Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing最新文献

筛选
英文 中文
A machine learning based approach to identify geo-location of Twitter users 一种基于机器学习的方法来识别Twitter用户的地理位置
Aytuğ Onan
{"title":"A machine learning based approach to identify geo-location of Twitter users","authors":"Aytuğ Onan","doi":"10.1145/3018896.3018969","DOIUrl":"https://doi.org/10.1145/3018896.3018969","url":null,"abstract":"Twitter, a popular microblogging platform, has attracted great attention. Twitter enables people from all over the world to interact in an extremely personal way. The immense quantity of user-generated text messages become available on Twitter that could potentially serve as an important source of information for researchers and practitioners. The information available on Twitter may be utilized for many purposes, such as event detection, public health and crisis management. In order to effectively coordinate such activities, the identification of Twitter users' geo-locations is extremely important. Though online social networks can provide some sort of geo-location information based on GPS coordinates, Twitter suffers from geo-location sparseness problem. The identification of Twitter users' geo-location based on the content of send out messages, becomes extremely important. In this regard, this paper presents a machine learning based approach to the problem. In this study, our corpora is represented as a word vector. To obtain a classification scheme with high predictive performance, the performance of five classification algorithms, three ensemble methods and two feature selection methods are evaluated. Among the compared algorithms, the highest results (84.85%) is achieved by AdaBoost ensemble of Random Forest, when the feature set is selected with the use of consistency-based feature selection method in conjunction with best first search.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"537 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124263261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A method for video shot boundary detection based on HSV color histogram and DPHA feature 基于HSV颜色直方图和DPHA特征的视频镜头边界检测方法
Bin Sun, Deng-yin Zhang
{"title":"A method for video shot boundary detection based on HSV color histogram and DPHA feature","authors":"Bin Sun, Deng-yin Zhang","doi":"10.1145/3018896.3018928","DOIUrl":"https://doi.org/10.1145/3018896.3018928","url":null,"abstract":"With the explosion of video data, the demand of efficient video content analysis grows rapidly. Video shot boundary detection is the first and significant step for content based video retrieval (CBVR), which is one of the hottest research highlights. The histogram method is a major algorithm which is a reasonable compromise between processing and complexity. In this paper, a new method is proposed to improve the precision and integrity of shot boundary detection (SBD). The HSV color histogram method is used to be the first step of our detection and the histogram difference between two adjacent frames is calculated. Then, the dct perceptual hash algorithm (DPHA) is utilized to make further detection, which eliminates the fake boundaries from the results gave above. Experimental results indicate the improvement in precision and recall ratio of the proposed method.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121742149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic IoT management system using K-means machine learning for precision agriculture applications 使用K-means机器学习的动态物联网管理系统,用于精准农业应用
Jacqueline Stewart, R. Stewart, Sean Kennedy
{"title":"Dynamic IoT management system using K-means machine learning for precision agriculture applications","authors":"Jacqueline Stewart, R. Stewart, Sean Kennedy","doi":"10.1145/3018896.3036385","DOIUrl":"https://doi.org/10.1145/3018896.3036385","url":null,"abstract":"Multi-media applications for use in Precision Agriculture (PA) and Smart Farming (SM) require Network Management Systems to deliver Quality of Service (QoS) end-to-end guarantees. This paper presents the second phase of the research in providing a network management system capable of delivering end-to-end QoS guarantees for Internet of Things (IOT) networks. The first phase of this work used a wireless test bed to develop a propagation model to incorporate the attenuation due to foliage in dense vegetation typically found in PA environments. The output of this propagation model will influence the decision making process in the network management system. Wireless Multimedia Sensor Networks (WMSN) operate under the umbrella of the Wireless Sensor Network (WSN) IEEE 802.15.4 Medium Access Control (MAC) and Physical (PHY) protocol to deliver multimedia applications such as voice, video and live streaming. To operate successfully these multi-media applications have high QoS requirements. To enable these QoS requirements to be fulfilled performance metrics such as throughput, end-to-end delay and limited packet loss must be guaranteed. This next phase of the work in developing the intelligent network management system presented in this paper uses an OPNET™ simulation package to implement a modified K-Means algorithm to detect the presence of multi-media