Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China最新文献

筛选
英文 中文
Dynamic Computation Offloading Based on Deep Reinforcement Learning 基于深度强化学习的动态计算卸载
Baichuan Cheng, Zhilong Zhang, Danpu Liu
{"title":"Dynamic Computation Offloading Based on Deep Reinforcement Learning","authors":"Baichuan Cheng, Zhilong Zhang, Danpu Liu","doi":"10.4108/eai.29-6-2019.2282108","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282108","url":null,"abstract":"Mobile edge computing (MEC) provides computation capability at the edge of wireless network. To reduce the execution delay, computation-intensive multimedia tasks can be offloaded from user equipments (UEs) to the MEC server. How to allocate the computational and wireless resources is one of the key issues to guarantee the quality of services, and is very challenging when tasks are generated dynamically. In this paper, we address the above problem. To minimize the sum execution delay of multiple users, we jointly optimize the offloading decision and the allocation of both computational and wireless resources. We propose a deep policy gradient (DPG) algorithm based on the deep reinforcement learning. Simulation results show that our proposed DPG method can achieve lower latency than the baselines under different numbers of users, computation capacities and wireless bandwidths.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fine-grained Conditional Proxy Broadcast ReEncryption Policy for File Sharing System 文件共享系统的细粒度条件代理广播重加密策略
Yongjun Ren, Yepeng Liu, Chengshan Qian
{"title":"A Fine-grained Conditional Proxy Broadcast ReEncryption Policy for File Sharing System","authors":"Yongjun Ren, Yepeng Liu, Chengshan Qian","doi":"10.4108/eai.29-6-2019.2282387","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282387","url":null,"abstract":"With the proliferation of electronic devices, cloud storage has become an integral part of synchronizing files between devices. However, data stored on the cloud is vulnerable to unauthorized access during the sharing process. The traditional conditional proxy broadcast re-encryption solution is suitable for the above application scenarios but does not support flexible control of conditions. This article describes the concept of finegrained conditional proxy broadcast re-encryption (FGC-BPRE). The scheme utilizes an access tree to generate a re-encryption key. If the ciphertext keyword satisfies the conditions in the access tree, the proxy can convert the user's ciphertext into a new ciphertext for a group of users. In addition, this paper also constructs a fine-grained conditional proxy broadcast re-encryption scheme and verifies the security of selective ciphertext attacks without oracles.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Process for Indoor Positioning based on WiFi Fingerprint 基于WiFi指纹的室内定位数据处理
Xue-rong Cui, Mengyan Wang, Juan Li, Meiqi Ji, Jianhang Liu, Tingpei Huang, Haihua Chen
{"title":"Data Process for Indoor Positioning based on WiFi Fingerprint","authors":"Xue-rong Cui, Mengyan Wang, Juan Li, Meiqi Ji, Jianhang Liu, Tingpei Huang, Haihua Chen","doi":"10.4108/eai.29-6-2019.2282793","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282793","url":null,"abstract":"Currently, most of the existing location fingerprint indoor positioning algorithms are based on the original fingerprint database. The accuracy of the fingerprint database will directly affect the final positioning accuracy. A method based on skewness-kurtosis normality test and Kalman filter fusion is proposed in this paper. Experiments shows that the fusion algorithm can effectively remove the abrupt data and noise fluctuations for the RSSI (Received Signal Strength Indication) data, and achieve accurate and smooth output of the RSSI value.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117154342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Deceptive Reviews Utilizing Review Group Model 利用评审组模型检测欺骗性评论
Yuejun Li, Fangxin Wang, Shuwu Zhang, Xiaofei Niu
{"title":"Detecting Deceptive Reviews Utilizing Review Group Model","authors":"Yuejun Li, Fangxin Wang, Shuwu Zhang, Xiaofei Niu","doi":"10.4108/eai.29-6-2019.2282593","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282593","url":null,"abstract":"Online product and store reviews play an important role in product and service recommendation for new customers. However, due to economic or fame reasons, dishonest people are employed to write fake reviews which is also called “opinion spamming” to promote or demote target products and services. Previous research has used text similarity, linguistics, rating patterns, graph relation and other behavior for spammer detection. It is difficult to find fake reviews by a glance of product reviews in time-descending order while It’s more easy to identify fraudulent reviews by checking the list of reviews of reviewers. We propose sieries of novel review grouping models to identify both positive and negative deceptive reviews. The review grouping algorithm can effectively split reviews of reviewer into groups which participate in building new model of review spamming detection. Several new features which are language independent based on group model are constructed. Additionally, we explore the collusion behavior between reviewers to build group collusion model. Experiments and evaluations show that the review group method and relevant models can effectivly improve the precision of 4%-7% in deceptive reviews detection task especially those posted by professional review spammers.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design Solution to Security Simulation Platform for Intelligent Household 智能家居安防仿真平台的设计方案
Hui Wang, Chengze Li, Jing Yuan, Zhimin Wu
{"title":"A Design Solution to Security Simulation Platform for Intelligent Household","authors":"Hui Wang, Chengze Li, Jing Yuan, Zhimin Wu","doi":"10.4108/eai.29-6-2019.2282822","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282822","url":null,"abstract":"","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130934261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Context Awareness Based Accident Prevention During Mobile Phone Use 基于情境感知的手机使用事故预防研究
Bowen Sun, Quanlong Li, Yonghui Guo, Guocheng Li
{"title":"Research of Context Awareness Based Accident Prevention During Mobile Phone Use","authors":"Bowen Sun, Quanlong Li, Yonghui Guo, Guocheng Li","doi":"10.4108/eai.29-6-2019.2282759","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282759","url":null,"abstract":"In recent years, with the continuous development of technologies, people's dependence on smartphones is growing increasingly. Excessive dependence is causing a considerable number of people to face potential accidents and injuries on account of the use of mobile phones. Based on above considerations, this paper gives defines dangerous context, using context-aware technology to study the accident prevention methods in the process of using mobile phones, and the research involves three parts: human behavior awareness, spatial location awareness, and interaction mode awareness.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contactless heart rate and respiratory measurement for sleep monitoring 用于睡眠监测的非接触式心率和呼吸测量
