2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

筛选
英文 中文
Declarative Modeling for Deploying a Container Platform 用于部署容器平台的声明式建模
Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi
{"title":"Declarative Modeling for Deploying a Container Platform","authors":"Giuseppe Attardi, A. Barchiesi, A. Colla, Roberto di Lallo, F. Galeazzi","doi":"10.1109/WAINA.2018.00116","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00116","url":null,"abstract":"Cloud computing services provide several benefits in terms of flexibility, scalability and cost reductions. Container technology allows to further lower the overhead of virtualization making it possible to run more components per server. Designing and deploying a cloud platform requires significant effort and it should be possibly dealt with automation tools. Automation can be dealt through either an imperative or declarative approach. We present how we designed and deployed a cloud container platform using declarative modeling. A model of the architecture of the service is described through a declarative specification and then passed to an orchestration tool that generates the actual plan of steps to be performed in the deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems 基于DTN路由的生命安全信息系统静态物体检测方法的提出
Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata
{"title":"Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems","authors":"Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/WAINA.2018.00072","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00072","url":null,"abstract":"Although the life safety information systems on the smartphones are widely spread for the sake of the emergent situations in disasters, there have been some problems to use them by people who are not good to operate or are injured. Therefore, this paper proposes the static body object detection methods with the Delay Tolerant Networking for life safety information system. In the system, the sensors on smartphones automatically detect the abnormal static situations by the time and position differences based with the Markov Chain Monte Carlo methods, and the emergent messages are automatically transmitted with the message priorities. Moreover, those messages are transmitted to the servers with the Delay Tolerant Networking. Then, the prototype system is introduced, and the experiments are discussed for the effectiveness of the proposed systems.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"58 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Deep Learning Framework to Enhance Software Defined Networks Security 增强软件定义网络安全性的深度学习框架
A. Dawoud, Seyed Shahristani, Chun Raun
{"title":"A Deep Learning Framework to Enhance Software Defined Networks Security","authors":"A. Dawoud, Seyed Shahristani, Chun Raun","doi":"10.1109/WAINA.2018.00172","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00172","url":null,"abstract":"Software-Defined Networks (SDN) initiates a novel networking model. SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. The architecture enhances the network resilient, decompose management complexity, and support more straightforward network policies enforcement. However, the model suffers from severe security threats. Specifically, a centralized network controller is a precious target for two reasons. First, the controller is located at a central point between the application and data planes. Second, a controller is software which prone to vulnerabilities, e.g., buffer and stack overflow. Hence, providing security measures is a crucial procedure towards the fully unleash of the new model capabilities. Intrusion detection is an option to enhance the networking security. Several approaches were proposed, for instance, signature-based, and anomaly detection. Anomaly detection is a broad approach deployed by various methods, e.g., machine learning. For many decades intrusion detection solution suffers performance and accuracy deficiencies. This paper revisits network anomalies detection as recent advances in machine learning particularly deep learning proofed success in many areas like computer vision and speech recognition. The study proposes an intrusion detection framework based on unsupervised deep learning algorithms.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain 基于云的特定域虚拟策略网络管理方案中用户认证方法的概念
Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa
{"title":"Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain","authors":"Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa","doi":"10.1109/WAINA.2018.00127","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00127","url":null,"abstract":"In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize management of the specific domain with some network groups with plural organizations as a third step, concept of user authentication method applied for this scheme is expanded and described.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves 基于物联网的电子学习试验台的实现:考虑四种脑电波的Mean-Shift聚类方法的性能评估
Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli
{"title":"Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves","authors":"Keita Matsuo, M. Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu, L. Barolli","doi":"10.1109/WAINA.2018.00088","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00088","url":null,"abstract":"Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we present an IoT-Based E-Learning testbed using Raspberry Pi mounted on Raspbian. We carried out some experiments with a student of our laboratory for gamma type of brain waves. We used Mind Wave Mobile (MWM) to get the data and considered four situations: sleeping, relaxing, active and moving. Then, we used mean-shift clustering algorithm to cluster the data. The evaluation results show that our testbed can judge the human situation by using delta, theta, gamma and alpha brain waves.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs 基于集群组织阶段的无线传感器网络节能传输策略
M. Abderrahim, Hela Hakim, H. Boujemaa
