitudes of frequencies due to heartbeats within the frequency band to eliminate the noise caused by respiration and small body movements. Then, we detect peaks in the integrated amplitudes of frequencies corresponding to heartbeats. In general, the R-R intervals do not largely change between two adjacent intervals. Thus, we set a threshold to the difference of two adjacent peak-to-peak intervals that are detected. If the peak-to-peak interval is judged not corresponding to an R-R interval by the threshold, we remove the corresponding peak and interpolate a peak based on the adjacent peak-to-peak intervals. Through experiments, we show that when the subjects were sitting still, our algorithm improved the detection accuracy of the R-R intervals compared with our previous algorithm that was able to achieve a better detection accuracy than the other existing algorithms. Moreover, we confirmed that the improvement of the detection accuracy is effective to accurately calculate the stress index.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85534834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design and analysis of elastic handoff in cognitive cellular networks 认知细胞网络弹性切换的设计与分析
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996835
S. Raju, Sai Boddepalli, Neelabjo Choudhury, Qiben Yan, J. Deogun
Cognitive cellular networks can enable opportunistic network access but their effectiveness relies on adaptive handoff algorithms. However, in cognitive radio networks the usufructuary rights of a secondary user are rescinded due to the unanticipated appearance of a primary user causing potential service disruption. In order to provide uninterrupted service to a cognitive cellular user, we propose elastic handoff as a composite framework of conventional cellular and voluntary spectrum handoffs. As with spectrum handoff, elastic handoff grants secondary users spectrum access while insulating them against the arrival of primary users. On the other hand, it is similar to cellular handoff in providing secondary users service assurance. The setup also offers users multiple network access choices, and affords carriers the means to generate additional revenue by capitalizing on excess capacity. We use a blockchain-based spectrum exchange and smart contracts to implement elastic handoff. Our tests show that user-initiated elastic handoff may reduce call drops by up to half compared to observations from a conventional cellular market, and network-initiated elastic handoff can improve a carrier's revenue maximization prospects.
认知蜂窝网络可以实现机会网络访问,但其有效性依赖于自适应切换算法。然而,在认知无线网络中,由于主用户的意外出现导致潜在的服务中断,二级用户的用益权被取消。为了向认知蜂窝用户提供不间断服务,我们提出弹性切换作为传统蜂窝和自愿频谱切换的复合框架。与频谱切换一样,弹性切换允许从用户访问频谱,同时隔离主用户的到来。另一方面,它在提供辅助用户服务保证方面类似于蜂窝切换。这种设置还为用户提供了多种网络接入选择,并为运营商提供了通过利用过剩容量来产生额外收入的手段。我们使用基于区块链的频谱交换和智能合约来实现弹性切换。我们的测试表明,与传统蜂窝市场的观察结果相比,用户发起的弹性切换可以减少多达一半的通话掉线,而网络发起的弹性切换可以提高运营商的收入最大化前景。
{"title":"Design and analysis of elastic handoff in cognitive cellular networks","authors":"S. Raju, Sai Boddepalli, Neelabjo Choudhury, Qiben Yan, J. Deogun","doi":"10.1109/ICC.2017.7996835","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996835","url":null,"abstract":"Cognitive cellular networks can enable opportunistic network access but their effectiveness relies on adaptive handoff algorithms. However, in cognitive radio networks the usufructuary rights of a secondary user are rescinded due to the unanticipated appearance of a primary user causing potential service disruption. In order to provide uninterrupted service to a cognitive cellular user, we propose elastic handoff as a composite framework of conventional cellular and voluntary spectrum handoffs. As with spectrum handoff, elastic handoff grants secondary users spectrum access while insulating them against the arrival of primary users. On the other hand, it is similar to cellular handoff in providing secondary users service assurance. The setup also offers users multiple network access choices, and affords carriers the means to generate additional revenue by capitalizing on excess capacity. We use a blockchain-based spectrum exchange and smart contracts to implement elastic handoff. Our tests show that user-initiated elastic handoff may reduce call drops by up to half compared to observations from a conventional cellular market, and network-initiated elastic handoff can improve a carrier's revenue maximization prospects.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89039042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hybrid POF/VLC link with M-PAM and MLP equaliser 混合POF/VLC链接与M-PAM和MLP均衡器
