2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

筛选
英文 中文
Multihop Transmission Strategy to Improve Energy Efficiency in WSNs 提高无线传感器网络能量效率的多跳传输策略
M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad
{"title":"Multihop Transmission Strategy to Improve Energy Efficiency in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad","doi":"10.1109/WAINA.2018.00076","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00076","url":null,"abstract":"Many researches have shown interest in the development of energy efficient transmission technique to reduce the power consumption and to extend the network lifetime. In this paperweproposeanenergy-efficientmultihoptransmissionstrategy in Wireless Sensor Networks (WSN). We consider a clustered WSN where each cluster is composed of N sensor nodes. These last detect information and try to transmit it to the cluster head which is responsible for transmitting received data to a center of maintenance in order to take the appropriate intervention. We suppose that the transmitting symbol is correctly received only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold γth. The main objective of our work is to define a new transmission technique minimizing the power consumption using multihop communication. The selected relays which participate in this transmission are those offering the least transmit power while maintaining SNR equal to the threshold γth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission with a single relay. Simulations results demonstrate that our proposed strategy significantly reduces the energy consumption, thus confirm significant energy relative to direct transmission.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stereo-Based 3D Space Handwriting Recognition 基于立体的3D空间手写识别
Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan
{"title":"Stereo-Based 3D Space Handwriting Recognition","authors":"Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan","doi":"10.1109/WAINA.2018.00154","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00154","url":null,"abstract":"Recently, based on the improvements of hardware performance and the popularity of internet, big data analysis and artificial intelligence were successfully applied in a wide range of applications. Similarly, computer vision technology also benefited from the powerful performance of hardware and artificial intelligence, so that the computer vision technology could solve problem more efficiently and accurately and improve the development of automation. In this thesis, we aim at measuring the distance between the finger and camera, and tracking the finger to fulfill a stereo vision-based hand-writing recognition system in three-dimensional (3D) space. Traditionally, the researchers usually applied infrared sensors to recognize human's hands. However, the infrared sensor solution still be challenged in hand tracking algorithm under widely varying lighting, distance limitation, and the outdoor condition. As mentioned above, this thesis attempts to generate the depth information based on stereo vision for improving the finger tracking. Through the depth information, we determine and track the fingers step by step. Also, tracking target would be excluded from other objects and background. In this thesis, the Probability Density Function is applied to get the threshold value, which could find out the region of interest automatically instead of manually. Furthermore, the proposed system uses Particle Swarm Optimization for hand tracking. After getting the hand (palm) position in each frame, the grayscale image would be used to analyze the fingers. Finally, the multilayer perceptron is used to train the MNIST dataset for hand-writing character validation. The experimental results demonstrate that the proposed system could recognize hand-writing digits in 3D space in high accuracy without any constraints and restricted environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid 一种新的用于智能电网需求侧管理的元启发式混合增强差分和谐风(EDHWDO)优化技术
T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan
{"title":"A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid","authors":"T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan","doi":"10.1109/WAINA.2018.00128","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00128","url":null,"abstract":"In recent decades numerous Demand Side Management (DSM) techniques have been merged for Smart Grid (SG). These techniques have been very effective in minimizing cost. However, lack in other characteristics like effective control over Peak Average Ratio (PAR) that why they are not equally beneficial for the utility. Due to different characteristic of different operations some techniques are really work well for cost and some for PAR. We have evaluated and extracted different operations from Harmony Search Algorithm (HSA), Enhanced Differential Evolution (EDE) and Wind Driven Optimization (WDO) for controlling cost along with PAR. A hybrid Enhanced Differential Harmony Wind Driven Optimization (EDHWADO) is formed that combines the cost effectiveness of WDO, HSA and PAR controlling operation through integration of EDE. The proposed hybrid engine proved to be most cost effective in comparison to Genetic Algorithm (GA), WDO along effective PAR control and User Comfort (UC) maximization. Real Time Pricing (RTP) signals are used to evaluate real time behavior of appliances. Three categories of appliances are used; fixed, elastic and shiftable. On basis of performances metrics, simulations proved that EDHWDO leads substantial cost saving along with enhancing user comfort and also helps in significant cost reduction.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Network Intrusions Using a Confidence-Based Reward System 使用基于信任的奖励系统检测网络入侵
Kole Nunley, Wei Lu
{"title":"Detecting Network Intrusions Using a Confidence-Based Reward System","authors":"Kole Nunley, Wei Lu","doi":"10.1109/WAINA.2018.00083","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00083","url":null,"abstract":"Combining multiple intrusion detection technologies into a hybrid system has been recently proposed to improve the comprehensive intrusion detection capability. However, such a hybrid system is not always stronger than its component detectors. Getting different detection technologies to interoperate effectively and efficiently has become a major challenge when building operational intrusion detection systems (IDS's). In this paper, we propose a novel reward system model in order to increase the accuracy and reliability of hybrid IDS's. In particular, the proposed confidence-based reward system built within a reinforcement learning algorithm includes three components. Namely, a relative discount factor, a confidence extraction technique, and a unique reward computing algorithm. The preliminary case studies show that the proposed reward system has a potential to improve the anomaly detection accuracy, decrease false alarm rate, and improve adaptability to new network traffic.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand 基于新西兰房产课程参与的学生行为特征分析
Shadi Esnaashari, L. Gardner, Michael Rehm
