首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity 基于发电量归一化的太阳能发电系统异常检测
Yohei Akiyama, Y. Kasai, M. Iwata, E. Takahashi, Fumiaki Sato, M. Murakawa
Solar power generation has attracted significant attention recently as a safe and environmentally friendly renewable energy source. However, generally speaking, since the service lives of solar power systems are relatively long, and since it is difficult to detect anomalies in individual solar panels, such plants tend to operate without much consideration for individual panel anomalies. In order to more comprehensively monitor solar power generation systems, the National Institute of Advanced Industrial Science and Technology (AIST) of Japan has developed a direct current (DC) power line communication system that enables monitoring of each panel in a system. Monitored data are then integrated and uploaded to the cloud. Using this monitored data, we found that the integrated power ratio trends of single panel power output are in accordance with a normal distribution. Therefore, herein, we propose an anomaly detection method that uses a normal distribution. We then describe an experiment using 24 solar panels into which pseudo-faults were induced and show that our proposal makes it possible to detect errors with high accuracy.
太阳能发电作为一种安全、环保的可再生能源,近年来备受关注。然而,一般来说,由于太阳能发电系统的使用寿命相对较长,并且很难检测到单个太阳能电池板的异常情况,因此此类电站往往不太考虑单个太阳能电池板的异常情况。为了更全面地监测太阳能发电系统,日本国家先进工业科学技术研究所(AIST)开发了一种直流(DC)电力线通信系统,可以监测系统中的每个面板。然后,监控数据被整合并上传到云端。利用这些监测数据,我们发现单面板功率输出的综合功率比趋势符合正态分布。因此,本文提出了一种利用正态分布的异常检测方法。然后,我们描述了一个用24块太阳能电池板诱发伪故障的实验,并表明我们的建议可以高精度地检测错误。
{"title":"Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity","authors":"Yohei Akiyama, Y. Kasai, M. Iwata, E. Takahashi, Fumiaki Sato, M. Murakawa","doi":"10.1109/AINA.2015.198","DOIUrl":"https://doi.org/10.1109/AINA.2015.198","url":null,"abstract":"Solar power generation has attracted significant attention recently as a safe and environmentally friendly renewable energy source. However, generally speaking, since the service lives of solar power systems are relatively long, and since it is difficult to detect anomalies in individual solar panels, such plants tend to operate without much consideration for individual panel anomalies. In order to more comprehensively monitor solar power generation systems, the National Institute of Advanced Industrial Science and Technology (AIST) of Japan has developed a direct current (DC) power line communication system that enables monitoring of each panel in a system. Monitored data are then integrated and uploaded to the cloud. Using this monitored data, we found that the integrated power ratio trends of single panel power output are in accordance with a normal distribution. Therefore, herein, we propose an anomaly detection method that uses a normal distribution. We then describe an experiment using 24 solar panels into which pseudo-faults were induced and show that our proposal makes it possible to detect errors with high accuracy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"71 1","pages":"294-301"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85896692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Resource-aware Business Process development in the Cloud 面向云中的资源感知业务流程开发
E. Hachicha, Walid Gaaloul
In recent years, cloud environments have emerged as a new paradigm for the execution and the deployment of cost-reduced and optimized business processes. Nevertheless, due to the lack of explicit and formal description of the resource perspective in existing business processes, cloud resources cannot be efficiently and optimally managed. With the aim of formalizing the consumed cloud resources using a shared knowledge base, we propose in this paper a semantic framework for resource-aware business process development in the cloud. Basically, our proposed semantic framework allows for (1) resource description in a formal and unique way, (2) resource allocation management and (3) resource constraints verification. In order to show its feasibility, our approach has been implemented as an extension of Signavio process editor and tested using a real use case study from an industrial partner.
