Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin
{"title":"Location Privacy Protection in Online Query based-on Privacy Region Replacement","authors":"Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin","doi":"10.1109/CCWC47524.2020.9031176","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031176","url":null,"abstract":"In order to realize online location query based on privacy in the location-based service (LBS), a location privacy protection method based on privacy region replacement (PRR) was proposed to improve the query response time without reducing the degree of privacy protection in this paper. Firstly, a privacy region was generated according to the density of people and privacy requirements. Secondly, the privacy region was replaced into an anonymous region based on the personnel distribution in the privacy region. And then the coverage degree between the anonymous region and the user query region is calculated. Finally, a new query region was used to carry on the online query. Comparing with other methods such as Casper, Fragment, and ARC, the query response time was reduced at least 17.33% in PRR with the same degree of privacy protection. The results show that the quantity of services was improved effectively using the PRR in online query.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSK","authors":"Aditi Singh, T. M. Syed, L. Joiner","doi":"10.1109/CCWC47524.2020.9031110","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031110","url":null,"abstract":"The increased throughput performance of physical-layer network coding (PNC) has led to rigorous research in this field for two-way relay systems or multi-way systems. For coherent detection of information received by the relay node and decoding the correct symbols transmitted by the user nodes after removing self-information, synchronization in the system is a critical requirement. This paper aims to study the symbol error rate (SER) performance of an asynchronized PNC system, i.e. a system with phase misalignments. The symbols of two end users arrive with a phase difference of $phi$. We study a mapping scheme for the combined signal at the relay based on its superimposed constellation structure incorporating the phase difference $phi$. An analytical bound on SER performance at the relay node in presence of phase difference $phi$ is derived. Simulation results showing identical SER performance for a fixed value of $phi$, independent of the individual link phase offsets, have been presented. It can be seen that mapping provides better spectral efficiency when compared to the de-noise and forward scheme with a slight tradeoff in SER performance compared to non-mapped case.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector Case","authors":"Y. Kamura","doi":"10.1109/CCWC47524.2020.9031191","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031191","url":null,"abstract":"In this study, we deal with the vector case's bottleneck assignment problem. Each edge's cost is introduced by the sum of the vertices which are assigned. This problem is NP-complete. We show an idea that we use a clustering method to divide the problem to partial ones. Each vertices' set is divided into subsets by a non-hierarchical clustering method. We make the optimal combination of the subsets, then vertices in the subset are corresponded according to the subsets' combinations. We examine our proposed algorithm in effectiveness by numerical experiments.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"55 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring and Alarm System Timing Analysis for an Interconnecting Grid","authors":"Steve Chan, P. Nopphawan","doi":"10.1109/CCWC47524.2020.9031167","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031167","url":null,"abstract":"Power system oscillation is a common problem in interconnected power grids. Progress has been made in measurement-based oscillation analysis due to the increased utilization of wide-area measurement system (WAMS). However, robust solution set approaches, such as oscillation classification at the “edge” and dynamic re-tuning of power system stabilizers (PSS), are often not exercised; rather generation shedding has become a common approach vector. This interim approach has risen in prevalence while the actual engineering to address root causes has been sidelined; this paper delineates the issue and posits a prospective solution for the current timing problem.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Motion Detection Based on Channel State Information and LSTM-RNN","authors":"Pengyu Zhang, Zhuoran Su, Zehua Dong, K. Pahlavan","doi":"10.1109/CCWC47524.2020.9031214","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031214","url":null,"abstract":"With the development of smart devices, human motion detection has been widely used for applications like entertainment and healthcare. Existing RF signal-based systems mostly focus on detecting relative strenuous actions and classifying them by Machine Learning (ML) method, like Support Vector Machine (SVM) and Random Forest (RF). This paper proposes a system that can detect and classify arm motions by leveraging the $W$ iFi OFDM signal. Instead of widely used SVM, we choose the Long Short-Term Memory (LSTM) algorithm to classify data from Channel State Information (CSI). The preliminary result shows that our systems achieve an average accuracy of 96% with 5 states of arm movement.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interface for Human Machine Interaction for assistant devices: A Review","authors":"Saifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim","doi":"10.1109/CCWC47524.2020.9031244","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031244","url":null,"abstract":"Interface for the Human Machine Interaction has become a prominent area of research due to the rapid growth of automation and robotics in the recent few decades. Although an abundance of frameworks have been emerged to make the interaction between human and machine easy and robust, a substantial portion of these is not flourished in their scope. Through this review, we have tried to reveal different types of interfacing technique between human and machine to exhibit the evolution of the related technologies in developing assistant devices. This review explores the contemporary groundbreaking technologies developed for this purpose and their advantages and limitations. An outline is drawn for forthcoming development in the field of human machine interaction, human computer interaction and human robot interaction by using this review. This review draws a broad perspective on status quo and perspective on the possible future development of interfaces of assistant devices in the field of Human machine interaction.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116521038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jannatun Naher, C. Gloster, C. Doss, Shrikant S. Jadhav
