Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 804
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Jamil, Mohammad Newaj
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Belief Rule Based Expert System for Evaluating Technological Innovation Capability of High-Tech Firms Under Uncertainty2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Technological innovation capability (TIC) is a complicated and subtle concept which is based on multiple quantitative and qualitative criteria. The cores of a firm’s long-term competitive dominance are defined by technological innovation capability which is the incentive for a firm’s innovation. Various types of uncertainty can be noticed while considering multiple criteria for evaluating TIC. In order to evaluate TIC in a reliable way, a Belief Rule Base (BRB) Expert System can be used to handle both quantitative and qualitative data and their associated uncertainties. In this paper, a RESTful API-based BRB expert system is introduced to evaluate technological innovation capability by taking uncertainties into consideration. This expert system will facilitate firms’ managers to obtain a recapitulation of the TIC evaluation. It will help them to take essential steps to ensure corporate survival and strengthen their weak capabilities continuously to facilitate a competitive advantage. Other users can also use this API to apply BRB for a different domain. However, a comparison between the knowledge-driven approach (BRBES) and several data-driven models has been performed to find out the reliability in evaluating TIC. The result shows that the outcome of BRBES is better than other data-driven approaches.

  • 2.
    Huang, Mingfeng
    et al.
    School of Information Science and Engineering, Central South University, Changsha 410083, China..
    Liu, Anfeng
    School of Information Science and Engineering, Central South University, Changsha 410083, China.
    Xiong, Neal N.
    Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, USA.
    Wang, Tian
    School of Computer Science, National Huaqiao University, Quanzhou 362000, China..
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems2019Ingår i: IEEE Transactions on Systems, Man & Cybernetics. Systems, ISSN 2168-2216, E-ISSN 1349-2543, Vol. 49, nr 2, s. 317-332Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Millions of dedicated sensors are deployed in smart cities to enhance quality of urban living. Communication technologies are critical for connecting these sensors and transmitting events to sink. In control systems of mobile wireless sensor networks (MWSNs), mobile nodes are constantly moving to detect events, while static nodes constitute the communication infrastructure for information transmission. Therefore, how to communicate with sink quickly and effectively is an important research issue for control systems of MWSNs. In this paper, a communication scheme named first relay node selection based on fast response and multihop relay transmission with variable duty cycle (FRAVD) is proposed. The scheme can effectively reduce the network delay by combining first relay node selection with node duty cycles setting. In FRAVD scheme, first, for the first relay node selection, we propose a strategy based on fast response, that is, select the first relay node from adjacent nodes in the communication range within the shortest response time, and guarantee that the remaining energy and the distance from sink of the node are better than the average. Then for multihop data transmission of static nodes, variable duty cycle is introduced novelty, which utilizes the residual energy to improve the duty cycle of nodes in far-sink area, because nodes adopt a sleep-wake asynchronous mode, increasing the duty cycle can significantly improve network performance in terms of delays and transmission reliability. Our comprehensive performance analysis has demonstrated that compared with the communication scheme with fixed duty cycle, the FRAVD scheme reduces the network delay by 24.17%, improves the probability of finding first relay node by 17.68%, while also ensuring the network lifetime is not less than the previous researches, and is a relatively efficient low-latency communication scheme.

  • 3.
    Akter, Shamima
    et al.
    International Islamic University, Chittagong, Bangladesh.
    Nahar, Nazmun
    University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A New Crossover Technique to Improve Genetic Algorithm and Its Application to TSP2019Ingår i: Proceedings of 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 2019, artikel-id 18566123Konferensbidrag (Refereegranskat)
    Abstract [en]

    Optimization problem like Travelling Salesman Problem (TSP) can be solved by applying Genetic Algorithm (GA) to obtain perfect approximation in time. In addition, TSP is considered as a NP-hard problem as well as an optimal minimization problem. Selection, crossover and mutation are the three main operators of GA. The algorithm is usually employed to find the optimal minimum total distance to visit all the nodes in a TSP. Therefore, the research presents a new crossover operator for TSP, allowing the further minimization of the total distance. The proposed crossover operator consists of two crossover point selection and new offspring creation by performing cost comparison. The computational results as well as the comparison with available well-developed crossover operators are also presented. It has been found that the new crossover operator produces better results than that of other cross-over operators.

