2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)最新文献

筛选
英文 中文
Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals 实时监测心脏和呼吸信号的MAC协议分析
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628524
Negar Mohammadi-Koushki, A. Gawanmeh
{"title":"Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals","authors":"Negar Mohammadi-Koushki, A. Gawanmeh","doi":"10.1109/LCNW.2018.8628524","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628524","url":null,"abstract":"Wireless sensor networks have several appealing medical applications. The deployment of wireless technologies in the medical field imposes several considerations on the choice of communication methods, protocols, wireless technologies, and type of devices. One of the most challenging problems is the choice of the best medium access control protocol in order to resolve problems such as the correlation of traffic, heavy collisions, and free channel recognition. Real-Time monitoring of heart and respiratory signals has gained increasing attention in the last few decades, as there is more interest in continuous monitoring of heart activity which can significantly improve early detection of heart problems. This paper suggests a Multi Attribute Decision Making (MADM) methodology [1], [2] in order to study, analyze and recommend the most optimum protocol for the purpose of heart monitoring. The aim of this approach is to rank existing alternatives, according to several attributes that are often inconsistent.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Bounds of Secondary User's Transmission Under Fading Channel 衰落信道下辅助用户传输的性能界限
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628604
Jun Zheng, Li Yu
{"title":"Performance Bounds of Secondary User's Transmission Under Fading Channel","authors":"Jun Zheng, Li Yu","doi":"10.1109/LCNW.2018.8628604","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628604","url":null,"abstract":"Cognitive radio (CR) is a promising technology to improve the spectrum utilization in that it allows secondary users (SUs) to transmit over the spectrum holes by spectrum sensing. Though the SUs are with low priority to access to the channel, the QoS guarantees are critical for their transmissions. In this paper, we construct a cross-layer based model to analyze the performance bounds for SUs, by which we investigate how different factors jointly influence the transmission of SUs, including PU activity, number of SUs and channel fading, etc. To this end, the stochastic network calculus is employed as a basic tool, where impairment process is introduced to construct the service process for SUs. Then, the delay bound and throughput bound are derived for given arrival process. Numerical results demonstrate that PU activity has a dominant impact on the performance of the transmission for SUs.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124637911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Approach for Disaster Recovery using P2P Communications in Android 在Android中使用P2P通信的混合灾难恢复方法
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628555
Hakan Yekta Yatbaz, Berkem Cinar, Ali Gokdemir, E. Ever, F. Al-turjman, H. Nguyen, A. Yazıcı
{"title":"Hybrid Approach for Disaster Recovery using P2P Communications in Android","authors":"Hakan Yekta Yatbaz, Berkem Cinar, Ali Gokdemir, E. Ever, F. Al-turjman, H. Nguyen, A. Yazıcı","doi":"10.1109/LCNW.2018.8628555","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628555","url":null,"abstract":"Disaster recovery and rescuing are challenging tasks due to the unknown parameters related with the victims in disastrous situations. Existing surveillance systems have a degree of efficiency to inform the people through the use of various communication channels about disasters and their area of effect. However, the obscureness of the rescuing process has not been resolved in desirable levels, especially for the cases where the communication infrastructure can also be heavily damaged. Thanks to the prevalent use of mobile devices installed with variety of sensors, it is possible to aid the rescue process using the mobile hand sets. In this study, a framework which focuses on reducing the time spent to locate possible victims in a disastrous situation and to expedite the medical help is presented. For this purpose a system which introduces a proactive approach using Android, WiFi P2P technology, and local/central location database synchronization is proposed. In short, the system obtains the location of the users with fixed intervals to store in both local and centralized database for authorities to query for necessary information. The information related with the neighbouring mobile devices within a specific coverage area is also stored for the cases where only some of the devices are reachable due to disasters. With these features, it is possible to consider the system as a hybrid one where both reactive and proactive approaches are