2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

筛选
英文 中文
Heterogeneous Computing and The Real-World Applications 异构计算和现实世界的应用
V. Bui, T. Pham, Huy Nguyen, Hoang Nhi Tran Gia, Tauheed Khan Mohd
{"title":"Heterogeneous Computing and The Real-World Applications","authors":"V. Bui, T. Pham, Huy Nguyen, Hoang Nhi Tran Gia, Tauheed Khan Mohd","doi":"10.1109/uemcon53757.2021.9666740","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666740","url":null,"abstract":"In recent years, Graphics Processing Units (GPUs) in computational science have effectively driven the computing system to achieve higher computational power in various electronic devices. Combining with multi-core Central Processing Units (CPUs), the inevitable CPU-GPU integration is considered the new high-performance trend of the future. There have been multiple explorations on heterogeneous processing techniques, alongside the design of fused CPU and GPU chips. This survey paper will describe, summarize, and analyze some of the latest research from 2015 to map the techniques that can improve this computation hardware’s performance or energy efficiency. We then take a look at the collaborative CPU-GPU approaches with regards to runtime and applicability. We have certainty that this report can provide insights into the knowledge of CPU-GPU applications and help find future opportunities for these processors.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Dynamic Task Offloading for Blockchain-enabled Virtual Wireless Networks 支持区块链的虚拟无线网络的节能动态任务卸载
Amani Alshaikhi, D. Rawat
{"title":"Energy Efficient Dynamic Task Offloading for Blockchain-enabled Virtual Wireless Networks","authors":"Amani Alshaikhi, D. Rawat","doi":"10.1109/uemcon53757.2021.9666519","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666519","url":null,"abstract":"The application of the blockchain technology in various fields has continued to grow exponentially. Besides, task offloading schemes are essential in the lessening of the quantity of consumed energy. These schemes are also needed for workload rate of systems during the transfer of tasks to the execution phase in the cloud or edge. Based on the need for a dynamic task offloading and allocation of resources for virtual wireless networks (VWNs), we have proposed an energy efficient dynamic task offloading scheme in VWNs that leverages the blockchain technology. The proposed approach chooses the online optimal computing place either on the mobile cloud computing (MCC) server or the mobile edge computing (MEC) server with the goal of reducing task response time and energy consumption. Communication and computation costs incurred by different kinds of applications are controlled by the Lyapunov optimization technique. Computing location for each task is chosen adaptively during the optimization without requiring extensive system information. Energy efficient approach achieves better offloading decisions with lower computational complexity as compared with traditional offloading techniques.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Automatic Smart Irrigation System 自动智能灌溉系统的设计与实现
Mohammad Taz Uddin, T. Chowdhury, R. Rahman
{"title":"Design and Implementation of Automatic Smart Irrigation System","authors":"Mohammad Taz Uddin, T. Chowdhury, R. Rahman","doi":"10.1109/uemcon53757.2021.9666518","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666518","url":null,"abstract":"Groundwater & Surface water resources are decreasing all over the world including Bangladesh. Water resource management can be done in various ways. Traditionally, water management can be done by operators. However, sometimes it could result over-irrigation, increased electricity bills, water waste, and the crop can be damaged. In this paper, we have developed an intelligent irrigation system that will control the water dispensing to the crop smartly without any operator. There is a moisture sensor that will detect the soil moisture, and a rain sensor will detect rainfall to limit water use. The system can be used to manage groundwater as well as surface water without changing any existing traditional irrigation pumping equipment. This paper attempts low-cost Arduino-based irrigation devices, sensors, especially modern techniques implemented in irrigation systems and agriculture, such as intelligent irrigation systems.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122052645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Relation of Online Behavioral Response to Fake News Exposure and Detection Accuracy 网络行为反应与假新闻曝光与检测准确率的关系
Kevin Matthe Caramancion
{"title":"The Relation of Online Behavioral Response to Fake News Exposure and Detection Accuracy","authors":"Kevin Matthe Caramancion","doi":"10.1109/UEMCON53757.2021.9666642","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666642","url":null,"abstract":"Using a Fake News test consisting of mixed legitimate and misleading news headlines, this study investigated and explored how the behavioral responses of users (N=153) to false headlines are associated with their ability to detect content legitimacy. The behavioral responses were (a) report the content, (b) engage in debate/discussion, or (c) simply ignore it. The results revealed that the subjects who engaged in a discussion have higher detection accuracy than the mere reporters. The participants who simply ignored the deceptive content performed the poorest while those who performed both reporting and discussion registered with the highest accuracy. The intended target audience of this paper are information scientists, digital forensic professionals, communication experts, policymakers, and other scholars possibly seeking references on this subject.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Localization using Enclaves 使用enclave的隐私保护定位
