2018 IEEE International Conference on Communications (ICC)最新文献

筛选
英文 中文
Doppler Analysis Based Fall Detection Using Array Antenna 基于多普勒分析的阵列天线跌落检测
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422793
Yugo Agata, T. Ohtsuki, Kentaroh Toyoda
{"title":"Doppler Analysis Based Fall Detection Using Array Antenna","authors":"Yugo Agata, T. Ohtsuki, Kentaroh Toyoda","doi":"10.1109/ICC.2018.8422793","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422793","url":null,"abstract":"The number of elderly people who live alone is increasing in many countries. Furthermore, many of their accidents occur at home. Hence, it is an urgent demand for a system monitoring their activities to detect accidents indoor such as falling. In conventional systems of fall detection using array antennas, falling after standing still can be detected with high accuracy by leveraging the features indicating the change of radio wave propagation. However, it is difficult to detect falling after walking correctly. In this paper, to improve fall detection accuracy including falling after walking, we propose an accurate fall detection system by leveraging the features indicating the change of Doppler signals during human activities in detail. Analyzing Doppler signals is useful to detect falling since they are observed when a radio wave reflects by moving objects. We conducted experiments in actual rooms to demonstrate that the proposed method can detect falling after both standing and walking with high accuracy.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Renewable Penetration in Energy Procurement and Demand Response 能源采购和需求响应中可再生能源的最优渗透
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422908
Xuanyu Cao, Junshan Zhang, H. Poor
{"title":"Optimal Renewable Penetration in Energy Procurement and Demand Response","authors":"Xuanyu Cao, Junshan Zhang, H. Poor","doi":"10.1109/ICC.2018.8422908","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422908","url":null,"abstract":"In this paper, joint energy procurement and demand response is studied from the perspective of the operator of a power system. The operator procures energy from both renewable energy sources (RESs) and the spot market. We observe the fact that the RESs may incur considerable infrastructure cost. This cost is taken into account and the optimal planning of renewables is examined by controlling the investment in RES infrastructures. Due to the uncertainty of renewables, the operator can also purchase energy directly from the spot market to compensate for the possible deficit incurred by the realization of the random renewable energy. By setting appropriate prices, the operator sells the collected energy to heterogeneous end users with different demand response characteristics. We model the decision making process of the operator as a two-stage optimization problem. The optimal decisions on the renewable deployment, energy purchase from the spot market and pricing schemes are derived. Several solution structures are observed and a computationally efficient algorithm, requiring only closed-form calculation and simple bisection search, is proposed to compute the optimal decisions. Finally, numerical experiments are conducted to verify the optimality of the proposed algorithm and the solution structures observed theoretically.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dirichlet-Based Initial Trust Establishment for Personal Space IoT Systems 基于dirichlet的个人空间物联网系统初始信任建立
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422727
Tham Nguyen, D. Hoang, A. Seneviratne
{"title":"Dirichlet-Based Initial Trust Establishment for Personal Space IoT Systems","authors":"Tham Nguyen, D. Hoang, A. Seneviratne","doi":"10.1109/ICC.2018.8422727","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422727","url":null,"abstract":"Trust has played a crucial role in enhancing the security of IoT systems over their lifecycles from creation to retirement. Particularly, in a personal space IoT system where devices join and leave the system dynamically, it is important to evaluate the device's behavior in the form of trust on its admission to the system to reduce the risk and uncertainty of the overall system. Currently, proposed trust evaluation models primarily rely on the historical knowledge or trusted recommendations. However, in many situations, such information is not available at the first encounter between the system and the device. The challenge tackled by this paper is how to establish whether a device can be trusted to a level that merits further evaluation for admission into an IoT system when it encounters the system for the first time. We propose a Dirichlet-based trust assessment model to establish the initial trust that the system places on a device in a mobile and dynamic environment called personal space IoT. The proposed scheme can also be used to affirm the trust of a device during its operation or when it is being re-admitted to the system after an interruption. We describe and evaluate our proposed model theoretically and by simulation.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collision Analysis of mIot Network with Power Ramping Scheme 基于功率斜坡方案的mIot网络碰撞分析
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422867
Nan Jiang, Yansha Deng, A. Nallanathan, Xin Kang, Tony Q. S. Quek