employed in order to reach the most up-to-date information available. This way, the probability of reaching up-to-date information about potential victims with no connection due to damaged infrastructure is increased, since each mobile node has information about the stations within its coverage area. In addition, the emergency medical information of the user are collected via a mobile application to accelerate the medical support time. Even though the system is designed to be used in any kind of disastrous situations, the case study included in this paper is for earthquakes only. Briefly, we developed a system that can enhance the rescuing and provide fast medical support by making use of the advancements in both mobile and wireless communication technologies.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Anomaly Based Network Intrusion Detection Systems 基于异常的网络入侵检测系统性能分析
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628599
Md. Zainal Abedin, K. Siddiquee, M. S. Bhuyan, Razuan Karim, Mohammad Shahadat Hossain, K. Andersson
{"title":"Performance Analysis of Anomaly Based Network Intrusion Detection Systems","authors":"Md. Zainal Abedin, K. Siddiquee, M. S. Bhuyan, Razuan Karim, Mohammad Shahadat Hossain, K. Andersson","doi":"10.1109/LCNW.2018.8628599","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628599","url":null,"abstract":"Because of the increased popularity and fast expansion of the Internet as well as Internet of things, networks are growing rapidly in every corner of the society. As a result, huge amount of data is travelling across the computer networks that lead to the vulnerability of data integrity, confidentiality and reliability. So, network security is a burning issue to keep the integrity of systems and data. The traditional security guards such as firewalls with access control lists are not anymore enough to secure systems. To address the drawbacks of traditional Intrusion Detection Systems (IDSs), artificial intelligence and machine learning based models open up new opportunity to classify abnormal traffic as anomaly with a self-learning capability. Many supervised learning models have been adopted to detect anomaly from networks traffic. In quest to select a good learning model in terms of precision, recall, area under receiver operating curve, accuracy, F -score and model built time, this paper illustrates the performance comparison between Naive Bayes, Multilayer Perceptron, J48, Naive Bayes Tree, and Random Forest classification models. These models are trained and tested on three subsets of features derived from the original benchmark network intrusion detection dataset, NSL-KDD. The three subsets are derived by applying different attributes evaluator's algorithms. The simulation is carried out by using the WEKA data mining tool.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Packet Dropping and Decoding Statistics for Linear Network Coded Broadcast with Feedback 带反馈的线性网络编码广播的丢包和解码统计
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628590
Sovanjyoti Giri, R. Roy
{"title":"Packet Dropping and Decoding Statistics for Linear Network Coded Broadcast with Feedback","authors":"Sovanjyoti Giri, R. Roy","doi":"10.1109/LCNW.2018.8628590","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628590","url":null,"abstract":"Exploitation of the benefit of feedback in network coded multicast or broadcast is a well-investigated technique, whose purpose is to make the system more robust to loss. In such scenario, the drop when seen algorithm reduces the expected queue length at sender while maintaining throughput optimality of encoding scheme. In this work, we study a broadcasting system where the transmitter is sending data packets of a generation, using drop when seen strategy, to a set of receivers of finite buffer length over packet erasure channels with full feedback. We develop an n-dimensional Markov chain-based model that enables us to compute the probability of dropping a packet (which is currently being transmitted) from sender queue at the end of a particular time slot. Further, by proposing the idea of first time dropping, we map the n-dimensional dynamics to a simple one-dimensional model. This simplified framework is used to find expected time to drop a packet from the sender queue. It also provides an opportunity to study decoding statistics of stored packets in receivers' buffer. We analyze three different decoding options namely, arbitrary single receiver decoding, leader decoding, worst follower decoding, and compare them.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Welcome Message from the 5G-IoT Chairs 5G-IoT主席欢迎辞
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/lcnw.2018.8628480
{"title":"Welcome Message from the 5G-IoT Chairs","authors":"","doi":"10.1109/lcnw.2018.8628480","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628480","url":null,"abstract":"","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking-based Cooperative Caching in VANETs for Social Networking 社会化网络VANETs中基于跟踪的协同缓存
