2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
GRETA: erGonomic stREss Tracking pAd 葛丽塔:符合人体工程学的压力追踪板
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912904
Benedetta Bolis, Lorenzo Fratini, Mirko Salaris, M. Santambrogio
{"title":"GRETA: erGonomic stREss Tracking pAd","authors":"Benedetta Bolis, Lorenzo Fratini, Mirko Salaris, M. Santambrogio","doi":"10.1109/ISCC55528.2022.9912904","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912904","url":null,"abstract":"Several studies have shown stress to be associated with increased rates of heart attack, hypertension, and other disorders. In this regard, office workers are subjected to the dullness of their daily working routine which does nothing but increase their stress exposure. On the basis of these facts, our work acts as a proposal for a novel health-care-embedded system thought to detect the time course of a few vital signs, strictly related to stress, and to be a cost-effective solution for the market. The project, named GRETA (erGonomic stREss Tracking pAd), is based on a rubber-cork working pad provided with a set of photoplethysmography sensors that allow us to collect data about the ventral-wrist heart rate time evolution of average workers in an office setting environment. To this purpose, we designed our device in order to be as comfortable and noninvasive as possible and the implementation of the software and hardware part aims at reducing any environmental noise source, i.e., thermal noise, irregular detection, and sudden movements, in order to enable a cleaner data analysis.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart Ecosystem to improve Patient Monitoring using Wearables, Intelligent Agents, Complex Event Processing and Image Processing 使用可穿戴设备、智能代理、复杂事件处理和图像处理改善患者监测的智能生态系统
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912829
Lorenzo De Lauretis, Fabio Persia, Stefania Costantini
{"title":"A Smart Ecosystem to improve Patient Monitoring using Wearables, Intelligent Agents, Complex Event Processing and Image Processing","authors":"Lorenzo De Lauretis, Fabio Persia, Stefania Costantini","doi":"10.1109/ISCC55528.2022.9912829","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912829","url":null,"abstract":"Our work describes a smart-ecosystem able to mon-itor patients' health condition, even at home or at work, by ex-ploiting a creative blend of Medical Wearables, Intelligent Agents, Complex Event Processing and Image Processing. With the help of a smart application, that links together the Wearables and the power of Artificial Intelligence, patients will be continuously and actively supervised during their daily activities. This can even save their lives, in case sudden or gradual issues should occur. Using our system, patients with non-severe though potentially unstable chronic diseases will no longer overburden first aid services. This is also useful for containing the spread of COVID-19. Specifically, in this paper we focus on automated vitals monitoring, electrocardiogram (ECG) analysis, and Psoriasis detection.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physiological Parameters Extraction by Accelerometric Signal Analysis During Sleep 睡眠过程中加速度信号的生理参数提取
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912931
Linda Senigagliesi, Manola Ricciuti, Gianluca Ciattaglia, E. Gambi
{"title":"Physiological Parameters Extraction by Accelerometric Signal Analysis During Sleep","authors":"Linda Senigagliesi, Manola Ricciuti, Gianluca Ciattaglia, E. Gambi","doi":"10.1109/ISCC55528.2022.9912931","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912931","url":null,"abstract":"Sleep quality is an index of well-being, since sleep disorders, such as sleep apnea, may constitute a health risk. A constant monitoring of subjects, especially when there are heart or respiratory diseases, is essential. The present paper aims to offer a non-invasive and comfortable sleep monitoring, by employing a BallistoCardioGraphic (BCG) signal processing. In particular, with a BCG device located below the mattress, we are able to extract the heart rate, respiratory rate and, therefore, to exploit this information to develop an automatic sleep apnea recognition algorithm. The automatic approach presented has proven to achieve accuracy and reliability and could represent a valid resource to prevent serious damages during sleep.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"57 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MD-Roofline: A Training Performance Analysis Model for Distributed Deep Learning md - rooline:分布式深度学习的训练性能分析模型
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912757
Tianhao Miao, Qinghua Wu, Ting Liu, Penglai Cui, Rui Ren, Zhenyu Li, Gaogang Xie
{"title":"MD-Roofline: A Training Performance Analysis Model for Distributed Deep Learning","authors":"Tianhao Miao, Qinghua Wu, Ting Liu, Penglai Cui, Rui Ren, Zhenyu Li, Gaogang Xie","doi":"10.1109/ISCC55528.2022.9912757","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912757","url":null,"abstract":"Due to the bulkiness and sophistication of the Distributed Deep Learning (DDL) systems, it leaves an enormous challenge for AI researchers and operation engineers to analyze, diagnose and locate the performance bottleneck during the training stage. Existing performance models and frameworks gain little insight on the performance reduction that a performance straggler induces. In this paper, we introduce MD-Roofline, a training performance analysis model, which extends the traditional rooftine model with communication dimension. The model considers the layer-wise attributes at application level, and a series of achievable peak performance metrics at hardware level. With the assistance of our MD-Roofline, the AI researchers and DDL operation engineers could locate the system bottleneck, which contains three dimensions: intra-GPU computation capacity, intra-GPU memory access bandwidth and inter-GPU communication bandwidth. We demonstrate that our performance analysis model provides great insights in bottleneck analysis when training 12 classic CNNs.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precise Latency Guarantee with Mobility and Handover in 5G and Beyond 5G及以后的移动和切换的精确延迟保证
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912811
Lijun Dong, Richard Li