  • 4.
    Safkhani, Masoumeh
    et al.
    Department of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 23514-23526Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Telecare Medicine Information System (TMIS)'s security importance attracts a lot of attention these days. Whatever the security of TMIS improves, its application becomes wider. To address this requirement, recently, Li et al. proposed a new privacy-preserving RFID authentication protocol for TMIS. After that, Zhou et al. and also Benssalah et al. presented their scheme, which is not secure, and they presented their new authentication protocol and claim that their proposal can provide higher security for TMIS applications. In this stream, Zheng et al. proposed a novel authentication protocol with application in smart campus, including TMIS. In this paper, we present an efficient impersonation and replay attacks against Zheng et al. with the success probability of 1 and a desynchronization attack which is applicable against all of the rest three mentioned protocols with the success probability of 1-2^{-n} , where n is the protocols parameters length. After that, we proposed a new protocol despite these protocols can resist the attacks presented in this paper and also other active and passive attacks. Our proposed protocol's security is also done both informally and formally through the Scyther tool.

  • 5.
    Lan, Yihua
    et al.
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China.
    Bai, Kun
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China..
    Hung, Chih-Cheng
    Laboratory for Machine Vision and Security Research, College of Computing and Software Engineering, Kennesaw State University, Marietta, USA.
    Alelaiwi, Abdulhameed
    Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 45850-45857Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for health-care. The emergence of mobile cloud computing will provide cloud servers and storage for IMRT mobile applications, thus realizing visualized radiotherapy in a real sense.Equivalent uniform dose (EUD) is a biomedical indicator based on the dose measure. In this study, the dose volume histogram is used to describe the dose distribution of different tissues in target and nontarget regions. The traditional definition of equivalent uniform dose such as the exponential form and the linear form has only a few parameters in the model for fast calculation. However, there is no close relationship between this traditional definition and the dose volume histogram.In order to establish the consistency between the equivalent uniform dose and the dose volume histogram, this paper proposes a novel definition of equivalent uniform dose based on the volume dose curve, called VD-EUD. By using a unique organic volume weight curve, it is easy to calculate VD-EUD for different dose distributions. In the definition, different weight curves are used to represent the biological effects of different organs. For the target area, we should be more careful about those voxels with low dose (cold point); thus, the weight curve is monotonically decreasing. While for the nontarget area, the curve is monotonically increasing. Furthermore, we present the curves for parallel, serial and mixed organs of nontarget areas separately, and we define the weight curve form with only two parameters. Medical doctors can adjust the curve interactively according to different patients and organs. We also propose a fluence map optimization model with the VD-EUD constraint, which means the proposed EUD constraint will lead to a large feasible solution space.We compare the generalized equivalent uniform dose (gEUD) and the proposed VD-EUD by experiments, which show that the VD-EUD has a closer relationship with the dose volume histogram. If the biological survival probability is equivalent to the VD-EUD, the feasible solution space would be large, and the target areas can be covered.By establishing a personalized organic weight curve, medical doctors can have a unique VD-EUD for each patient. By using the flexible and adjustable equivalent uniform dose definition, we can establish VD-EUD-based fluence map optimization model, which will lead to a larger solution space than the traditional dose volume constraint-based model. The VD-EUD is a new definition; thus, we need more clinical testing and verification.

  • 6.
    Lee, Cheng-Chi
    et al.
    Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, Taiwan, Republic of China; Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, Republic of China.
    Li, Chun-Ta
    Department of Information Management, Tainan University of Technology, Tainan, Taiwan, Republic of China.
    Cheng, Chung-Lun
    Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, Taiwan, Republic of China.
    Lai, Yan-Ming
    Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, Republic of China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Group Ownership Delegate Protocol for RFID Systems2019Ingår i: Information Systems Frontiers, ISSN 1387-3326, E-ISSN 1572-9419, Vol. 21, nr 5, s. 1153-1166Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation.

  • 7.
    Hasanov, Aziz
    et al.
    Ajou University.
    Laine, Teemu
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Chung, Tae-Sun
    Ajou University.
    A survey of adaptive context-aware learning environments2019Ingår i: Journal of Ambient Intelligence and Smart Environments, ISSN 1876-1364, E-ISSN 1876-1372, Vol. 11, nr 5, s. 403-428Artikel, recension (Refereegranskat)
    Abstract [en]

    Adaptive context-aware learning environments (ACALEs) can detect the learner’s context and adapt learning materi-als to match the context. The support for context-awareness and adaptation is essential in these systems so that they can makelearning contextually relevant. Previously, several related surveys have been conducted, but they are either outdated or they donot consider the important aspects of context-awareness, adaptation and pedagogy in the domain of ACALEs. To alleviate this,a comprehensive literature search on ACALEs was first performed. After filtering the results, 53 studies that were publishedbetween 2010 and 2018 were analyzed. The highlights of the results are: (i) mobile devices (PDAs, mobile phones, smartphones)are the most common client types, (ii) RFID/NFC are the most common sensors, (iii) ontology is the most common context mod-eling approach, (iv) context data typically originates from the learner profile or the learner’s location, (v) rule-based adaptationis the most used adaptation mechanism, and (vi) informative feedback is the most common feedback type. Additionally, we con-ducted a trend analysis on technology usage in ACALEs throughout the covered timespan, and proposed a taxonomy of contextcategories as well as several other taxonomies for describing various aspects of ACALEs. Finally, based on the survey results,directions for future research in the field were given. These results can be of interest to educational technology researchers andto developers of adaptive and context-aware applications.