Yingyan Hou, Fangzheng Zhu
{"title":"Contactless heart rate and respiratory measurement for sleep monitoring","authors":"Yingyan Hou, Fangzheng Zhu","doi":"10.4108/eai.29-6-2019.2282670","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282670","url":null,"abstract":"Heart rate and respiration, which are physiological indicators closely related to cardiopulmonary function, are widely used in clinical diagnosis and daily monitoring. This paper proposes a heart rate measurement based on imaging photovoltaic plethysmography (iPPG) and a respiratory measurement method of sift algorithm. We mark the region of interest by dlib. Signal is obtained by color channels separation of ROI and independent component analysis. Next we filter signal with bandpass filter and extract heart rate from the blood volume pulse via Fourier transform. Meanwhile, the trajectory is decomposed into a set of component motions by calculating the feature points at the chest and performing principal component analysis. The composition of the respiration that is most suitable for the calculation is then selected based on its time spectrum. Finally, the peak of the trajectory corresponding to the respiration is determined. This method could be used for contactless sleep monitoring .","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127880734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research of lever-arm effect in the Transfer Alignment 传递校中杠杆臂效应的研究
Lijun Song, Duan Zhongxing, Zhao Wanliang, Chen Yuxiang
{"title":"The research of lever-arm effect in the Transfer Alignment","authors":"Lijun Song, Duan Zhongxing, Zhao Wanliang, Chen Yuxiang","doi":"10.4108/eai.29-6-2019.2284115","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2284115","url":null,"abstract":"Song lijun1 Duan Zhongxing1 Zhao wanliang2 Cheng yuxiang2 1 School of Information & Control Engineering , Xi’an University of Architecture and Technology, Xi’an 710055 2 Shanghai Aerospace Control Technology Institute,Shanghai 201109 Songlijun9071@sina.com Abstract: The Transfer Alignment is an effective method of improve the initial alignment velocity and accuracy of inertial navigation system, and the lever-arm effect is an important factor affecting on the accuracy of transfer alignment. It is analyzed the reasons for the formation of the lever-arm effect, proposed an compensation algorithm for the leve-r arm effect, built the mathematical model of velocity and acceleration, took a method of velocity and position matching in transfer alignment, used the method of calculating the compensation to compensate the lever-arm velocity, and diminished the effect of the lever-arm effect on the transfer alignment accuracy. Finally, the simulation shows that the model can effectively improve the alignment accuracy and alignment time.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127822275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mobile Edge Computing Enabled Spectrum Blockchain for the Internet of Spectrum Devices 面向频谱设备互联网的移动边缘计算频谱区块链
Yang Jian, Ding Guoru, Chengzhe Xi, Zhang Linyuan, Sun Jiachen, Zhao Hangsheng
{"title":"A Mobile Edge Computing Enabled Spectrum Blockchain for the Internet of Spectrum Devices","authors":"Yang Jian, Ding Guoru, Chengzhe Xi, Zhang Linyuan, Sun Jiachen, Zhao Hangsheng","doi":"10.4108/eai.29-6-2019.2282647","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282647","url":null,"abstract":"To achieve secure and immutable spectrum data monitoring and sharing, and further to realize accurate and reliable spectrum strategy customization, a mobile edge computing (MEC) enabled spectrum blockchain is developed for the internet of spectrum devices (IoSD). Specially, a three-stage consensus mechanism is designed to achieve secure and immutable spectrum data monitoring and sharing, and spectrum blockchain employs the edge-deployed personal wireless device to realize efficient storage of massive spectrum data and quickly response of spectrum strategy customization. The malicious behaviour of spectrum data falsification is employed as Byzantine attack to evaluate the security performance of the proposed MEC-enabled spectrum blockchain. Numerical simulations show the consensus mechanism identify the malicious behaviours with high probability of detection under a variety of scenarios.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive fusion localization mechanism towards TDoA and IMU data with LSTM correction Method 基于LSTM校正方法的TDoA和IMU数据自适应融合定位机制
Zhiyuan Liu, Liang Li, Zheng Wang, Q. Fu, Puning Zhang
{"title":"Adaptive fusion localization mechanism towards TDoA and IMU data with LSTM correction Method","authors":"Zhiyuan Liu, Liang Li, Zheng Wang, Q. Fu, Puning Zhang","doi":"10.4108/eai.29-6-2019.2282992","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282992","url":null,"abstract":"Using Time Difference of Arrival(TDoA) positioning results and the Inertial measurement unit(IMU) for calculating the motion state of information fusion can significantly improve the positioning accuracy, due to the carrier in the process of movement, the state of the system noise and measurement noise are not strictly obey the normal gaussian distribution, which makes the traditional fusion positioning method using Kalman Filtering algorithm less accurate. This paper proposes an adaptive filter fusion localization mechanism with LSTM network correction. Firstly, a data preprocessing method is designed to convert IMU data from the carrier coordinate system to the geographical coordinate system. Then, based on kinematics theory, the state equation and measurement equation of Adaptive Kalman Filter are established and the system state noise is obtained. Furthermore, the model adaptively to update the carrier coordinate, system state noise and measurement noise. Finally, the carrier trajectory coordinates predicted by the coupled LSTM model are used to obtain the final positioning results and complete the carrier trajectory filtering. Experimental results show that the proposed fusion localization mechanism can effectively improve the accuracy of carrier trajectory localization.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"2526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信