Lamia Ben Amor, Imene Lahyani, M. Jmaiel, K. Drira
{"title":"Anomaly Detection and Diagnosis Scheme for Mobile Health Applications","authors":"Lamia Ben Amor, Imene Lahyani, M. Jmaiel, K. Drira","doi":"10.1109/AINA.2018.00116","DOIUrl":"https://doi.org/10.1109/AINA.2018.00116","url":null,"abstract":"Mobile healthcare applications highly depend on healthcare data, which is collected from wearable or implantable sensors. However, sensor readings may be inaccurate due to resource-constrained devices, sensor misplacement, patient with smearing, and other environmental related causes. Analyzing healthcare data is of paramount importance to provide high quality-care services and reduce false medical diagnosis. In this paper, we propose an online approach to detect inaccurate measurements and to raise alerts only when patients seem to be in emergency situations. The proposed approach is based on robust principal component analysis and adaptive threshold for multivariate anomaly detection, and on contribution plots for univariate anomaly diagnosis. We apply our proposed approach on real medical dataset. Our experimental results prove the effectiveness of our approach in detecting and diagnosing anomalous physiological measurements. The reduced time and space complexities of our approach make it useful and efficient for real time mobile health applications.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Júlio Mendonça, R. Lima, Rúbens de Souza Matos Júnior, João Ferreira, E. Andrade
{"title":"Availability Analysis of a Disaster Recovery Solution Through Stochastic Models and Fault Injection Experiments","authors":"Júlio Mendonça, R. Lima, Rúbens de Souza Matos Júnior, João Ferreira, E. Andrade","doi":"10.1109/AINA.2018.00032","DOIUrl":"https://doi.org/10.1109/AINA.2018.00032","url":null,"abstract":"The Information Technology (IT) systems of most organizations must support their operations 24 hours a day, 7 days a week. Systems unavailability may have serious consequences such as data loss, customer dissatisfaction, and subsequent revenue loss. With the popularity of cloud computing, the adoption of cloud-based disaster recovery (DR) solutions has gained more space to prevent data loss and ensure business continuity. However, disaster recovery solutions are not cheap and do not exist as a single solution that suits every requirement (e.g., availability and costs). In this paper, we present an integrated model-experiment approach to evaluate cloud-based disaster recovery solutions. We use Stochastic Petri Nets (SPNs) and fault-injection experiments to evaluate availability related metrics like steady-state availability and downtime. To demonstrate the feasibility of our approach, distinct real-world cloud-based DR solutions (e.g., active/active and active/standby) are modeled and analyzed. The results revealed that disaster recovery solution significantly improves system availability and minimizes the downtime costs. In addition, our numerical analysis shows the statistical correspondence between the results of the experiments and models.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"52 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Urva Latif, N. Javaid, Syed Shahab Zarin, Muqaddas Naz, Asma Jamal, Abdul Mateen
{"title":"Cost Optimization in Home Energy Management System Using Genetic Algorithm, Bat Algorithm and Hybrid Bat Genetic Algorithm","authors":"Urva Latif, N. Javaid, Syed Shahab Zarin, Muqaddas Naz, Asma Jamal, Abdul Mateen","doi":"10.1109/AINA.2018.00102","DOIUrl":"https://doi.org/10.1109/AINA.2018.00102","url":null,"abstract":"Home energy management systems are widely used to cope up with the increasing demand for energy. They help to reduce carbon pollutants generated by excessive burning of fuel and natural resources required for energy generation. They also save the budget needed for installing new power plants. Price based automatic demand response (DR) techniques incorporated in these systems shift appliances from high price hours to low price hours to reduce electricity bills and peak to average ratio (PAR). In this paper, electricity load of home is categorized into three types: base load, shift-able interruptible load and shiftable non-interruptible load. In literature many metaheuristic optimization techniques have been implemented for scheduling of appliances. In this work for the optimization of energy usage genetic algorithm (GA) and bat algorithm (BA) are implemented with time of use (TOU) pricing scheme to schedule appliances to reduce electricity bills, the peak to average ratio and appliance delay time. A new technique bat genetic algorithm (BGA) has been proposed. It is hybrid of GA and BA. It outperforms GA and BA in terms of cost reduction and peak to average ratio for single home scenario as well as multiple home scenario. Operation time internals (OTIs) 15 minutes, 30 minutes