{"title":"Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa","doi":"10.1109/WAINA.2018.00142","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00142","url":null,"abstract":"Recently, Wireless Sensor Network (WSN) has drawn serious attention to the researchers. The most important challenge of WSN is how to extend its lifetime. In this paper, we propose an energy-efficient multihop transmission strategy with organization cluster phase. During this phase, we try to choose the cluster head node which allows communicating with the other nodes with possible minimum energy and classify the remaining nodes into two groups. We consider a WSN organized into clusters, each cluster is composed of N sensor nodes classified as follows: source node, elected CH node as the destination, group of active nodes and group of sleeping nodes. When a source node detects relevant information in the network, it tries to transmit it to the cluster head via a cooperative or non-cooperative transmission. The transmission is supposed to be correct only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold ãth. The main objective of our work is to define a new transmission technique minimizing the power consumption. It is a multihop transmission technique where the selected relays which cooperate in the transmission are those offering the least transmit power while maintaining SNR equal to the threshold ãth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission where the CH node is chosen randomly within the cluster. Simulations results demonstrate that adding an organization cluster phase before transmitting data significantly increases the energy savings.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132585450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource Allocation Scheme in 5G Network Slices 5G网络切片中的资源分配方案
M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira
{"title":"Resource Allocation Scheme in 5G Network Slices","authors":"M. Dighriri, A. Alfoudi, G. Lee, T. Baker, R. Pereira","doi":"10.1109/WAINA.2018.00098","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00098","url":null,"abstract":"5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of requirements. There will obviously be conflicting demands in an allocation of such slices, and the effective provisioning of network slicing poses numerous challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., inter-slice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel resource allocation scheme able to dynamically allocate network resources to different slices in order to achieve the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets 基于子词的政治推文情感分析深度学习方法
Marco Pota, M. Esposito, Marco A. Palomino, G. Masala
{"title":"A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets","authors":"Marco Pota, M. Esposito, Marco A. Palomino, G. Masala","doi":"10.1109/WAINA.2018.00162","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00162","url":null,"abstract":"The successful use of online material in political campaigns over the past two decades has motivated the inclusion of social media platforms—such as Twitter—as an integral part of the political apparatus. Political analysts are increasingly turning to Twitter as an indicator of public opinion. We are interested in learning how positive and negative opinions propagate through Twitter and how important events influence public opinion. In this paper, we present a neural network-based approach to analyse the sentiment expressed on political tweets. First, our approach represents the text by dense vectors comprising subword information to better detect word similarities by exploiting both morphology and semantics. Then, a Convolutional Neural Network is trained to learn how to classify tweets depending on sentiment, based on an available labelled dataset. Finally, the model is applied to perform the sentiment analysis of a collection of tweets retrieved during the days prior to the latest UK General Election. Results are promising and show that the neural network approach represents an improvement over lexicon-based approaches for positive/negative sentence classification.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Analysis of Scientific Production of IoE Big Data Research 物联网大数据研究的科学产出分析
Jaswinder Kaur, P. Wongthongtham, Bilal Abu-Salih, Sogand Fathy
{"title":"Analysis of Scientific Production of IoE Big Data Research","authors":"Jaswinder Kaur, P. Wongthongtham, Bilal Abu-Salih, Sogand Fathy","doi":"10.1109/WAINA.2018.00173","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00173","url":null,"abstract":"The investment on Internet of Everything is increasing exponentially. This new global technological approach opens the doors for connecting everything and anything. Such massive propagation of Big Data generated from a wide variety of sensors requires consolidated efforts to put forward solutions to address specific related business problems and needs. The aim of this paper is to provide a systematic review of the state-of-the-art scientific research on the Internet of Everything and Big Data. Top 20 journals are selected in this study comprising 112 articles in the domain. The paper discusses the results of affiliation analysis, keyword statistics, source statistics, citation analysis and co-citation analysis. The conclusion of this literature review suggests future opportunities and research directions in the era of Internet of Everything and Big Data.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones 多无人机协同安全飞行控制系统图像处理改进
Noriyasu Yamamoto, Noriki Uchida
{"title":"Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones","authors":"Noriyasu Yamamoto, Noriki Uchida","doi":"10.1109/WAINA.2018.00087","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00087","url":null,"abstract":"In recent years, it has become possible for anyone to purchase high-performance Drones at low price. The Drones are equipped with a unit of high-vision camera, multiple compact cameras for flight control, gyroscope, infrared sensor, GPS, and a processor for processing video images and sensor information for controlling the flight. Relatively stable flight is available for Drones by operating within human's sight. However, scope of shooting is narrow and precision of the images is poor by human's operation within his or her sight. Therefore, studies on automated operation of Drones are very important. In this paper, we improved our conventional collaborative security flight control system for multiple drones. We also presents the performance evolution. The proposed methods mainly consist of the pattern recognition using drones' camera images and the collaboration of drones. Our proposed image processing method can operate with 100 msec/frame and we found that the drone can trace the host drone.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信