近年来,云环境已经成为执行和部署成本降低和优化的业务流程的新范例。然而,由于现有业务流程中缺乏对资源透视图的明确和正式描述,因此无法有效和最佳地管理云资源。为了使用共享知识库形式化所使用的云资源,我们在本文中提出了一个用于云中资源感知业务流程开发的语义框架。基本上,我们提出的语义框架允许(1)以正式和独特的方式描述资源,(2)资源分配管理和(3)资源约束验证。为了展示其可行性,我们的方法已经作为Signavio流程编辑器的扩展实现,并使用来自行业合作伙伴的真实用例研究进行了测试。
{"title":"Towards Resource-aware Business Process development in the Cloud","authors":"E. Hachicha, Walid Gaaloul","doi":"10.1109/AINA.2015.265","DOIUrl":"https://doi.org/10.1109/AINA.2015.265","url":null,"abstract":"In recent years, cloud environments have emerged as a new paradigm for the execution and the deployment of cost-reduced and optimized business processes. Nevertheless, due to the lack of explicit and formal description of the resource perspective in existing business processes, cloud resources cannot be efficiently and optimally managed. With the aim of formalizing the consumed cloud resources using a shared knowledge base, we propose in this paper a semantic framework for resource-aware business process development in the cloud. Basically, our proposed semantic framework allows for (1) resource description in a formal and unique way, (2) resource allocation management and (3) resource constraints verification. In order to show its feasibility, our approach has been implemented as an extension of Signavio process editor and tested using a real use case study from an industrial partner.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"761-768"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72786775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks 基于蜂窝网络拓扑结构的隐私保护最近邻搜索
Mahdi Daghmehchi Firoozjaei, Jaegwan Yu, Hyoungshick Kim
As the popularity of location-based services (LBSes) is increasing, the location privacy has become a main concern. Among the rich collection of location privacy techniques, the spatial cloaking is one of the most popular techniques. In this paper, we propose a new spatial cloaking technique to hide a user's location under a cloaking of the serving base station (SeNB) and anonymize SeNB with a group of dummy locations in the neighboring group of another base station as central eNB (CeNB). Unlike the most existing approaches for selecting a dummy location, such as the center of a virtual circle, we select a properly chosen dummy location from real locations of eNBs to minimize side information for an adversary. Our experimental results show that the proposed scheme can achieve a reasonable degree of accuracy (>96%) for nearest neighbor services while providing a high level of location privacy.
随着基于位置服务(lbs)的日益普及,位置隐私问题成为人们关注的焦点。在众多的位置隐私技术中,空间隐身技术是最受欢迎的技术之一。在本文中,我们提出了一种新的空间隐身技术,将用户的位置隐藏在服务基站(SeNB)的伪装下,并使用另一个基站相邻组中的一组虚拟位置作为中心eNB (CeNB)来匿名服务基站(SeNB)。与大多数现有的选择虚拟位置的方法(如虚拟圆的中心)不同,我们从enb的真实位置中选择适当选择的虚拟位置,以最大限度地减少对手的侧信息。实验结果表明,该方案能够在提供高度位置隐私的同时,为最近邻服务提供合理的准确度(>96%)。
{"title":"Privacy Preserving Nearest Neighbor Search Based on Topologies in Cellular Networks","authors":"Mahdi Daghmehchi Firoozjaei, Jaegwan Yu, Hyoungshick Kim","doi":"10.1109/WAINA.2015.22","DOIUrl":"https://doi.org/10.1109/WAINA.2015.22","url":null,"abstract":"As the popularity of location-based services (LBSes) is increasing, the location privacy has become a main concern. Among the rich collection of location privacy techniques, the spatial cloaking is one of the most popular techniques. In this paper, we propose a new spatial cloaking technique to hide a user's location under a cloaking of the serving base station (SeNB) and anonymize SeNB with a group of dummy locations in the neighboring group of another base station as central eNB (CeNB). Unlike the most existing approaches for selecting a dummy location, such as the center of a virtual circle, we select a properly chosen dummy location from real locations of eNBs to minimize side information for an adversary. Our experimental results show that the proposed scheme can achieve a reasonable degree of accuracy (>96%) for nearest neighbor services while providing a high level of location privacy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"89 1","pages":"146-149"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77022782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Message Suppression Controller for Vehicular Delay Tolerant Networking 一种车载容延迟网络的消息抑制控制器
Taiki Honda, Makoto Ikeda, S. Ishikawa, L. Barolli
In this paper, we propose a Message Suppression Controller (MSC) for Vehicular Delay Tolerant Networking (VDTN) under highly stressed environment. The simulations for two scenarios are conducted considering obstacles (buildings), where MSC with Road side units (MSCRs) are present or not present. We consider 802.11p standard and send bundle messages in a Manhattan grid scenario. We use the duplicated bundle received, end-to-end delay, number of sent messages, Packet Delivery Ratio (PDR) and storage usage as evaluation metrics. Based on simulation results, we found that our proposed method can reduce the number of sent messages in the network without reducing the PDR.