Arslan Khan, Joseph I. Choi, D. Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, J. Shea, T. Wong
{"title":"Privacy-Preserving Localization using Enclaves","authors":"Arslan Khan, Joseph I. Choi, D. Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, J. Shea, T. Wong","doi":"10.1109/uemcon53757.2021.9666706","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666706","url":null,"abstract":"Localization is one form of cooperative spectrum sensing that lets multiple sensors work together to estimate the location of a target transmitter. However, the requisite exchange of spectrum measurements leads to exposure of the physical location of participating sensors. Furthermore, in some cases, a compromised participant can reveal the sensitive characteristics of all participants. Accordingly, a lack of sufficient guarantees about data handling discourages such devices from working together. In this paper, we provide the missing data protections by processing spectrum measurements within attestable containers or enclaves. Enclaves provide runtime memory integrity and confidentiality using hardware extensions and have been used to secure various applications [1]–[8]. We use these enclave features as building blocks for new privacy-preserving particle filter protocols that minimize disruption of the spectrum sensing ecosystem. We then instantiate this enclave using ARM TrustZone and Intel SGX, and we show that enclave-based particle filter protocols incur minimal overhead (adding 16 milliseconds of processing to the measurement processing function when using SGX versus unprotected computation) and can be deployed on resource-constrained platforms that support TrustZone (incurring only a 1.01x increase in processing time when doubling particle count from 10,000 to 20,000), whereas cryptographically-based approaches suffer from multiple orders of magnitude higher costs. We effectively deploy enclaves in a distributed environment, dramatically improving current data handling techniques. To our best knowledge, this is the first work to demonstrate privacy-preserving localization in a multi-party environment with reasonable overhead.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Web and Mobile Based Smart Online Healthcare System 基于Web和移动的智能在线医疗系统的开发
Mohammad Monirujjaman Khan, Rahat Anwar, Farhan Amar Tanve, Dewan Shakil, Manas Banik, S. Gupta
{"title":"Development of Web and Mobile Based Smart Online Healthcare System","authors":"Mohammad Monirujjaman Khan, Rahat Anwar, Farhan Amar Tanve, Dewan Shakil, Manas Banik, S. Gupta","doi":"10.1109/uemcon53757.2021.9666657","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666657","url":null,"abstract":"Health care system is one of the fundamental parts of society. This paper presents the development of web and smartphone applications for the people of Bangladesh where both patients and doctors can register and patients can have medical treatment via video calling. Using the developed web and smartphone applications, patients can register via their phone number, store information concerning their health, search available doctors, send text messages or make video calls to the available doctors, set alarm to take medicine on time and complete payment through online. Doctors can also register to the system where the verification to ensure the authenticity of the information provided by the doctor is handled manually. The doctors can view a patient’s medical history whenever a patient makes contact through text or video call and provide treatment accordingly. The system has been deployed and verified. The applications provide a faster and enhanced way to get treatment and will ensure the availability of treatments in remote areas. The system will help to spread health care services nationwide and provide doctors with the opportunity to help to improve the health conditions of the citizens of Bangladesh.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demystifying Black-box Learning Models of Rumor Detection from Social Media Posts 从社交媒体帖子中解密谣言检测的黑箱学习模型
Faiza Tafannum, Mir Nafis Sharear Shopnil, Anika Salsabil, Navid Ahmed, Md. Golam Rabiul Alam, Md. Tanzim Reza
{"title":"Demystifying Black-box Learning Models of Rumor Detection from Social Media Posts","authors":"Faiza Tafannum, Mir Nafis Sharear Shopnil, Anika Salsabil, Navid Ahmed, Md. Golam Rabiul Alam, Md. Tanzim Reza","doi":"10.1109/uemcon53757.2021.9666567","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666567","url":null,"abstract":"Social media and its users are vulnerable to the spread of rumors, therefore, protecting users from the spread of rumors is extremely important. For this reason, we propose a novel approach for rumor detection in social media that consists of multiple robust models: XGBoost Classifier, Support Vector Machine, Random Forest Classifier, Extra Tree Classifier, Decision Tree Classifier, a hybrid model, deep learning models-LSTM and BERT. For evaluation, two datasets are used. These artificial intelligence algorithms are often referred to as \"Blackbox\" where data go in the box and predictions come out of the box but what is happening inside the box frequently remains cloudy. Although, there have been several works on detecting fake news, the number of works regarding rumor detection is still limited and the models used in the existing works do not explain their decision-making process. We take models with higher accuracy to illustrate which feature of the data contributes the most for a post to have been predicted as a rumor or a non-rumor by the models to explain the opaque process happening inside the black-box models. Our hybrid model achieves an accuracy of 93.22% and 82.49%, while LSTM provides 99.81%, 98.41% and BERT provides 99.62%, 94.80% accuracy scores on the COVID19 Fake News and the concatenation of Twitter15 and Twitter16 datasets respectively.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secret Key Steganography: improve security level of LSB algorithm 密钥隐写:提高LSB算法的安全水平
