G. Albertengo, F. Debele, W. Hassan, Dario Stramandino
{"title":"On the Performance of Web Services and Google Cloud Messaging","authors":"G. Albertengo, F. Debele, W. Hassan, Dario Stramandino","doi":"10.1109/CIT.2017.66","DOIUrl":"https://doi.org/10.1109/CIT.2017.66","url":null,"abstract":"Smartphones and other connected devices rely on data services, such as web services (WS) and Google Cloud Messaging (GCM), to share the information they collect or use. Traditionally, these services were classified according to their efficiency or their delivery time, but, when dealing with battery operated devices, another important parameter is the power consumption. In this paper, we present the results from a test on GCM and two types of WS, namely SOAP-based and RESTful WS. In these tests, we experimentally collected time, efficiency, and power consumption figures for all services. The final outcome is that RESTful WS outperforms all other communication techniques in terms of one-way delay, round trip time, data consumption, packet overhead and battery duration.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, S. Ye
{"title":"Practical Performance Models for High-Order CFD Simulation","authors":"Hao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, S. Ye","doi":"10.1109/CIT.2017.22","DOIUrl":"https://doi.org/10.1109/CIT.2017.22","url":null,"abstract":"This paper discusses the performance model for practical computational fluid dynamics (CFD) simulation. Based on the analysis of the conventional qualitative model and empirical knowledge in the simulation, a set of practical models for the linear solution in high-order finite element method (FEM) simulation are established: a linear function model for the storage consumption, and a power function model for the solution time. The unknown parameters in the models are estimated by linear fitting and nonlinear fitting, respectively. Tests on a typical high-order FEM platform show that the proposed models are highly accurate and practical. In addition, it has been tested that nonlinear fitting is better than linear fitting in our case.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Presence Detection for Occupancy Control in Multisensory Environments","authors":"C. Papatsimpa, J. Linnartz","doi":"10.1109/CIT.2017.31","DOIUrl":"https://doi.org/10.1109/CIT.2017.31","url":null,"abstract":"Presence detection is used in occupancy control to dynamically adjust energy-related appliances in smart building applications. Yet, practical applications typically suffer from high sensor unreliability. We propose a computationally efficient approach, based on Hidden Markov Models, to fuse sensor observations from multiple sensors to better estimate user state (presence/absence). Our model considers a realistic scenario, where sensor communication may be limited or unreliable, thus some sensor observations data may be missing for some intervals. Compared to state of art classifiers (Logistic Regression, Naïve Bayes, SVM), our approach achieves improved results while maintaining low computational and memory requirements or even relaxing these. Judging from our experiments, the algorithm appears to work well also in real-world test set-up where user presence and sensors error may not exactly follow our idealized model assumptions.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach to Utility-Based Privacy Preserving in Data Publishing","authors":"Yilmaz Vural, M. Aydos","doi":"10.1109/CIT.2017.27","DOIUrl":"https://doi.org/10.1109/CIT.2017.27","url":null,"abstract":"A fundamental problem in privacy-preserving data publishing is how to make the right trade-off between privacy risks and data utility. Anonymization techniques are used both to reduce privacy risks and to create anonymized dataset. The anonymized dataset can be grouped together into equivalence classes. The Equivalence Classes are classified into two groups based on the utility provided to the data recipients: Utility Equivalence Class (UEC) and Outlier Equivalence Class (OEC). The OEC contains records that have been fully suppressed by anonymization techniques resulting in no data utility. In this study, a new approach is proposed by reducing the number of outlier records in order to increase the data utility. In the proposed model, k-anonymity and l-diversity privacy models are used together to reduce the privacy risks. The Average Equivalence Class Size is used in measuring the data utility. According to the experimental results, the data utility is increased with the use of our proposed model while keeping the delicate balance between privacy risks and data usefulness.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134535085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tenager Mekonnen, E. Harjula, A. Heikkinen, T. Koskela, M. Ylianttila
{"title":"Energy Efficient Event Driven Video Streaming Surveillance Using SleepyCAM","authors":"Tenager Mekonnen, E. Harjula, A. Heikkinen, T. Koskela, M. Ylianttila","doi":"10.1109/CIT.2017.10","DOIUrl":"https://doi.org/10.1109/CIT.2017.10","url":null,"abstract":"Wireless Multimedia Sensor Networks (WMSN) are one of the emerging paradigms of the Internet of Things (IoT) that are used to retrieve content including scalar data, video and audio streams and still images from the physical environment. In contrast to scalar sensor (such as temperature and humidity sensor) nodes, multimedia sensor nodes capture high volumes of data and perform far more complex tasks that can be highly power consuming. In this paper, we present the design of energy efficient high resolution camera sensor node, that is capable of capturing a full HD video at 30fps, using off-the-shelf hardware for an event driven video streaming surveillance application. In order to achieve long battery life, we use an energy efficient motion detection and power management mechanism, called sleepyCAM, which uses a lowpower scalar sensor node to detect motion and wake-up a high resolution camera node when needed. We used Libellium Waspmote platform and raspberry pi (RPi) to implement the functionality of the low-power sensor node and the HD camera node, respectively. We validate our work using a baseline setup on a standby RPi that uses scalar sensor for motion detection. The results demonstrate that with the used hardware platform, the power consumption can be reduced by more than 99%.