International Conference on Advanced Wireless Information, Data, and Communication Technologies最新文献

筛选
英文 中文
Mobility and Epidemic Process in Temporal Networks 时间网络中的流动性和流行过程
Djibril Mboup, C. Diallo, Moussa Lo
{"title":"Mobility and Epidemic Process in Temporal Networks","authors":"Djibril Mboup, C. Diallo, Moussa Lo","doi":"10.1145/3231830.3231835","DOIUrl":"https://doi.org/10.1145/3231830.3231835","url":null,"abstract":"Complex networks are distinguished to have a particular structure due to its large dimension and its many interactions, which play an important role in its characteristic. In fact, these networks are the locus of many dynamical phenomena such as birth of community, opinion formation, information diffusion, and rumors or epidemic spreading and so on. User mobility is of critical important when you want to know how disease spreads in network. The synthetic models represents a good alternative to describe how humans move. In this paper, we study the dynamics of epidemic spreading in temporal network generated by synthetic mobility model such as Random Waypoint (RWP), Gauss Markov (GM) and Truncated Levy Walk (TLW). Then, we show how proximity in terms in distance could impact a spreading process like droplet or airborne modes of pathogen spreading. Finally, we will statistically evaluate the number of infected nodes by scaling the spreading rate depending on the proximity between agents.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131123711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accessible Urban by Modeling the Explicit Data Using Fuzzy Logic 用模糊逻辑对显式数据建模的无障碍城市
Daniel Sinkonde, L. Mselle, N. Shidende, S. Comai, M. Matteucci
{"title":"Accessible Urban by Modeling the Explicit Data Using Fuzzy Logic","authors":"Daniel Sinkonde, L. Mselle, N. Shidende, S. Comai, M. Matteucci","doi":"10.1145/3231830.3231844","DOIUrl":"https://doi.org/10.1145/3231830.3231844","url":null,"abstract":"The paper explores the level of accessibility for people with specific mobility problems in an urban setting. The work is part on the polisocial Maps for Easy Path (MEP) project [1]. The project aiming at developing a set of innovative tools and solutions for the enrichment of geographical maps with information about accessibility of urban pedestrian areas for people with mobility challenges. This paper builds a FuzzyMEP predictive model that accounts for uncertainty in the real world using fuzzy logic to predict the quality and the condition of the accessibility of a path. The FuzzyMEP model has been developed for mapping two explicit data sets, namely the coordinates where a picture of an obstacle on the sidewalk has been taken and the comment. The current urban city accessibility tool uses spatial data and focuses mainly on the accessibility of a path. We present a novel MEP tool by using a fuzzy logic model for pedestrian path prediction of the condition of the accessibility of a path. In this paper, the FuzzyMEP model has been developed by applying a fuzzy logic rule which can be adapted to other contexts.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prolonging WSN lifetime using a new scheme for Sink moving based on Artificial Fish Swarm Algorithm 基于人工鱼群算法的水池移动方案延长WSN寿命
D. Mechta, S. Harous
{"title":"Prolonging WSN lifetime using a new scheme for Sink moving based on Artificial Fish Swarm Algorithm","authors":"D. Mechta, S. Harous","doi":"10.1145/3231830.3231837","DOIUrl":"https://doi.org/10.1145/3231830.3231837","url":null,"abstract":"In this paper, we investigate the problem of energy in Wireless sensor networks. The sensors maintain their autonomy from their batteries. These networks have a limited capacity in terms of energy mostly at the communication process which could significantly reduce the network lifetime. In order to prolong the network lifetime, by maintaining its performance, we propose a novel algorithm based on Artificial Fish Swarm Algorithm (AFSA) behaviors for sink moving in WSN. Simulation results indicate the efficiency of the proposed scheme in terms of increasing the network lifetime and giving the best rate of the delivered packets.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Prioritizing Cloud Security Controls 优先考虑云安全控制
M. Alani
{"title":"Prioritizing Cloud Security Controls","authors":"M. Alani","doi":"10.1145/3231830.3231831","DOIUrl":"https://doi.org/10.1145/3231830.3231831","url":null,"abstract":"As more and more organization move to the cloud, security remains a major concern. Given the unique nature of a cloud computing system, security threats take a different form in the cloud. These unique threats require unique security measures and security management.\u0000 This paper introduces a simplified method to calculate the effect of adding different security controls to the cloud system and prioritize security management in limited budget situations. These calculations help in prioritizing security controls and security spending to get an optimal security for a given limited budget.\u0000 To clarify the proposed method, a case study is considered for a University that have shifted its systems to the cloud and needs to prioritize its security spending.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of IPv6-Based Mobility Support for P2P-SIP Networks 基于ipv6的P2P-SIP网络移动性支持研究
Abel Diatta, I. Niang, Mandicou Ba, Bassirou Gueye
{"title":"A Survey of IPv6-Based Mobility Support for P2P-SIP Networks","authors":"Abel Diatta, I. Niang, Mandicou Ba, Bassirou Gueye","doi":"10.1145/3231830.3231836","DOIUrl":"https://doi.org/10.1145/3231830.3231836","url":null,"abstract":"For many years, communications with mobile objects (smartphones, laptops, tablets, etc.) occupy most of the exchanges through internet, raising nowadays a real passion to mobile Peer-to-Peer Session Initiation Protocol (P2P-SIP) networks through which are these communications. Internet Protocol version 6 (IPv6), with its many advantages over IPv4, including the multitude of addresses and automatic management of handover, arouses today great interest. However, most studies have focused separately, on one hand, in mobility in a peer-to-peer SIP environment, and on other hand in IPv6 mobility management (not both at once).\u0000 In this paper, after a broad overview of peer-to-peer SIP networks and existing IPv6 mobility management solutions, we show the best combination to set up for an optimized solution for mobility management in IPv6 within a P2P-SIP environment.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Intrusion Detection System for Social Network of Europe 基于机器学习的欧洲社交网络入侵检测系统