本文提出了一种适用于高压力环境下车载容错网络(VDTN)的消息抑制控制器(MSC)。两种场景的模拟是考虑障碍物(建筑物),其中存在或不存在带有路边单元(mscr)的MSC。我们考虑802.11p标准,并在曼哈顿网格场景中发送捆绑消息。我们使用接收到的重复包、端到端延迟、发送的消息数、包交付率(PDR)和存储使用情况作为评估指标。仿真结果表明,该方法可以在不降低PDR的情况下减少网络中发送的消息数。
{"title":"A Message Suppression Controller for Vehicular Delay Tolerant Networking","authors":"Taiki Honda, Makoto Ikeda, S. Ishikawa, L. Barolli","doi":"10.1109/AINA.2015.264","DOIUrl":"https://doi.org/10.1109/AINA.2015.264","url":null,"abstract":"In this paper, we propose a Message Suppression Controller (MSC) for Vehicular Delay Tolerant Networking (VDTN) under highly stressed environment. The simulations for two scenarios are conducted considering obstacles (buildings), where MSC with Road side units (MSCRs) are present or not present. We consider 802.11p standard and send bundle messages in a Manhattan grid scenario. We use the duplicated bundle received, end-to-end delay, number of sent messages, Packet Delivery Ratio (PDR) and storage usage as evaluation metrics. Based on simulation results, we found that our proposed method can reduce the number of sent messages in the network without reducing the PDR.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"52 1","pages":"754-760"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76034605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
User-Centric Contexts Sensing for Instant Information Seeking Support 面向即时信息寻求支持的以用户为中心的上下文感知
N. Yen, J. C. Hung
Use of portable devices receives a tremendous growth in recent years. Such device becomes a universal portal, which connects users and the Web together, in addition to its ordinary built purposes. Users tend to share things via available channels (and/or social media as well) with the convenience brought by the device. This phenomenon, however, brings to the publics an open issue about the management of a vast amount of data, or user generated content as its specific term, and its potential usage. So this research, from a perspective of information seeking, attempts to facilitate the process and achieve high return on information in a ubiquitous environment. Beginning with a computational model to efficient management of user-generated contents, a progressive search algorithm is applied to obtain correlated information in accordance with user contexts. The above mentioned process is meanwhile normalized by a dynamic temporal-spatial model, which is primarily proposed to highlight the significance of timely information that matches the ultimate task of users at specific moment. Experiment results demonstrate the performance of proposed model and algorithm, and also the feasibility of this study.
近年来,便携式设备的使用得到了极大的增长。这样的设备成为一个通用的门户,将用户和网络连接在一起,除了其普通的构建目的。随着设备带来的便利,用户倾向于通过可用的渠道(和/或社交媒体)分享东西。然而,这种现象给公众带来了一个悬而未决的问题,即海量数据的管理,或用户生成内容的具体术语,以及它的潜在用途。因此,本研究从信息寻找的角度出发,试图在无所不在的环境中促进这一过程,实现信息的高回报。从有效管理用户生成内容的计算模型入手,采用渐进式搜索算法,根据用户上下文获取相关信息。同时,通过动态时空模型对上述过程进行规范化,主要是为了突出在特定时刻与用户最终任务相匹配的及时信息的重要性。实验结果验证了所提模型和算法的有效性,也验证了本研究的可行性。
{"title":"User-Centric Contexts Sensing for Instant Information Seeking Support","authors":"N. Yen, J. C. Hung","doi":"10.1109/AINA.2015.200","DOIUrl":"https://doi.org/10.1109/AINA.2015.200","url":null,"abstract":"Use of portable devices receives a tremendous growth in recent years. Such device becomes a universal portal, which connects users and the Web together, in addition to its ordinary built purposes. Users tend to share things via available channels (and/or social media as well) with the convenience brought by the device. This phenomenon, however, brings to the publics an open issue about the management of a vast amount of data, or user generated content as its specific term, and its potential usage. So this research, from a perspective of information seeking, attempts to facilitate the process and achieve high return on information in a ubiquitous environment. Beginning with a computational model to efficient management of user-generated contents, a progressive search algorithm is applied to obtain correlated information in accordance with user contexts. The above mentioned process is meanwhile normalized by a dynamic temporal-spatial model, which is primarily proposed to highlight the significance of timely information that matches the ultimate task of users at specific moment. Experiment results demonstrate the performance of proposed model and algorithm, and also the feasibility of this study.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"114 1","pages":"310-315"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88014881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis 基于协议的RFID系统聚类标签建模及形式化安全分析
Bruce Ndibanje, Hyunho Kim, Young Jin Kang, Young-Sil Lee, Hoon-Jae Lee
This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where they interchange the data with the reader whenever it sends a request. This scheme provides a strong mutual authentication framework that suits for real heterogeneous RFID applications such as in supply-chain management systems, healthcare monitoring and industrial environment. In addition, we contribute with a mathematical analysis to the delay analysis and optimization in a clustering topology tag-based. Finally, a formal security and proof analysis is demonstrated to prove the effectiveness of the proposed protocol and that achieves security and privacy.
