2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

筛选
英文 中文
A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets 5G多鼠网中最优鼠选择的匹配博弈解决方案
M. Anany, M. M. Elmesalawy, Eman Serag El Din
{"title":"A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets","authors":"M. Anany, M. M. Elmesalawy, Eman Serag El Din","doi":"10.1109/UEMCON47517.2019.8993013","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993013","url":null,"abstract":"Multiple Radio Access Technologies (Multi-RAT) heterogeneous Networks (HetNets) have been proposed as one of the main solutions to comprise the enormous growth of data traffic in fifth generation (5G) mobile networks. In this paper we consider RAT selection problem in Multi-RAT HetNets where user equipment (UE) has to choose between Long term Evolution (LTE) and Wireless Local Area Network (WLAN) radio access technologies. In this context, the RAT selection is modeled as a UE association process and formulated as an optimization problem aiming to maximize a certain UEs' weighted objective function in terms of user equipment achievable data rates and the security levels provided by different base stations (BSs). The weighting parameter is decided to reflect the orientation of UEs in which higher weighting value for the security level, means that UEs tends to select the BSs that can provide best security levels rather than achieved data rates. A many-to-one matching game-based association approach is then proposed and applied to capture optimal solution for UE association problem. Our simulation results are compared to the well-known WLAN first association algorithm, the results show the outperformance of the proposed matching game based association approach in terms of the achieved system throughput and rate outage probability at different requirements of security levels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT 一种基于权重的分布式TDMA时延优化算法
Mohamed Sofiane Batta, Z. Aliouat, S. Harous
{"title":"A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT","authors":"Mohamed Sofiane Batta, Z. Aliouat, S. Harous","doi":"10.1109/UEMCON47517.2019.8993097","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993097","url":null,"abstract":"The Internet of Things (IoT) and the Wireless Sensor Networks (WSNs) attract attention of the research communities due to their rapid and promising development. These paradigms have been predicted to play a leading role in our daily life in the near future. The limited resources and the restricted number of communication channels in these networks create new challenges especially in collision and access conflicts. To bring appropriate solutions for these problems, several works, in the literature, focus on centralized and distributed approaches. Traditional distributed protocols assume that the MAC and Routing layers act independently. Moreover, the dynamic topology and the central point of failure restrict the development of centralized techniques. In this paper, we present a distributed weight-based TDMA-MAC scheduling algorithm (WB-DTSA). The proposed solution takes advantage of routing information to improve the communication latency and the schedule length. Simulation results show better performance, in comparison to similar distributed channel assignment approaches. The latency is improved by 47% and the schedule length is reduced by 23%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda 乌干达GSM移动通信网信道冗余分析与带宽利用
Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi
{"title":"Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda","authors":"Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi","doi":"10.1109/UEMCON47517.2019.8992999","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992999","url":null,"abstract":"Uganda's Mobile Communication sector is one of the fastest growing in Africa and exhibits second highest internet growth in East Africa. The quantity of versatile mobile users had arrived at 23.24 million (23,249,967) with tele-density of 60 in September 2018 [2], which is about fifty percent portion of the nation's populace (in 2018). This has alarmed the research on the optimum utilization of bandwidth and voice channels used in GSM networks being prevailed in Uganda which are indeed two prominent constraints in mobile communication. The spectrum re-farming seems to be the only possible solution in near future however it additionally has some key difficulties like intricacy of operation and user disturbances. This research paper proposes and exhibits the investigation of Data Interleaving Technique in Mobile Communication in GSM networks of Kampala, Uganda. The simulation results show that significant enhancement of 54.22% in channel utilization and bandwidth optimization is possible with negligible overhead of 0.03%. Consequently it's easily feasible to accommodate more mobile internet users in limited allotted bandwidth and use the limited allotted spectrum efficiently.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"2005 62","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users 智能手机用户活动识别与认证的机器学习模型
S. Ahmadi, S. Rashad, H. Elgazzar
