2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)最新文献

筛选
英文 中文
Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing 基于定价定时Petri网的雾计算资源分配策略
Lina Ni, Jinquan Zhang, Jiguo Yu
{"title":"Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing","authors":"Lina Ni, Jinquan Zhang, Jiguo Yu","doi":"10.1109/IIKI.2016.87","DOIUrl":"https://doi.org/10.1109/IIKI.2016.87","url":null,"abstract":"This paper proposes a resource allocation strategy for fog computing based on Priced Timed Petri nets (PTPN), by which the user can choose the satisfied resources autonomously from a group of pre-allocated resources according to the price cost and time cost of task. We construct the PTPN models of tasks in fog computing in accordance with the features of fog resources. The algorithm of predicting task completion time and price is presented. In particular, we give the fog resources dynamic allocation algorithm. Simulation results demonstrate that our proposed algorithms can achieve the higher efficiency.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization 一种基于WiFi指纹定位的轻量级位置隐私保护方案
Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun
{"title":"A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization","authors":"Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun","doi":"10.1109/IIKI.2016.41","DOIUrl":"https://doi.org/10.1109/IIKI.2016.41","url":null,"abstract":"Although regarded as a promising approach for indoor localization, WiFi fingerprint-based localization can lead to potential location privacy violations. In this work, we study the location privacy issues of WiFi fingerprint-based localization and propose a lightweight location privacy-preserving scheme that does not rely on any cryptographic primitive as the existing work does. In our scheme, a to-be-localized user sends the measured signal strength values and other k-1 dummy signal strength values to the service provider who accordingly replies with k locations. The service provider cannot distinguish the user's location from the other k-1 dummy locations. Compared with the existing work, the computational and communication overhead of the proposed scheme are much lower.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"766 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133348591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT Applications on Secure Smart Shopping 物联网在安全智能购物中的应用
Ruinian Li, Tianyi Song, Nicholas Capurso, Jiguo Yu, Xiuzhen Cheng
{"title":"IoT Applications on Secure Smart Shopping","authors":"Ruinian Li, Tianyi Song, Nicholas Capurso, Jiguo Yu, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.25","DOIUrl":"https://doi.org/10.1109/IIKI.2016.25","url":null,"abstract":"We propose to design a smart shopping system based on RFID. The smart carts used in such a system can navigate the customers to the desired products, and they can calculate the billing information as the customer shops. Items that are put in a smart shopping cart can be automatically recognized and billed. In this way, customers can avoid long queuing time at the check-out points. The grocery management also becomes much easier: The sensors on the grocery shelf can keep updating the number of items to the central server so that the server is always aware of the items' status in the store. Furthermore, the inventory management also becomes much easier, because all the items can be automatically read by a RFID reader instead of manually scanned by a laborer. In this paper, we propose a smart shopping cart system with consideration of how this system can work functionally and securely.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Risk Concentration Based on the Tail Distortion Risk Measure under Generalized FGM Copula 广义FGM联结下基于尾部扭曲风险度量的风险集中
Wenhua Lv, Liheng Sang, Guangjun Shen
{"title":"Risk Concentration Based on the Tail Distortion Risk Measure under Generalized FGM Copula","authors":"Wenhua Lv, Liheng Sang, Guangjun Shen","doi":"10.1109/IIKI.2016.98","DOIUrl":"https://doi.org/10.1109/IIKI.2016.98","url":null,"abstract":"Risk concentration is used as a measurement of diversification benefits in the context of risk concentration. The tail distortion risk measure, which was introduced in Zhu and Li (2012), has attracted increasing interest recently. In this paper, We investigate the second-order asymptotics of the risk concentration based on the tail distortion risk measure, when the dependence structure is driven by the generalized copulas.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Location Aware Semantic Access Control Approach for Mobile Computing 面向移动计算的位置感知语义访问控制方法
Luokai Hu, Zhenyu Huang, Fang Deng, Ke Yan, Jin Liu
{"title":"Towards a Location Aware Semantic Access Control Approach for Mobile Computing","authors":"Luokai Hu, Zhenyu Huang, Fang Deng, Ke Yan, Jin Liu","doi":"10.1109/IIKI.2016.117","DOIUrl":"https://doi.org/10.1109/IIKI.2016.117","url":null,"abstract":"With the development of mobile computing, a more intelligent location aware access control approach which can not only protect the privacy of location information but also reduce the frequency of access control decision is needed. This paper brought semantic access control approach into the Location Aware Access Control (LAAC). First, we used semantic area to substitute physical location for the authorization decision, reducing the frequency of authorization decisions. The exact physical location of the subject would not be exposed. Secondly, for the different representation of semantic area of different security domains, we used ontology cluster to represent semantic spatial information. We established security domain ontology (SDO) and bridge ontology (BO) between the security domains. And then we used such ontology cluster as knowledge base and added annotation to the physical areas of XACML language. Finally, the model and framework of location aware semantics based access control for mobile computing is proposed. The proposed location aware semantic access control(LASAC) approach provides a better solution for location aware access control in mobile network environment.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Bistatic Angle's Impact on Imaging Performance in Bistatic RCS Measurement 双基地RCS测量中双基地角度对成像性能影响的研究
Ming Lyu, Chao Gao
