2014 IEEE Computers, Communications and IT Applications Conference最新文献

筛选
英文 中文
Improving the data processing in WSNs through combination of a distributed approach and statistical techniques 采用分布式方法和统计技术相结合的方法改进无线传感器网络的数据处理
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017193
O. Diallo, J. Rodrigues, M. Sene, Guangjie Han, J. Niu
{"title":"Improving the data processing in WSNs through combination of a distributed approach and statistical techniques","authors":"O. Diallo, J. Rodrigues, M. Sene, Guangjie Han, J. Niu","doi":"10.1109/ComComAp.2014.7017193","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017193","url":null,"abstract":"Wireless sensor networks (WSNs) have received a lot of attentions from both academic and industrial communities due to the wide range of applications they can provide. In this sort of network, maximizing the lifetime of sensor nodes as well as providing valid data in real-time are essential issues due to the real-time requirement of data and the resource limitation of sensor nodes. The distributed database approach has proven to be an effective approach to manage the large amount of sensed data in an energy-efficient manner and to reduce the response time of data processing. This work proposes a new query processing algorithm, which relies on a combination of a distributed database architecture with statistical techniques for improving the data processing in WSNs. The proposed query processing algorithm and the architecture were evaluated based on the temperature measures of an environment as a case study.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hot topics detected from micro-bloggings based on word co-occurrence model 基于词共现模型的微博热点话题检测
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017187
Long Cao, Xin Chen, Yuqing Zhang, Donghui Li
{"title":"Hot topics detected from micro-bloggings based on word co-occurrence model","authors":"Long Cao, Xin Chen, Yuqing Zhang, Donghui Li","doi":"10.1109/ComComAp.2014.7017187","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017187","url":null,"abstract":"Micro-blogging services are used by millions of people around the world to get information and express their opinions. Detecting hot topics from Chinese micro-bloggings has vast importance to discovering rumors and guiding public opinion. In order to solve the problem of massive pieces of information on micro-bloggings platform and the feature of micro-bloggins content such as short text, in this paper a model is put forward to detect hot topics from Chinese micro-bloggings based on word co-occurrence model. The experimental results show the model can efficiently detect hot topics from Chinese micro-bloggings.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129759975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety requirements modeling based on RUCM 基于RUCM的安全需求建模
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017199
Xue Wu, Chao Liu, Qingxin Xia
{"title":"Safety requirements modeling based on RUCM","authors":"Xue Wu, Chao Liu, Qingxin Xia","doi":"10.1109/ComComAp.2014.7017199","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017199","url":null,"abstract":"Safety requirements have commanded increasing attention as software is playing a more and more important role in today's safety critical systems. As many experts, scholars have found that the main reason for safety critical systems' accident is bad requirements which means inaccurate, incomplete or inconsistent requirements may lead to misunderstanding of the system and may cause a fault in software design and realization, and brought disaster to people or environment. The main reason of bad requirements is poor communication between safety engineers and requirements analysis engineers. Safety requirements essentially are requirements to protect the software system go into a danger state which will cause lost of life or asset or environment damage. Safety requirements deal with errors, faults that the system may come across. So In this paper, we combine fault protection concepts with safety requirements, and propose a model-based safety requirements modeling approach named Safety RUCM to describe safety requirements in order to reduce inaccurate, incomplete or inconsistent safety requirements and at the same time to enhance mutual understanding on safety requirements between safety.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121157529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints 基于速度可调方案的资源约束下大型多媒体传感系统的选择性加密控制模型
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017179
Chen Xiao, Tiemeng Li, Nan Yang, Lifeng Wang, Shilong Ma
{"title":"A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints","authors":"Chen Xiao, Tiemeng Li, Nan Yang, Lifeng Wang, Shilong Ma","doi":"10.1109/ComComAp.2014.7017179","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017179","url":null,"abstract":"Video and audio streams in large-scale multimedia sensing system are high-volume, while computation and power resources are very scarce, which restricts the usage of complex data security process on multimedia data. Therefore, the confidentiality of video data under resources constraints is studied in this paper. Firstly, the trend of resources constraints is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed adjustable video encryption scheme is given. Thirdly, a series of selective encryption control models and their solution algorithms are proposed. Experimental analyses show the performances of the presented schemes are effective enough to support real-time multimedia sensing applications.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129164836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Liveness detection of dorsal hand vein based on AutoRegressive model 基于自回归模型的手背静脉活动性检测
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017197
Yiding Wang, Qi Qi, Kefeng Li
{"title":"Liveness detection of dorsal hand vein based on AutoRegressive model","authors":"Yiding Wang, Qi Qi, Kefeng Li","doi":"10.1109/ComComAp.2014.7017197","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017197","url":null,"abstract":"A novel method for liveness detection of dorsal hand vein (DHV) based on AR model is proposed. Firstly, existing real DHV images are used to constitute a projection space based on modified principal component analysis (PCA). Unlike the previous works using the method of PCA, zero eigenvalues with their eigenvectors are used to constitute the projection space in this work. Secondly, test samples, including both real and fake DHV images, are projected to the projection space to produce one-dimensional vectors to extract their noise information. Then, autoregressive (AR) model is established for each test sample by estimating the power spectrum of the vector to detect the liveness of DHV. The proposed method is tested on a database of 510 real DHV images and 300 fake DHV images of 3 different types. The experimental results show that the proposed method performs well with an average recognition rate of 99%.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal power allocation for smart-grid powered point-to-point cognitive radio system 智能电网供电点对点认知无线电系统的最优功率分配
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017217