{"title":"Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand","authors":"Shadi Esnaashari, L. Gardner, Michael Rehm","doi":"10.1109/WAINA.2018.00055","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00055","url":null,"abstract":"Identifying students' learning behavior is very important in giving insights to the lecturer. Tracking data from 102 university students' in class and out of class have been investigated to find a different pattern in their learning process. Our aim was to group the students based on their activities in their class and their performance on the final exam. Data from students' answers to the regular quizzes were used at the end of online modules, internal test, and tournament questions. A clustering algorithm has been applied to the students' data to group them with similar performance and scores. Four different groups of students have been identified. The results revealed that students who were more active and participated more in activities achieved better scores on their final exam.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection 踏脚石入侵检测中的嗅探和欺骗网络流量
Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert
{"title":"Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection","authors":"Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert","doi":"10.1109/WAINA.2018.00137","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00137","url":null,"abstract":"Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders' manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MELODIC: Utility Based Cross Cloud Deployment Optimisation MELODIC:基于实用程序的跨云部署优化
G. Horn, Pawel Skrzypek
{"title":"MELODIC: Utility Based Cross Cloud Deployment Optimisation","authors":"G. Horn, Pawel Skrzypek","doi":"10.1109/WAINA.2018.00112","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00112","url":null,"abstract":"Cross Cloud deployment of applications allows for many additional benefits, like using the best Cloud provider for a given application component, increasing the reliability owing to the diversification of Cloud providers, and providing additional elasticity and capacity. On the other side, in practical applications, it is currently very difficult to properly plan and optimise the architecture of the application for cross Cloud deployment. Different Cloud providers uses different types of infrastructure, making direct comparisons difficult. Additionally, the requirements of the application could change over time and according to the application's execution context, workload, users, and many other aspects. This paper presents the fundamentals of the MELODIC solution based on a high level model of the application and dynamic, Cloud provider agnostic optimised deployment and reconfiguration of the application.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Secure OTT Service Scheme Based on Blockchain Technology 基于区块链技术的安全OTT服务方案
Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen
{"title":"Secure OTT Service Scheme Based on Blockchain Technology","authors":"Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen","doi":"10.1109/WAINA.2018.00161","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00161","url":null,"abstract":"Due to the popularity of multimedia and constantly growing capacity of network, digital media demanding is increasingly high in last decade. The digital media with copyrighted contents, such as pictures, videos, audios, and 3D-model materials, etc., are more important in today's e-commerce. In recent years, the digital media content service by using OTT (over-the-top) platform is an emerging e-commerce model. The traditional website of the digital media content (DMC) always provides the transaction platform for both content producer and content provider to upload their DMC products. Then, clients (consumers) could browse their interesting products on the website, and download DMCs after payment. However, the transaction of these copyrighted DMCs on the platform is still carried out by means of the traditional payment, e.g. credit cards, debit cards and the ACH (Automated Clearing House). This paper proposes an innovative secure private OTT (p-OTT) platform in which the transaction process could deal with the credible and customizable services by adopting blockchain technology. One of the key features of the blockchain technique is smart contract. Thus, each DMC product could be pre-defined a template of data contract. After negotiation process by using the smart contract, the real data contract (RDC) will be created and outputted by smart contract. According to the predefined template of data contract, the content producer or provider could easily implement his transaction policy. In addition, we design an online authentication key for each member and a shadow key pair for each booked DMC during a transaction period. Therefore, this paper presents a secure OTT model with blockchain technology. Finally, we shows that it is not only a secure OTT platform but also a flexible transaction via preforming smart contract.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing 从云到边缘和物联网:实现渗透计算的智能编排架构
Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari
{"title":"From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing","authors":"Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari","doi":"10.1109/WAINA.2018.00122","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00122","url":null,"abstract":"The latest technological and conceptual developments have destroyed the centralized Cloud Computing model, moving Cloud services in emerging ICT infrastructures such as Edge, Fog and Internet of Things (IoT) that are closer to end users. Specifically, current Cloud computing programming models and resource orchestration techniques are challenged by the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be place near such devices. In this regard, the Osmotic Computing aims to provide a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, Fog an IoT layers. In this scientific paper, we investigate the Smart Orchestration of a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. Several use cases are presented for describing the Artificial Intelligence processes that enables the MELs deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach 大数据算法的并行化和部署:TOREADOR方法
Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito
{"title":"Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach","authors":"Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito","doi":"10.1109/WAINA.2018.00120","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00120","url":null,"abstract":"In order to reduce the initial investments needed by small and medium enterprises (SMEs) to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, TOREADOR proposes a Big Data Analytics framework which supports users in devising their own Big Data solutions by keeping the inherent costs at a minimum. Among the objectives of the TOREADOR framework is supporting developers in parallelizing and deploying their algorithms, in order to develop they own analytics solutions. This paper describes the Code-Based approach, developed by CINI and adopted within the TOREADOR framework to parallelize users' algorithms and deploy them on distributed platforms, with a focus on its integration with the web services and resources offered by ATOS for the actual deployment of the solution.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信