2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

筛选
英文 中文
Extending a Conventional Chatbot Knowledge Base to External Knowledge Source and Introducing User Based Sessions for Diabetes Education 将传统的聊天机器人知识库扩展到外部知识来源并引入基于用户的糖尿病教育会话
Shafquat Hussain, Ginige Athula
{"title":"Extending a Conventional Chatbot Knowledge Base to External Knowledge Source and Introducing User Based Sessions for Diabetes Education","authors":"Shafquat Hussain, Ginige Athula","doi":"10.4018/978-1-5225-6023-4.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-6023-4.CH015","url":null,"abstract":"Chatbots or conversational agents are computer programs, which interact with users using natural language through artificial intelligence in a way that the user thinks he is having dialogue with a human. One of the main limit of a chatbot technology is associated to the construction of its local knowledge base. A conventional chatbot knowledge base is typically hand constructed, which is a very time-consuming process and may take years to train a chatbot in a particular field of expertise. This work presented in this paper extends the knowledge base of a conventional chatbot beyond its local knowledge base to external knowledge source Wikipedia. This has been achieved by using Media Wiki API to retrieve information from Wikipedia when the chatbot's local knowledge base does not contain the answer to user query. To make the conversation with chatbot more meaningful with regards to the user's previous chat sessions, a user specific session ability has been added to the chatbot architecture. An open source AIML web based chatbot has been modified and programmed for the use in health informatics domain. The chatbot has been named VDMS - Virtual Diabetes Management System. It is intended to be used by the general community and diabetic patients for diabetes education and management.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Edge Computing-Enabled Body Area Networks 支持边缘计算的体域网络
G. Aloi, G. Fortino, Raffaele Gravina, P. Pace, Giuseppe Caliciuri
{"title":"Edge Computing-Enabled Body Area Networks","authors":"G. Aloi, G. Fortino, Raffaele Gravina, P. Pace, Giuseppe Caliciuri","doi":"10.1109/WAINA.2018.00110","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00110","url":null,"abstract":"Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard Cloud-based approaches to reduce the huge amount of data coming from IoT devices toward the Internet. In this direction, the paper proposes BodyEdge, a novel architecture well suited for medical applications in the context of the emerging healthcare industry. The advantages of the designed software platform have been evaluated in terms of reduced bandwidth and processing time through a real testbed on different hardware platforms. The conducted study also discovered the network conditions (data load and processing delay) in which BodyEdge is a valid and inexpensive solution for healthcare application scenarios.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126492438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE) 基于模糊条件身份的代理重加密(FCI-PRE)在云健康信息系统中的隐私支持
Gianluca Fimiani
{"title":"Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)","authors":"Gianluca Fimiani","doi":"10.1109/WAINA.2018.00146","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00146","url":null,"abstract":"Healthcare is traditionally a data-intensive domain, where physicians needs complete and updated anamnesis of their patients to take the best medical decisions. Dematerialization of the medical documents and the consequent health information systems to share electronic health records among healthcare providers are paving the way to an effective solution to this issue. However, they are also paving the way of non-negligible privacy issues that are limiting the full application of these technologies. Encryption is a valuable means to resolve such issues, however the current schemes are not able to cope with all the needs and challenges that the cloud-based sharing of electronic health records imposes. In this work we have investigated the use of a novel scheme where encryption is combined with biometric authentication, and defines a preliminary solution.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"42 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rules to Transform Specific Description Language Diagram Into Coloured Petri Nets 特定描述语言图转换成彩色Petri网的规则
Hana Mejdi, O. Kallel, S. Hasnaoui
{"title":"Rules to Transform Specific Description Language Diagram Into Coloured Petri Nets","authors":"Hana Mejdi, O. Kallel, S. Hasnaoui","doi":"10.1109/WAINA.2018.00058","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00058","url":null,"abstract":"The specification and description language is widely used at the design stage to describe the behavior of reactive and distributed systems. The language is intended for the specification of complex, eventdriven, real time and interactive applications. This paper represents a method for validation of a specification and description language diagrams. The method consists of translating the diagram into coloured Petri nets. It is composed of three main stages: explaining the rules, applying them and finally verifying and discussing the results.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128036866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc Networks 减少无线自组织网络中电能消耗的单播路由协议