  • 8.
    Hossain, Mohammad Shahadat
    et al.
    University of Chittagong, Bangladesh.
    Sultana, Zinnia
    International Islamic University Chittagong, Bangladesh.
    Nahar, Lutfun
    International Islamic University Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    An Intelligent System to Diagnose Chikungunya under Uncertainty2019Ingår i: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 10, nr 2, s. 37-54Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Chikungunya is a virus-related disease, bring about by the virus called CHIKV that spreads throughmosquito biting. This virus first found in Tanzania, while blood from patients was isolated. Thecommon signs and symptoms, associated with Chikungunya are considered as fever, joint swelling,joint pain, muscle pain and headache. The examination of these signs and symptoms by the physician constitutes the typical preliminary diagnosis of this disease. However, the physician is unable tomeasure them with accuracy. Therefore, the preliminary diagnosis in most of the cases could sufferfrom inaccuracy, which leads to wrong treatment. Hence, this paper introduces the design and implementation of a belief rule based expert system (BRBES) which is capable to represent uncertainknowledge as well as inference under uncertainty. Here, the knowledge is illustrated by employing belief rule base while deduction is carried out by evidential reasoning. The real patient data of250 have been considered to demonstrate the accuracy and the robustness of the expert system. Acomparison has been performed with the results of BRBES and Fuzzy Logic Based Expert System(FLBES) as well as with the expert judgment. Furthermore, the result of BRBES has been contrastedwith various data-driven machine learning approaches, including ANN (Artificial Neural networks)and SVM (Support Vector Machine). The reliability of BRBESs was found better than those of datadriven machine learning approaches. Therefore, the BRBES presented in this paper could enable thephysician to conduct the analysis of Chikungunya more accurately.

  • 9.
    Chowdhury, Rumman Rashid
    et al.
    University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Hossain, Sazzad
    University of Liberal Arts Bangladesh, Dhaka, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Analyzing Sentiment of Movie Reviews in Bangla by Applying Machine Learning Techniques2019Ingår i: Proceedings of the International Conference on Bangla Speech and Language Processing, 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper proposes a process of sentiment analysis of movie reviews written in Bangla language. This process can automate the analysis of audience’s reaction towards a specific movie or TV show. With more and more people expressing their opinions openly in the social networking sites, analyzing the sentiment of comments made about a specific movie can indicate how well the movie is being accepted by the general public. The dataset used in this experiment was collected and labeled manually from publicly available comments and posts from social media websites. Using Support Vector Machine algorithm, this model achieves 88.90% accuracy on the test set and by using Long Short Term Memory network [1] the model manages to achieve 82.42% accuracy. Furthermore, a comparison with some other machine learning approaches is presented in this paper.

  • 10.
    Chowdhury, Rumman Rashid
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Sazzad
    Department of Computer Science and Engineering, University of Liberal Arts Bangladesh, Dhaka, Bangladesh.
    Bangla Handwritten Character Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper proposes a process of Handwritten Character Recognition to recognize and convert images of individual Bangla handwritten characters into electronically editable format, which will create opportunities for further research and can also have various practical applications. The dataset used in this experiment is the BanglaLekha-Isolated dataset [1]. Using Convolutional Neural Network, this model achieves 91.81% accuracy on the alphabets (50 character classes) on the base dataset, and after expanding the number of images to 200,000 using data augmentation, the accuracy achieved on the test set is 95.25%. The model was hosted on a web server for the ease of testing and interaction with the model. Furthermore, a comparison with other machine learning approaches is presented.

  • 11.
    Alzubaidi, Ali
    et al.
    Newcastle University.Umm-Al-Qura University.
    Solaiman, Ellis
    Newcastle University.
    Patel, Pankesh
    Fraunhofer USA-Center for Experimental Software Engineering.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Blockchain-Based SLA Management in the Context of IoT2019Ingår i: IT Professional Magazine, ISSN 1520-9202, E-ISSN 1941-045X, Vol. 21, nr 4, s. 33-40Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In pursuit of effective service level agreement (SLA) monitoring and enforcement in the context of Internet of Things (IoT) applications, this article regards SLA management as a distrusted process that should not be handled by a single authority. Here, we aim to justify our view on the matter and propose a conceptual blockchain-based framework to cope with some limitations associated with traditional SLA management approaches.

