Proceedings of the International Conference on Internet of things and Cloud Computing最新文献

筛选
英文 中文
Out-Of-Order Events Processing: Healthcare Use Case 乱序事件处理:医疗保健用例
Hanen Bouali, J. Akaichi
{"title":"Out-Of-Order Events Processing: Healthcare Use Case","authors":"Hanen Bouali, J. Akaichi","doi":"10.1145/2896387.2896429","DOIUrl":"https://doi.org/10.1145/2896387.2896429","url":null,"abstract":"Radio Frequency Identification technologies has entered the healthcare domain because of its enhanced functionality, low cost, high accuracy and easy to use capacities. However, network latencies and machine failure may cause events to arrive out-of-order at the event processing engine. Hence, imperfections in event delivery are due to incoherences and failure between different sensors or machines. To cope with those problems, we propose in this paper, a method that efficiently handles out-of-order events at a time window. The proposed solution is based on dating each event and characterizing it by two sets; the past set which include all past events and a future set which includes all futures events. An experiment was designed in order to verify and test the proposed solution. Using this method, events are ordered to be analysed later in order to support real time decision making.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115986279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Minutiae Based Latent Fingerprint Recognition System 基于细节的潜在指纹识别系统
S. Ahmed, M. I. Razzak, Bandar Alhaqbani
{"title":"The Minutiae Based Latent Fingerprint Recognition System","authors":"S. Ahmed, M. I. Razzak, Bandar Alhaqbani","doi":"10.1145/2896387.2896434","DOIUrl":"https://doi.org/10.1145/2896387.2896434","url":null,"abstract":"The emergence in the field of fingerprint recognition witness several efficient techniques that propose matching and recognition in less time. The latent fingerprints posed a challenge for such efficient techniques that may deviates results from ideal to worse. The minutiae are considered as a discriminative feature of finger patterns which is assessed in almost every technique for recognition purpose. But in latent patterns such minutiae may be missed or may have contaminated noise. In this paper, we presents such work that demonstrate the solution for latent fingerprints recognition but in ideal time. We also gathered the description about the techniques that have been evaluated on standard NIST Special Dataset (SD)27 of latent fingerprint.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122855602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems 一种适用于组专用系统的组管理和端到端安全管理的开放水平模型
E. Festijo, Younchan Jung
{"title":"An Open Horizontal Model for Group Management and End-to-End Security Management Suitable for Group-based Private Systems","authors":"E. Festijo, Younchan Jung","doi":"10.1145/2896387.2896404","DOIUrl":"https://doi.org/10.1145/2896387.2896404","url":null,"abstract":"This paper proposes an open horizontal model for group management and end-to-end security management suitable for group-based private systems. The overlay network controller (ONC), which is located at the control layer, acts as an SDN controller capable of handling network functions such as group management and end-to-end security management. For group management, we propose a group-based private system that uses unicast method within the overlay network for distributing the signaling messages among the group members and is based on scalable architecture, that is, centralized and network independent. While the group key management is responsible for securing control signaling messages within the group members, the purpose of the end-to-end security management is to protect the end-to-end data traffic within them. To achieve end-to-end security, this paper uses packet key scheme that collaborates with the group key management. The members of the group-based private system are allowed to receive packet key scheme service for their end-to-end data traffic. The packet key scheme is based on the idea that a relatively small key size can be used as long as it provides high level of security and satisfy the latency requirements especially for real-time applications. The proposed scheme is evaluated based on the communication load and computational load requirement on both the ONC and mobile hosts. The security strength of the proposed packet key scheme is also analyzed.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123802118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection 基于性侵犯检测的社交网络隐私保护协议
Zeineb Dhouioui, J. Akaichi