为了保证RFID系统中用户的隐私和数据的完整性,提出了一种高效、自适应的加密协议。射频识别技术提供了更智能的系统和应用,但在采用之前和之后都必须解决隐私和安全问题。所提出的模型的设计基于所涉及标签的集群配置,每当阅读器发送请求时,它们就与阅读器交换数据。该方案提供了一个强大的互认证框架,适用于供应链管理系统、医疗监控和工业环境等实际异构RFID应用。此外,我们还对基于聚类拓扑标签的延迟分析和优化进行了数学分析。最后,通过形式化的安全性和证明分析证明了所提出协议的有效性,并实现了安全性和隐私性。
{"title":"On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis","authors":"Bruce Ndibanje, Hyunho Kim, Young Jin Kang, Young-Sil Lee, Hoon-Jae Lee","doi":"10.1109/AINA.2015.227","DOIUrl":"https://doi.org/10.1109/AINA.2015.227","url":null,"abstract":"This paper presents an efficiency and adaptive cryptographic protocol to ensure users' privacy and data integrity in RFID system. Radio Frequency Identification technology offers more intelligent systems and applications, but privacy and security issues have to be addressed before and after its adoption. The design of the proposed model is based on clustering configuration of the involved tags where they interchange the data with the reader whenever it sends a request. This scheme provides a strong mutual authentication framework that suits for real heterogeneous RFID applications such as in supply-chain management systems, healthcare monitoring and industrial environment. In addition, we contribute with a mathematical analysis to the delay analysis and optimization in a clustering topology tag-based. Finally, a formal security and proof analysis is demonstrated to prove the effectiveness of the proposed protocol and that achieves security and privacy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 9 1","pages":"498-505"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82824814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Numerical Analysis of 1X4 Branch Waveguide in Two Dimensional Photonic Crystal Structure 二维光子晶体结构中1X4分支波导的数值分析
H. Maeda, N. Sakuma, Noriyuki Toyomasu, Ryoma Nishi, Daichi Ogata
Propagation and filtering characteristics of two dimensional (2D) pillar-type photonic crystal waveguide with triangular lattice were simulated by CIP method. The simulation results for Y-shaped branch and the cascaded 1X4 Yshaped branch waveguide were compared with measurements by using a scale model in microwave frequency range from 3.6 to 4.2 GHz. The resonant characteristics for cavities with various lengths were observed in good agreement with the experiment. This structure is applicable as a basic filter component in wavelength division multiplexing (WDM) systems in optical or microwave communication systems.