  • 12.
    Islam, Raihan Ul
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ruci, Xhesika
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Mohammad Shahadat
    Department of Computer Science and Engineering, University of Chittagong, Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Kor, Ah-Lian
    School of Computing, Creative Technologies and Engineering Leeds Beckett University, Leeds, UK.
    Capacity Management of Hyperscale Data Centers Using Predictive Modelling2019Ingår i: Energies, ISSN 1996-1073, E-ISSN 1996-1073, Vol. 12, nr 18, artikel-id 3438Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Big Data applications have become increasingly popular with the emergence of cloud computing and the explosion of artificial intelligence. The increasing adoption of data-intensive machines and services is driving the need for more power to keep the data centers of the world running. It has become crucial for large IT companies to monitor the energy efficiency of their data-center facilities and to take actions on the optimization of these heavy electricity consumers. This paper proposes a Belief Rule-Based Expert System (BRBES)-based predictive model to predict the Power Usage Effectiveness (PUE) of a data center. The uniqueness of this model consists of the integration of a novel learning mechanism consisting of parameter and structure optimization by using BRBES-based adaptive Differential Evolution (BRBaDE), significantly improving the accuracy of PUE prediction. This model has been evaluated by using real-world data collected from a Facebook data center located in Luleå, Sweden. In addition, to prove the robustness of the predictive model, it has been compared with other machine learning techniques, such as an Artificial Neural Network (ANN) and an Adaptive Neuro Fuzzy Inference System (ANFIS), where it showed a better result. Further, due to the flexibility of the BRBES-based predictive model, it can be used to capture the nonlinear dependencies of many variables of a data center, allowing the prediction of PUE with much accuracy. Consequently, this plays an important role to make data centers more energy-efficient.

  • 13.
    Li, Jianjiang
    et al.
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Zhang, Kai
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Yang, Xiaolei
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Wei, Peng
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Wang, Jie
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ranjan, Rajiv
    School of Computer Science, China University of Geosciences.
    Category Preferred Canopy-K-means based Collaborative Filtering algorithm2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 93, s. 1046-1054Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    It is the era of information explosion and overload. The recommender systems can help people quickly get the expected information when facing the enormous data flood. Therefore, researchers in both industry and academia are also paying more attention to this area. The Collaborative Filtering Algorithm (CF) is one of the most widely used algorithms in recommender systems. However, it has difficulty in dealing with the problems of sparsity and scalability of data. This paper presents Category Preferred Canopy-K-means based Collaborative Filtering Algorithm (CPCKCF) to solve the challenges of sparsity and scalability of data. In particular, CPCKCF proposes the definition of the User-Item Category Preferred Ratio (UICPR), and use it to compute the UICPR matrix. The results can be applied to cluster the user data and find the nearest users to obtain prediction ratings. Our experimentation results performed using the MovieLens dataset demonstrates that compared with traditional user-based Collaborative Filtering algorithm, the proposed CPCKCF algorithm proposed in this paper improved computational efficiency and recommendation accuracy by 2.81%.

  • 14.
    Alhamazani, Khalid
    et al.
    School of Computer Science and Engineering, University of New South Wales.
    Ranjan, Rajiv
    CSIRO Digital Productivity, Acton.
    Jayaraman, Prem
    CSIRO Digital Productivity, Acton.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liu, Chang
    Sydney University of Technology.
    Rabhi, Fethi
    School of Computer Science and Engineering, University of New South Wales.
    Georgakopoulos, Dimitrios
    Royal Melbourne Institute of Technology, Melbourne.
    Wang, Lizhe
    Chinese Academy of Sciences, Beijing.
    Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework2019Ingår i: I E E E Transactions on Cloud Computing, ISSN 2168-7161, Vol. 7, nr 1, s. 48-61Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cloud computing provides on-demand access to affordable hardware (e.g., multi-core CPUs, GPUs, disks, and networking equipment) and software (e.g., databases, application servers and data processing frameworks) platforms with features such as elasticity, pay-per-use, low upfront investment and low time to market. This has led to the proliferation of business critical applications that leverage various cloud platforms. Such applications hosted on single/multiple cloud provider platforms have diverse characteristics requiring extensive monitoring and benchmarking mechanisms to ensure run-time Quality of Service (QoS) (e.g., latency and throughput). This paper proposes, develops and validates CLAMBS—Cross-Layer Multi Cloud Application Monitoring and Benchmarking as-a-Service for efficient QoS monitoring and benchmarking of cloud applications hosted on multi-clouds environments. The major highlight of CLAMBS is its capability of monitoring and benchmarking individual application components such as databases and web servers, distributed across cloud layers (*-aaS), spread among multiple cloud providers. We validate CLAMBS using prototype implementation and extensive experimentation and show that CLAMBS efficiently monitors and benchmarks application components on multi-cloud platforms including Amazon EC2 and Microsoft Azure.  