{"title":"Machine Learning Models for Activity Recognition and Authentication of Smartphone Users","authors":"S. Ahmadi, S. Rashad, H. Elgazzar","doi":"10.1109/UEMCON47517.2019.8993055","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993055","url":null,"abstract":"Technological advancements have made smartphones to provide wide range of applications that enable users to perform many of their tasks easily and conveniently, anytime and anywhere. For this reason, many users are tend to store their private data in their smart phones. Since conventional methods for security of smartphones, such as passwords, personal identification numbers, and pattern locks are prone to many attacks, this research paper proposes a novel method for authenticating smartphone users based on performing seven different daily physical activity as behavioral biometrics, using smartphone embedded sensor data. This authentication scheme builds a machine learning model which recognizes users by performing those daily activities. Experimental results demonstrate the effectiveness of the proposed framework.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vulnerability Analysis and Modeling 漏洞分析与建模
Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy
{"title":"Vulnerability Analysis and Modeling","authors":"Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy","doi":"10.1109/UEMCON47517.2019.8993028","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993028","url":null,"abstract":"One of the significant risks of computer systems is the lack of security whether that is attributed to the system vulnerabilities or too sophisticated intrusion techniques. The software security vulnerability is detrimental to the user as well as the system because of its inability to protect confidentiality within the system. Analysis from a national database displays how software vulnerabilities are categorized and how much of an impact they play amongst computer systems. To help preventing attacks, we propose that the focus be more on producing vulnerability free software, rather than focusing on issuing patches. The contribution of this paper is to show the need to include all three methods: prevention, detection and accommodation, to mitigate vulnerabilities. This requires the adoption of formal methods in software development, end user education and vulnerability modeling using the Kill Chain Technique.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a Realistic Example of Information-Centric Network Metadata Management 一个以信息为中心的网络元数据管理实例的评估
Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase
{"title":"Evaluation of a Realistic Example of Information-Centric Network Metadata Management","authors":"Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase","doi":"10.1109/UEMCON47517.2019.8992942","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992942","url":null,"abstract":"This paper presents the performance evaluation of a metadata database (DB) management method that uses realistic numeric examples for IoT Live Data. The method is proposed to reduce the handling costs of Live Data. Live Data are here defined as data that are typically continuously generated by IoT devices and have short lifetimes (e.g., 10 fps surveillance camera images). We have already proposed an evaluation model in which the high locality is significantly featured in Live Data usage. The previous evaluation results are obtained only from general parameter values in statistical distributions. To evaluate realistic situations, this paper assumes that the metadata of Live Data with high usefulness for sharing by many users/services would dominate all metadata. In particular, for such data, we use both surveillance camera images and social networking service contents. The median values and the expected values are set considering the surveillance camera's locality (defined as the average distance between a surveillance camera and the users of its camera images). As a result, the proposed method can reduce the DB update costs by 99.0% while the additional search costs are reduced by up to 27.8% compared with the conventional metadata management method. The additional search costs are negligible compared with the reduction in DB update costs, since the number of searches is much smaller than the number of DB updates with respect to the number of update/search epochs.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover 基于田口交叉的差分进化优化算法设计数字IIR滤波器
P. Stubberud
{"title":"The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover","authors":"P. Stubberud","doi":"10.1109/UEMCON47517.2019.8993041","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993041","url":null,"abstract":"This paper presents a differential evolution algorithm that uses an elitist, ranking, random selection method and both two and three level Taguchi crossover. The algorithm is applied to 13 commonly used global numerical optimization test functions, including a spherical, three hyper-ellipsoid, the sum of different powers, Rastrigin's, Schwefel's, Griewank's, Rosen-brock's valley, Styblinski-Tang, Ackley's Path, Price-Rosenbrock, and Eggholder's functions. The algorithm is also used to design a number of optimal digital infinite impulse response (IIR) filters.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments gps拒绝环境下基于机载中继的坠毁无人机定位算法
Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek
{"title":"Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments","authors":"Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek","doi":"10.1109/UEMCON47517.2019.8993065","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993065","url":null,"abstract":"We propose a location algorithm to promptly search for crashed unmanned aerial vehicles (UAVs), using an airborne communication relay UAV (ACRU) in global positioning system (GPS)-denied environments. Conventional UAV based location methods require at least four UAVs to search for the crashed one. However, such methods are subject to significant errors according to the distance between the crashed UAV and the others. In the proposed algorithm, only one ACRU is required to locate the crashed UAV. The ACRU relays its own position and the signals from the crashed UAV in real-time to a ground control station (GCS), which then estimates the position of the crashed UAV based on time difference of arrival (TDOA) processing using the signals relayed from the ACRU. According to the estimated position of the crashed UAV, the ACRU then flies in the direction of the crashed UAV by applying a weighting algorithm to effectively estimate the distance to it. The performance of the proposed algorithm is verified by computer simulations by considering the conditions of an army battalion battlefield. We improve the accuracy of the proposed location algorithm by applying a weighting algorithm to the TDOA data, and we demonstrate that the location algorithm can be used to efficiently locate crashed UAVs in GPS denied environments.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications 基于智能信道选择的设备间通信干扰缓解
Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab
{"title":"Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications","authors":"Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab","doi":"10.1109/UEMCON47517.2019.8993057","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993057","url":null,"abstract":"Device-to-Device (D2D) communication is an efficient and interesting feature of wireless networks of the next generation. It provides extremely low latency by allowing immediate communication between nearby wireless devices without transmitting data through the network facilities. This will add advanced features to cellular networks in the 5th generation (5 G) and beyond. Empowering D2D in the mobile network creates many technical problems such as device discovery, mode selection, data security, and interference mitigation. Cognitive radio D2D users (DUs) transmission radiates through diverse ways that cause undesirable interference to primary users (PUs) or cellular users (CUs) that share the same spectrum bands, which eventually lead to serious degradation of service quality and efficiency. This article proposes an intelligent channel selection scheme depending on learning algorithms that drive the selection scheme to be intelligent for D2D Cognitive Radio Network (DCRN) aiming at mitigating interference between DUs and PUs. An extensive analysis and comparisons with other algorithms are carried out to investigate its performance. The simulation results demonstrate that the proposed algorithm improves the accuracy of channel selection, maximizes the average throughput, spectrum utilization, packet delivery, and minimizes both the average delay and interference in D2D network under various network densities and a diverse number of channels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Control System Response Improvement via Denoising Using Deep Neural Networks 基于深度神经网络去噪的控制系统响应改进
Kiavash Fathi, M. Mahdavi
{"title":"Control System Response Improvement via Denoising Using Deep Neural Networks","authors":"Kiavash Fathi, M. Mahdavi","doi":"10.1109/UEMCON47517.2019.8993083","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993083","url":null,"abstract":"Noise is an inseparable part of control systems. Every sensor reading used for determining the state of a control system is corrupted with noise., therefor increasing the signal to noise ratio of sensor readings can significantly improve the performance of systems. The proposed filter in this paper captures the underlying probability distribution of the noise-free input signal in the training stage and therefor is capable of refining the corrupted input signal regardless of the distribution of the added noise. In order to acquire better data-driven based results in the suggested approach, it has been decided to use different neural network structures and stack these layers to form a hybrid multilayer filter. The properties of the stacked neural network sublayers guarantee a robust and general solution for the intended purpose. The key elements of the proposed filter are two auto-encoders., a dense neural network and a convolutional layer. Effects of every sublayer on the corrupted input signal., along with fine-tuning of these sublayers are discussed in detail. Afterwards in order to assess the generality and the robustness of the method., the proposed filter is exposed to a non-Gaussian noise. Finally., the proposed filter is tested on a linear and a nonlinear system. The comparison between systems” output to the reconstructed signal with that of the original noise-free signal., suggests the substantial improvement in the performance of the given systems. This improvement is in terms of systems” output resemblance to the reference noise-free output signal when the reconstructed signal is applied to the systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信