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996426
I. Osahon, E. Pikasis, S. Rajbhandari, W. Popoola
We propose and experimentally demonstrate for the first time, M-PAM transmission through a hybrid POF/VLC downlink using off-the-shelf components. The link consists of 60 m SI-POF and 1 m VLC and with the aid of a blue filter, the link has an effective bandwidth of 17 MHz. Conventional adaptive decision feedback equaliser (DFE) and multi-layer perceptron DFE (MLP-DFE) are also implemented and their bit error rate (BER) performances are measured and compared with offline (MATLAB) implementation. For the conventional DFE, the achievable data rates at a BER of 10−3 are 60, 91.5 and 80 Mbps for M = 2, 4 and 8 respectively. Higher data rates are achieved for MLP-DFE at the same BER of 10−3 as we obtained 61.5, 95 and 85 Mbps for M = 2, 4 and 8 respectively. Thus, we show that MLP-DFE offers superior BER performance than conventional DFE for higher PAM level.
我们首次提出并实验证明了M-PAM通过使用现成组件的混合POF/VLC下行链路传输。该链路由60 m SI-POF和1 m VLC组成,在蓝色滤波器的帮助下,链路的有效带宽为17 MHz。实现了传统的自适应决策反馈均衡器(DFE)和多层感知器(MLP-DFE),并测量了它们的误码率(BER)性能,并与离线(MATLAB)实现进行了比较。对于传统DFE,当M = 2、4和8时,在BER为10−3时可实现的数据速率分别为60、91.5和80 Mbps。与M = 2、4和8时分别获得的61.5、95和85 Mbps相比,在相同BER为10−3的情况下,MLP-DFE获得了更高的数据速率。因此,我们发现MLP-DFE在更高的PAM水平下比传统DFE具有更好的BER性能。
{"title":"Hybrid POF/VLC link with M-PAM and MLP equaliser","authors":"I. Osahon, E. Pikasis, S. Rajbhandari, W. Popoola","doi":"10.1109/ICC.2017.7996426","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996426","url":null,"abstract":"We propose and experimentally demonstrate for the first time, M-PAM transmission through a hybrid POF/VLC downlink using off-the-shelf components. The link consists of 60 m SI-POF and 1 m VLC and with the aid of a blue filter, the link has an effective bandwidth of 17 MHz. Conventional adaptive decision feedback equaliser (DFE) and multi-layer perceptron DFE (MLP-DFE) are also implemented and their bit error rate (BER) performances are measured and compared with offline (MATLAB) implementation. For the conventional DFE, the achievable data rates at a BER of 10−3 are 60, 91.5 and 80 Mbps for M = 2, 4 and 8 respectively. Higher data rates are achieved for MLP-DFE at the same BER of 10−3 as we obtained 61.5, 95 and 85 Mbps for M = 2, 4 and 8 respectively. Thus, we show that MLP-DFE offers superior BER performance than conventional DFE for higher PAM level.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73740666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lightweight service replication for ultra-short latency applications in mobile edge networks 移动边缘网络中超短延迟应用的轻量级服务复制
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996357
I. Farris, T. Taleb, A. Iera, H. Flinck
Edge Cloud infrastructure will play a key role in extending the range of supported real-time cloud applications, by guaranteeing extremely fast response times. However, user mobility requires fast relocation of service instances, which represents an open challenge for resource-constrained cloudlets interconnected by high-latency and low-bandwidth links. In this paper, we investigate container-based virtualization techniques to support dynamic Mobile Edge Computing (MEC) environments. In particular, we design a framework to guarantee fast response time, by proactively exploiting service replication. A preliminary performance analysis is conducted to identify the possible advantages introduced by the proposed approach compared to classic migration procedures.