and 1 hour have been considered to check their effect on cost reduction, PAR and user comfort (UC).","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eventual Leader Election in Shared-Memory Dynamic Systems","authors":"C. Khouri, F. Greve","doi":"10.1109/AINA.2018.00035","DOIUrl":"https://doi.org/10.1109/AINA.2018.00035","url":null,"abstract":"In spite of the importance of dynamic distributed environments, e.g., SANs (storage area networks), multicore architectures, etc., we found very few proposals of models and protocols for implementing eventual leader election in these contexts. This abstraction is fundamental to ensure consistency and fault-tolerance. Most approaches for electing a leader consist of static systems, in which processes communicate by message passing, satisfying timing constraints. This paper presents an Omega (or Ω) class leader election service for a dynamic asynchronous system subject to crash failures, in which processes communicate through shared memory, following a memory access pattern, free of temporal requirements.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131764253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security in Cognitive Information Systems","authors":"Anna Kubarek, L. Ogiela","doi":"10.1109/AINA.2018.00097","DOIUrl":"https://doi.org/10.1109/AINA.2018.00097","url":null,"abstract":"The aim of the article is to discuss security of IT systems and to identify elements that should be protected against unauthorized access. Software protection is created based on the characteristics of cyberspace. The complexity of IT systems makes security more complicated and unreliable. The development of technology is inseparably connected with the development of threats, which means that the improvement of software solutions has become an extremely important aspect for all users. The article is also intended to indicate what security elements should be considered as both the system user and when creating the security system. This paper presents topic of cognitive security aspects dedicated to management processes.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Hadiwardoyo, Enrique Hernández-Orallo, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"Evaluating UAV-to-Car Communications Performance: Testbed Experiments","authors":"S. Hadiwardoyo, Enrique Hernández-Orallo, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/AINA.2018.00025","DOIUrl":"https://doi.org/10.1109/AINA.2018.00025","url":null,"abstract":"Vehicular networks are gradually emerging due to the expected benefits in terms of enhanced safety and infotainment services. However, outside main metropolitan areas, little infrastructure currently deployed, which may hinder these services. To mitigate this problem, Unmanned Aerial Vehicles (UAVs) are envisioned as mobile infrastructure elements, supporting communications when fixed infrastructure is missing. This way, in emergency situations, UAVs can offer services to vehicles including broadcasting alerts or acting as message relays between ground vehicles. Our work attempts to be a first step in this direction by presenting experimental measurement results regarding communications quality between cars and UAVs. In particular, we varied the altitude of the drone and its antenna orientation, and the car's antenna location to assess their impact on performance. Based on the experimental results achieved, we find that UAVs communicating in the 5 GHz band using IEEE 802.11 technology are able to deliver data to moving cars within a range of more than three kilometers, achieving more than 0.5 of packet delivery ratio up to 2.5 kilometers under the optimal configuration settings.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abir Masmoudi, M. Barhamgi, Noura Faci, Z. Saoud, Khalid Belhajjame, D. Benslimane, David Camacho
{"title":"An Ontology-Based Approach for Mining Radicalization Indicators from Online Messages","authors":"Abir Masmoudi, M. Barhamgi, Noura Faci, Z. Saoud, Khalid Belhajjame, D. Benslimane, David Camacho","doi":"10.1109/AINA.2018.00094","DOIUrl":"https://doi.org/10.1109/AINA.2018.00094","url":null,"abstract":"Detecting radicalization on social networks is crucial to the fight against violent extremism and terrorism. In most cases, online radicalization has clear warning indicators that can be detected at the early stages of the radicalization process. In this paper, we focus on mining radicalization indicators from online messages by exploiting structured domain knowledge. More precisely, we propose an approach to automatically annotate social messages with concepts from a domain ontology. Annotations are then exploited within an inference phase to identify the messages exhibiting a radicalization indicator. We conducted a set of experiments on a sample extracted from a public dataset that contains radicalized individuals along with their social messages (i.e. Tweets). Obtained results show the effectiveness of our approach compared to a baseline method.