  • 15.
    Synnes, Kåre
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Artopoulos, Georgios
    The Cyprus Institute, Nicosia, Cyprus.
    Smaniotto Costa, Carlos
    Universidade Lusófona, Lisbon, Portugal.
    Menezes, Marluci
    National Laboratory for Civil Engineering – LNEC, Lisbon, Portugal.
    Redaelli, Gaia
    Politecnico di Milano, Milan, Italy.
    CyberParks Songs and Stories - Enriching Public Spaces with Localized Culture Heritage Material such as Digitized Songs and Stories: Enriching Public Spaces with Localized Culture Heritage Material such as Digitized Songs and Stories2019Ingår i: CyberParks - The Interface Between People, Places and Technology: New Approaches and Perspectives / [ed] Carlos Smaniotto Costa, Springer, 2019, s. 224-237Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    This chapter offers theoretical considerations and reflections on technological solutions that contribute to digitally supported documentation, access and reuse of localised heritage content in public spaces. It addresses immaterial cultural heritage, including informal stories that could emerge and be communicated by drawing hyperlinks between digitised assets, such as songs, images, drawings, texts and more, and not yet documented metadata, as well as augmenting interaction opportunities with interactive elements that relate to multiple media stored in databases and archives across Europe. The aim is to enable cultural heritage to be experienced in novel ways, supported by the proliferation of smartphones and ubiquitous Internet access together with new technical means for user profiling, personalisation, localisation, contextawareness and gamification. The chapter considers cyberparks as digitally enhanced public spaces for accessing and analyzing European cultural heritage and for enriching the interpretation of the past, along with theoretical ramifications and technological limitations. It identifies the capacities of a proposed digital environment together with design guidelines for interaction with cultural heritage assets in public spaces. The chapter concludes with describing a taxonomy of digital content that can be used in order to enhance association and occupation conditions of public spaces, and with discussing technological challenges associated with enriching public spaces with localized cultural heritage material.

  • 16.
    Noor, Ayman
    et al.
    Newcastle University, Newcastle upon Tyne, UK. Taibah University, Madinah, Saudi Arabia.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Solaiman, Ellis
    Newcastle University, Newcastle upon Tyne, UK.
    Souza, Arthur
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Jha, Devki Nandan
    Newcastle University, Newcastle upon Tyne, UK.
    Demirbaga, Umit
    Newcastle University, Newcastle upon Tyne, UK. Bartin University, Bartin, Turkey.
    Jayaraman, Prem Prakash
    Swinburne University of Technology, Melbourne, Australia.
    Cacho, Nelio
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Ranjan, Rajiv
    Newcastle University, Newcastle upon Tyne, UK.
    Cyber-physical application monitoring across multiple clouds2019Ingår i: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 77, s. 314-324Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cyber-physical systems (CPS) integrate cyber-infrastructure comprising computers and networks with physical processes. The cyber components monitor, control, and coordinate the physical processes typically via actuators. As CPS are characterized by reliability, availability, and performance, they are expected to have a tremendous impact not only on industrial systems but also in our daily lives. We have started to witness the emergence of cloud-based CPS. However, cloud systems are prone to stochastic conditions that may lead to quality of service degradation. In this paper, we propose M2CPA - a novel framework for multi-virtualization, and multi-cloud monitoring in cloud-based cyber-physical systems. M2CPA monitors the performance of application components running inside multiple virtualization platforms deployed on multiple clouds. M2CPA is validated through extensive experimental analysis using a real testbed comprising multiple public clouds and multi-virtualization technologies.

  • 17.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russian Federation.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, India.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Rodrigues, Joel J. P. C.
    National Institute of Telecommunications (Inatel), Brazil; Instituto de Telecomunicações, Portugal; University of Fortaleza (UNIFOR), Brazil.
    Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment2019Ingår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, nr 2, s. 3572-3584, artikel-id 8581510Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.

  • 18.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russian Federation.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, India.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Design of secure key management and user authentication scheme for fog computing services2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, s. 475-492Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.