边缘云基础设施将通过保证极快的响应时间,在扩展支持的实时云应用范围方面发挥关键作用。然而,用户移动性需要快速重新定位服务实例,这对于通过高延迟和低带宽链路互连的资源受限的云来说是一个公开的挑战。在本文中,我们研究了基于容器的虚拟化技术,以支持动态移动边缘计算(MEC)环境。特别是,我们设计了一个框架,通过主动利用服务复制来保证快速响应时间。进行了初步的性能分析,以确定与经典迁移过程相比,所提出的方法可能带来的优势。
{"title":"Lightweight service replication for ultra-short latency applications in mobile edge networks","authors":"I. Farris, T. Taleb, A. Iera, H. Flinck","doi":"10.1109/ICC.2017.7996357","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996357","url":null,"abstract":"Edge Cloud infrastructure will play a key role in extending the range of supported real-time cloud applications, by guaranteeing extremely fast response times. However, user mobility requires fast relocation of service instances, which represents an open challenge for resource-constrained cloudlets interconnected by high-latency and low-bandwidth links. In this paper, we investigate container-based virtualization techniques to support dynamic Mobile Edge Computing (MEC) environments. In particular, we design a framework to guarantee fast response time, by proactively exploiting service replication. A preliminary performance analysis is conducted to identify the possible advantages introduced by the proposed approach compared to classic migration procedures.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76453799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Secure outage probability over κ-μ fading channels κ-μ衰落信道上的安全中断概率
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996664
Shunya Iwata, T. Ohtsuki, P. Kam
In this paper, we derive the analytical expressions for the secure outage probability in a single-input single-output (SISO) system over fading, in which both the main and eavesdropper channels are subject to κ-μ fading. Many authors have analyzed the secrecy performance of such a SISO system over various fading models. More recently, a lower bound on the secure outage probability over κ-μ fading has been reported. However, the exact analytical expression of secure outage probability over κ-μ fading has not been obtained. The problem with using the lower bound is that we are not sure about the tightness of the bound. Our result is an exact expression which is verified by Monte-Carlo simulations. Furthermore, it enables us to examine the behavior of the secure outage probability as a function of the fading parameters of both the main and eavesdropper channels for given values of the average signal-to-noise power ratio (SNR) over these channels. Exact expressions for the case of Nakagami-m and Rician fading models for both the main and eavesdropper channels are also obtained and verified by simulations.
本文导出了在主信道和窃听信道均受κ-μ衰落影响的单输入单输出(SISO)系统中安全中断概率的解析表达式。许多作者分析了这种SISO系统在各种衰落模型下的保密性能。最近,已经报道了κ-μ衰落下安全中断概率的下界。但是,目前还没有得到κ-μ衰落下安全中断概率的精确解析表达式。使用下界的问题在于我们不能确定边界的紧密性。我们的结果是一个精确的表达式,并通过蒙特卡罗模拟得到了验证。此外,它使我们能够在给定的平均信噪比(SNR)值下,检查安全中断概率作为主信道和窃听信道衰落参数的函数的行为。文中还得到了主信道和窃听信道的Nakagami-m衰落模型和ricr衰落模型的精确表达式,并通过仿真进行了验证。
{"title":"Secure outage probability over κ-μ fading channels","authors":"Shunya Iwata, T. Ohtsuki, P. Kam","doi":"10.1109/ICC.2017.7996664","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996664","url":null,"abstract":"In this paper, we derive the analytical expressions for the secure outage probability in a single-input single-output (SISO) system over fading, in which both the main and eavesdropper channels are subject to κ-μ fading. Many authors have analyzed the secrecy performance of such a SISO system over various fading models. More recently, a lower bound on the secure outage probability over κ-μ fading has been reported. However, the exact analytical expression of secure outage probability over κ-μ fading has not been obtained. The problem with using the lower bound is that we are not sure about the tightness of the bound. Our result is an exact expression which is verified by Monte-Carlo simulations. Furthermore, it enables us to examine the behavior of the secure outage probability as a function of the fading parameters of both the main and eavesdropper channels for given values of the average signal-to-noise power ratio (SNR) over these channels. Exact expressions for the case of Nakagami-m and Rician fading models for both the main and eavesdropper channels are also obtained and verified by simulations.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87773596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wearable healthcare systems: A single channel accelerometer based anomaly detector for studies of gait freezing in Parkinson's disease 可穿戴医疗保健系统:用于帕金森病步态冻结研究的单通道加速度计异常检测器
