Proceedings of the International Conference on Internet of things and Cloud Computing最新文献

筛选
英文 中文
Cloud-based Parallel Implementation of SLAM for Mobile Robots 基于云的移动机器人SLAM并行实现
Supun Kamburugamuve, Hengjing He, G. Fox, David J. Crandall
{"title":"Cloud-based Parallel Implementation of SLAM for Mobile Robots","authors":"Supun Kamburugamuve, Hengjing He, G. Fox, David J. Crandall","doi":"10.1145/2896387.2896433","DOIUrl":"https://doi.org/10.1145/2896387.2896433","url":null,"abstract":"Simultaneous Localization and Mapping (SLAM) for mobile robots is a computationally expensive task. A robot capable of SLAM needs a powerful onboard computer, but this can limit the robot's mobility because of weight and power demands. We consider moving this task to a remote compute cloud, by proposing a general cloud-based architecture for real-time robotics computation, and then implementing a Rao-Blackwellized Particle Filtering-based SLAM algorithm in a multi-node cluster in the cloud. In our implementation, expensive computations are executed in parallel, yielding significant improvements in computation time. This allows the algorithm to increase the complexity and frequency of calculations, enhancing the accuracy of the resulting map while freeing the robot's onboard computer for other tasks. Our method for implementing particle filtering in the cloud is not specific to SLAM and can be applied to other computationally-intensive tasks.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automation System Architecture For Barcode Region Detection Algorithm 条码区域检测算法的自动化系统架构
Geun-Jun Kim, B. Kang
{"title":"Automation System Architecture For Barcode Region Detection Algorithm","authors":"Geun-Jun Kim, B. Kang","doi":"10.1145/2896387.2896406","DOIUrl":"https://doi.org/10.1145/2896387.2896406","url":null,"abstract":"Conventional barcode region detections are generally using guideline at computer vision. Guideline is the simple method but efficient. As the demand increases in the automation system, guideline method needs to replace. Hardware has strong point at the parallel operation. Using parallel operation, hardware can process iterative operation efficiently. In this paper, we propose system architecture for barcode region detection algorithm using APU and FPGA. This architecture can easily adapted application system. FPGA reduce overload easily and efficiently for APU.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Brokers in an Internet of Things for Logistics 物流物联网中的智能经纪人
B. Karakostas, N. Bessis
{"title":"Intelligent Brokers in an Internet of Things for Logistics","authors":"B. Karakostas, N. Bessis","doi":"10.1145/2896387.2896390","DOIUrl":"https://doi.org/10.1145/2896387.2896390","url":null,"abstract":"The proliferation of Internet of Things (IoT) logistics applications necessitates the availability of new generation 'brokers' to bridge the smart objects to each other and to the enterprise world (IT systems). Such brokers need to be able to cope with the diversity of the IoT objects in their environment, in terms of intelligence and communication capabilities. More specifically, the brokers should employ trust computation mechanisms and publish-subscribe architectures. This paper proposes the architecture and functionality of IoT brokers and illustrates their use in logistics environments.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing Antecedents, Challenges, and Directions 云计算的前因后果、挑战与方向
Majed Almubaddel, Ahmed M. Elmogy
{"title":"Cloud Computing Antecedents, Challenges, and Directions","authors":"Majed Almubaddel, Ahmed M. Elmogy","doi":"10.1145/2896387.2896401","DOIUrl":"https://doi.org/10.1145/2896387.2896401","url":null,"abstract":"Cloud computing has recently emerged as a new model for hosting and delivering services over the Internet. It has many advantages, such as, increasing the capacity or adding capabilities without investing in a new infrastructure to fulfil the needed technological requirements in a fast and automated manner. It has obviously grown and its growth is impressive. However, the more information about people and business are used in the cloud, the more concerns raised about the security of its environment. Also, there are some challenges when using this service. In this paper, a survey about the main concepts of cloud computing along with some examples of the appropriate usage of its services is presented. This will help in making the right choice of using cloud computing services. The challenges of using cloud computing is introduced as well.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
IoT for Smart City Services: Lifecycle Approach 智慧城市服务的物联网:生命周期方法
A. Hefnawy, Abdelaziz Bouras, C. Cherifi
{"title":"IoT for Smart City Services: Lifecycle Approach","authors":"A. Hefnawy, Abdelaziz Bouras, C. Cherifi","doi":"10.1145/2896387.2896440","DOIUrl":"https://doi.org/10.1145/2896387.2896440","url":null,"abstract":"\"Internet of Things\" (IoT) and \"Smart City\" are widely recognized to address the complexity of modern city operation. Concentration of population, scarcity of resources and environmental concerns are the main challenges that face city operators, and make ordinary service provisioning less efficient. In city environment, IoT sensors can be sources of real-time data; and, IoT actuators can execute real-time actions in the physical domain. IoT systems range from domain-specific to cross-sectoral systems where valuable data/ information flow across interconnected complex systems. Yet, to integrate domain-specific IoT systems into the complete vision of Smart City, as a System of Systems (SoS), there is a need to address heterogeneity of data sources, diversity of application domains and the big number of stakeholders across different phases of lifecycle. This paper suggests Service Lifecycle Management (SLM) concepts and Lifecycle Modeling Language (LML) to analyze, plan, specify, design, build and maintain IoT-enabled Smart City Service Systems.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Detection Of URL In Image Steganography 图像隐写中URL的检测
Moudhi M. Aljamea, C. Iliopoulos, M. Samiruzzaman
