2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)最新文献

筛选
英文 中文
An Explication of Acceptability of Wearable Devices in Context of Bangladesh: A User Study 可穿戴设备在孟加拉国的可接受性解释:一项用户研究
Arnab Debnath, K. Kobra, Proteeti Prova Rawshan, Manisha Paramita, M. Islam
{"title":"An Explication of Acceptability of Wearable Devices in Context of Bangladesh: A User Study","authors":"Arnab Debnath, K. Kobra, Proteeti Prova Rawshan, Manisha Paramita, M. Islam","doi":"10.1109/FiCloud.2018.00027","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00027","url":null,"abstract":"The advent of wearable technology, which includes smart electronic devices, is burgeoning day by day and is highly anticipated to be the next big thing in the field of Internet of Things (IoT). Wearable technology includes smart electronic devices, which can be worn on the parts of your body. This technology has been proved to be highly prolific and well accepted in the developed countries. In spite of its efficacy, potency, ease of use and many other qualities that it claims to have, the adoption of wearable devices is still very low in the developing countries like Bangladesh. This study, based on Focused Group Discussion (FGD), depicts a set of factors affecting the adoption of wearable technology in Bangladesh. The objective of this research is to find out the dominant factors that affect the adoption of wearable devices in context of Bangladesh. The conventional IT adoption models such as the Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), The Unified Theory of Acceptance and Use of Technology (UTAUT) etc. were used as background theory to carry out the study. The study results showed that Perceived Cost, Perceived Usefulness, Perceived Ease of Use, Unavailability & Lack of Promotion are the most cardinal factors; Perceived Trust, Lack of Knowledge, Brand Loyalty are moderately important factors while Social Influence, Perceived Risk, Facilitating Condition and Attitude Towards Use are the trivial factors working as catalyst behind the acceptance of wearable devices.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluation of New Dynamic Time Division Multiplexing Protocol for Real-Time Traffic over Converged Networks 融合网络实时流量动态时分复用新协议的评估
Dalia El-Banna, P. Bull, Yonghao Wang
{"title":"Evaluation of New Dynamic Time Division Multiplexing Protocol for Real-Time Traffic over Converged Networks","authors":"Dalia El-Banna, P. Bull, Yonghao Wang","doi":"10.1109/FiCloud.2018.00048","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00048","url":null,"abstract":"Packet switched networks have been increasingly used for the transmission of real-time traffic in addition to the traditional best-effort. Although not primarily designed for time critical traffic, industries like professional audio and video, electrical utilities and automation systems, motivated the need for having converged networks that support both time critical as well as best-effort traffic. In this paper a new proposed dynamic Time Division Multiplexing (TDM) protocol, Flexilink, is evaluated for its ability to provide a low latency unified network infrastructure for both real-time traffic as well as traditional best-effort traffic. A simulation model had been developed to evaluate Flexilink performance, however, no research evaluation had been done based on hardware implementation of the protocol. We present a test-bed based study and evaluation for the performance of Flexilink. Test-bed results shows that Flexilink has a better performance compared to other multimedia networking solutions mainly in providing extremely low end-to-end latency and jitter that is well below the audible threshold which makes Flexilink suitable to be used in live multimedia networks.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130272195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knee/Elbow Point Estimation through Thresholding 通过阈值法估计膝关节/肘关节点
M. Antunes, Joana Ribeiro, D. Gomes, R. Aguiar
{"title":"Knee/Elbow Point Estimation through Thresholding","authors":"M. Antunes, Joana Ribeiro, D. Gomes, R. Aguiar","doi":"10.1109/FiCloud.2018.00066","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00066","url":null,"abstract":"Estimating the knee/elbow point in curves is a challenging task. However, most of the time these points represent ideal compromises for parameters, methods and algorithms. Nowadays several IoT and M2M scenarios require autonomous systems that optimize themselves with minimal human intervention. Thus, knee/elbow estimation has become an important research area. Our focus is determining the ideal number of clusters autonomously. In this paper, we formalize the notion of knee/elbow point based on continuous curvature function and propose two theoretical methods based on the same function. We analyse and discuss well-known knee/elbow estimators and propose our own method. Contrary to most methods, ours is resilient to long tails in the curve. We also propose an iterative refinement method to increase the resilience to long heads. All the previously mentioned methods were implemented (and are publicly available) and evaluated against eight datasets. The proposed method is a viable stable solution for knee/elbow estimation.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Point-Based Pattern Search in 3D Motion Capture Databases 三维运动捕捉数据库中基于点的高效模式搜索
