2014 IEEE 28th International Conference on Advanced Information Networking and Applications最新文献

筛选
英文 中文
Channel Estimation for Secret Key Generation 密钥生成的信道估计
M. McGuire
{"title":"Channel Estimation for Secret Key Generation","authors":"M. McGuire","doi":"10.1109/AINA.2014.60","DOIUrl":"https://doi.org/10.1109/AINA.2014.60","url":null,"abstract":"Generating secret keys from radio channel measurements has been shown to allow private communications. Previously described methods for performing wireless key generation have not come close to achieving the theoretical upper bounds on key rates theory for this technique. This paper demonstrates how using a Kalman filter based on an auto-regressive (AR) model for the channel process, channel gain measurements can be converted into a sequence of independent Gaussian vectors. Methods for processing these vectors so they are compatible with existing secret key quantization and error reconciliation techniques are also presented. It is shown how the mutual information in these vectors is near that of the theoretical upper bounds. Finally, it is shown that most of the available secret key bits can be extracted using practical quantization and error reconciliation techniques.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Application-Aware Fast Dormancy in LTE LTE中应用感知的快速休眠
J. B. Abdo, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi
{"title":"Application-Aware Fast Dormancy in LTE","authors":"J. B. Abdo, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/AINA.2014.28","DOIUrl":"https://doi.org/10.1109/AINA.2014.28","url":null,"abstract":"Two Radio Resource Control states have been proposed in LTE and implemented to ensure low UE power consumption and high network resource availability. Transiting between these two states optimizes network performance if tuned properly. Currently, a UE switches from the LTE_ACTIVE state to the LTE_IDLE state after a pre-configured static inactivity duration. This paper seeks to demonstrate that no static timeout is optimal for all users at all times. In addition, a user-level dynamic decision algorithm is proposed to have fine-grain user level optimization. Since achieving better efficiency is related to context awareness, we present a solution that allows the UE to auto-learn its traffic behavior. The dynamic algorithm was applied to five different user load scenarios of combined application and legacy traffic, and the results showed that we are able to attain power savings of up to 30% when compared to the fixed timeout case.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"os-58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-Aware Replication Models of Mobile Agents 移动代理的能量感知复制模型
Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa
{"title":"Energy-Aware Replication Models of Mobile Agents","authors":"Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2014.138","DOIUrl":"https://doi.org/10.1109/AINA.2014.138","url":null,"abstract":"Application processes are performed on servers in a cluster. Here, processes have to be not only reliably performed in presence of server faults but also the total electric power consumed by servers has to be reduced. The more number of replicas, the more reliably a process can be performed but the more amount of electric power is consumed by the servers. In this paper, we consider a mobile agent approach to realizing fault-tolerant energy-aware clusters. Here, a mobile agent is passively replicated on multiple servers. One primary replica of a mobile agent moves around servers and is performed on servers while the other secondary replicas are not performed. If the primary replica is faulty, one of the secondary replicas takes over the primary replica. In this paper, we discuss how to select servers for replicas to reliably and energy-efficiently perform mobile agents. We evaluate the energy-efficient passive replication scheme of a mobile agent in terms of average execution time of each mobile agent.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Personalized Healthcare Recommender Based on Social Media 基于社交媒体的个性化医疗保健推荐
Juan Li, Nazia Zaman
{"title":"Personalized Healthcare Recommender Based on Social Media","authors":"Juan Li, Nazia Zaman","doi":"10.1109/AINA.2014.120","DOIUrl":"https://doi.org/10.1109/AINA.2014.120","url":null,"abstract":"Social media is rapidly changing the nature and speed of healthcare interaction. As more and more people go online to search for their health-related issues, providing them with appropriate information would save them from being overwhelmed by mountains of information. For this purpose, in this paper we propose a personalized healthcare recommending system to recommend highly relevant and trustworthy healthcare-related information to users. The system identifies key factors impacting the recommendation in a healthcare social networking environment, and uses semantic web technology and fuzzy logic to represent and evaluate the recommendation. Experiments were conducted and demonstrated that our approach can generate good outcomes in making recommendation and predicting the scope and impact of different factors.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems 优化代理辅助网络觅食系统的能量消耗
M. Nir, A. Matrawy, M. St-Hilaire
{"title":"Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems","authors":"M. Nir, A. Matrawy, M. St-Hilaire","doi":"10.1109/AINA.2014.71","DOIUrl":"https://doi.org/10.1109/AINA.2014.71","url":null,"abstract":"In this paper, we present our work in the area of Cyber Foraging (CF), which enables mobile devices to offload heavy computations to resourceful computing nodes. The main focus of the paper is to minimize the total energy consumption across all the mobile devices in a large Cyber Foraging System (CFS). We use a centralized architecture where a broker node handles the task scheduling. We model the task scheduling problem for this centralized architecture and optimally solve the problem to minimize the total energy consumption, which is equivalent to maximizing the total energy saving across all mobile devices. Simulation results show that using a centralized broker able to optimally offload tasks can provide a significant reduction in energy consumption.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNs 基于混合高级分布式和集中式聚类的wsn路径规划算法
A. Muhammad, E. Munir, M. Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal
{"title":"HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNs","authors":"A. Muhammad, E. Munir, M. Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal","doi":"10.1109/AINA.2014.81","DOIUrl":"https://doi.org/10.1109/AINA.2014.81","url":null,"abstract":"Designing and development of energy effective path planning algorithm is very key research domain in order to tackle the issues of limited life-time for Wireless Sensor Networks (WSNs). So in WSNs, energy efficiency is major concern of researchers. Overall advancement in routing protocols prove that clustering is much better approach as compared to flat and location-based energy efficient routing protocols. Due to better performance, multiple energy efficient clustering routing protocols have been proposed. But existing clustering algorithms are centralized or distributed, which are not intelligent enough and do not produce hybrid cluster-head selection. In this paper, we propose a cluster structured path planning algorithm named, Hybrid Advance Distributed Centralized Clustering (HADCC) path planning energy efficient algorithm. HADCC proposed model is fascinated with hybrid cluster head selection algorithm. This hybrid algorithm makes decision of cluster head selection of nodes. In order to execute proposed model we have also proposed an advance network topology, in which the whole network region is divided into two physical levels. First physical level consists of a circular region, containing homogeneous normal nodes and all important Base Station. While, second physical level is outer region of the circle that contains advanced heterogeneous nodes. Simulation results indicate that HADCC prolongs the network lifetime as compared to existing advanced clustering routing protocols for both homogeneous and heterogeneous WSNs. HADCC outperforms in case of stability and network life time as compared to the existing clustering algorithms.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115679324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Protecting Run-Time Filters for Network Intrusion Detection Systems 保护网络入侵检测系统的运行时过滤器
Victor C. Valgenti, Hai Sun, Min Sik Kim
{"title":"Protecting Run-Time Filters for Network Intrusion Detection Systems","authors":"Victor C. Valgenti, Hai Sun, Min Sik Kim","doi":"10.1109/AINA.2014.19","DOIUrl":"https://doi.org/10.1109/AINA.2014.19","url":null,"abstract":"Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reverse Nearest Neighbour by Region on Mobile Devices 在移动设备上按区域反转最近邻居
Kiki Maulana, D. Taniar, M. Indrawan, Dirda M. K. Latjuba
{"title":"Reverse Nearest Neighbour by Region on Mobile Devices","authors":"Kiki Maulana, D. Taniar, M. Indrawan, Dirda M. K. Latjuba","doi":"10.1109/AINA.2014.57","DOIUrl":"https://doi.org/10.1109/AINA.2014.57","url":null,"abstract":"Reverse Nearest Neighbour queries is known for the heavyweight algorithm that makes it difficult to be implemented in mobile devices due to high computations needed to verify the objects. Since the rapid development of mobile devices' hardware and also the new lightweight approach in solving the Reverse Nearest Neighbour problem, this problem can be solved in mobile devices. In this paper, we implemented the Contact Zone algorithm to create bichromatic reverse nearest neighbour region for a specific query point on mobile devices. The model is developed in a closed wireless network and various types of mobile devices with different hardware specifications are used. Our experiments show that RNN queries by region can be solved in mobile devices and different mobile CPUs do not give significant performance in processing the queries.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service Selection 基于层次模糊推理系统的服务选择云信任评价系统
Chenhao Qu, R. Buyya
{"title":"A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service Selection","authors":"Chenhao Qu, R. Buyya","doi":"10.1109/AINA.2014.104","DOIUrl":"https://doi.org/10.1109/AINA.2014.104","url":null,"abstract":"Cloud computing is an utility computing paradigm that allows users to flexibly acquire virtualized computing resources in a pay-as-you-go model. To realize the benefits of using cloud, users need to first select the suitable cloud services that can satisfy their applications' functional and non-functional requirements. However, this is a difficult task due to large number of available services, users' unclear requirements, and performance variations in cloud. In this paper, we propose a system that evaluates trust of clouds according to users' fuzzy Quality of Service (QoS) requirements and services' dynamic performances to facilitate service selection. We demonstrate the effectiveness and efficiency of our system through simulations and case studies.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Automated Dynamic Resource Provisioning and Monitoring in Virtualized Large-Scale Datacenter 虚拟化大规模数据中心的自动化动态资源发放与监控
Sameera Abar, Pierre Lemarinier, G. Theodoropoulos, Gregory M. P. O'Hare
{"title":"Automated Dynamic Resource Provisioning and Monitoring in Virtualized Large-Scale Datacenter","authors":"Sameera Abar, Pierre Lemarinier, G. Theodoropoulos, Gregory M. P. O'Hare","doi":"10.1109/AINA.2014.117","DOIUrl":"https://doi.org/10.1109/AINA.2014.117","url":null,"abstract":"Infrastructure as a Service (IaaS) is a pay-as-you go based cloud provision model which on demand outsources the physical servers, guest virtual machine (VM) instances, storage resources, and networking connections. This article reports the design and development of our proposed innovative symbiotic simulation based system to support the automated management of IaaS-based distributed virtualized data enter. To make the ideas work in practice, we have implemented an Open Stack based open source cloud computing platform. A smart benchmarking application \"Cloud Rapid Experimentation and Analysis Tool (aka CBTool)\" is utilized to mark the resource allocation potential of our test cloud system. The real-time benchmarking metrics of cloud are fed to a distributed multi-agent based intelligence middleware layer. To optimally control the dynamic operation of prototype data enter, we predefine some custom policies for VM provisioning and application performance profiling within a versatile cloud modeling and simulation toolkit \"CloudSim\". Both tools for our prototypes' implementation can scale up to thousands of VMs, therefore, our devised mechanism is highly scalable and flexibly be interpolated at large-scale level. Autonomic characteristics of agents aid in streamlining symbiosis among the simulation system and IaaS cloud in a closed feedback control loop. The practical worth and applicability of the multiagent-based technology lies in the fact that this technique is inherently scalable hence can efficiently be implemented within the complex cloud computing environment. To demonstrate the efficacy of our approach, we have deployed an intelligible lightweight representative scenario in the context of monitoring and provisioning virtual machines within the test-bed. Experimental results indicate notable improvement in the resource provision profile of virtualized data enter on incorporating our proposed strategy.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125058760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信