{"title":"Detection Of URL In Image Steganography","authors":"Moudhi M. Aljamea, C. Iliopoulos, M. Samiruzzaman","doi":"10.1145/2896387.2896408","DOIUrl":"https://doi.org/10.1145/2896387.2896408","url":null,"abstract":"Steganography is the science of hiding data within data. Either for the good purpose of secret communication or for the bad intention of leaking sensitive confidential data or embedding malicious code or URL. However, many different carrier file formats can be used to hide these data (network, audio, image..etc) but the most common steganography carrier is embedding secret data within images as it is considered to be the best and easiest way to hide all types of files (secret files) within an image using different formats (another image, text, video, virus, URL..etc). To the human eye, the changes in the image appearance with the hidden data can be imperceptible. In fact, images can be more than what we see with our eyes. Therefore, many solutions where proposed to help in detecting these hidden data but each solution have their own strong and weak points either by the limitation of resolving one type of image along with specific hiding technique and or most likely without extracting the hidden data. This paper intends to propose a novel detection approach that will concentrate on detecting any kind of hidden URL in all types of images and extract the hidden URL from the carrier image that used the LSB least significant bit hiding technique.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Heterogeneous Face Detection 异质人脸检测
A. Das, R. Kumar, D. Kisku
{"title":"Heterogeneous Face Detection","authors":"A. Das, R. Kumar, D. Kisku","doi":"10.1145/2896387.2896417","DOIUrl":"https://doi.org/10.1145/2896387.2896417","url":null,"abstract":"Face detection is the process of determining the location of human faces in an image. Like human visual system, a face detection system should also be capable of achieving the detection task irrespective of illumination, absence of texture, orientation and camera distance. Detecting faces in heterogeneous, infrared and thermal images is a challenging job due to variation in texture, orientation, lighting condition, intensity etc. Many researchers have worked and proposed various methods for visible faces in the domain of face detection. However, face detection with the existing algorithm in heterogeneous face images is found quite difficult one. This paper attempts to improve the accuracy of an existing face detection algorithm which was basically designed for detecting visible faces, can now be used to detect heterogeneous faces by applying various image enhancement techniques before face detection. The proposed improved algorithm is suitable for heterogeneous face images which include thermal images, infrared images in the crowd. Attempts for the same have been tested on test image dataset. The experimental results are found to be encouraging.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"41 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Political Sentiment Analysis Using Twitter Data 利用推特数据进行政治情绪分析
T. Elghazaly, Amal Mahmoud, H. Hefny
{"title":"Political Sentiment Analysis Using Twitter Data","authors":"T. Elghazaly, Amal Mahmoud, H. Hefny","doi":"10.1145/2896387.2896396","DOIUrl":"https://doi.org/10.1145/2896387.2896396","url":null,"abstract":"There is a remarkable growth in the usage of social networks, such as Facebook and Twitter. Users from different cultures and backgrounds post large volumes of textual comments reflecting their opinion in different aspect of life and make them available to everyone. In particular we study the case of Twitter and focus on presidential elections in Egypt 2012. This paper compares between two techniques for Arabic text classification using WEKA application. These techniques are Support Vector Machine (SVM) and Naïve Bayesian (NB), we investigate the use of TF-IDF to obtain document vector. The main objective of this paper is to measure the accuracy and time to get the result for each classifier and to determine which classifier is more accurate for Arabic text classification. Comparison reported in this paper shows that the Naïve Bayesian method is the highest accuracy and the lowest error rate.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Integration of OFDM Based Communication System with Alpha-Stable Interference using CupCarbon Simulator 利用CupCarbon模拟器集成具有α稳定干扰的OFDM通信系统
U. Noreen, A. Bounceur, L. Clavier
{"title":"Integration of OFDM Based Communication System with Alpha-Stable Interference using CupCarbon Simulator","authors":"U. Noreen, A. Bounceur, L. Clavier","doi":"10.1145/2896387.2900321","DOIUrl":"https://doi.org/10.1145/2896387.2900321","url":null,"abstract":"Deploying sensor networks in an efficient and optimal way has become an important topic these days. A sensor network is basically an infrastructure which consists on number of nodes equipped with a sensor, a controller and a communication module. Interference from the neighboring nodes makes it difficult for a communication system to achieve the required throughput and also makes it difficult to predict the network behavior. CupCarbon is a wireless sensor network (WSN) simulator, recently developed by researchers of Lab STICC, for a better analysis and understanding of WSN. In this paper, we present an optimal way to integrate a PHY layer based on Orthogonal Frequency Division Multiplexing (OFDM) in the simulator and we have also considered the network interference impact in wireless communication. For a flexible and accurate representation, interference is modeled by alpha-stable distribution function. This allows the better estimation of channel conditions to take into account the channel conditions and the density of interferers in a network.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases 基于云的关系型数据库的词和短语接近搜索加密协议
K. Mallaiah, R. Gandhi, Ramachandram Sirandas
{"title":"Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases","authors":"K. Mallaiah, R. Gandhi, Ramachandram Sirandas","doi":"10.1145/2896387.2896427","DOIUrl":"https://doi.org/10.1145/2896387.2896427","url":null,"abstract":"In this paper, we propose a practical and efficient word and phrase proximity searchable encryption protocols for cloud based relational databases. The proposed advanced searchable encryption protocols are provably secure. We formalize the security assurance with cryptographic security definitions and prove the security of our searchable encryption protocols under Shannon's perfect secrecy assumption. We have tested the proposed protocols comprehensively on Amazon's high performance computing server using mysql database and presented the results. The proposed protocols ensure that there is zero overhead of space and communication because cipher text size being equal to plaintext size. For the same reason, the database schema also does not change for existing applications. In this paper, we also present results of comprehensive analysis for Song, Wagner, and Perrig scheme.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129966797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书