C. Beecks, Alexander Grass
{"title":"Efficient Point-Based Pattern Search in 3D Motion Capture Databases","authors":"C. Beecks, Alexander Grass","doi":"10.1109/FiCloud.2018.00041","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00041","url":null,"abstract":"3D motion capture data is a specific type of data arising in the Internet of Things. It is widely used in science and industry for recording the movements of humans, animals, or objects over time. In order to facilitate efficient spatio-temporal access into large 3D motion capture databases collected via internet-of-things technology, we propose an efficient 2-Phase Point-based Trajectory Search Algorithm (2PPTSA) which is built on top of a compact in-memory spatial access method. The 2PPTSA is fundamental to any type of pattern-based investigation and enables fast and scalable point-based pattern search in 3D motion capture databases. Our empirical evaluation shows that the 2PPTSA is able to retrieve the most similar trajectories for a given point-based query pattern in a few milliseconds with a comparatively low number of I/O accesses.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Publisher's Information 出版商的信息
{"title":"Publisher's Information","authors":"","doi":"10.1109/ficloud.2018.00072","DOIUrl":"https://doi.org/10.1109/ficloud.2018.00072","url":null,"abstract":"","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Routing for MANET Connected Internet of Things Systems MANET连接物联网系统的安全路由
Jonny Karlsson, L. Dooley, G. Pulkkis
{"title":"Secure Routing for MANET Connected Internet of Things Systems","authors":"Jonny Karlsson, L. Dooley, G. Pulkkis","doi":"10.1109/FiCloud.2018.00024","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00024","url":null,"abstract":"This paper presents a contemporary review of communication architectures and topographies for MANET-connected Internet-of-Things (IoT) systems. Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low-power and Lossy Networks. Various security threats and vulnerabilities in current MANET routing are described and security enhanced routing protocols and trust models presented as methodologies for supporting secure routing. Finally, the paper identifies some key research challenges in the emerging domain of MANET-IoT connectivity.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129793278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Self-Organized Framework for Insurance Based on Internet of Things and Blockchain 基于物联网和区块链的自组织保险框架
Monireh Vahdati, Kamran Gholizadeh HamlAbadi, A. Saghiri, H. Rashidi
{"title":"A Self-Organized Framework for Insurance Based on Internet of Things and Blockchain","authors":"Monireh Vahdati, Kamran Gholizadeh HamlAbadi, A. Saghiri, H. Rashidi","doi":"10.1109/FiCloud.2018.00032","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00032","url":null,"abstract":"Recently, Internet of Things (IoT) and blockchain technology are used to improve the traditional companies. One type of traditional companies is insurance companies. These companies suffer several problems that are leading to decrease their efficiency in modern societies. Many users of these companies are unhappy and dissatisfied because of some problems. The main problems of these companies are that their operations are not transparent. Moreover, their insurance rates are not calculated and in adaptive with customer's characteristics, e.g for low-risk and high-risk customers. Note that, users are not identical to the same insurance rates, which are determined by the insurer. In modern society, we have the IoT technology that enables us to find some specific information about users. This information enables the insurance companies to increase its accuracy. In addition, considering the potential of the smart contract of the blockchain, determining insurance rates must be transparent. This article proposes a self-organizing framework for insurance based on IoT and blockchain, which eliminates the main problems of traditional insurance. To evaluate the proposed framework, it is compared with the existing framework. The results show that it has several advantages over the existing framework and could be useful in near future.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Modelling Cloud Federation: A Fair Profit Distribution Strategy Using the Shapley Value 建模云联盟:使用Shapley值的公平利润分配策略
Kun Ma, A. Bagula, H. Mauwa, A. Celesti