  • 19.
    Xu, Xiwei
    et al.
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Lu, Qinghua
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Liu, Yue
    College of Computer and Communication Engineering, China. University of Petroleum (East China), Qingdao, China.
    Zhu, Liming
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Yao, Haonan
    College of Computer and Communication Engineering, China. University of Petroleum (East China), Qingdao, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Designing blockchain-based applications a case study for imported product traceability2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, s. 399-406Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Blockchain technology enables decentralization as new forms of distributed software architectures, where components can reach agreements on the shared system states without trusting on a central integration point. Since blockchain is an emerging technology which is still at an early stage of development, there is limited experience on applying blockchain to real-world software applications. We applied blockchain application design approaches proposed in software architecture community in a real-world project called originChain, which is a blockchain-based traceability system that restructures the current system by replacing the central database with blockchain. In this paper, we share our experience of building originChain. By using blockchain and designing towards security, originChain provides transparent tamper-proof traceability data with high availability and enables automated regulatory-compliance checking and adaptation in product traceability scenarios. We also demonstrate both qualitative and quantitative analysis of the software architecture of originChain. Based on our experience and analysis, we found that the structural design of smart contracts has large impact on the quality of the system.

  • 20.
    Sakr, Sherif
    et al.
    University of Taru, Estonia.
    Zomaya, Albert
    University of Sydney, Australia.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Editorial for Special issue of FGCS special issue on “Benchmarking big data systems”2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 96, s. 32-34Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Even though several big data processing and analytics systems have been introduced with various design architectures, we are still lacking a deeper understanding of the performance characteristics for the various design architectures in addition to lacking comprehensive benchmarks for the various Big Data platforms. There is a crucial need to conduct fundamental research with a more comprehensive performance evaluation for the various Big Data processing systems and architectures. We also lack the availability of validation tools, standard benchmarks, and system performance prediction methods that can help us have a deeper and more solid understanding of the strengths and weaknesses of the various Big Data processing platforms. This special issue is dedicated to original results and achievements by active researchers, designers, and developers working on various issues and challenges related to big data research.

  • 21.
    Kor, Ah-Lian
    et al.
    Leeds Beckett University.
    Rondeau, Eric
    University of Lorraine, Nancy, France.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Porras, Jari
    Lappeenranta University of Technology, Finland.
    Georges, Jean-Philippe
    University of Lorraine, Nance, France.
    Education in Green ICT and Control of Smart Systems: A First Hand Experience from the International PERCCOM Masters Programme2019Ingår i: Proceedings of the 12th International Federation of Automatic Control Symposium on Advances in Control Education (IFAC-ACE 2019), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    PERCCOM (PERvasive Computing and COMmunications in sustainable development) Masters is the first innovative international programme in Green ICT for educating and equipping new IT engineers with Green IT skills for sustainable digital applications design and implementation. After five years of running the PERCCOM programme, this paper provides an assessment of skills and employability in the context of Green jobs and skills. The paper ends with a list of recommendations for the development of environment related education curricula.

  • 22.
    Wu, Weiwei
    et al.
    School of Computer Science, Southeast University, Nanjing, Jiangsu, China.
    Wang, Wanyuan
    School of Computer Science and Engeering, Southeast University, Nanjing, Jiangsu China.
    Fang, Xiaolin
    Computer Science and Engineering, Harbin Institute of Technology, Harbin, Heilongjiang China.
    Junzhou, Luo
    School of Computer Science and Engineering, Southeast University, Nanjing, Jiangsu China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Electricity Price-aware Consolidation Algorithms for Time-sensitive VM Services in Cloud Systems2019Ingår i: IEEE Transactions on Services Computing, ISSN 1939-1374, E-ISSN 1939-1374Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Despite the salient feature of cloud computing, the cloud provider still suffers from electricity bill, which mainly comes from 1) the power consumption of running physical machines and 2) the dynamically varying electricity price offered by smart grids. In the literature, there exist viable solutions adaptive to electricity price variation to reduce the electricity bill. However, they are not applicable to serving time-sensitive VM requests. In serving time-sensitive VM requests, it is potential for the cloud provider to apply proper consolidation strategies to further reduce the electricity bill. In this work, to address this challenge, we develop electricity-price-aware consolidation algorithms for both the offline and online scenarios. For the offline scenario, we first develop an consolidation algorithm with constant approximation, which always approaches the optimal solution within a constant factor of 5. For the online scenario, we propose an $O(\log(\frac{L_{max}}{L_{min}}))$ -competitive algorithm that is able to approach the optimal offline solution within a logarithmic factor, where $\frac{L_{max}}{L_{min}}$ is the ratio of the longest length of the processing time requirement of VMs to the shortest one. Our trace-driven simulation results further demonstrate that the average performance of the proposed algorithms produce near-optimal electricity bill.