利用CIP方法模拟了三角形晶格二维柱型光子晶体波导的传输和滤波特性。在3.6 ~ 4.2 GHz微波频率范围内,用比例模型对y型支路和级联1X4型支路波导的仿真结果与实测结果进行了比较。对不同长度空腔的谐振特性进行了观测,与实验结果吻合较好。该结构适用于光或微波通信系统中作为波分复用(WDM)系统的基本滤波元件。
{"title":"Numerical Analysis of 1X4 Branch Waveguide in Two Dimensional Photonic Crystal Structure","authors":"H. Maeda, N. Sakuma, Noriyuki Toyomasu, Ryoma Nishi, Daichi Ogata","doi":"10.1109/WAINA.2015.90","DOIUrl":"https://doi.org/10.1109/WAINA.2015.90","url":null,"abstract":"Propagation and filtering characteristics of two dimensional (2D) pillar-type photonic crystal waveguide with triangular lattice were simulated by CIP method. The simulation results for Y-shaped branch and the cascaded 1X4 Yshaped branch waveguide were compared with measurements by using a scale model in microwave frequency range from 3.6 to 4.2 GHz. The resonant characteristics for cavities with various lengths were observed in good agreement with the experiment. This structure is applicable as a basic filter component in wavelength division multiplexing (WDM) systems in optical or microwave communication systems.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"282 1","pages":"366-369"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86739234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Approximating Document Frequency for Self-Index based Top-k Document Retrieval 基于自索引Top-k文档检索的近似文档频次
Tokinori Suzuki, Atsushi Fujii
Top-k document retrieval, which returns highly relevant documents relative to a query, is an essential task for many applications. One of the promising index frameworks is built by FM-index and wavelet tree for supporting efficient top-k document retrieval. The index, however, has difficulty on handling document frequency (DF) at search time because indexed terms are all substrings of a document collection. Previous works exhaustively search all the parts of the index, where most of the documents are not relevant, for DF calculation or store recalculated DF values in huge additional space. In this paper, we propose two methods to approximate DF of a query term by exploiting the information obtained from the process of traversing the index structures. Experimental results showed that our methods achieved almost equal effectiveness of exhaustive search while keeping search efficiency that time of our methods are about a half of the exhaustive search.
Top-k文档检索是许多应用程序的基本任务,它返回与查询高度相关的文档。其中一个很有前途的索引框架是利用fm索引和小波树来支持高效的top-k文档检索。但是,索引在搜索时难以处理文档频率(DF),因为索引的词都是文档集合的子字符串。以前的工作是详尽地搜索索引的所有部分,其中大多数文档是不相关的,用于DF计算或将重新计算的DF值存储在巨大的额外空间中。在本文中,我们提出了两种方法,利用从遍历索引结构中获得的信息来近似查询项的DF。实验结果表明,在保持搜索效率的同时,我们的方法几乎达到了穷举搜索的同等效果,而我们的方法的搜索时间大约是穷举搜索的一半。
{"title":"Approximating Document Frequency for Self-Index based Top-k Document Retrieval","authors":"Tokinori Suzuki, Atsushi Fujii","doi":"10.1109/WAINA.2015.68","DOIUrl":"https://doi.org/10.1109/WAINA.2015.68","url":null,"abstract":"Top-k document retrieval, which returns highly relevant documents relative to a query, is an essential task for many applications. One of the promising index frameworks is built by FM-index and wavelet tree for supporting efficient top-k document retrieval. The index, however, has difficulty on handling document frequency (DF) at search time because indexed terms are all substrings of a document collection. Previous works exhaustively search all the parts of the index, where most of the documents are not relevant, for DF calculation or store recalculated DF values in huge additional space. In this paper, we propose two methods to approximate DF of a query term by exploiting the information obtained from the process of traversing the index structures. Experimental results showed that our methods achieved almost equal effectiveness of exhaustive search while keeping search efficiency that time of our methods are about a half of the exhaustive search.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"18 1","pages":"541-546"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79089344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SkillsRec: A Novel Semantic Analysis Driven Learner Skills Mining and Filtering Approach for Personal Learning Environments Based on Teacher Guidance SkillsRec:一种基于教师指导的个人学习环境语义分析驱动的学习者技能挖掘和过滤方法
Z. A. Shaikh, D. Gillet, S. Khoja
This paper presents SkillsRec - a novel teacher guidance based learner skills mining and filtering approach that identifies learner skills for Personal Learning Environment (PLE) based learning scenarios using Latent Semantic Analysis (LSA) technique. Skills Rec is developed on PLE design and development principles of the guided PLEs model [1]. Skills Rec takes teacher competencies/roles [2] and learner interests as input, melds them using LSA, and returns learner skills for the PLE-based learning as output. We compare learner-skill similarity scores of the Skills Rec with those generated through conventional Information Retrieval (IR) and Keywords Matching (KM) techniques. The aim is to report Skills Rec gains over conventional IR techniques. Based on Skills Rec results, this paper also provides top N=8 user-user recommendations most likely to be similar for a given active learner as a testing data.