{"title":"Modelling Cloud Federation: A Fair Profit Distribution Strategy Using the Shapley Value","authors":"Kun Ma, A. Bagula, H. Mauwa, A. Celesti","doi":"10.1109/FiCloud.2018.00063","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00063","url":null,"abstract":"Cloud computing provides software (Software as a Service), platform (Platform as a Service) and infrastructure (Infrastructure as a Service) services to its users by integrating IT resources into a large-scale and scalable resource pool through the virtualisation technology. However, the single cloud resource provider model currently implemented by many providers may fail short to meet the dynamic nature of cloud users' requirements. Cloud federation can mitigate this issue by optimising cloud resource allocation through sharing and re-usability of available resources. This paper revisit the problem of cloud engineering by tackling the key issue of the fair distribution of profit between cloud resource providers, which, to the best of our knowledge, has only been scarcely addressed by the research and practitioners' community. We propose a method that enables the cloud federation to map the contribution of resources of the participants to the federations into a quality of service metric used to achieve a cloud federation. Building upon a federation game implementation, we reveal the possibilities and benefits of different federation compositions using the Shapley value of each resource provider as a way of implementing a fair profit sharing strategy. Using extensions of the CloudSim package, we present simulation results that demonstrate the fairness of our proposed method and strategy.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement 确保物联网设备遵守其隐私政策协议
Alanoud Subahi, George Theodorakopoulos
{"title":"Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement","authors":"Alanoud Subahi, George Theodorakopoulos","doi":"10.1109/FiCloud.2018.00022","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00022","url":null,"abstract":"In the past few years, Internet of Things (IoT) devices have emerged and spread everywhere. Many researchers have been motivated to study the security issues of IoT devices due to the sensitive information they carry about their owners. Privacy is not simply about encryption and access authorization, but also about what kind of information is transmitted, how it used and to whom it will be shared with. Thus, IoT manufacturers should be compelled to issue Privacy Policy Agreements for their respective devices as well as ensure that the actual behavior of the IoT device complies with the issued privacy policy. In this paper, we implement a test bed for ensuring compliance of Internet of Things data disclosure to the corresponding privacy policy. The fundamental approach used in the test bed is to capture the data traffic between the IoT device and the cloud, between the IoT device and its application on the smart-phone, and between the IoT application and the cloud and analyze those packets for various features. We test 11 IoT manufacturers and the results reveal that half of those IoT manufacturers do not have an adequate privacy policy specifically for their IoT devices. In addition, we prove that the action of two IoT devices does not comply with what they stated in their privacy policy agreement.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131928791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
ReMot Reputation and Resource-Based Model to Estimate the Reliability of the Host Machines in Volunteer Cloud Environment 基于远程信誉和资源的志愿者云环境下主机可靠性评估模型
Yousef S. Alsenani, G. Crosby, Tomas Velasco, Abdulrahman Alahmadi
{"title":"ReMot Reputation and Resource-Based Model to Estimate the Reliability of the Host Machines in Volunteer Cloud Environment","authors":"Yousef S. Alsenani, G. Crosby, Tomas Velasco, Abdulrahman Alahmadi","doi":"10.1109/FiCloud.2018.00017","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00017","url":null,"abstract":"Due to the need of green computing and low cost, emerging paradigms such as edge and fog computing, and volunteer cloud have recently been introduced. In general, the volunteer cloud model targets globally distributed volunteer, highly heterogeneous, and non-dedicated machines. The inherent high degree of resource heterogeneity leads to varying levels of hardware and software failures and configuration faults on the unreliable and volatile volunteer hosts. As a result, the performance of deployed tasks is detrimentally impacted and is a key challenge, particularly in the case of scheduling algorithms. Most of the reputation models that have been used for reliability evaluation only evaluate the reliability of host machines by simply using the ratio of successfully completed tasks to total tasks requested. These models do not consider the resource utilization and the daily or weekly patterns of job behaviors or characteristics (e.g. priority of a job). Thus, the performance of tasks that run on these resources suffers and may take a substantial time to complete. Therefore, there is a need to proactively consider the reliability of host machines for effective and efficient management of resources in highly heterogeneous and distributed cloud environments. To address these challenges, this paper proposes a reputation and resource-based reliability model called ReMot. ReMot is an intelligent machine learning based model that utilizes historical data of the tasks and host machines to extract their resource usage patterns, in addition to other metrics such as task failure rate and resource utilization to predict the reliability of host machines. To validate ReMots approach, the researchers have utilized a large usage trace of real world applications made available by Google Inc. The results indicate that ReMot obtained more accurate reliability estimation than existing models and dynamically adapts to workload variations.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信