E. Ogawa, Shigenari Nakamura, T. Enokido, M. Takizawa
{"title":"Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc Networks","authors":"E. Ogawa, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/WAINA.2018.00140","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00140","url":null,"abstract":"In wireless ad-hoc networks, messages have to be energy-efficiently exchanged among neighboring nodes. In our previous studies, the reactive type EAO (Energy-Aware One-to-one routing) and LEU (Low-Energy Unicast Ad-hoc routing) protocols are proposed to unicast messages to the destination node. In the EAO protocol, the total electric energy of nodes and delay time from a source node to a destination node can be reduced compared with the ESU and AODV protocols. However, a source-to-destination route may not be found if the communication range of each node is shorter. In this paper, we newly proposed an IEAO (Improved Energy-Aware One-to-one routing) protocol to overcome the difficulties of the EAO protocol. Here, after a shortest route is found to the destination node, a more energy-efficient prior node is found in nearest neighbor of each node starting from the destination node. In this paper, a neighbor node which has an uncovered neighbor node is selected as a prior node for each node to make a route. In the evaluation, we show the number of nodes in a source-to-destination route can be reduced and a route can be found even in shorter communication range in the IEAO protocol compared with the LEU and EAO protocols.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114286805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Parallel Primitives for Vendor-Agnostic Implementation of Big Data Mining Algorithms 大数据挖掘算法厂商无关实现的并行原语
Cesare Bandirali, Stefano Lodi, G. Moro, A. Pagliarani, Claudio Sartori
{"title":"Parallel Primitives for Vendor-Agnostic Implementation of Big Data Mining Algorithms","authors":"Cesare Bandirali, Stefano Lodi, G. Moro, A. Pagliarani, Claudio Sartori","doi":"10.1109/WAINA.2018.00118","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00118","url":null,"abstract":"In the age of Big Data, scalable algorithm implementations as well as powerful computational resources are required. For data mining and data analytics the support of big data platforms is becoming increasingly important, since they provide algorithm implementations with all the resources needed for their execution. However, choosing the best platform might depend on several constraints, including but not limited to computational resources, storage resources, target tasks, service costs. Sometimes it may be necessary to switch from one platform to another depending on the constraints. As a consequence, it is desirable to reuse as much algorithm code as possible, so as to simplify the setup in new target platforms. Unfortunately each big data platform has its own peculiarity, especially to deal with parallelism. This impacts on algorithm implementation, which generally needs to be modified before being executed. This work introduces functional parallel primitives to define the parallelizable parts of algorithms in a uniform way, independent of the target platform. Primitives are then transformed by a compiler into skeletons, which are finally deployed on vendor-dependent frameworks. The procedure proposed aids not only in terms of code reuse but also in terms of parallelization, because programmer's expertise is not demanded. Indeed, it is the compiler that entirely manages and optimizes algorithm parallelization. The experiments performed show that the transformation process does not negatively affect algorithm performance.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualized SDN-Based End-to-End Reference Architecture for Fog Networking 基于虚拟化sdn的端到端雾组网参考体系结构
Pooyan Habibi, Soroush Baharlooei, M. Farhoudi, Sepehr Kazemian, S. Khorsandi
{"title":"Virtualized SDN-Based End-to-End Reference Architecture for Fog Networking","authors":"Pooyan Habibi, Soroush Baharlooei, M. Farhoudi, Sepehr Kazemian, S. Khorsandi","doi":"10.1109/WAINA.2018.00064","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00064","url":null,"abstract":"Cloud Computing provides a distributed Internet based platform for data and application hosting such as Internet of Things (IoT), cloud applications and social applications. Despite increased use of cloud computing, there are serious issues due to inherent problems such as lukewarm reliability, lowgranularity location-awareness, and global view of the network and also dependency on the communication infrastructure for mobility support. Fog computing is a network based computing paradigm that allows essential parts of the computing processes