{"title":"Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection","authors":"Zeineb Dhouioui, J. Akaichi","doi":"10.1145/2896387.2896448","DOIUrl":"https://doi.org/10.1145/2896387.2896448","url":null,"abstract":"Social networks offer great opportunities for communication and no one can deny the benefits of these sites; however, we cannot ignore the privacy defects such as fraudsters, spam, hackers and sexual predators. This paper presents a privacy protection protocol in order to protect users from risks that may be encountered in their social networks activities. In particular, we focus on the sexual predators detection. For this purpose, we use text mining tools to classify doubtful conversations based on lexical and behavioral features extraction. Moreover, we are able to flag potential predators, by computing the predatorhood score according to the sum of features weights. Different experiments have been carried out based on comparative study between two machine learning algorithms: support vector machines (SVM) and NaÃŕve Bayes (NB). The results are very promising.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124063347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A QoS aware Routing Protocol in Wireless Sensor Networks with Mobile Base Stations 具有移动基站的无线传感器网络中的QoS感知路由协议
Bhaskar Bhuyan, N. Sarma
{"title":"A QoS aware Routing Protocol in Wireless Sensor Networks with Mobile Base Stations","authors":"Bhaskar Bhuyan, N. Sarma","doi":"10.1145/2896387.2896400","DOIUrl":"https://doi.org/10.1145/2896387.2896400","url":null,"abstract":"Wireless Sensor Networks (WSNs) are deployed in different applications such as environmental monitoring, surveillance, healthcare, habitat monitoring, industrial monitoring etc. for monitoring, gathering and sending data to a control station called sink or base station. It is an emerging area of research and provision of Quality of Service (QoS) is a challenging problem in many such applications mentioned above. Delay is an important QoS parameter for timely delivery of event information in delay sensitive applications of wireless sensor networks. In this paper, we propose a delay aware routing protocol for wireless sensor networks with mobile base stations. We have also taken reliability into our consideration by keeping the provision of transmitting data to multiple base stations. The performance of the proposed works is evaluated by simulation using NS-2 simulator.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Generic Usability Monitoring Model for Cloud Computing Environment (GUM) 云计算环境通用可用性监测模型(GUM)
Baha'a Al-Sharafat, Bara'a Qadoumi
{"title":"Generic Usability Monitoring Model for Cloud Computing Environment (GUM)","authors":"Baha'a Al-Sharafat, Bara'a Qadoumi","doi":"10.1145/2896387.2896430","DOIUrl":"https://doi.org/10.1145/2896387.2896430","url":null,"abstract":"The paper proposed a new generic model to monitor the quality of the service parameter in the cloud computing environments. Usability requirement is a main factor to enumeration the quality of any software system, where the user satisfaction is the principal factor that gives a perception of the software system success or failure. Most of the existing cloud computing environments are very complex and not easy to use, as a result of that the authors start developing methods and mechanisms to evaluate if the cloud computing environment usable or not. Several papers clarify these methods, according to the author opinion. In this paper we focus in term of usability based on Three-Dimensional (3D) approach as a one of the usability evaluation methods. This research proposed a new model that helps the third party to monitoring the usability of the cloud computing environments, and gives the result to the costumers. Our model aims to use different usability evaluation methods such as: design principles, user satisfaction, the process of inspection, and user participation (testing & questionnaire) to determine the usability of this environment type. The Three-Dimensional (3D) approach is a proposed usability evaluation method that designed to pass the cloud computing environment in three phases during the evaluation process. Where there will be a certain degree of each stage. The first two phase's represents 40%, while the last one represents 20 % due to its importance, the total of the three phases are 100 %. Therefore, that will represent the percentage of the usability of the cloud computing environments.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-Efficient Remote Healthcare Monitoring Using IoT: A Review of Trends and Challenges 使用物联网的节能远程医疗监控:趋势和挑战综述
W. Abdullah, N. Yaakob, Mohamed Elshaikh Elobaid, M. N. M. Warip, Siti Asilah Yah