Ahmed Imad Hammoodi Al-Jarah, J. Ortega-Arjona
{"title":"Secret Key Steganography: improve security level of LSB algorithm","authors":"Ahmed Imad Hammoodi Al-Jarah, J. Ortega-Arjona","doi":"10.1109/UEMCON53757.2021.9666569","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666569","url":null,"abstract":"Internet has revolutionized the way people share information, store data, communicate, learn, and do business. Internet has been used for information transmission; this has changed in the last decade. Today, governments, businesses and individuals are increasingly relying on-line applications; the need to secure data exchange over the Internet and store it on the cloud has gained more importance. Data security aims to keep information safe by using cryptography and/or steganography. Steganography is a suitable candidate for keeping information safe, hiding the existence of data itself inside another medium. The Least Significant Bit (LSB) algorithm is one of the most common techniques to hide secret messages in an image. The main problem with LSB is knowing whether such an image has a secret message inside, making it easy to retrieve it by collecting the least significant bit from the steg-image. This paper presents an attempt to improve the security level of the LSB algorithm by using a secret steganography key. The proposed algorithm SKLSB is encoding the secret key from the cover image, encodes the secret message using the secret key, embedding it to the cover image. Even if attackers know about the steganography, they cannot know about the secret key. The SKLSB algorithm helps to get a higher and better level of security, useful for keeping sensitive, relevant, and important information stored. The results regarding this paper are compared with LSB algorithm regarding its Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) values aiming to show this method is more secure and does not affect the image imperceptibility.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Blockchain& IoT in Precision Farming: Exploration, Scope and Security Challenges 区块链和物联网在精准农业中的整合:探索、范围和安全挑战
I. Kaushik, N. Prakash, Anurag Jain
{"title":"Integration of Blockchain& IoT in Precision Farming: Exploration, Scope and Security Challenges","authors":"I. Kaushik, N. Prakash, Anurag Jain","doi":"10.1109/uemcon53757.2021.9666554","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666554","url":null,"abstract":"Internet of things (IoT) plays a major role in every field. It helps in transforming the way with the use of sensors, edge devices and its infrastructure. As sensors are major source of information gathering which is stored on the cloud and relevant information is being retrieved. Information is passed at various levels of IoT ecosystem, which takes security into consideration. With the growth of interconnected devices, data security is becoming increasingly complex. The necessity arising for building a secure and smart structure leads in combining blockchain technology with IoT based system in precision agriculture. With the use of blockchain, traditional methods utilized for collecting and sharing agriculture data are replaced with transparent, reliable and decentralized data storage methods. This combined approach helps us in maintaining an autonomous precise agriculture system and managing in more secure and optimized ways. This paper presents a comprehensive approach on highlighting the importance of integrating blockchain technology with smart agriculture. This paper also proposes novel approach to blockchain models which are used as alternate solutions for challenges faced by IoT based smart agriculture. Various sub sectors like food supply chain, livestock grazing, and crops overseeing are also managed using blockchain platform. Later section of the paper focuses on open challenges and issues while developing blockchain based IoT system used in precision farming.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS 基于树的有监督机器学习模型检测无人机的GPS欺骗攻击
Ghilas Aissou, Hadjar Ould Slimane, Selma Benouadah, N. Kaabouch
{"title":"Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS","authors":"Ghilas Aissou, Hadjar Ould Slimane, Selma Benouadah, N. Kaabouch","doi":"10.1109/uemcon53757.2021.9666744","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666744","url":null,"abstract":"The security of Unmanned Aerial System (UAS) networks is becoming crucial as their number and application in several fields are increasing every day. For navigation and positioning, the Global Navigation System (GPS) is essential as it provides an accurate location for the UAS. However, since the civilian GPS signals are open and unencrypted, attackers target them in different ways such as spoofing attacks. To address this security concern, we propose a comparison of several tree-based machine learning models, namely Random Forest, Gradient Boost, XGBoost, and LightGBM, to detect GPS spoofing attacks. In this work, the dataset was built of real GPS signals that were collected using a Software Defined Radio unit and different types of simulated GPS spoofing attacks. The results show that XGBoost has the best accuracy (95.52%) and fastest detection time (2ms), which makes this model appropriate for UAS applications.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信