  • 23.
    Fu, Zhangjie
    et al.
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Huang, Fengxiao
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Sun, Xingming
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Enabling Semantic Search based on ConceptualGraphs over Encrypted Outsourced Data2019Ingår i: IEEE Transactions on Services Computing, ISSN 1939-1374, E-ISSN 1939-1374Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Currently, searchable encryption is a hot topic in the field of cloud computing. The existing achievements are mainly focused on keyword-based search schemes, and almost all of them depend on predefined keywords extracted in the phases of index construction and query. However, keyword-based search schemes ignore the semantic representation information of users’ retrieval and cannot completely match users’ search intention. Therefore, how to design a content-based search scheme and make semantic search more effective and context-aware is a difficult challenge. In this paper, for the first time, we define and solve the problems of semantic search based on conceptual graphs(CGs) over encrypted outsourced data in clouding computing (SSCG).We firstly employ the efficient measure of ”sentence scoring” in text summarization and Tregex to extract the most important and simplified topic sentences from documents. We then convert these simplified sentences into CGs. To perform quantitative calculation of CGs, we design a new method that can map CGs to vectors. Next, we rank the returned results based on ”text summarization score”. Furthermore, we propose a basic idea for SSCG and give a significantly improved scheme to satisfy the security guarantee of searchable symmetric encryption (SSE). Finally, we choose a real-world dataset – ie., the CNN dataset to test our scheme. The results obtained from the experiment show the effectiveness of our proposed scheme.

  • 24.
    Poirot, Valentin
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ericson, Mårten
    Ericsson Research, Luleå, Sweden.
    Nordberg, Mats
    Ericsson Research, Luleå, Sweden.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Energy efficient multi-connectivity algorithms for ultra-dense 5G networks2019Ingår i: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, s. 1-16Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Two radio air interfaces, Evolved-LTE and New Radio, coexist in new 5G systems. New Radio operates in the millimeter band and provides a better bandwidth, but the higher frequencies also imply worse radio conditions. Multi-connectivity, a feature of 5G that allows users to connect to more than one base station simultaneously, can offer the advantages of both interfaces. In this paper, we investigate how multi-connectivity can improve user reliability and the system’s energy efficiency. Five algorithms for secondary cell association are presented and evaluated. We show a decrease in the radio link failure rate of up to 50% at high speeds and improvements of the energy efficiency of up to 20% at low speeds.

  • 25.
    Sun, Gang
    et al.
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Li, Yayu
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Yu, Hongfang
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Du, Xiaojiang
    Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA.
    Guizani, Mohsen
    Department of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA.
    Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, s. 347-360Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Service function chaining (SFC) provisioning is helpful not only for saving the capital expenditure (CAPEX) and operational expenditure (OPEX) of a network provider but also for reducing energy consumption in the substrate network. However, to the best of our knowledge, there has been little research on the problem of energy consumption for orchestrating online SFC requests in multi-domain networks. In this paper, we first formulate the problem of an energy-efficient online SFC request that is orchestrated across multiple clouds as an integer linear programming (ILP) model to find an optimal solution. Then, we analyze the complexity of this ILP model and prove that the problem is NP-hard. Additionally, we propose a low-complexity heuristic algorithm named energy-efficient online SFC request orchestration across multiple domains (EE-SFCO-MD) for near-optimally solving the mentioned problem. Finally, we conduct simulation experiments to evaluate the performance of our algorithm. Simulation results show that EE-SFCO-MD consumes less energy than existing approaches while the online SFC’s requirements are met and the privacy of each cloud is effectively guaranteed. The low computational complexity of the heuristic approach makes it applicable for quickly responding to online SFC requests.

  • 26.
    Uddin Ahmed, Tawsin
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Sazzad
    Department of Computer Science and Engineering, University of Liberal Arts Bangladesh, Dhaka, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Facial Expression Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Detecting emotion from facial expression has become an urgent need because of its immense applications in artificial intelligence such as human-computer collaboration, data-driven animation, human-robot communication etc. Since it is a demanding and interesting problem in computer vision, several works had been conducted regarding this topic. The objective of this research is to develop a facial expression recognition system based on convolutional neural network with data augmentation. This approach enables to classify seven basic emotions consist of angry, disgust, fear, happy, neutral, sad and surprise from image data. Convolutional neural network with data augmentation leads to higher validation accuracy than the other existing models (which is 96.24%) as well as helps to overcome their limitations.