Bassem Khalfi, Mahdi Ben Ghorbel, B. Hamdaoui, M. Guizani
{"title":"Optimal power allocation for smart-grid powered point-to-point cognitive radio system","authors":"Bassem Khalfi, Mahdi Ben Ghorbel, B. Hamdaoui, M. Guizani","doi":"10.1109/ComComAp.2014.7017217","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017217","url":null,"abstract":"This paper proposes an optimal power allocation analysis for a point-to-point wireless system when powered by a smart grid. We propose to minimize the total power consumption cost while ensuring individual and total throughput constraints. The power cost is computed based on different dynamic pricing models of the power consumption. Analytical solutions are derived for each pricing model. The derived solutions are shown to be modified versions of the water-filling solution. Water-filling based algorithms are proposed for the resource allocation with each pricing model. Performance comparison and pricing effect are shown through simulations.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantifying individual communication capability in opportunistic mobile social networks 量化机会移动社交网络中的个人通信能力
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017160
Q. Cai, Yuqing Bai, Limin Sun, J. Niu
{"title":"Quantifying individual communication capability in opportunistic mobile social networks","authors":"Q. Cai, Yuqing Bai, Limin Sun, J. Niu","doi":"10.1109/ComComAp.2014.7017160","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017160","url":null,"abstract":"Conventional methods with measuring information propagation in static networks mainly rely on paths or the shortest path connecting nodes, whereas in opportunistic mobile social networks the existence of a path or the shortest path between nodes cannot be assumed due to the dynamic topological partition nature of the networks. This paper extends the concept of walk to dynamic settings and combines it with the Green's function that originates from statistical physics to quantify how much information flows through each node in the networks changing over time. By means of the time-evolving graph model and the calculation of weighted combinatorial dynamic walks on the graph, a concise theoretic result is derived to account for the relative information propagation capability of each mobile node based on the historical contacts. In addition, the iteration-form result can be conveniently computed at any time point and therefore can be used for predicting the future network behavior when the time interval is appropriately chosen in specific scenarios. Extensive experiments are conducted based on four real trace datasets and the results show that, the formula derived in this paper is very effective at quantifying the information that flows through each mobile node.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a distributed wireless tree-like data acquisition system based on ZigBee 基于ZigBee的分布式无线树状数据采集系统设计
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017192
Yiding Wang, He Gong, Yun Fan, Haijun Cao
{"title":"Design of a distributed wireless tree-like data acquisition system based on ZigBee","authors":"Yiding Wang, He Gong, Yun Fan, Haijun Cao","doi":"10.1109/ComComAp.2014.7017192","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017192","url":null,"abstract":"This paper introduces the design of a distributed wireless tree-like data acquisition system based on ZigBee, including its composition and the topological structure of ZigBee network. An industrial information transmission system based on ZigBee technology with CC2530 chip is designed. In this paper, every part of the hardware connections and software design will be introduced overall framework of the system. In consideration of the large data transmission and the security of wireless communication, a communication protocol of wireless transmission will be presented. The experimental tests, aiming at those following factors: distance, magnetic field, occlusion, temperature, short interval test and long-time test, have proved that the system has high speed of transmission and safety of information transmission.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel UEP resource allocation scheme for layered source transmission in COFDM systems COFDM系统分层源传输的一种新的UEP资源分配方案
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/COMCOMAP.2014.7017164
Zhao Kai, Cui Hui-juan, Tang Kun
{"title":"A novel UEP resource allocation scheme for layered source transmission in COFDM systems","authors":"Zhao Kai, Cui Hui-juan, Tang Kun","doi":"10.1109/COMCOMAP.2014.7017164","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2014.7017164","url":null,"abstract":"This paper proposes a novel unequal error protection (UEP) resource allocation scheme for layered source transmission in coded OFDM systems. In the proposed scheme, firstly the resource allocation problem for two layered source is solved by UEP Fischer bit loading algorithm and golden search method. Secondly, according to the divide and conquer principle, the optimization of resource allocation for the multi-layered source can be decomposed hierarchically into sub-problems. And luckily, each sub-problem can be well solved by the above algorithm developed for the two layered source. Finally we design an efficient routine in which optimized resource allocation results for multi-layered source can be updated recursively through calculation and merging of solutions to the decomposed subproblems. Experimental results show that compared with traditional resource allocation schemes, the proposed scheme can effectively decrease the reconstructed distortion with moderate time complexity in a variety of channel conditions.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation regularity of hot topics in Sina Weibo based on SIR model — A simulation research 基于SIR模型的新浪微博热点话题传播规律——仿真研究
2014 IEEE Computers, Communications and IT Applications Conference Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017216
Donghui Li, Yuqing Zhang, Xin Chen, Long Cao
{"title":"Propagation regularity of hot topics in Sina Weibo based on SIR model — A simulation research","authors":"Donghui Li, Yuqing Zhang, Xin Chen, Long Cao","doi":"10.1109/ComComAp.2014.7017216","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017216","url":null,"abstract":"Sina Weibo, as one of the most popular and fast growing social network, has gradually become the field where hot topics appear, propagate, and outbreak. In order to explore and find out the propagating regularity of hot topics on the platform of micro-blog, a novel approach based on a well-known epidemic model called SIR is proposed in this paper to understand and explain hot topics spreading dynamics, which takes the structure information and propagation characteristics of Sina Weibo into consideration. The event of flight MH370 vanished is being used to test the modified topic transmission model based on SIR. The experimental results show that the fitting degree between simulation results and the historical data is high and indicates that there is a high feasibility of this model to research on the propagating regularity of hot topics spreading on Sina Weibo.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124596182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信