traffic. Consequently a signal informs the network management system to adopt pre-configured settings via the Personal Area Network Co-ordinator (PANC). The resulting changes implement service differentiation by manipulating the MAC layer (size of the individual GTS timeslots and duty cycle) to deliver better throughput and end-to-end delay performance. OPNET™ simulation results show that the new algorithm facilitates better performance and meets QoS requirements suitable to multimedia applications. This paper focuses on the derivation and evaluation of the performance of the K-Means algorithm. The sensory nodes are power, memory and computationally restricted. These restrictions coupled with the heterogeneous structure of the wireless network make intelligent network management systems very important if the QoS requirements are to be fulfilled. Upon detection of multimedia traffic with high QoS demands usually triggered in the aftermath of an event of particular interest e.g. security threat etc., a management system must dynamically effect change of the network configuration settings to maintain such guarantees. As real-time applications require an urgent response, the dynamic change must occur during run time automatically. This research work is novel in that it combines the output from the development of the physical layer propagation model to inform a network management system to trigger service differentiation for multimedia traffic in a PA environment.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117255488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modeling virtual channel to enforce runtime properties for IoT services 建模虚拟通道以强制物联网服务的运行时属性
Yang Zhang, Junliang Chen
{"title":"Modeling virtual channel to enforce runtime properties for IoT services","authors":"Yang Zhang, Junliang Chen","doi":"10.1145/3018896.3025150","DOIUrl":"https://doi.org/10.1145/3018896.3025150","url":null,"abstract":"Ensuring an industrial information infrastructure in a secure and safe state is a critical and mandatory requirement. Existing execution monitoring technologies do not work well to protect physical systems, especially when these supervisory control systems are open via the Internet, and the \"inside\" malwares may compromise and subvert the monitoring mechanism itself. In this paper, we propose an isolation-based solution to enforce property policies for runtime IoT services. We firstly address the issue of isolation-based service trace observation by establishing and modeling a virtual channel. We then address the issue of isolation-based policy enforcement by dealing with the incompleteness and inconsistency of trace knowledge observed in the virtual channel. Finally, physical systems are introduced into our runtime monitors, where the controllability of IoT services is discussed as an example of service property enforcement. We make some experiments to show our idea.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imagery 基于GOES-R卫星图像的近实时环境监测系统大数据GIS平台设计
M. A. Vega, S. Couturier
{"title":"Design of a big data GIS platform for a near-real-time environmental monitoring system based on GOES-R satellite imagery","authors":"M. A. Vega, S. Couturier","doi":"10.1145/3018896.3018974","DOIUrl":"https://doi.org/10.1145/3018896.3018974","url":null,"abstract":"Geographic Information Systems will gradually tend to incorporate technologies such as Big Data and the Internet of things, so that data can be processed to information towards near real time spatial analysis with unprecedented power and applications. Perhaps one of the most visible obstacles to this is the large amount of data involved. Indeed, the magnitude of stored data which implies its constant acquisition and generation, is rapidly growing to Terabyte systems through to Petabyte systems. By designing a near real time environmental monitoring system based on GOES-R next generation satellite imagery, we show in this paper that current tools actually allow the proper management of such amount of data and enable the integration of a variety of data sources that makes possible the rapid analysis of one of the most voluminous spatial dataset available.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122715914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow machine diagrams for VHDL code 流程图为VHDL代码
S. Al-Fedaghi, Sari Sultan
{"title":"Flow machine diagrams for VHDL code","authors":"S. Al-Fedaghi, Sari Sultan","doi":"10.1145/3018896.3056779","DOIUrl":"https://doi.org/10.1145/3018896.3056779","url":null,"abstract":"This paper discusses the process of generating abstract graphical models from VHDL. This process can be utilized to enhance the maintenance and comprehensibility of legacy textual code by transforming it into more readable and comprehensive models. The paper proposes use of a different diagrammatic language in this field, an alternative to UML. The proposed language is applied to describe the AND gate and half-adder and also to model a vending machine. The resultant high-level descriptions provide a viable tool for understanding VHDL code written by someone else and for documenting, communicating among team members, and teaching of VHDL.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of things for driving human-like interactions: a case study for cultural smart environment 驱动类人互动的物联网:文化智能环境的案例研究