{"title":"Precise Latency Guarantee with Mobility and Handover in 5G and Beyond","authors":"Lijun Dong, Richard Li","doi":"10.1109/ISCC55528.2022.9912811","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912811","url":null,"abstract":"Precise end-to-end latency guarantee is predicted to be required by many emerging applications. On the other hand, the network traffic will continue to be dominated by mobile devices. Therefore, the end-to-end latency is composed of the latency incurred in the Internet as well as in the mobile networks. In this paper, we target to address the end-to-end latency guarantee requirement for downlink traffic by leveraging the previously proposed 5G slice namely, Latency Guarantee Service (LGS) slice. The mechanisms and procedures are proposed by taking the compatibility of 5G architecture into consideration. The simulation results show that the downlink flows which are admitted by the LGS slices are verified to satisfy the end-to-end latency constraint consistently.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media and Web Sensing on Interior and Urban Design 社会媒体和网络感知在室内和城市设计中的应用
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912803
E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris
{"title":"Social Media and Web Sensing on Interior and Urban Design","authors":"E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris","doi":"10.1109/ISCC55528.2022.9912803","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912803","url":null,"abstract":"Social media and web sites provide an access to pub-lic opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. Designers have been investigating how to use them for grasping social feelings and needs associated with the arrangement of spaces that surround people in everyday life to find inspiration and come up with ideas for adaptive designs. Following this, we propose a novel design-oriented tool-set that retrieves and analyses online public information from Twitter and focused content from relevant web sites. We present the data collection pipeline and multilingual analysis algorithms like concept extraction and sentiment analysis on interior and urban design. Finally, we showcase an application of the proposed tool-set within two case studies.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning 基于射频指纹二维表示和深度学习的移动设备识别
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913038
Jing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang
{"title":"Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning","authors":"Jing Li, Shunliang Zhang, Mengyan Xing, Zhuang Qiao, Xiaohui Zhang","doi":"10.1109/ISCC55528.2022.9913038","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913038","url":null,"abstract":"Radio frequency (RF) fingerprint representing the inherent hardware characteristics of mobile devices has been employed to classify and identify wireless devices for the security of Internet of Things (IoT). Existing works on RF fingerprinting are usually based on the amplitude or phase of RF signal envelope, which leads to relatively coarse features. Moreover, the classification performance over small sample dataset is poor. To solve the problem, a novel device identification method based on RF fingerprinting with on deep learning is proposed. In particular, the RF signal are transformed into two dimensional representations by image preprocessing. Then the gray images representing the RF fingerprints are classified by employing classical CNN. To verify the performance of the proposed approach, a testbed is constructed by using MATLAB build framework of gray image preprocessing. Extensive experiment results show that the identification accuracy can reach at least 90%. Even with the sample rate of 20Gsps. Particularly, the accuracy of iPhone can reach 100%. It is verified that the proposed method can effectively classify mobile devices even with small sample RF fingerprints represented two dimensional gray images,","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122162774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
City-Scale Fingerprint Positioning Framework based on MDT Data 基于MDT数据的城市规模指纹定位框架
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912993
Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen
{"title":"City-Scale Fingerprint Positioning Framework based on MDT Data","authors":"Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen","doi":"10.1109/ISCC55528.2022.9912993","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912993","url":null,"abstract":"Mobile positioning plays an essential role in smart city services. This paper proposes a fingerprint positioning framework based on massive Minimization of Drive Test (MDT) data to provide accurate and efficient city-scale positioning without additional equipment and measures. First, a multi-level fingerprint construction method is proposed using the Timing Advance (TA), Reference Signal Receiving Power (RSRP), and Reference Signal Receiving Quality (RSRQ) of the serving cell and neighboring cell. Then, an adaptive online fingerprint matching method is employed to extract and match online data fingerprints. Experiments show that the median positioning error is 29.97 meters with city-scale MDT data. It outperforms the reported accuracy of the state-of-the-art fingerprint positioning method.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Channel Learning with Preprocessing for Automatic Modulation Order Separation 基于预处理的多通道学习自动调制顺序分离
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912830
Gizem Sümen, B. Çelebi, G. Kurt, Ali̇ Görçi̇n, S. T. Basaran
{"title":"Multi-Channel Learning with Preprocessing for Automatic Modulation Order Separation","authors":"Gizem Sümen, B. Çelebi, G. Kurt, Ali̇ Görçi̇n, S. T. Basaran","doi":"10.1109/ISCC55528.2022.9912830","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912830","url":null,"abstract":"Automatic modulation classification (AMC) with deep learning (DL) based methods has been studied in recent years and improvements have been shown in many studies; however, it has been difficult to design a classifier that can distinguish modulation orders such as 16-QAM and 64-QAM, with high accuracy. In this study, the distinction performance of 16-QAM and 64-QAM modulation orders increased by feeding the features obtained during the preprocessing stage to the multi-channel convolutional long short-term deep neural network (MCLDNN). Simulation results indicate performance improvements, particularly at the low SNR region. Furthermore, the proposed method can be extended for the separation of other orders of QAM and other digital modulations.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures 使公民系统更安全:实用的加密绕过和对策
2022 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912814
Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou
{"title":"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures","authors":"Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou","doi":"10.1109/ISCC55528.2022.9912814","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912814","url":null,"abstract":"Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信