International Conference on Embedded Wireless Systems and Networks (EWSN) ...最新文献

筛选
英文 中文
SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar. SuperRF:使用固定式低成本毫米波雷达增强3D射频表示。
Shiwei Fang, Shahriar Nirjon
{"title":"SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar.","authors":"Shiwei Fang,&nbsp;Shahriar Nirjon","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.</p>","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"2020 ","pages":"120-131"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7377925/pdf/nihms-1603887.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38185284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar SuperRF:使用固定式低成本毫米波雷达增强3D射频表示
International Conference on Embedded Wireless Systems and Networks (EWSN) ... Pub Date : 2020-02-01 DOI: 10.5555/3400306.3400321
Shiwei Fang, S. Nirjon
{"title":"SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar","authors":"Shiwei Fang, S. Nirjon","doi":"10.5555/3400306.3400321","DOIUrl":"https://doi.org/10.5555/3400306.3400321","url":null,"abstract":"This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"40 1","pages":"120-131"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84102870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Progressive Content-Sensitive Data Retrieval in Sensor Networks 传感器网络中渐进式内容敏感数据检索
International Conference on Embedded Wireless Systems and Networks (EWSN) ... Pub Date : 2009-07-31 DOI: 10.3844/JCSSP.2009.529.535
Bo Yang, M. Manohar, S. Kou
{"title":"Progressive Content-Sensitive Data Retrieval in Sensor Networks","authors":"Bo Yang, M. Manohar, S. Kou","doi":"10.3844/JCSSP.2009.529.535","DOIUrl":"https://doi.org/10.3844/JCSSP.2009.529.535","url":null,"abstract":"Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data) has been considered as a challenging task due to the lack of infrastructures and the multiple limitations (such as band-width, storage and energy). While the past research discussed much on routing protocols for sensor networks, few works have been reported on effective data retrieval with respect to optimized data search cost and fairness across various environment setups. This study presented the design of progressive content prediction approaches to facilitate efficient similarity-based search in sensor networks. Approach: The study proposed fully dynamic, hierarchy-free and non-flooding approaches. Association rules and Bayesian probabilities were generated to indicate the content distribution in the sensor network. The proposed algorithms generated the interest node set for a node based on its query history and the association rules and Bayesian rule. Because in most cases the data content of a node was semantically related with its interest of queries, the sensor network was therefore partitioned into small groups of common interest nodes and most of the queries can be resolved within these groups. Consequently, blind search approach based on flooding could be replaced by the heuristic-based uni-casting or multicasting schemes, which drastically reduced the system cost of storage space, network bandwidth and computation power. Results: We verified the performance with experimental analysis. The simulation result showed that both Bayesian scheme and association scheme require much less message complexity than flooding, which drastically reduced the consumption of system resources. Conclusion: Content distribution knowledge could be used to improve the system performance of content-based data retrieval in sensor networks.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"6 1","pages":"63-68"},"PeriodicalIF":0.0,"publicationDate":"2009-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78435499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Effects of PRF and Slot Interval on the Data Throughput of PPM-Based Ultra Wide-Band Systems in Multi-Path Channels PRF和时隙间隔对多径信道ppm超宽带系统数据吞吐量的影响
Sungjun Kim, S. Im
{"title":"The Effects of PRF and Slot Interval on the Data Throughput of PPM-Based Ultra Wide-Band Systems in Multi-Path Channels","authors":"Sungjun Kim, S. Im","doi":"10.1007/11751588_84","DOIUrl":"https://doi.org/10.1007/11751588_84","url":null,"abstract":"","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"2 1","pages":"18-23"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78515572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GSM Security GSM安全
International Conference on Embedded Wireless Systems and Networks (EWSN) ... Pub Date : 2005-01-01 DOI: 10.1002/9781118380642.ch3
Basar Kasim, Levent Ertaul
{"title":"GSM Security","authors":"Basar Kasim, Levent Ertaul","doi":"10.1002/9781118380642.ch3","DOIUrl":"https://doi.org/10.1002/9781118380642.ch3","url":null,"abstract":"Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulnerabilities are given. Security evaluations of two new security protocol proposals for GSM, using private and public key techniques, are also presented. Next, a new GSM security protocols which uses the Elliptic Curve Public Key Cryptography (ECC) technique is proposed. This is followed by a security analysis of the proposed protocols.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"692 1","pages":"555-561"},"PeriodicalIF":0.0,"publicationDate":"2005-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76849570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks 支持Ad Hoc网络中基于代理的服务运行时升级的体系结构
R. Sen, Radu Handorean, Gregory Hackmann, G. Roman
{"title":"An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks","authors":"R. Sen, Radu Handorean, Gregory Hackmann, G. Roman","doi":"10.7936/K7319T70","DOIUrl":"https://doi.org/10.7936/K7319T70","url":null,"abstract":"In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to the service process that runs on a remote host. Due to software evolution, it becomes necessary at times to upgrade the service. Some of these upgrades may require an upgrade of the proxy software, in addition to the server itself. This paper addresses the issue of upgrading both the server and its proxy in a manner transparent to the client, and ensures only momentary interruption during the switching process. The model we propose is designed for ad hoc wireless networks, but can be used in other settings as well. We also describe a Java implementation of our model.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"1 1","pages":"689-695"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83450622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Framework For Policy Based Coordinated Adaptation in Mobile Systems 移动系统中基于策略的协调适应框架
International Conference on Embedded Wireless Systems and Networks (EWSN) ... Pub Date : 2004-01-01 DOI: 10.25148/ETD.FI13101538
S. Makki, N. Pissinou, S. Agrawal
{"title":"A Framework For Policy Based Coordinated Adaptation in Mobile Systems","authors":"S. Makki, N. Pissinou, S. Agrawal","doi":"10.25148/ETD.FI13101538","DOIUrl":"https://doi.org/10.25148/ETD.FI13101538","url":null,"abstract":"OF THE THESIS A FRAMEWORK FOR POLICY BASED COORDINATED ADAPTATION IN","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"156 1","pages":"969-974"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82655113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Wireless Payment Protocol 安全无线支付协议
International Conference on Embedded Wireless Systems and Networks (EWSN) ... Pub Date : 2003-12-01 DOI: 10.22215/etd/2002-05265
Hong Wang, E. Kranakis
{"title":"Secure Wireless Payment Protocol","authors":"Hong Wang, E. Kranakis","doi":"10.22215/etd/2002-05265","DOIUrl":"https://doi.org/10.22215/etd/2002-05265","url":null,"abstract":"With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols are necessary for online transactions. A good payment protocol should balance the requirements of security and convenience. WAP (Wireless Application Protocol) is one of the prevalent wireless technologies being embraced by the banking sector. Compared with WLAN (Wireless Local Area Network), WAP can satisfy the strong security requirement of banking services. WPP (Wireless Payment Protocol) is a convenient lightweight protocol that supports both credit card and debit card transactions in wireless environment. The shortcoming of WPP is that it does not actually address security. In this paper, we propose a new wireless payment protocol, SWPP (Secure Wireless Payment Protocol), to address security and convenience based on WAP for WTLS (Wireless Transport Layer Security), WIM (Wireless Identity Module) and WMLScrypt, WPKI technology.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"7 1","pages":"576-582"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75356524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信