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121392509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New V2X Communication System to Realize Long Distance and Large Data Transmittion by N-Wavelength Wireless Cognitive Network","authors":"Y. Shibata, Kenta Ito, Noriki Uchida","doi":"10.1109/AINA.2018.00091","DOIUrl":"https://doi.org/10.1109/AINA.2018.00091","url":null,"abstract":"In V2X communication on the actual road, both the length of communication distance and the total size of data transmission must be maximized at the same time when vehicle are running on the road. The conventional single wireless communication such as Wi-Fi, IEEE802.11p, LPWA, cannot satisfy those conditions at the same time. In order to resolve such problems, N-wavelength wireless communication method is newly introduced in our research. Multiple standard wireless networks with different wavelengths are integrated to organize a cognitive wireless communication. The best link of the cognitive wireless is determined by considering their RSSI values. In order to verify the effects of our proposed method, a prototype system is constructed at the actual road and tested the performance, such as communication distance and total transmission data. Through the performance evaluation, the effects of our suggest method could be verified over the single network.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Myung-Eun Kim, Youngsung Son, Cheonyong Kim, Yongbin Yim, Sang-Ha Kim
{"title":"Origin-Mediated Sink Mobility Support for Large-Scale Phenomena Monitoring in IWSNs","authors":"Myung-Eun Kim, Youngsung Son, Cheonyong Kim, Yongbin Yim, Sang-Ha Kim","doi":"10.1109/AINA.2018.00028","DOIUrl":"https://doi.org/10.1109/AINA.2018.00028","url":null,"abstract":"Large-scale phenomena monitoring such as fire or toxic gas monitoring is one of major applications in industrial wireless sensor networks. A multitude of sources stemming from a large-scale phenomenon brings heavy communication overhead to report data to a sink. Many researches have focused on monitoring a large-scale phenomenon and reporting to a static sink with an energy-efficient way. Recently, large-scale phenomena monitoring needs a mobile sink for real-time response. However, the sink mobility support in large-scale phenomenon monitoring brings challenging issues. Given the existing approaches to support sink mobility in individual object detection, a mobile sink should establish one-to-many communication with all sources of a large-scale phenomenon for location update. The one-to-many communication between a mobile sink and all sources triggers early energy depletion and thus reduces the network lifetime. In this paper, we propose the origin-mediated communication scheme exploiting a hierarchy-based architecture to resolve the one-to-many communication problem. The origin node builds the virtual backbone network to propagate a location update message on behalf of the mobile sink. Simulation results show that the proposed scheme outperforms all the other work and exhibits significant amounts of savings in terms of the entire network's energy consumption.","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asif Khan, N. Javaid, Muhammad Nadeem Iqbal, N. Anwar, Inzimam ul-Haq, Faraz Ahmad
{"title":"Time and Device Based Priority Induced Demand Side Load Management in Smart Home with Consumer Budget Limit","authors":"Asif Khan, N. Javaid, Muhammad Nadeem Iqbal, N. Anwar, Inzimam ul-Haq, Faraz Ahmad","doi":"10.1109/AINA.2018.00129","DOIUrl":"https://doi.org/10.1109/AINA.2018.00129","url":null,"abstract":"In demand side management (DSM) scheduling of appliances based on consumer-defined priorities is an important task of a home energy management controller (EMC). This paper presents a DSM technique that is capable of controlling loads within a smart home considering time-varying appliances prior- ities. An evolutionary priority algorithm (EPA) was developed based on three postulations that allow time-varying priorities to be quantified in time and device-based features. Based on the input data considering the appliance's power ratings, its time of use, and absolute user comfort values the EPA is able to generate an optimal energy consumption pattern which would give maximum comfort at a predetermined user budget. A cost per unit comfort (χ) index, which relates the consumer expenditure to the achievable comfort is also demonstrated. To test the applicability of the proposed EPA, two budget scenarios of 1.5/day and 2.0/day are performed. The simulation results revealed that the proposed EPA obtained an optimal comfort value for the high budget with increased (χ).","PeriodicalId":239730,"journal":{"name":"2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}