{"title":"Collision Analysis of mIot Network with Power Ramping Scheme","authors":"Nan Jiang, Yansha Deng, A. Nallanathan, Xin Kang, Tony Q. S. Quek","doi":"10.1109/ICC.2018.8422867","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422867","url":null,"abstract":"The Random Access (RA) procedure is used to request channel resources for the uplink data transmission in the cellular-based massive Internet of Things (mIoT). To ease the RA failure and the network congestion, power ramping (PR) technique is used to step up the preamble transmit power after each unsuccessful RA attempt. In this paper, we develop a traffic aware spatio-temporal model to analyze the PR scheme in the mIoT network, where the Signal-to-Interference-and-Noise Ratio (SINR) outage and collision events jointly determine the traffic evolution and the RA success probability. Compared with existing literature only modelled collision from single cell perspective, we model both the SINR outage and the collision from the network perspective. Based on this analytical model, we derive the exact expression for the RA success probability to show the effectiveness of the PR scheme. Our results show that the geometry PR scheme with smooth increased transmission power is effective in heavy traffic scenario in terms of increasing the RA success probability.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Load-Aware Sub-Band and Wavelength Allocation in Radio-over-Fiber Enabled Dense Wireless Pico-Cell Networks 基于光纤的无线微蜂窝密集网络中负载感知子带和波长分配
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422379
Bart Post, S. Borst, A. Koonen
{"title":"Load-Aware Sub-Band and Wavelength Allocation in Radio-over-Fiber Enabled Dense Wireless Pico-Cell Networks","authors":"Bart Post, S. Borst, A. Koonen","doi":"10.1109/ICC.2018.8422379","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422379","url":null,"abstract":"The development of 5G wireless networking is flourishing, introducing major paradigm shifts and key new technologies such as Radio- over-Fiber (RoF). A fundamental concept for achieving the 5G design objectives is dynamically allocating frequencies, sub-bands and wavelengths. While these allocation problems have been extensively studied in wireless and optical domains in isolation, the combination has received little attention so far. However, with the advances in software-defined radio access networking and RoF technologies, there is increasing need and scope for joint optimization across the two domains, in order to harness the full potential of these networks. Motivated by these observations, we introduce a model for jointly optimal sub-band and wavelength allocation in pico-cell networks where virtual access points (APs) transmit via remote radio heads (RRHs) connected through RoF technology. We specifically account for the optical network topology, which introduces a distinct set of constraints in both the optical and wireless domain. Since the resulting load balancing problem is NP-hard, we introduce a heuristic for obtaining a stabilizing allocation which provides all RRHs with sufficient spectrum capacity to deal with their load. Numerical experiments demonstrate that the heuristic provides near-optimal solutions.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Doppler Sensor-Based Blink Duration Estimation by Spectrogram Analysis 基于谱图分析的多普勒传感器瞬变持续时间估计
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422999
Kohei Yamamoto, Kentaroh Toyoda, T. Ohtsuki
{"title":"Doppler Sensor-Based Blink Duration Estimation by Spectrogram Analysis","authors":"Kohei Yamamoto, Kentaroh Toyoda, T. Ohtsuki","doi":"10.1109/ICC.2018.8422999","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422999","url":null,"abstract":"It is known that the blink duration is highly related to drowsiness, where the blink duration is the entire duration of one blink. Hence, it is important to measure the blink duration without any special wearable devices in various application, e.g., driver's monitoring. Although a Doppler sensor could be a key device to realize it, no such blink duration estimation method has been realized so far, since estimating the blink duration is difficult because of the low SNR (Signal to Noise Ratio) of the signal reflected from eyelids. In this paper, we propose a Doppler sensor-based method that estimates the duration, tblink, that is proportional to the actual blink duration. In the proposed method, a spectrogram is firstly calculated from a received signal, and then the timings when eyelids close and open are extracted from that. More specifically, tblink is calculated based on the center-of-gravity of the energy on a spectrogram. We conducted the experiments on five subjects to show the estimation accuracy of our proposed method. We confirmed that our method achieved the average correlation coefficient R of 0.95, furthermore, the average RMSE (Root Mean Square Error) of 46 ms.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121160551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV-Assisted Data Dissemination Scheduling in VANETs 无人机辅助VANETs中的数据分发调度
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422219
Fanhui Zeng, Rongqing Zhang, Xiang Cheng, Liuqing Yang
{"title":"UAV-Assisted Data Dissemination Scheduling in VANETs","authors":"Fanhui Zeng, Rongqing Zhang, Xiang Cheng, Liuqing Yang","doi":"10.1109/ICC.2018.8422219","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422219","url":null,"abstract":"In high-speed vehicular ad-hoc networks (VANETs), cooperative data dissemination is an effective solution to amend the limited connection time of communication links between roadside units (RSUs) and vehicles. Existing data dissemination strategies utilize efficient cooperation of vehicle-to-vehicle (V2V) and vehicle- to-infrastructure (V2I) communication links to maintain the data transmissions and thus improve the system performance. Recently, unmanned aerial vehicle (UAV) is widely utilized in communication systems, which has a high probability of line-of-sight (LoS) links with better channel quality and can be dynamically deployed. In this paper, we propose a novel UAV-assisted data dissemination scheduling strategy in VANETs. The recursive least squares (RLS) algorithm is utilized to predict the vehicle mobility with low complexity and high prediction accuracy. To enhance the transmission utilities of the UAVs, we further propose a maximum vehicle coverage (MVC) algorithm to schedule the two- dimensional (2D) movements of the UAVs during the process of data dissemination. Simulations in both urban and highway scenarios verify that the proposed UAV-assisted data dissemination strategy achieves a significant reduction of data dissemination delay and an improvement of system throughput.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
