{"title":"Energy efficient IR-UWB transceiver for autonomous wireless sensor network","authors":"B. Benamrouche, D. Dragomirescu","doi":"10.1145/3018896.3036372","DOIUrl":"https://doi.org/10.1145/3018896.3036372","url":null,"abstract":"Power consumption is a major concern in current and future transceiver designs. The work presented in this paper is related to CHIST-ERA SMARTER project (Smart Multifunctional Architecture and Technology for Energy aware wireless sensoRs) which address autonomous wireless sensors nodes. The challenge is to develop a multifunctional energy harvesting and sensing device that includes a smart adaptive energy storage and a low power communication block based on impulse radio ultra-wide band (IR-UWB). The final device will be integrated on a single flexible substrate that can be placed into various surfaces. Our work is focused on developing a low power wireless communication transceiver for autonomous WSN for SHM systems. The IR-UWB technique was chosen due to its predilection for low power transmission especially on the emitter side.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A maximum agreement approach to information fusion","authors":"M. Cai, Y. Lin, C. L. Liu, C. Ji, W. Zhang","doi":"10.1145/3018896.3036367","DOIUrl":"https://doi.org/10.1145/3018896.3036367","url":null,"abstract":"Information fusion is a generic technique for the problem of information fusion. The common features with this problem are (1) there is a target system X and its state (S) is to be inferred or predicted, (2) there is a group of sensors which have a varying degree of imprecise connection with S of X, and (3) there is a need to come up with an agreed inference or prediction on the state of X (note that consensus here does not mean all with the same opinion by the group). Elsewhere, we proposed an approach called \"maximum agreement (MA)\" to information fusion in general and probability distribution function aggregation in specific. The basic idea of MA is that an agreed inference is a function of individual sensors' measurements and the agreed measurement can be determined based on the goal that the agreed judgment has a maximum consensus with all individual sensors' measurements. In this paper, we show some alternative methods of MA and discuss their characteristics with reference to MA. We shall then conclude that MA is the best method among all the alternative methods for the problem of expert opinion aggregation or consensus aggregation.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covert network analysis to detect key players using correlation and social network analysis","authors":"Ejaz Farooq, S. Khan, Wasi Haider Butt","doi":"10.1145/3018896.3025142","DOIUrl":"https://doi.org/10.1145/3018896.3025142","url":null,"abstract":"The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analogue to information converter design using analogue chua circuit for IoT devices","authors":"Hesham H. Aly, A. Soliman, Mansour Mouniri","doi":"10.1145/3018896.3056804","DOIUrl":"https://doi.org/10.1145/3018896.3056804","url":null,"abstract":"IoT devices design faces several challenges like power consumption, security, privacy and more. In this paper a low power, secured and fully analogue design for the analogue information converter (AIC) preprocessing block (or AIC analogue frontend) is proposed to be used for monitoring systems like the IoT devices. The proposed design is based on replacing the traditional digital pseudo random generator like linear feedback shift register (LFSR) by analogue Chua circuit. This replacement overcomes any need of isolation between analogue parts and digital parts of the AIC and add security to the input data. Chua circuit has been presented by 4 different implementations. The different implementations for the Chua circuit have been tested for the performance of reconstructing the original signal and the power consumption. The study is based on simulation using Multisim Pspice, and Matlab software and based on the off the shelf component.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive investigation of natural language processing techniques and tools to generate automated test cases","authors":"Imran Ahsan, Wasi Haider Butt, Mudassar Adeel Ahmed, Muhammad Waseem Anwar","doi":"10.1145/3018896.3036375","DOIUrl":"https://doi.org/10.1145/3018896.3036375","url":null,"abstract":"Natural Language Processing (NLP) techniques show promising results to organize and identify desired information from the bulky raw data. As a result, NLP techniques are continuously getting researcher's attention to automate various software development activities like test cases generation. However, selection of right NLP techniques and tools to generate automated test cases is always challenging. Therefore, in this paper, we investigate the application of NLP techniques to generate test cases from preliminary requirements document. A Systematic Literature Review (SLR) has been conducted to identify 16 research works published during 2005-2014. Consequently, 6 NLP techniques and 18 tools have been identified. Furthermore, 4 test case generation approaches and 9 NLP algorithms have also been presented. The identified NLP techniques and tools are highly beneficial for the researchers and practitioners of the domain.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121566806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical transmission control based on confidence interval in high bandwidth network","authors":"Won-Jeong Choi, Ramneek Seckhon, Woojin Seok","doi":"10.1145/3018896.3018922","DOIUrl":"https://doi.org/10.1145/3018896.3018922","url":null,"abstract":"TCP performs slow start phase based on an exponential increase of the congestion window to predict the current network. Current TCP slow start does not work well under large bandwidth networks. The exponential growth of slow start phase cause burst packet loss if there are many traffic in the network. In this paper, we use a statistical slow start method to solve heavy packet loss from collision between flows in the network and to improve TCP performance.