to be moved to a point near the user, and hence emulating a locally provided service improving users quality of experience (QoE) in many dimensions such as response time and availability. The duty of fog networks is to connect each component of the fog architecture seamlessly. However, managing such a complex network, maintaining connectivity and providing on-demand services, particularly in large-scale applications of the Internet of Things (IoT), is so convoluted. Therefore, a new architecture is needed to deal with predicting and maintaining the connectivity graph of network, design distributed SDN system that meet the harsh requirement of fog computing, implement and manage VNFCs through the network, and orchestrate these components together. Hence, an integrated end-to-end SDN/NFV reference architecture by means of orchestration of integrated Cloud, Fog, and network resources has been proposed.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126055350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Energy-Efficient Model of Fog and Device Nodes in IoT 物联网中雾和设备节点的节能模型
R. Oma, Shigenari Nakamura, T. Enokido, M. Takizawa
{"title":"An Energy-Efficient Model of Fog and Device Nodes in IoT","authors":"R. Oma, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/WAINA.2018.00102","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00102","url":null,"abstract":"Various types and huge number of devices like sensors and actuators are interconnected with clouds of servers in IoT (Internet of Things). Here, a large volume of data including multimedia data like image created by sensors are transmitted to servers in clouds through networks. Processes in servers decide on actions and send the actions to actuators under time constraints like realtime one. However, huge volume of data are transmitted in networks and servers are heavily loaded. An intermediate layer named fog layer is introduced between clouds and devices in IoT to overcome the difficulties. Processing to be done and data to be stored in servers are distributed to fog nodes while centralized on servers in clouds in traditional cloud computing systems. In this paper, we newly propose a linear IoT model to deploy processes and data to devices, fog nodes, and servers in IoT so that the total electric energy consumption of nodes can be reduced. We show the total electric energy of the IoT model is smaller than the cloud model in the evaluation.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Dijkstra Algorithm Based Ray Tracing: A Case Study for Tunnel Structures 基于Dijkstra算法的光线追踪:隧道结构的案例研究
K. Uchida, L. Barolli
{"title":"Dijkstra Algorithm Based Ray Tracing: A Case Study for Tunnel Structures","authors":"K. Uchida, L. Barolli","doi":"10.1109/WAINA.2018.00067","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00067","url":null,"abstract":"This paper deals with ray tracing in a closed space such as tunnel or underground by using the numerical method based on Dijkstra algorithm (DA). The essence of the method is to modify the DA based proximity matrix in terms of three procedures, that is, path selection, path linearization and line of sight (LOS) check. This method has successively been applied to ray tracing in an open space such as a random rough surface. When we treat a closed space, however, more detailed discussions are required than in the case of an open space, because we must take account of the effects of floor, ceiling and side walls at the same time. In this paper we propose procedures for LOS check to solve this difficult situation. Numerical examples are shown for the traced rays and cost distributions in sinusoidal and cross type tunnels.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security-Aware Network Analysis for Network Controllability 面向网络可控性的安全感知网络分析
Shuo Zhang, S. Wolthusen
{"title":"Security-Aware Network Analysis for Network Controllability","authors":"Shuo Zhang, S. Wolthusen","doi":"10.1109/WAINA.2018.00136","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00136","url":null,"abstract":"Although people use critical, redundant and ordinary categories to concisely distinguish the importance of edges in maintaining controllability of networks in linear time-invariant (LTI) model, a specific network analysis is still uncertain to confirm edges of each category for further edge protection. Given a large, sparse, Erdős-Rényi random digraph with a precomputed maximum matching in LTI model as an input network, we address the problem of efficiently classifying its all edges into those categories. By the minimal input theorem, classifying an edge into one of those categories is modeled into analysing the number of maximum matchings having it, while it is solved by finding maximally-matchable edges via a bipartite graph mapped by the input network. In the worst case, entire edge classification is executed in linear time except for precomputing a maximum matching of the input network.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122221041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信