2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

筛选
英文 中文
An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks 一种用于自组织无线传感器网络中未知空间相关信号跟踪的高效加速学习算法
H. Alasti
{"title":"An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks","authors":"H. Alasti","doi":"10.1109/UEMCON51285.2020.9298182","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298182","url":null,"abstract":"An efficient accelerated learning algorithm is proposed and discussed for tracking of spatially correlated signals in ad-hoc wireless sensor networks. The proposed algorithm is low-cost and computationally efficient. It models an unknown, spatially correlated signal using a number of its contour lines at equally spaced levels. In the proposed algorithm, each sensor is modeled as one neuron in a neural network. The accelerated learning’s agent is implemented at the fusion center (FC). The algorithm is performed in two phases of spatial modeling and spatial tracking. In spatial modeling phase that accelerated learning is implemented, the algorithm discovers the model parameters. In spatial tracking phase, the model parameters are updated to track the varying, unknown spatial signal. Those sensors (neurons) that their observation are in a given margin of at least one of the contour levels, report their filtered observations to the FC. The FC updates the model parameters based on the reported observations and returns the model features to the sensor network for the next iteration step. The performance evaluation results show that the proposed accelerated learning is low cost and converges faster than single layer machine learning approach. The modeling performance, convergence speed and the cost of the proposed algorithm are compared with those of single layer machine learning algorithm. The algorithm is proposed for environmental monitoring.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology 混合finfet -忆阻器技术中250mhz -1.6 GHz锁相环设计
Naheem Olakunle Adesina, A. Srivastava
{"title":"A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology","authors":"Naheem Olakunle Adesina, A. Srivastava","doi":"10.1109/UEMCON51285.2020.9298155","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298155","url":null,"abstract":"There are tremendous improvements in performance of transistor in CMOS technology by scaling down its size. However, there are various challenges, such as short channel effects (SCE), that are associated with miniaturization. FinFET technology is a promising technique to overcome these issues because it offers better electrostatic control of the channel than planar CMOS transistor as the technology scales down. In this work, we have proposed a phase locked loop (PLL) design with FinFET and memristor. The resistive and capacitive (R-C) components of loop filter are replaced with memristor and memcapacitor, respectively, in order to minimize the die area and reduce power consumption. The designed PLL produces a tuning range of 0.25 - 1.60 GHz at center frequency of 1 GHz with 2.05 mW average power consumption. The voltage-controlled oscillator (VCO), which contributes majorly to the total phase noise in phase locked loop, has a phase noise -135.2 dBc/Hz at 1 MHz offset frequency. In addition, the PLL shows high reliability with wide variations in temperature.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel 具有Nakagami-m衰落信道的云无线接入网性能分析
Ayad N. Bihnam, Xian Liu
{"title":"Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel","authors":"Ayad N. Bihnam, Xian Liu","doi":"10.1109/UEMCON51285.2020.9298112","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298112","url":null,"abstract":"In this letter, the performance analysis of Cloud Radio Access Network (C-RAN) is investigated in terms of Ergodic Capacity (EC) under the well-known Nakagami-m fading channel. In this study, the C-RAN model is based on two nearest Remote Radio Head (2-RRH) association. The user is considered at the center of a disk equipped with a single antenna while each RRH has L antennas. The outage probability equation is defined and a closed form formula of EC has been derived with arbitrary path loss exponent. Numerical and analytical results show nonlinear behavior of channel capacity versus signal to noise ratio.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OPSCAN: Density-based Spatial Clustering in Opportunistic Networks 机会网络中基于密度的空间聚类
Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, S. Aly
{"title":"OPSCAN: Density-based Spatial Clustering in Opportunistic Networks","authors":"Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, S. Aly","doi":"10.1109/UEMCON51285.2020.9298179","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298179","url":null,"abstract":"In modern opportunistic networks, network operations can be improved through knowledge of spatial information of low and high density areas, predictions of the mobility of nodes in the space, as well as the spatial distribution of nodes. Such information can be used to adapt forwarding decisions. In this paper, we introduce an efficient opportunistic spatial clustering algorithm, OPSCAN (Opportunistic Spatial Clustering of Applications with Noise). Based on DBSCAN (Density-Based Spatial Clustering of Applications with Noise), a density-based clustering algorithm that discovers arbitrary-shaped clusters in a dataset and distinguishes noise points. OPSCAN is capable of clustering network nodes into high density clusters, while maintaining sparse areas of nodes between clusters. Clusters share spatial information of the network such as area density, mobility statistics and information about other clusters and their nodes. Knowledge of edge nodes in the clusters is also made available for utilization in more efficient forwarding decisions. Simulations show that our algorithm is capable of producing dense, homogeneous clusters and accurately outlining cluster edges. We have used the Silhouette Coefficient to measure cluster homogeneity against density-based clustering algorithms DBSCAN and ST-DBSCAN (Spatial-Temporal DBSCAN), a DBSCAN-based spatial-temporal variant on \"GeoLife\" dataset. We have found OPSCAN outperforms DBSCAN by a coefficient of 0.81 to 0.73 for the same minimum distance, under-performing ST-DBSCAN by 0.87 to 0.81 for that distance. OPSCAN requires only two inputs as compared to four for ST-DBSCAN. As the distance parameter is increased, OPSCAN produces homogeneous clusters more closely to ST-DBSCAN.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform 利用离散Hartley变换缓解车载安全中的里程表欺诈
G. Baldini, Raimondo Giuliani, M. Gemo