本文提出了SkillsRec——一种基于教师指导的学习者技能挖掘和过滤方法,该方法使用潜在语义分析(LSA)技术识别基于个人学习环境(PLE)的学习场景的学习者技能。Skills Rec是根据指导型PLEs模型的PLE设计和开发原则开发的[1]。Skills Rec将教师的能力/角色[2]和学习者的兴趣作为输入,使用LSA将它们融合,并将学习者的技能作为输出返回给基于语言的学习。我们比较了通过传统的信息检索(IR)和关键词匹配(KM)技术生成的学习者技能相似度得分。目的是报告技能识别相对于传统IR技术的收益。基于Skills Rec的结果,本文还为给定的主动学习者提供了最可能相似的N=8个用户-用户推荐作为测试数据。
{"title":"SkillsRec: A Novel Semantic Analysis Driven Learner Skills Mining and Filtering Approach for Personal Learning Environments Based on Teacher Guidance","authors":"Z. A. Shaikh, D. Gillet, S. Khoja","doi":"10.1109/WAINA.2015.112","DOIUrl":"https://doi.org/10.1109/WAINA.2015.112","url":null,"abstract":"This paper presents SkillsRec - a novel teacher guidance based learner skills mining and filtering approach that identifies learner skills for Personal Learning Environment (PLE) based learning scenarios using Latent Semantic Analysis (LSA) technique. Skills Rec is developed on PLE design and development principles of the guided PLEs model [1]. Skills Rec takes teacher competencies/roles [2] and learner interests as input, melds them using LSA, and returns learner skills for the PLE-based learning as output. We compare learner-skill similarity scores of the Skills Rec with those generated through conventional Information Retrieval (IR) and Keywords Matching (KM) techniques. The aim is to report Skills Rec gains over conventional IR techniques. Based on Skills Rec results, this paper also provides top N=8 user-user recommendations most likely to be similar for a given active learner as a testing data.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"39 1","pages":"570-576"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79468535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Identity-Based Encryption with Bounded Leakage Resilience 具有有限泄漏弹性的匿名身份加密
Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang
Memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes which were considered secure. In this paper, we consider the memory leakage resilience in anonymous identity-based encryption schemes. We construct a leakage-resilient anonymous identity based encryption scheme based on dual system encryption. Inspired by Lewko et al.'s techniques, our scheme is built in composite order groups which have four prime order subgroups and blind the public parameters and cipher texts using the random elements of same subgroup to achieve the anonymity. Moreover, we analyze the security of our scheme in the full adaptive-ID model rather than the selective-ID model.
内存攻击受到最近现实的物理攻击的启发,已经破坏了许多被认为是安全的加密方案。本文研究了基于匿名身份的加密方案中的内存泄漏弹性问题。我们构造了一个基于双系统加密的防泄漏匿名身份加密方案。受Lewko等人技术的启发,我们的方案建立在包含四个素数子群的复合序群中,并使用同一子群中的随机元素对公共参数和密文进行盲化,从而实现匿名性。此外,我们分析了该方案在完全自适应id模型下的安全性,而不是在选择性id模型下的安全性。
{"title":"Anonymous Identity-Based Encryption with Bounded Leakage Resilience","authors":"Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang","doi":"10.1109/WAINA.2015.27","DOIUrl":"https://doi.org/10.1109/WAINA.2015.27","url":null,"abstract":"Memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes which were considered secure. In this paper, we consider the memory leakage resilience in anonymous identity-based encryption schemes. We construct a leakage-resilient anonymous identity based encryption scheme based on dual system encryption. Inspired by Lewko et al.'s techniques, our scheme is built in composite order groups which have four prime order subgroups and blind the public parameters and cipher texts using the random elements of same subgroup to achieve the anonymity. Moreover, we analyze the security of our scheme in the full adaptive-ID model rather than the selective-ID model.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"63 3 1","pages":"287-292"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83628945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1