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problem solving in combinatorial optimization based on the algorithmic model of attack behavior of locust swarm","authors":"Tiago M. Ribeiro, V. L. Paucar","doi":"10.1145/3018896.3025136","DOIUrl":"https://doi.org/10.1145/3018896.3025136","url":null,"abstract":"The attack behavior of locust swarm has inspired the recently developed computer algorithmic model of locust swarm optimizer (LS) within the swarm artificial intelligence methods. Some NP-hard problems of combinatorial optimization that LS may solve are the following: the traveling salesman problem, the knapsack problem, routing in telecommunication networks, and cellular robotic systems. General models of these combinatorial optimization problems which can be solved with locust swarm optimizer technique are proposed in the present work.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The information and communication technology governance maturity level for malaysian public sector","authors":"Rosida Ab Razak, M. Zakaria","doi":"10.1145/3018896.3018967","DOIUrl":"https://doi.org/10.1145/3018896.3018967","url":null,"abstract":"The fundamental issue for ICT Governance (ICTG) practices in Malaysian Public Sector (MPS) is how Information and Communication Technology (ICT) can be applied to support improvements in productivity, management effectiveness and the quality of services offered to its citizens. In particular, we have identified appropriate Critical Success Factors (CSFs) that drive a successful ICTG practices, and reflect on the focus areas that need to be strategically considered to ensure business success. Then, we assign weightage to compute relative priorities among them, which simultaneously generate an ICTG model to set an accurate maturity measurement. The ICTG model has to be blended with maturity indicator score and create a comprehensive ICTG Maturity Model (ICTGMM). This research uses survey as a quantitative approach for data collection. Then, the Multiple Regression Analysis (MRA) thru IBM SPSS Statistical Software was used to formulate index score for those CSFs, and developed an ICTGMM; instrument that measures current state of ICTG capabilities and allows management to prioritize and offer extra thought to the related CSFs for strengthening ICTG practices. We believe that this research makes an original contribution in addressing areas for improvements to face future challenges, and helps ICT practitioner in handling ICTG goings-on in their organization.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on call admission control protocols in cellular networks","authors":"Satyasrikanth Palle, T. N, F. Takawira","doi":"10.1145/3018896.3025141","DOIUrl":"https://doi.org/10.1145/3018896.3025141","url":null,"abstract":"The use of cellular networks over a period of time has resulted in the establishment of effective mobile networks for cellular data transmission. The main requirement for data transmission is the availability of radio frequencies but with the increasing applications there is a scarcity of radio frequencies. One way to overcome this is by employing the concept of call admission control so as to enforce proper resource utilization among all the participating nodes. But the main concern here is with respect to the quality of service in terms of several metrics based on the underlying applications. The survey conducted here provides with a detailed insight into the problems existing with respect to data transmission with QoS requirements. Several existing protocols have been analyzed and along with the current research issues.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient approach for application execution in mobile cloud IoT environment","authors":"R. Kumari, S. Kaushal","doi":"10.1145/3018896.3018957","DOIUrl":"https://doi.org/10.1145/3018896.3018957","url":null,"abstract":"Smart mobile devices (SMD) are able to provide different services to the users with minimum delay. Generally, the users are not aware of the complexity of the applications over which they are expecting fast response. SMD are constrained by their processing speed, storage capacity and many other resources, therefore, to make them to perform well with different types of applications, the concept of mobile cloud is used. Internet of Things (IoT) provides dynamic control and monitoring of energy resources enabling stakeholders to save energy usage at granular levels. With the advancement of IoT technologies and mobile cloud, a new concept is developed called as mobile cloud IoT (MCIoT) which is the convergence of both. The main objective of MCIoT is to provide the sufficient resources to the application so that the application can be executed without any deficiencies. When an application is partitioned complex part is on the cloud and rest is on the SMD, the battery life of the SMD highly improves. In this paper, we have presented an analytical model in MCIoT environment to represent the appropriate partition rate which effects execution time and energy consumption on SMD and cloud. The experiments are conducted on the bases of varying partition rate, bandwidth and data size of an application. Further, the impact of these parameters are analysed over the residual energy of SMD.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116089776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}