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best Random Codes Construction for Syndrome Coding Scheme","authors":"K. Zhang, M. Tomlinson, M. Z. Ahmed","doi":"10.1109/CIT.2017.15","DOIUrl":"https://doi.org/10.1109/CIT.2017.15","url":null,"abstract":"Syndrome coding is a very classical coding scheme in Physical layer security. It is necessary to design a efficient and secure code for syndrome coding to guarantee the security of the instant communications. In this paper, we apply two ways to construct random codes. By analysing on the effect of the parity check matrix on the average equivocation, we propose a method to generate the best random codes with low computation complexity and high security level. The simulation results show that the security performance of the best random codes (BRC) are close to that of the best equivocation codes (BEC) in syndrome coding. Specially, compared to BEC, BRC has a much lower computation complexity.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115454763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Analogy Based Effort Estimation: An Empirical Comparative Study","authors":"A. Idri, Ibtissam Abnane","doi":"10.1109/CIT.2017.29","DOIUrl":"https://doi.org/10.1109/CIT.2017.29","url":null,"abstract":"Software Development Effort Estimation (SDEE) plays a primary role in software project management. Among several techniques suggested for estimating software development effort, analogy-based software effort estimation approaches stand out as promising techniques.In this paper, the performance of Fuzzy Analogy is compared with that of six other SDEE techniques (Linear Regression, Support Vector Regression, Multi-Layer Perceptron, M5P and Classical Analogy). The evaluation of the SDEE techniques was performed over seven datasets with two evaluation techniques (All-in and Jackknife). The first step of the evaluation aimed to ensure that the SDEE techniques outperformed random guessing by using the Standardized Accuracy (SA). Then, we used a set of reliable performance measures (Pred(0.25), MAE, MBRE, MIBRE and LSD) and Borda count to rank them and identify which techniques are the most accurate.The results suggest that when using All-in evaluation, Fuzzy Analogy statistically outperformed the other SDEE techniques regardless of the dataset used. However, when using Jackknife evaluation, the results obtained depended on the dataset and the SDEE technique used. The results suggest that Fuzzy Analogy is a promising technique for software development effort estimation.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129091256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Visualization Tool for High Order Discontinuous Galerkin Method with Quadratic Elements","authors":"Liyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang, Yongquan Feng","doi":"10.1109/CIT.2017.50","DOIUrl":"https://doi.org/10.1109/CIT.2017.50","url":null,"abstract":"High order discretization method is one of the most popular research topics on Computational Fluid Dynamics (CFD). However, the development of visualization tools suited for high order methods obtains not as much attention. Most of the software used to visualize numerical solutions do not support high order data format. To visualize the high order solution, the most common method is to tessellate the solution with linear subdivision and then generate the values by resampling. This paper describes an efficient approach for Discontinuous Galerkin Method (DGM) based on OpenFOAM and VTK. We design a method to estimate the visualization error and introduce gaussian quadrature method to calculate it. Under the limit of visualization error set by user, the high order DGM solution is tessellated into a set of quadratic elements and converted into VTK data. By implementing the interpolation interface, this tools can support other discretization methods. The tool is tested with a series of cases. Accurately visualization of geometric information and field attributes are obtained. Comparing to linear methods, less computation and space cost are needed to reach the same visualization error limit.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Coding-Unit Mode Decision for HEVC Transrating","authors":"Shih-Hsuan Yang, Chong-Cheng Zhong","doi":"10.1109/CIT.2017.35","DOIUrl":"https://doi.org/10.1109/CIT.2017.35","url":null,"abstract":"Transrating is a bitrate transcoding technique that facilitates video applications in heterogeneous environments. This paper presents a fast coding-unit (CU) mode decision algorithm for transrating a once-encoded HEVC bitstreams to lower bitrate versions of diverse quality levels. The proposed method comprises three major parts. First, an early SKIP decision is based on the modes and motion vectors of the correlated CUs. Second, the CU depth search is restricted to a range estimated by a weighted average of the depth levels of correlated CUs and the weights are adapted to the quantization parameter. Third, a CU with a higher rate-distortion (RD) cost (judging from the RD costs of correlated CUs) will be directly divided into smaller CUs without evaluating RD costs of the remaining partitioning modes at the current depth level. Experimental results substantiate the superiority of the proposed method, which averagely reduces the encoding time by 55.01% with only 0.09 dB BD-PSNR degradation and 2.26% BD-rate increase.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123841426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion","authors":"Yuanyue Guo, Jie Deng, Falin Liu, Dongjin Wang","doi":"10.1109/CIT.2017.52","DOIUrl":"https://doi.org/10.1109/CIT.2017.52","url":null,"abstract":"In order to reduce imaging time of complex targets in a large scene, an efficient strip-mode microwave correlated imaging method with data fusion is proposed. Due to its rangegate feature, while random radiation radar array transmits narrow-pulse random signals synchronously, the whole imaging area can be divided into multiple imaging strips in the range direction. By analyzing the temporal-spatial stochastic radiation fields in each imaging strip and its scattered echoes, a new correlated imaging model in strip mode is established, which reduces the matrix scale of its imaging equation greatly. Meanwhile the sampling process within its range-gates of scattered echoes is discussed in detail, and by the multi-strip image mosaicking and its imaging data fusion, the whole correlated imaging in a large scene can be achieved. Numerical simulations validate its effectiveness of the proposed method and demonstrate its potential advantages to shorten the imaging time dramatically and improve the imaging performance.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}