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628526
Sara A. Elsayed, Sherin Abdel Hamid, A. M. Nagib, H. Hassanein
{"title":"Tracking-based Cooperative Caching in VANETs for Social Networking","authors":"Sara A. Elsayed, Sherin Abdel Hamid, A. M. Nagib, H. Hassanein","doi":"10.1109/LCNW.2018.8628526","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628526","url":null,"abstract":"Social media traffic is the predominant source of Internet traffic. Such traffic is primarily facilitated by mobile devices. As a result, mobile users tend to sustain high cellular costs. To alleviate such costs, we endeavor to allow social media users to depend more on vehicular rather than cellular networks for data access. However, this can be thwarted by the high delay and low packet delivery ratio often coupled with content access from distant data providers in vehicular networks. Hence, we strive to get the data closer to the requester by proposing the Cooperative Content Discovery and Placement at Vehicles (CCDPV) scheme. In CCDPV, we dynamically discover closer replicas to the requester using parked and moving vehicles. In particular, we utilize the last encounter information, as well as the static and mobile nature of parked and moving vehicles, respectively, to diffuse cached content information, track caching nodes, and dynamically locate closer caching nodes to the requester. CCDPV applies cooperative cache placement at both parked and moving vehicles. It caches data at parked vehicles located in congested road segments to cater for the higher possibility of requests occurring at them. CCDPV caches data at moving vehicles while taking data diversity relative to the vehicles direction of movement into consideration. Performance evaluation shows that CCDPV significantly improves delay, packet delivery ratio, and cache hit ratio compared to a caching scheme in vehicular networks that has some implicit cooperative features, as well as to a tracking-based cooperative cache discovery scheme in mobile ad hoc networks.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"17 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LCN 2018 Organizing and Program Committee LCN 2018组委会
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/lcnw.2018.8628504
{"title":"LCN 2018 Organizing and Program Committee","authors":"","doi":"10.1109/lcnw.2018.8628504","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628504","url":null,"abstract":"","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Paving the Way for Connected Cars with Adaptive AUTOSAR and AGL 利用自适应AUTOSAR和AGL为联网汽车铺平道路
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/LCNW.2018.8628558
S. Aust
{"title":"Paving the Way for Connected Cars with Adaptive AUTOSAR and AGL","authors":"S. Aust","doi":"10.1109/LCNW.2018.8628558","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628558","url":null,"abstract":"Connected vehicles offer new business models and improved user experiences. Car manufacturers are aiming to equip their vehicles with software modules and to keep them up-to-date with new services. To ease the process of maintaining the vehicle functions and to offer basic software components over the vehicle's life-cycle the AUTOSAR (AUTomotive Open System ARchitecture) consortium started to standardize basic core functions for vehicle's Electronic Control Units (ECUs) as classic AUTOSAR real-time operating system (RTOS). However, the ever increasing user expectations require that software platforms follow recent developments in software architecture and the AUTOSAR consortium started with the design of an adaptive platform solution that is directed towards future developments. Adaptive AUTOSAR offers software components that will make it easier to deploy a standardized platform for connected cars. A missing component in adaptive AUTOSAR is the specification of a Graphical User Interface (GUI) that is required to design In-vehicle Infotainment (IVI) systems. Automotive Grade Linux (AGL) provides such appealing GUIs and is open source. In this paper, the new concept of adaptive AUTOSAR will be introduced and recent design architectures are outlined. Further, the combination of adaptive AUTOSAR and AGL are motivated to design a proof-of-concept (PoC) that is efficient to use for further performance evaluation of the software components of each software platform.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124530982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On-Move 2018 Workshop 移动2018工作坊
2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops) Pub Date : 2018-10-01 DOI: 10.1109/lcnw.2018.8628601
{"title":"On-Move 2018 Workshop","authors":"","doi":"10.1109/lcnw.2018.8628601","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628601","url":null,"abstract":"","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信