F. Marulli, Luca Vallifuoco
{"title":"Internet of things for driving human-like interactions: a case study for cultural smart environment","authors":"F. Marulli, Luca Vallifuoco","doi":"10.1145/3018896.3036373","DOIUrl":"https://doi.org/10.1145/3018896.3036373","url":null,"abstract":"Current smart IoT technologies have the potential to make a breakthrough in the support of Cultural Heritage (CH), by providing information and communication technology to enhance effectively current models of art recreation and enjoyment. To turn such potential into reality, IoT-based technological solutions for CH should be designed by taking into account two main factors: on the one hand, they must be able to involve and attract different types of users, on the other they must avoid focusing users' attention solely on the smartness and novelty of the supporting technologies, thus diverting them from living the experience of being in a cultural site. To this aim, endowing IoT applications with anthropic interfaces seems a promising way to explore, and most prominent among such interfaces are those based on capabilities for Natural Language Understanding and Generation. In this paper we propose a preliminary case study describing an IoT infrastructure supporting Human Computer Interaction (HCI) Models, designed for art recreation. An IoT infrastructure supports a system for Holographic Projections, driven by an NLP interaction, for users' enjoyment in cultural sites. Users' experiences were collected for supporting further analysis and improving the system tuning.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Managing QoS in IoTs: a survey 物联网中的QoS管理:调查
Eiman Al Nuaimi, Noura Al Darmaki
{"title":"Managing QoS in IoTs: a survey","authors":"Eiman Al Nuaimi, Noura Al Darmaki","doi":"10.1145/3018896.3018977","DOIUrl":"https://doi.org/10.1145/3018896.3018977","url":null,"abstract":"Internet of Things \"IoT\" had spread because of the rapid development of technologies and applications. It encompasses heterogeneous objects and underlying technologies to deliver efficient services to its end-users while guarantying certain Quality of Service (QoS) properties. From this perspective, we summarize and discuss in this paper different QoS models used in IoT. Also, we propose a classification scheme that categories QoS attributes of IoT based on resources, performance, and networks properties. This classification opens up further research directions in QoS management of IoT and may serve as a baseline to manage and guarantee QoS in IoT.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing encryption and IDS for cloud security 为云安全设计加密和IDS
N. Sengupta
{"title":"Designing encryption and IDS for cloud security","authors":"N. Sengupta","doi":"10.1145/3018896.3018954","DOIUrl":"https://doi.org/10.1145/3018896.3018954","url":null,"abstract":"Usage of data is increasing exponentially with advancement of network and internet technologies. Cloud is becoming popular to save such enormous data along with facilities of using infrastructure, software and platform. Though cloud has many advantages but security is the biggest challenging factor in cloud. Cloud security includes the security in cloud client side, server side and when data is in transmission. Data is most vulnerable when data is in server as well as when data is in transmission medium. In this paper, two tier architecture of security system is proposed for cloud data. In the first tier, encryption is provided to secure data when the same is in medium. Encrypted data will be stored in server. In the second tier, Support Vector Machine based intrusion detection system is designed for cloud server to detect intruder.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoS analysis of hierarchical routing protocols for wireless sensor networks 无线传感器网络分层路由协议的QoS分析
Mariam Benmoussa, Mariyam Ouaissa, M. Lahmer, Idriss Chana, A. Rhattoy
{"title":"QoS analysis of hierarchical routing protocols for wireless sensor networks","authors":"Mariam Benmoussa, Mariyam Ouaissa, M. Lahmer, Idriss Chana, A. Rhattoy","doi":"10.1145/3018896.3025137","DOIUrl":"https://doi.org/10.1145/3018896.3025137","url":null,"abstract":"In wireless sensor networks, sensors must have a high degree of autonomy to ensure a continuous monitoring of the phenomenon perceived and must transmit the best of information to the base station with minimum loss of it. Cluster based routing protocols were initiated as the most energy efficient routing protocols for large scale wireless sensor networks. With the trend of multimedia and real time applications, the quality of service becomes one of the main requirements of WSNs. The purpose of this paper is to compare some cluster-based routing protocols, differentiated in the data transfer strategy, according to some QoS metrics such as: energy, delay, and bandwidth. These protocols are LEACH, CBHRP, MH-LEACH and LEATCH. Simulations results have shown that the best routing protocol is CBHRP because it realizes the best tradeoff between all metrics","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信