{"title":"Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM)","authors":"Jannatun Naher, C. Gloster, C. Doss, Shrikant S. Jadhav","doi":"10.1109/CCWC47524.2020.9031173","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031173","url":null,"abstract":"OpenCL is a framework for writing programs that execute across heterogeneous platforms, including FPGAs. OpenCL allows users to write standardized C-like code for the host as well as for the hardware accelerators, thus reducing the programming challenge for FPGAs. Hardware descriptions can be written in OpenCL using different memory access and data partitioning strategies. Matrix-Vector Multiplication (MVM) is the critical computational bottleneck for many System of Linear Equations (SLEs) solvers. The MVM OpenCL kernel can be optimized by varying several design parameters in the OpenCL description, improving hardware performance. To effectively explore the design space, logic synthesis is performed after each iteration of setting design parameters to determine their impact on design area and performance. However, each of these synthesis runs can take multiple hours. Hence, manual design space exploration for a large number of designs is prohibitive. To address this challenge, a prediction of FPGA utilization and throughput can significantly reduce the design time. This paper presents a machine learning-based approach to estimating FPGA utilization and throughput for a given set of design parameter values. It also presents an optimized MVM implementation obtained after compiling, synthesizing, and executing over 100 designs. The Random Forest machine learning algorithm estimates the result and for 175 designs, the average error is. 0098%,. 0012%,. 0039%,. 0414%, and 123.21% for estimating Look-up Tables (LUTs), Digital Signal Processors (DSPs), memory bits, RAM blocks and throughput (GFLOPs) respectively.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122392017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario","authors":"Q. Mamun, Muhammad Arif Khan","doi":"10.1109/CCWC47524.2020.9031277","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031277","url":null,"abstract":"The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating these two technologies can have a significant impact across multiple industries. In this paper, a sample use case related to safe-work has been discussed. A group mutual exclusion (GME) protocol has been proposed for the consensus operation of different authorities/stakeholder to update the distributed ledger of the hybrid system. The protocol utilises a single token to enable various processes of different stakeholders to enter into a common session to reach the consensus among themselves. In other words, we have introduced a novel consensus protocol-proof of presence. The protocol offers a crucial characteristic-the concurrency, throughput, and waiting time can be tailored by adjusting the period for which a session is declared. The protocol also ensures no starvation in the system. Furthermore, this algorithm works out for the Extended Group Mutual Exclusion problem as well.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, G. Koutitas, F. A. M. Mediavilla, S. Aslan, Jesús A. Jiménez
{"title":"Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture Data","authors":"Geovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, G. Koutitas, F. A. M. Mediavilla, S. Aslan, Jesús A. Jiménez","doi":"10.1109/CCWC47524.2020.9031222","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031222","url":null,"abstract":"Industrial Revolution 4.0 is defined as the interconnection of Information, Communications Technologies (ICT), and factory floor workers. Workers in the material handling industry are often subject to repetitive motions that cause exhaustion (or fatigue) which leads to work-related musculoskeletal disorders (WMSDs). The most common repetitive motions are lifting, pulling, pushing, carrying and walking with load. In this research data is collected as time-stamped motion data using infrared cameras at a rate of 100Hz while a subject performs one of the repetitive motions (i.e. lifting). The data is a combination of xyz-coordinates of 39 reflective markers. This results in 117 data points for each frame captured. Since these motions occur over time for a duration of time, this data is used as input to a time-series machine learning (ML) model such as Recurrent Neural Network (RNN). Using this model, this paper evaluates machine learning techniques, based on RNN, to evaluate the fatigue factor caused by repetitive motions.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Security Threats on Networked Medical Devices","authors":"David Zaldivar, L. Tawalbeh, Fadi Muheidat","doi":"10.1109/CCWC47524.2020.9031212","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031212","url":null,"abstract":"This paper explores the cyber security threat of Implanted Medical Devices. The widely use of Internet of Thing capable devices in healthcare like pacemakers, infusion pumps, and insulin pumps support patients, at the same time they are considered a point of security threats. All of these devices are susceptible to hacking and exploitation, which has been demonstrated at various cyber security conventions for nearly the past decade. Although some progress in security measures seems to have been made, recent discoveries and interviews with researchers show a battle is still being fought with some manufacturers. Through pressure applied by some of these researchers, The Food and Drug Administration (FDA) has taken notice and issued safety warnings for some of these devices. We will begin by defining what these devices are and explore why people need them. Next, we will briefly give a history of the Internet of Things, explore prior security issues, and then introduce the security researchers and groups involved with finding the exploits of healthcare devices.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}