{"title":"Study of Bistatic Angle's Impact on Imaging Performance in Bistatic RCS Measurement","authors":"Ming Lyu, Chao Gao","doi":"10.1109/IIKI.2016.105","DOIUrl":"https://doi.org/10.1109/IIKI.2016.105","url":null,"abstract":"This paper introduces the imaging formula in bistatic radar cross section (RCS) measurement at first. Then the bistatic angle’s impact on imaging performance and the features of two typical bistatic RCS measurement modes are explored based on the shape of the corresponding Fourier transform spectrum domain (k-space). Finally simulation data of ideal points is used to verify our conclusions.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125223463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Biomechanical Model for Detection of Vertigo Disease 眩晕病检测的生物力学模型
N. Filipovic, Z. Milosevic, I. Šaveljić, D. Nikolić, N. Zdravković, A. Kos
{"title":"Biomechanical Model for Detection of Vertigo Disease","authors":"N. Filipovic, Z. Milosevic, I. Šaveljić, D. Nikolić, N. Zdravković, A. Kos","doi":"10.1109/IIKI.2016.59","DOIUrl":"https://doi.org/10.1109/IIKI.2016.59","url":null,"abstract":"Benign Paroxysmal Positional Vertigo (BPPV) is most common vestibular disorder influencing the quality of life to considerable percentage of population after the age of forty. In this study the three-dimensional biomechanical model of the semi-circular canal (SCC) is described with full 3D fluid-structure interaction of particles, wall, cupula deformation and endolymph fluid flow. Oculus Rift device was used for experimental results of head motion and eye tracking and correlation with biomechanical model. A full Navier-Stokes equations and continuity equations are used for fluid domain with Arbitrary-Lagrangian Eulerian (ALE) formulation for mesh motion. Fluid-structure interaction for fluid coupling with cupula deformation is used. Particle tracking algorithm has been used for particle motion. Different size and number of particles with their full interaction between themselves, wall and cupula deformation are used. Velocity distribution, shear stress and force from endolymph side are presented for parametric one SCC and patient specific three SCC. All the models are used for correlation with the same experimental protocols with head moving and nystagmus eye tracking. A good correlation was found with numerical simulation of membrane deflection and nystagmus response detected with tracking technology. It can be used for virtual games with detection of vestibular disorders to the users.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122358655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Community-Based Routing with Ferry in Opportunistic Networks 机会网络中基于社区的轮渡改进路由
Weimin Chen, Zhigang Chen, Wenjia Li, Feng Zeng
{"title":"An Enhanced Community-Based Routing with Ferry in Opportunistic Networks","authors":"Weimin Chen, Zhigang Chen, Wenjia Li, Feng Zeng","doi":"10.1109/IIKI.2016.8","DOIUrl":"https://doi.org/10.1109/IIKI.2016.8","url":null,"abstract":"Routing is a very challenging task in opportunistic networks due to the lack of continuous end-to-end path between nodes. To improve the routing performance, a type of community-based routing protocol is presented. This routing generally turns to the social attributes of nodes to construct the community, and utilizes community characteristics (nodes within the same community come in contact with each other more frequently) to select the relay nodes and make the forwarding decisions. Unfortunately, this routing has a problem of transmission bottleneck between communities. To address this issue, we propose an enhanced community-based routing assisted by ferry in opportunistic networks. This routing resorts to some super-nodes as ferry nodes to ferry messages between communities in order to overcome the network division. The simulation results demonstrate the efficiency and effectiveness of the proposed scheme by comparing it with existing routing schemes.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Study on the Influence of Latin Dance and Tai Chi Exercise on Balance and Knee Joint Proprioception 拉丁舞与太极运动对平衡及膝关节本体感觉影响的研究
Huihui Wang, Zhongqiu Ji, Guiping Jiang, Xibian Jiao, Weitong Liu
{"title":"A Study on the Influence of Latin Dance and Tai Chi Exercise on Balance and Knee Joint Proprioception","authors":"Huihui Wang, Zhongqiu Ji, Guiping Jiang, Xibian Jiao, Weitong Liu","doi":"10.1109/IIKI.2016.50","DOIUrl":"https://doi.org/10.1109/IIKI.2016.50","url":null,"abstract":"Objective: To study the influence of Latin dance and Tai Chi on knee joint proprioception and balance. Method: All experiments were performed in the Beijing Normal University School of Physical Education and Sport Biomechanics Laboratory. An isokinetic test system (Biodex system 4, BS4) and a balance testing system (Biodex Balance System, BBS)from the United States Biodex medical system were used to test related indexes. Results: In the LOS test, the overall score of Latin group is much better than sedentary group. In the ASL test, Latin group have a better balance ability in anterior and posterior direction and overall score than sedentary group(p","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Computer Simulation System Used for Analyzing Balance Control Strategy during an Unexpected Slip 一种用于分析意外滑移时平衡控制策略的计算机仿真系统
Zhongqiu Ji, Huihui Wang, Guiping Jiang, Xulong Li, Lin Li
{"title":"A Computer Simulation System Used for Analyzing Balance Control Strategy during an Unexpected Slip","authors":"Zhongqiu Ji, Huihui Wang, Guiping Jiang, Xulong Li, Lin Li","doi":"10.1109/IIKI.2016.40","DOIUrl":"https://doi.org/10.1109/IIKI.2016.40","url":null,"abstract":"The test system was to study balance control strategy during an unexpected slip and the adaptive change to balance perturbation. This study performed slip tests on 10 healthy male students (age: 20.0±1.6 years, height: 1.72±0.05 m, mass: 64.67±9.81 kg) using the test system, Kinematics and kinetic date analyses using the Ariel video analysis system and Kistler force platform were performed. When the subject encountering an unexpected backward slip during sit-to-stand, people will take a backward recovery step and increase the maximum rising velocity of the hip joint by strong support against a backward slip. After balance perturbation training, similar to balance perturbation intensity, the amplitude of the balance adjustment decreased significantly. People can maintain their balance by swinging their trunk and arm.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信