2020 10th Annual Computing and Communication Workshop and Conference (CCWC)最新文献

筛选
英文 中文
Location Privacy Protection in Online Query based-on Privacy Region Replacement 基于隐私区域替换的在线查询位置隐私保护
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031176
Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin
{"title":"Location Privacy Protection in Online Query based-on Privacy Region Replacement","authors":"Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin","doi":"10.1109/CCWC47524.2020.9031176","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031176","url":null,"abstract":"In order to realize online location query based on privacy in the location-based service (LBS), a location privacy protection method based on privacy region replacement (PRR) was proposed to improve the query response time without reducing the degree of privacy protection in this paper. Firstly, a privacy region was generated according to the density of people and privacy requirements. Secondly, the privacy region was replaced into an anonymous region based on the personnel distribution in the privacy region. And then the coverage degree between the anonymous region and the user query region is calculated. Finally, a new query region was used to carry on the online query. Comparing with other methods such as Casper, Fragment, and ARC, the query response time was reduced at least 17.33% in PRR with the same degree of privacy protection. The results show that the quantity of services was improved effectively using the PRR in online query.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSK 基于QPSK的异步PNC动态星座映射与SER性能
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031110
Aditi Singh, T. M. Syed, L. Joiner
{"title":"Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSK","authors":"Aditi Singh, T. M. Syed, L. Joiner","doi":"10.1109/CCWC47524.2020.9031110","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031110","url":null,"abstract":"The increased throughput performance of physical-layer network coding (PNC) has led to rigorous research in this field for two-way relay systems or multi-way systems. For coherent detection of information received by the relay node and decoding the correct symbols transmitted by the user nodes after removing self-information, synchronization in the system is a critical requirement. This paper aims to study the symbol error rate (SER) performance of an asynchronized PNC system, i.e. a system with phase misalignments. The symbols of two end users arrive with a phase difference of $phi$. We study a mapping scheme for the combined signal at the relay based on its superimposed constellation structure incorporating the phase difference $phi$. An analytical bound on SER performance at the relay node in presence of phase difference $phi$ is derived. Simulation results showing identical SER performance for a fixed value of $phi$, independent of the individual link phase offsets, have been presented. It can be seen that mapping provides better spectral efficiency when compared to the de-noise and forward scheme with a slight tradeoff in SER performance compared to non-mapped case.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector Case k-均值法在矢量情况下改进瓶颈分配问题中的应用
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031191
Y. Kamura
{"title":"Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector Case","authors":"Y. Kamura","doi":"10.1109/CCWC47524.2020.9031191","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031191","url":null,"abstract":"In this study, we deal with the vector case's bottleneck assignment problem. Each edge's cost is introduced by the sum of the vertices which are assigned. This problem is NP-complete. We show an idea that we use a clustering method to divide the problem to partial ones. Each vertices' set is divided into subsets by a non-hierarchical clustering method. We make the optimal combination of the subsets, then vertices in the subset are corresponded according to the subsets' combinations. We examine our proposed algorithm in effectiveness by numerical experiments.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"55 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring and Alarm System Timing Analysis for an Interconnecting Grid 互联电网监控报警系统时序分析
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031167
Steve Chan, P. Nopphawan
{"title":"Monitoring and Alarm System Timing Analysis for an Interconnecting Grid","authors":"Steve Chan, P. Nopphawan","doi":"10.1109/CCWC47524.2020.9031167","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031167","url":null,"abstract":"Power system oscillation is a common problem in interconnected power grids. Progress has been made in measurement-based oscillation analysis due to the increased utilization of wide-area measurement system (WAMS). However, robust solution set approaches, such as oscillation classification at the “edge” and dynamic re-tuning of power system stabilizers (PSS), are often not exercised; rather generation shedding has become a common approach vector. This interim approach has risen in prevalence while the actual engineering to address root causes has been sidelined; this paper delineates the issue and posits a prospective solution for the current timing problem.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complex Motion Detection Based on Channel State Information and LSTM-RNN 基于通道状态信息和LSTM-RNN的复杂运动检测
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031214
Pengyu Zhang, Zhuoran Su, Zehua Dong, K. Pahlavan
{"title":"Complex Motion Detection Based on Channel State Information and LSTM-RNN","authors":"Pengyu Zhang, Zhuoran Su, Zehua Dong, K. Pahlavan","doi":"10.1109/CCWC47524.2020.9031214","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031214","url":null,"abstract":"With the development of smart devices, human motion detection has been widely used for applications like entertainment and healthcare. Existing RF signal-based systems mostly focus on detecting relative strenuous actions and classifying them by Machine Learning (ML) method, like Support Vector Machine (SVM) and Random Forest (RF). This paper proposes a system that can detect and classify arm motions by leveraging the $W$ iFi OFDM signal. Instead of widely used SVM, we choose the Long Short-Term Memory (LSTM) algorithm to classify data from Channel State Information (CSI). The preliminary result shows that our systems achieve an average accuracy of 96% with 5 states of arm movement.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Interface for Human Machine Interaction for assistant devices: A Review 辅助设备的人机交互界面:综述
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031244
Saifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim
{"title":"Interface for Human Machine Interaction for assistant devices: A Review","authors":"Saifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim","doi":"10.1109/CCWC47524.2020.9031244","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031244","url":null,"abstract":"Interface for the Human Machine Interaction has become a prominent area of research due to the rapid growth of automation and robotics in the recent few decades. Although an abundance of frameworks have been emerged to make the interaction between human and machine easy and robust, a substantial portion of these is not flourished in their scope. Through this review, we have tried to reveal different types of interfacing technique between human and machine to exhibit the evolution of the related technologies in developing assistant devices. This review explores the contemporary groundbreaking technologies developed for this purpose and their advantages and limitations. An outline is drawn for forthcoming development in the field of human machine interaction, human computer interaction and human robot interaction by using this review. This review draws a broad perspective on status quo and perspective on the possible future development of interfaces of assistant devices in the field of Human machine interaction.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116521038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM) 利用机器学习估计基于opencl的矩阵向量乘法(MVM)的利用率和吞吐量
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031173
Jannatun Naher, C. Gloster, C. Doss, Shrikant S. Jadhav
{"title":"Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM)","authors":"Jannatun Naher, C. Gloster, C. Doss, Shrikant S. Jadhav","doi":"10.1109/CCWC47524.2020.9031173","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031173","url":null,"abstract":"OpenCL is a framework for writing programs that execute across heterogeneous platforms, including FPGAs. OpenCL allows users to write standardized C-like code for the host as well as for the hardware accelerators, thus reducing the programming challenge for FPGAs. Hardware descriptions can be written in OpenCL using different memory access and data partitioning strategies. Matrix-Vector Multiplication (MVM) is the critical computational bottleneck for many System of Linear Equations (SLEs) solvers. The MVM OpenCL kernel can be optimized by varying several design parameters in the OpenCL description, improving hardware performance. To effectively explore the design space, logic synthesis is performed after each iteration of setting design parameters to determine their impact on design area and performance. However, each of these synthesis runs can take multiple hours. Hence, manual design space exploration for a large number of designs is prohibitive. To address this challenge, a prediction of FPGA utilization and throughput can significantly reduce the design time. This paper presents a machine learning-based approach to estimating FPGA utilization and throughput for a given set of design parameter values. It also presents an optimized MVM implementation obtained after compiling, synthesizing, and executing over 100 designs. The Random Forest machine learning algorithm estimates the result and for 175 designs, the average error is. 0098%,. 0012%,. 0039%,. 0414%, and 123.21% for estimating Look-up Tables (LUTs), Digital Signal Processors (DSPs), memory bits, RAM blocks and throughput (GFLOPs) respectively.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122392017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario 安全生产场景下物联网-区块链集成用例的组互斥协议
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031277
Q. Mamun, Muhammad Arif Khan
{"title":"A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario","authors":"Q. Mamun, Muhammad Arif Khan","doi":"10.1109/CCWC47524.2020.9031277","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031277","url":null,"abstract":"The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating these two technologies can have a significant impact across multiple industries. In this paper, a sample use case related to safe-work has been discussed. A group mutual exclusion (GME) protocol has been proposed for the consensus operation of different authorities/stakeholder to update the distributed ledger of the hybrid system. The protocol utilises a single token to enable various processes of different stakeholders to enter into a common session to reach the consensus among themselves. In other words, we have introduced a novel consensus protocol-proof of presence. The protocol offers a crucial characteristic-the concurrency, throughput, and waiting time can be tailored by adjusting the period for which a session is declared. The protocol also ensures no starvation in the system. Furthermore, this algorithm works out for the Extended Group Mutual Exclusion problem as well.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture Data 使用3D运动捕捉数据的人工材料搬运操作疲劳运动分析的机器学习技术
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031222
Geovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, G. Koutitas, F. A. M. Mediavilla, S. Aslan, Jesús A. Jiménez
{"title":"Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture Data","authors":"Geovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, G. Koutitas, F. A. M. Mediavilla, S. Aslan, Jesús A. Jiménez","doi":"10.1109/CCWC47524.2020.9031222","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031222","url":null,"abstract":"Industrial Revolution 4.0 is defined as the interconnection of Information, Communications Technologies (ICT), and factory floor workers. Workers in the material handling industry are often subject to repetitive motions that cause exhaustion (or fatigue) which leads to work-related musculoskeletal disorders (WMSDs). The most common repetitive motions are lifting, pulling, pushing, carrying and walking with load. In this research data is collected as time-stamped motion data using infrared cameras at a rate of 100Hz while a subject performs one of the repetitive motions (i.e. lifting). The data is a combination of xyz-coordinates of 39 reflective markers. This results in 117 data points for each frame captured. Since these motions occur over time for a duration of time, this data is used as input to a time-series machine learning (ML) model such as Recurrent Neural Network (RNN). Using this model, this paper evaluates machine learning techniques, based on RNN, to evaluate the fatigue factor caused by repetitive motions.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Investigating the Security Threats on Networked Medical Devices 调查网络医疗设备的安全威胁
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031212
David Zaldivar, L. Tawalbeh, Fadi Muheidat
{"title":"Investigating the Security Threats on Networked Medical Devices","authors":"David Zaldivar, L. Tawalbeh, Fadi Muheidat","doi":"10.1109/CCWC47524.2020.9031212","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031212","url":null,"abstract":"This paper explores the cyber security threat of Implanted Medical Devices. The widely use of Internet of Thing capable devices in healthcare like pacemakers, infusion pumps, and insulin pumps support patients, at the same time they are considered a point of security threats. All of these devices are susceptible to hacking and exploitation, which has been demonstrated at various cyber security conventions for nearly the past decade. Although some progress in security measures seems to have been made, recent discoveries and interviews with researchers show a battle is still being fought with some manufacturers. Through pressure applied by some of these researchers, The Food and Drug Administration (FDA) has taken notice and issued safety warnings for some of these devices. We will begin by defining what these devices are and explore why people need them. Next, we will briefly give a history of the Internet of Things, explore prior security issues, and then introduce the security researchers and groups involved with finding the exploits of healthcare devices.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信