QoS-Aware Heuristic Scheduling with Delay-Constraint for WBSNs 基于时延约束的qos感知启发式调度
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422180
Amit Samanta, Yong Li, Sheng Chen
{"title":"QoS-Aware Heuristic Scheduling with Delay-Constraint for WBSNs","authors":"Amit Samanta, Yong Li, Sheng Chen","doi":"10.1109/ICC.2018.8422180","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422180","url":null,"abstract":"Wireless body sensor networks (WBSNs), which efficiently and intelligently sense the physiological signals of the medical patients to support various medial applications, have allured tremendous attention from various research communities. For energy and resource constrained WBSNs, the important issues include: 1)~dynamic channel characteristics due to mobility and postural dynamics; 2) high energy efficiency owing to limited battery power; 3) high quality-of- service (QoS) requirement due to critical physiological data. To address the above issues, a cost-effective heuristic packet scheduling scheme is designed to provide the high network throughput and fair QoS to WBSNs. Unlike most of the existing works, we also consider the optimal delay- constraint in order to achieve the optimized packet transmission delay and to manage the heavy traffic load optimally. Specifically, we consider the critical factors of WBSNs to prioritize the data packets among access points, e.g., medical emergent patients have the higher priority to send their data packets than the normal patients. We formulate the proposed scheme mathematically. Simulation results are presented to demonstrate the effectiveness of the proposed heuristic packet scheduling scheme over other existing state-of- the-art solutions, in terms of packet transmission delay, cost and network throughput.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks 移动Cloudlet网络的协同任务卸载机制
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422114
Xiaochen Fan, Xiangjian He, Deepak Puthal, Shiping Chen, Chaocan Xiang, P. Nanda, Xunpeng Rao
{"title":"CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks","authors":"Xiaochen Fan, Xiangjian He, Deepak Puthal, Shiping Chen, Chaocan Xiang, P. Nanda, Xunpeng Rao","doi":"10.1109/ICC.2018.8422114","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422114","url":null,"abstract":"Mobile cloud computing has emerged as a pervasive paradigm to execute computing tasks for capacity- limited mobile devices. More specifically, at the network edge, the resource-rich and trusted cloudlet system is acting as a 'data center in a box' to support compute-intensive mobile applications. The mobile cloudlets can provide in-proximity services by executing the workloads for nearby devices. Nevertheless, load balancing in mobile cloudlet network is of great importance, as it has a huge impact on task response time. Existing methods for cloudlet load balancing basically rely on the strategic placement or user cooperation. However, the above solutions require the global task load information from the whole network, which is costly in both communication and computation. To achieve more efficient and low-cost load balancing, we propose 'CTOM', a Collaborative Task Offloading Mechanism for mobile cloudlet networks. Our solution is based on the balls-and-bins theory and can balance the task load only requiring limited information. Extensive simulations and evaluation based on mobility trace demonstrate that, our CTOM outperforms the conventional random and proportional allocation schemes by reducing the task gaps among mobile cloudlets by 65% and 55% respectively. Meanwhile, CTOM's performance is close to that of the greedy algorithm but with much lower computing complexity.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique 波洛先生:利用重新识别算法和非平凡特征选择技术检测僵尸网络
2018 IEEE International Conference on Communications (ICC) Pub Date : 2018-07-27 DOI: 10.1109/ICC.2018.8422081
Wei-Min Lee, Amir Rezapour, Wen-Guey Tzeng
{"title":"Monsieur Poirot: Detecting Botnets Using Re-Identification Algorithm and Nontrivial Feature Selection Technique","authors":"Wei-Min Lee, Amir Rezapour, Wen-Guey Tzeng","doi":"10.1109/ICC.2018.8422081","DOIUrl":"https://doi.org/10.1109/ICC.2018.8422081","url":null,"abstract":"Modern botnets are progressively migrating to P2P network to resist against take-down attempts. In addition, new botnets use randomization in their behavior to evade detection. In this paper, we propose a new method for detecting stealthy P2P bots. We formulate the problem as a re-identification problem. This opens the possibility of powerful instantiations of detection algorithms to address the botnet detection problem. We also use a nontrivial feature selection technique to discover the best feature pairs for conducting comparison between two flows. We use real-world botnet data to evaluate the performance of Monsieur Poirot and compare it with existing flow-based algorithms. Monsieur Poirot is robust towards injection of noise in the communication patterns. The experimental results show that Monsieur Poirot is able to identify P2P bots with an average TPR of 98.65% and an average FPR of 0.21%.","PeriodicalId":387855,"journal":{"name":"2018 IEEE International Conference on Communications (ICC)","volume":"255 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信