{"title":"Energy-Efficient Remote Healthcare Monitoring Using IoT: A Review of Trends and Challenges","authors":"W. Abdullah, N. Yaakob, Mohamed Elshaikh Elobaid, M. N. M. Warip, Siti Asilah Yah","doi":"10.1145/2896387.2896414","DOIUrl":"https://doi.org/10.1145/2896387.2896414","url":null,"abstract":"The emergence of Internet and technologies such as Wireless Sensor Network (WSN) has created another platform of Wireless Body Area Network (WBAN) and also an ever growing new area of Internet of Thing (IoT). A WBAN offers a flexibility and mobility to health monitoring system. Most of WBAN is made up of several small and light-weighted battery-operated sensor nodes and lead to energy-constrained system. Thus, an energy-efficient WBAN system is crucially needed to make the network last longer. In addition, data reliability and data transmission is important to make the system more effective. IoT concept helps in forming an interaction of things in the surrounding as well as support data storage (database) for collected vital body sign by the sensors. In this paper, we review the concept and design of energy-efficient WBAN and contribution of IoT in healthcare monitoring system.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133300638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework 使用物联网(IoT)安全框架保护传感器到云生态系统
Abdul Fuad Abdul Rahman, Maslina Daud, M. Z. Mohamad
{"title":"Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework","authors":"Abdul Fuad Abdul Rahman, Maslina Daud, M. Z. Mohamad","doi":"10.1145/2896387.2906198","DOIUrl":"https://doi.org/10.1145/2896387.2906198","url":null,"abstract":"The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured technology will exposed to security threats. Therefore an ecosystem for IoT should be designed with security embedded in each layer of its ecosystem. This paper will discussed the security threats to IoT and then proposed an IoT Security Framework to mitigate it. Then IoT Security Framework will be used to develop a Secure IoT Sensor to Cloud Ecosystem.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
OoDAAS: Ontology-Driven Analysis for Self-Adaptive Ambient Systems 面向自适应环境系统的本体驱动分析
A. Jemal, Hend Ktait, Riadh Ben Halima, M. Jmaiel
{"title":"OoDAAS: Ontology-Driven Analysis for Self-Adaptive Ambient Systems","authors":"A. Jemal, Hend Ktait, Riadh Ben Halima, M. Jmaiel","doi":"10.1145/2896387.2900318","DOIUrl":"https://doi.org/10.1145/2896387.2900318","url":null,"abstract":"In the current decade, computing turns towards smart, mobile and ambient devices. As a consequence, applications and services have to be aware in order to react to a highly dynamic context (available resources, environmental conditions, user needs, etc.) and adapt their structures and behaviors. In such context-aware environment (e.g. smart buildings) interoperability is highly recommended and especially for contexts where (i) connected entities in a particular space need to understand each other and (ii) an analysis module can be built based on exchanged data querying. In this paper, we propose an ontology model for smart building that allows monitoring smart entities and enables a rule based analysis. The proposed ontology model defines seven major reusable concepts that provide the basic infrastructure to build an ontology model for smart space environments. As each smart environment is distributed over different locations and may have many kinds of devices etc., we propose domain ontology for the smart building space and implement a prototype for this ontology model using Protégé 3.5 as an ontology editor and Pellet as a reasoning engine. Furthermore, we define smart rules using SWRL (Semantic Web Rule Language) and infer those rules by SQWRL (Semantic Query-Enhanced Web Rule Language) query language in order to analyze the context and generate alerts regarding abnormal behaviors. The proposed ontology model is illustrated in a smart building space where the analysis infers and detects alerting situations, in a wireless sensor network, based on monitoring data collected from sensors.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129825732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Method for Associating Radio Propagation Models with Spatial Partitioning for Smart City Applications 智慧城市应用中无线电传播模型与空间划分的有效关联方法
T. Alwajeeh, P. Combeau, A. Bounceur, R. Vauzelle
{"title":"Efficient Method for Associating Radio Propagation Models with Spatial Partitioning for Smart City Applications","authors":"T. Alwajeeh, P. Combeau, A. Bounceur, R. Vauzelle","doi":"10.1145/2896387.2901918","DOIUrl":"https://doi.org/10.1145/2896387.2901918","url":null,"abstract":"The first part of this paper presents a survey of the most famous outdoor propagation models suitable for Wireless Sensor Networks (WSNs) for smart city applications. Then, we propose an intelligent method to associate these models with spatial zones according to the electromagnetic interactions. Finally, we present how to integrate this method in a WSN simulation platform called CupCarbon [1], and a methodology to associate these models.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信