Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing最新文献

筛选
英文 中文
Energy efficient IR-UWB transceiver for autonomous wireless sensor network 用于自主无线传感器网络的节能IR-UWB收发器
B. Benamrouche, D. Dragomirescu
{"title":"Energy efficient IR-UWB transceiver for autonomous wireless sensor network","authors":"B. Benamrouche, D. Dragomirescu","doi":"10.1145/3018896.3036372","DOIUrl":"https://doi.org/10.1145/3018896.3036372","url":null,"abstract":"Power consumption is a major concern in current and future transceiver designs. The work presented in this paper is related to CHIST-ERA SMARTER project (Smart Multifunctional Architecture and Technology for Energy aware wireless sensoRs) which address autonomous wireless sensors nodes. The challenge is to develop a multifunctional energy harvesting and sensing device that includes a smart adaptive energy storage and a low power communication block based on impulse radio ultra-wide band (IR-UWB). The final device will be integrated on a single flexible substrate that can be placed into various surfaces. Our work is focused on developing a low power wireless communication transceiver for autonomous WSN for SHM systems. The IR-UWB technique was chosen due to its predilection for low power transmission especially on the emitter side.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A maximum agreement approach to information fusion 信息融合的最大一致性方法
M. Cai, Y. Lin, C. L. Liu, C. Ji, W. Zhang
{"title":"A maximum agreement approach to information fusion","authors":"M. Cai, Y. Lin, C. L. Liu, C. Ji, W. Zhang","doi":"10.1145/3018896.3036367","DOIUrl":"https://doi.org/10.1145/3018896.3036367","url":null,"abstract":"Information fusion is a generic technique for the problem of information fusion. The common features with this problem are (1) there is a target system X and its state (S) is to be inferred or predicted, (2) there is a group of sensors which have a varying degree of imprecise connection with S of X, and (3) there is a need to come up with an agreed inference or prediction on the state of X (note that consensus here does not mean all with the same opinion by the group). Elsewhere, we proposed an approach called \"maximum agreement (MA)\" to information fusion in general and probability distribution function aggregation in specific. The basic idea of MA is that an agreed inference is a function of individual sensors' measurements and the agreed measurement can be determined based on the goal that the agreed judgment has a maximum consensus with all individual sensors' measurements. In this paper, we show some alternative methods of MA and discuss their characteristics with reference to MA. We shall then conclude that MA is the best method among all the alternative methods for the problem of expert opinion aggregation or consensus aggregation.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert network analysis to detect key players using correlation and social network analysis 隐蔽网络分析,以检测关键球员使用相关性和社会网络分析
Ejaz Farooq, S. Khan, Wasi Haider Butt
{"title":"Covert network analysis to detect key players using correlation and social network analysis","authors":"Ejaz Farooq, S. Khan, Wasi Haider Butt","doi":"10.1145/3018896.3025142","DOIUrl":"https://doi.org/10.1145/3018896.3025142","url":null,"abstract":"The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analogue to information converter design using analogue chua circuit for IoT devices 使用物联网设备模拟chua电路的模拟到信息转换器设计
Hesham H. Aly, A. Soliman, Mansour Mouniri
{"title":"Analogue to information converter design using analogue chua circuit for IoT devices","authors":"Hesham H. Aly, A. Soliman, Mansour Mouniri","doi":"10.1145/3018896.3056804","DOIUrl":"https://doi.org/10.1145/3018896.3056804","url":null,"abstract":"IoT devices design faces several challenges like power consumption, security, privacy and more. In this paper a low power, secured and fully analogue design for the analogue information converter (AIC) preprocessing block (or AIC analogue frontend) is proposed to be used for monitoring systems like the IoT devices. The proposed design is based on replacing the traditional digital pseudo random generator like linear feedback shift register (LFSR) by analogue Chua circuit. This replacement overcomes any need of isolation between analogue parts and digital parts of the AIC and add security to the input data. Chua circuit has been presented by 4 different implementations. The different implementations for the Chua circuit have been tested for the performance of reconstructing the original signal and the power consumption. The study is based on simulation using Multisim Pspice, and Matlab software and based on the off the shelf component.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive investigation of natural language processing techniques and tools to generate automated test cases 对生成自动化测试用例的自然语言处理技术和工具的全面研究
Imran Ahsan, Wasi Haider Butt, Mudassar Adeel Ahmed, Muhammad Waseem Anwar
{"title":"A comprehensive investigation of natural language processing techniques and tools to generate automated test cases","authors":"Imran Ahsan, Wasi Haider Butt, Mudassar Adeel Ahmed, Muhammad Waseem Anwar","doi":"10.1145/3018896.3036375","DOIUrl":"https://doi.org/10.1145/3018896.3036375","url":null,"abstract":"Natural Language Processing (NLP) techniques show promising results to organize and identify desired information from the bulky raw data. As a result, NLP techniques are continuously getting researcher's attention to automate various software development activities like test cases generation. However, selection of right NLP techniques and tools to generate automated test cases is always challenging. Therefore, in this paper, we investigate the application of NLP techniques to generate test cases from preliminary requirements document. A Systematic Literature Review (SLR) has been conducted to identify 16 research works published during 2005-2014. Consequently, 6 NLP techniques and 18 tools have been identified. Furthermore, 4 test case generation approaches and 9 NLP algorithms have also been presented. The identified NLP techniques and tools are highly beneficial for the researchers and practitioners of the domain.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121566806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Statistical transmission control based on confidence interval in high bandwidth network 高带宽网络中基于置信区间的统计传输控制
Won-Jeong Choi, Ramneek Seckhon, Woojin Seok