N. Sengupta
{"title":"Machine Learning Based Intrusion Detection System for Social Network of Europe","authors":"N. Sengupta","doi":"10.1145/3231830.3231843","DOIUrl":"https://doi.org/10.1145/3231830.3231843","url":null,"abstract":"In modern age1, people have become dependent on social networking for communication for both in personal life and in corporate life. There are different types of users of social network, some users use social network for different good purposes like educational, entertainment, exchanging information, etc. Some users are using social network as a platform to exchange information for doing harmful work to the society. As some communications are useful and some are harmful, it's very important to analyze this traffic and to identify the harmful communication for the benefit of the country. Developing analysis model for identification of harmful communication of social network is a challenging area for computer science researchers. In the research proposal, Intrusion Detection System (IDS) is designed which should be installed in the gateways. The proposed research has four tier architectures for IDS.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based Resource Allocation for Disaster Management in IoT Environment 物联网环境下基于图形的灾害管理资源分配
J. Kumar, M. Zaveri
{"title":"Graph-based Resource Allocation for Disaster Management in IoT Environment","authors":"J. Kumar, M. Zaveri","doi":"10.1145/3231830.3231842","DOIUrl":"https://doi.org/10.1145/3231830.3231842","url":null,"abstract":"Allocation of emergency resources for the required tasks during disaster times is a non-trivial problem. In disaster situations, often times, networks for communication are greatly affected. From this perspective, Internet of Things, the new upcoming technology can be utilized in forming a dynamic network using Internet for communication. The availability of the resources and the tasks that need to be addressed can be efficiently manged using IoT. Now, maximum bipartite graph approach is employed for the resources allocation of various tasks. The bipartite graph based approach results in the allocation of maximum resources to finish the given tasks effectively. Further, the proposed approach is compared with greedy approach in terms of fairness of resource allocation for utility and execution time.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117186853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting Counterpart Word Pairs across Time 检测跨时间的对等词对
Kazuhiro Iwai, Yasunobu Sumikawa
{"title":"Detecting Counterpart Word Pairs across Time","authors":"Kazuhiro Iwai, Yasunobu Sumikawa","doi":"10.1145/3231830.3231845","DOIUrl":"https://doi.org/10.1145/3231830.3231845","url":null,"abstract":"Most search engines require users to input specific words to obtain useful results from the Web. However, this requirement is sometimes challenging for users who want to search for information regarding unknown words. It may be especially difficult to learn about the past without knowing suitable words, such as answering the question \"Who was the counterpart of the Prime Minister of the UK in the Ottoman Empire in 1900?\" We propose a novel search framework for finding counterpart relationships represented by word pairs across time. This framework detects the counterparts by arithmetic operations as well as Word2Vec. To improve the accuracy, our framework groups news articles to develop context for words. After embedding the words into vector spaces, we map a given relationship to another vector space, then perform arithmetic operations. We show our algorithm outputs better results compared with simply applying Word2Vec.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function 可穿戴设备的多因素认证:配置具有风险功能的系统参数
S. Bezzateev, A. Afanasyeva, N. Voloshina, A. Ometov
{"title":"Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function","authors":"S. Bezzateev, A. Afanasyeva, N. Voloshina, A. Ometov","doi":"10.1145/3231830.3231834","DOIUrl":"https://doi.org/10.1145/3231830.3231834","url":null,"abstract":"The users of today are already about to enter the era of highly integrated modern wearable devices -- the time when smart accessories will, in turn, push aside regular Smartphones and Tablets bringing a variety of new security challenges. The number of simultaneously used bio-sensors, both integrated into smart wearables and connected over wireless interfaces, allows novel opportunities for Multi-factor Authentication (MFA) of the user. This manuscript proposes a solution for configuring the MFA based on the average direct and indirect losses risk analysis. The example application of Bayesian function for MFA presents the applicability of the proposed framework for the utilization with wearables.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Noise Suppression by Artificial Neural Networks 人工神经网络的噪声抑制
G. R. Murthy, Aman Singh, Ganesh Yaparla
{"title":"Noise Suppression by Artificial Neural Networks","authors":"G. R. Murthy, Aman Singh, Ganesh Yaparla","doi":"10.1145/3231830.3231847","DOIUrl":"https://doi.org/10.1145/3231830.3231847","url":null,"abstract":"In this research paper, noise suppression ability of associative memories (e.g. Hopfield neural network) is briefly summarized. Motivated by this fact, noise suppression abilities of trained convolutional network are discussed. Introducing the concept of null vectors, noise suppression ability of Single Layer Perceptron, Multi-Layer Perceptron and Extreme Learning Machine are discussed.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"51 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信