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997415
T. Pham, Diep N. Nguyen, E. Dutkiewicz, A. McEwan, P. Leong
The causality of gait freezing in patients with advanced Parkinson's disease is still not fully understood. Clinicians are interested in investigating the freezing of gait (FoG) histogram of patients in their daily life. To that end, one needs a real-time signal processing platform that can help record freezing information (e.g., timing and the duration of every gait freezing occurrences). Wearable wireless sensors have been proposed to monitor FoG epochs. Existing automated methods using accelerometers have been introduced with high accuracy performance only for subject-dependent settings (e.g., an individual offline training process). This is a troublesome for large scale out-of-lab deployment and time-consuming. In this work, we used spectral coherence analysis for accelerometer data to apply an anomaly detection approach. Conventional features such as energy and freezing index are introduced to help refine normal epochs while the anomaly scores from spectral coherence measures define FoG epochs. Using this new set of features, our new FoG detector for subject-independent settings achieves the mean ±SD sensitivity (specificity) of 89.2±0.3% (95.6 ± 0.3%). To our best knowledge, this is the best performance for automated subject-independent approaches in literature of freezing of gait detection.
晚期帕金森病患者步态冻结的因果关系尚不完全清楚。临床医生对研究患者在日常生活中的步态冻结直方图很感兴趣。为此,需要一个实时信号处理平台,可以帮助记录冻结信息(例如,每次步态冻结发生的时间和持续时间)。可穿戴式无线传感器已被提出用于监测FoG时代。现有的使用加速度计的自动化方法仅在与主题相关的设置(例如,个人离线训练过程)中具有高精度性能。对于大规模的实验室外部署来说,这是一个麻烦的问题,而且很耗时。在这项工作中,我们对加速度计数据使用光谱相干性分析来应用异常检测方法。引入常规特征,如能量和冻结指数,以帮助细化正常年代,而光谱相干性测量的异常分数则定义了FoG年代。利用这组新的特征,我们的新的FoG检测器在受试者独立设置下的平均±SD灵敏度(特异性)为89.2±0.3%(95.6±0.3%)。据我们所知,这是在冻结步态检测的文献中自动主体独立方法的最佳性能。
{"title":"Wearable healthcare systems: A single channel accelerometer based anomaly detector for studies of gait freezing in Parkinson's disease","authors":"T. Pham, Diep N. Nguyen, E. Dutkiewicz, A. McEwan, P. Leong","doi":"10.1109/ICC.2017.7997415","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997415","url":null,"abstract":"The causality of gait freezing in patients with advanced Parkinson's disease is still not fully understood. Clinicians are interested in investigating the freezing of gait (FoG) histogram of patients in their daily life. To that end, one needs a real-time signal processing platform that can help record freezing information (e.g., timing and the duration of every gait freezing occurrences). Wearable wireless sensors have been proposed to monitor FoG epochs. Existing automated methods using accelerometers have been introduced with high accuracy performance only for subject-dependent settings (e.g., an individual offline training process). This is a troublesome for large scale out-of-lab deployment and time-consuming. In this work, we used spectral coherence analysis for accelerometer data to apply an anomaly detection approach. Conventional features such as energy and freezing index are introduced to help refine normal epochs while the anomaly scores from spectral coherence measures define FoG epochs. Using this new set of features, our new FoG detector for subject-independent settings achieves the mean ±SD sensitivity (specificity) of 89.2±0.3% (95.6 ± 0.3%). To our best knowledge, this is the best performance for automated subject-independent approaches in literature of freezing of gait detection.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83902908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1