{"title":"Statistical transmission control based on confidence interval in high bandwidth network","authors":"Won-Jeong Choi, Ramneek Seckhon, Woojin Seok","doi":"10.1145/3018896.3018922","DOIUrl":"https://doi.org/10.1145/3018896.3018922","url":null,"abstract":"TCP performs slow start phase based on an exponential increase of the congestion window to predict the current network. Current TCP slow start does not work well under large bandwidth networks. The exponential growth of slow start phase cause burst packet loss if there are many traffic in the network. In this paper, we use a statistical slow start method to solve heavy packet loss from collision between flows in the network and to improve TCP performance.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm 基于蝗群攻击行为算法模型的组合优化问题求解
Tiago M. Ribeiro, V. L. Paucar
{"title":"Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm","authors":"Tiago M. Ribeiro, V. L. Paucar","doi":"10.1145/3018896.3025136","DOIUrl":"https://doi.org/10.1145/3018896.3025136","url":null,"abstract":"The attack behavior of locust swarm has inspired the recently developed computer algorithmic model of locust swarm optimizer (LS) within the swarm artificial intelligence methods. Some NP-hard problems of combinatorial optimization that LS may solve are the following: the traveling salesman problem, the knapsack problem, routing in telecommunication networks, and cellular robotic systems. General models of these combinatorial optimization problems which can be solved with locust swarm optimizer technique are proposed in the present work.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The information and communication technology governance maturity level for malaysian public sector 马来西亚公共部门的信息和通信技术治理成熟度水平
Rosida Ab Razak, M. Zakaria
{"title":"The information and communication technology governance maturity level for malaysian public sector","authors":"Rosida Ab Razak, M. Zakaria","doi":"10.1145/3018896.3018967","DOIUrl":"https://doi.org/10.1145/3018896.3018967","url":null,"abstract":"The fundamental issue for ICT Governance (ICTG) practices in Malaysian Public Sector (MPS) is how Information and Communication Technology (ICT) can be applied to support improvements in productivity, management effectiveness and the quality of services offered to its citizens. In particular, we have identified appropriate Critical Success Factors (CSFs) that drive a successful ICTG practices, and reflect on the focus areas that need to be strategically considered to ensure business success. Then, we assign weightage to compute relative priorities among them, which simultaneously generate an ICTG model to set an accurate maturity measurement. The ICTG model has to be blended with maturity indicator score and create a comprehensive ICTG Maturity Model (ICTGMM). This research uses survey as a quantitative approach for data collection. Then, the Multiple Regression Analysis (MRA) thru IBM SPSS Statistical Software was used to formulate index score for those CSFs, and developed an ICTGMM; instrument that measures current state of ICTG capabilities and allows management to prioritize and offer extra thought to the related CSFs for strengthening ICTG practices. We believe that this research makes an original contribution in addressing areas for improvements to face future challenges, and helps ICT practitioner in handling ICTG goings-on in their organization.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey on call admission control protocols in cellular networks 蜂窝网络中呼叫接纳控制协议的研究
Satyasrikanth Palle, T. N, F. Takawira
{"title":"Survey on call admission control protocols in cellular networks","authors":"Satyasrikanth Palle, T. N, F. Takawira","doi":"10.1145/3018896.3025141","DOIUrl":"https://doi.org/10.1145/3018896.3025141","url":null,"abstract":"The use of cellular networks over a period of time has resulted in the establishment of effective mobile networks for cellular data transmission. The main requirement for data transmission is the availability of radio frequencies but with the increasing applications there is a scarcity of radio frequencies. One way to overcome this is by employing the concept of call admission control so as to enforce proper resource utilization among all the participating nodes. But the main concern here is with respect to the quality of service in terms of several metrics based on the underlying applications. The survey conducted here provides with a detailed insight into the problems existing with respect to data transmission with QoS requirements. Several existing protocols have been analyzed and along with the current research issues.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy efficient approach for application execution in mobile cloud IoT environment 移动云物联网环境下高效节能的应用程序执行方法
R. Kumari, S. Kaushal
{"title":"Energy efficient approach for application execution in mobile cloud IoT environment","authors":"R. Kumari, S. Kaushal","doi":"10.1145/3018896.3018957","DOIUrl":"https://doi.org/10.1145/3018896.3018957","url":null,"abstract":"Smart mobile devices (SMD) are able to provide different services to the users with minimum delay. Generally, the users are not aware of the complexity of the applications over which they are expecting fast response. SMD are constrained by their processing speed, storage capacity and many other resources, therefore, to make them to perform well with different types of applications, the concept of mobile cloud is used. Internet of Things (IoT) provides dynamic control and monitoring of energy resources enabling stakeholders to save energy usage at granular levels. With the advancement of IoT technologies and mobile cloud, a new concept is developed called as mobile cloud IoT (MCIoT) which is the convergence of both. The main objective of MCIoT is to provide the sufficient resources to the application so that the application can be executed without any deficiencies. When an application is partitioned complex part is on the cloud and rest is on the SMD, the battery life of the SMD highly improves. In this paper, we have presented an analytical model in MCIoT environment to represent the appropriate partition rate which effects execution time and energy consumption on SMD and cloud. The experiments are conducted on the bases of varying partition rate, bandwidth and data size of an application. Further, the impact of these parameters are analysed over the residual energy of SMD.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信