{"title":"Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform","authors":"G. Baldini, Raimondo Giuliani, M. Gemo","doi":"10.1109/UEMCON51285.2020.9298039","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298039","url":null,"abstract":"Odometer fraud is a serious offense in the automotive sector and indicates the disconnection, resetting, or alteration of a vehicle’s odometer and the related sensor with the intent to change the number of miles/Kms indicated or recorded to report false information. This paper focuses specifically on the threat scenario where the odometer sensor (i.e., Hall Sensor) is manipulated or replaced to implement an odometer fraud. This paper proposes a technique to mitigate odometer fraud by performing a physical layer authentication of the Hall Sensor, which takes in consideration the limitation of the in-vehicle networks and microprocessors. In particular, the Discrete Hartley Transform (DHT) in combination with machine learning algorithms is used to perform the authentication on an experimental data set of 12 Hall Sensors, which has been collected by the authors. The results shows that features extracted with DHT have more discriminating power than the original time domain and the frequency domain representations based on the Fast Fourier Transform (FFT) especially in presence of noise.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115580345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process 一种用于量子控制和读出的1.2 v 6ghz双路电荷泵锁相环频率合成器
V. Manthena, S. Miryala, G. Deptuch, G. Carini
{"title":"A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process","authors":"V. Manthena, S. Miryala, G. Deptuch, G. Carini","doi":"10.1109/UEMCON51285.2020.9298160","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298160","url":null,"abstract":"This paper presents a low jitter dual-path charge-pump phase locked loop (PLL) synthesizer in a CMOS 65-nm process for quantum readout applications. The PLL incorporates a programmable dual charge-pump and a loop filter with both proportional and integral paths that can be driven independently providing flexible control of the loop bandwidth to achieve low jitter performance. The design is implemented at 300 K and critical blocks like voltage-controlled oscillator (VCO) and charge-pump (CP) are analyzed at 77 K based on the characterized results. The LC-VCO is realized with the class-C NMOS only architecture with 5-bit coarse control and quadrature signals are generated with poly phase filter. The VCO is designed with the tuning range of 1 GHz around the center frequency of 6 GHz with Phase Noise of -123 dBc/Hz and -132 dBc/Hz at 1MHz offset at 300 K and 77 K temperature. The simulated PLL rms jitter is 125 fs at 6 GHz with a power consumption of 8 mW at the 1.2 V power supply.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks 弹性光网络中动态路由的自适应调制再生器和距离感知算法
Siwei Zhao, Sanyami Shah, Kishan N. Patel, Nickyta Patel, Vachana Shetty, Michal Aibin
{"title":"Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks","authors":"Siwei Zhao, Sanyami Shah, Kishan N. Patel, Nickyta Patel, Vachana Shetty, Michal Aibin","doi":"10.1109/UEMCON51285.2020.9298105","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298105","url":null,"abstract":"The Elastic Optical Network is a technology that offers versatile conversion of modulation format, allowing for more effective use of spectrum resources compared to the traditional fixed grid in WDM networks. Additionally, the content-oriented services offered by geographically distributed data centres raise a need for cost-effective and scalable data delivery. In this paper, we discuss Routing, Modulation and Spectrum Allocation (RMSA) in content-oriented networks, based on the Elastic Optical Network. We propose a new adaptive modulation, regenerator and distance-aware algorithm. Our findings discover an interesting trade-off between the request blocking and regenerator use.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128429898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach 时域网络活动攻击风险估计:小波变换方法
Soo-Yeon Ji, Bong-Keun Jeong, C. Kamhoua, Nandi O. Leslie, D. Jeong
{"title":"Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach","authors":"Soo-Yeon Ji, Bong-Keun Jeong, C. Kamhoua, Nandi O. Leslie, D. Jeong","doi":"10.1109/UEMCON51285.2020.9298153","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298153","url":null,"abstract":"Analyzing network traffic data to detect suspicious network activities requires tremendous efforts because of continuously changing network traffic patterns and intrusion scenarios. Numerous research has been devoted to the task of identifying network anomalies while maintaining excellent performances. However, most studies focus on identifying network attacks without considering their temporal domain. Time information is useful for discovering patterns in network activities and understanding the changes in network traffic over time. This paper introduces an approach to discover network traffic patterns with time series analysis to estimate the level of attack risks. Classification is performed with machine learning techniques to assess the estimated attack risks. Findings from this study can increase the capability to detect network intrusions by analyzing the behaviors of temporal data and estimating their attack risks.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radio-Factor Authentication: Identity Management over the 900MHz Band 无线电因素认证:900MHz频段上的身份管理
Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy
{"title":"Radio-Factor Authentication: Identity Management over the 900MHz Band","authors":"Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy","doi":"10.1109/UEMCON51285.2020.9298110","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298110","url":null,"abstract":"Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122043503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Digital Service as a Utility and the Unit of Measure 作为实用工具和度量单位的安全数字服务
Salam Ismaeel, M. Kamaludeen, A. Miri
{"title":"Secure Digital Service as a Utility and the Unit of Measure","authors":"Salam Ismaeel, M. Kamaludeen, A. Miri","doi":"10.1109/UEMCON51285.2020.9298151","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298151","url":null,"abstract":"Technology becomes more and more involved in the learning process of K-12 schools. The digital requirements must be assessed for cost-effective and efficient (a reasonable download wait time) access to the Internet. Nowadays, there is an increase in usage of the amount of data incoming and outgoing based on students' activities. This needs to be increased to guarantee ready access and effective usage of technology in K-12 school environments. This paper outlines a useful standard management unit called Digital Resource Unit (DRU), which identifies the ability to be securely connected to the internet and transfer digital contents free from impediments or prying eyes.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信