  • 27.
    Makkie, Milad
    et al.
    Computer Science Department, University of Georgia, Athens, GA, USA.
    Huang, Heng
    School of Automation, Northwestern Polytechnical University, Xi'an, China.
    Zhao, Yu
    Computer Science Department, University of Georgia, Athens, GA, USA.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liu, Tianming
    Harvard Center for Neurodegeneration and Repair, Boyd GSRC 420, Athens, GA 30602, United States.
    Fast and Scalable Distributed Deep Convolutional Autoencoder for fMRI Big Data Analytics2019Ingår i: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 325, s. 20-30Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, analyzing task-based fMRI (tfMRI) data has become an essential tool for understanding brain function and networks. However, due to the sheer size of tfMRI data, its intrinsic complex structure, and lack of ground truth of underlying neural activities, modeling tfMRI data is hard and challenging. Previously proposed data modeling methods including Independent Component Analysis (ICA) and Sparse Dictionary Learning only provided shallow models based on blind source separation under the strong assumption that original fMRI signals could be linearly decomposed into time series components with corresponding spatial maps. Given the Convolutional Neural Network (CNN) successes in learning hierarchical abstractions from low-level data such as tfMRI time series, in this work we propose a novel scalable distributed deep CNN autoencoder model and apply it for fMRI big data analysis. This model aims to both learn the complex hierarchical structures of the tfMRI big data and to leverage the processing power of multiple GPUs in a distributed fashion. To deploy such a model, we have created an enhanced processing pipeline on the top of Apache Spark and Tensorflow, leveraging from a large cluster of GPU nodes over cloud. Experimental results from applying the model on the Human Connectome Project (HCP) data show that the proposed model is efficient and scalable toward tfMRI big data modeling and analytics, thus enabling data-driven extraction of hierarchical neuroscientific information from massive fMRI big data.

  • 28.
    Dadhich, Siddharth
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Sandin, Fredrik
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Bodin, Ulf
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ulf
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Signaler och system.
    Martinsson, Torbjörn
    Volvo CE, Bolindervägen 5, 63185 Eskilstuna, Sweden.
    Field test of neural-network based automatic bucket-filling algorithm for wheel-loaders2019Ingår i: Automation in Construction, ISSN 0926-5805, E-ISSN 1872-7891, Vol. 97, s. 1-12Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Automation of earth-moving industries (construction, mining and quarry) require automatic bucket-filling algorithms for efficient operation of front-end loaders. Autonomous bucket-filling is an open problem since three decades due to difficulties in developing useful earth models (soil, gravel and rock) for automatic control. Operators make use of vision, sound and vestibular feedback to perform the bucket-filling operation with high productivity and fuel efficiency. In this paper, field experiments with a small time-delayed neural network (TDNN) implemented in the bucket control-loop of a Volvo L180H front-end loader filling medium coarse gravel are presented. The total delay time parameter of the TDNN is found to be an important hyperparameter due to the variable delay present in the hydraulics of the wheel-loader. The TDNN network successfully performs the bucket-filling operation after an initial period (100 examples) of imitation learning from an expert operator. The demonstrated solution show only 26% longer bucket-filling time, an improvement over manual tele-operation performance.

  • 29.
    Zhan, Yufeng
    et al.
    School of Automation, Key Laboratory of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing, PR China.
    Xia, Yuanqing
    School of Automation, Key Laboratory of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing, PR China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Future directions of networked control systems: A combination of cloud control and fog control approach2019Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 161, s. 235-248Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Currently, we have witnessed that networked control technology has played a key role in Internet of Things (IoT). However, the volume, variety and velocity properties of big data from IoT make the traditional networked control systems (NCSs) can not meet the current requirements. Due to this, cloud control systems have emerged as a new control paradigm which bring lots of benefits and have played a key role in current IoT society. Despite cloud control systems have tremendous advantages, there are still lots of tough challenges such as latency, network congestion and etc., which hinder the development of cloud control systems. For these challenges, we extend the cloud control systems to the cloud fog control systems which bring the fog computing into the NCSs design. First, some recent studies of fog computing have been surveyed. Second, a new architecture of NCSs based on cloud computing and fog computing has been proposed. Then, an incentive mechanism has been designed for the cloud fog control systems. In the end, the cases of control tasks offloading and a simple platform of cloud fog control systems have been studied.

  • 30.
    Lindberg, Renny S. N.
    et al.
    Vrije Universiteit Brussel.
    Laine, Teemu H.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Haaranen, Lassi
    Aalto University.
    Gamifying programming education in K‐12: A review of programming curricula in seven countries and programming games2019Ingår i: British Journal of Educational Technology, ISSN 0007-1013, E-ISSN 1467-8535, Vol. 50, nr 4, s. 1979-1995Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    An increasing number of countries have recently included programming education in their curricula. Similarly, utilizing programming concepts in gameplay has become popular in the videogame industry. Although many games have been developed for learning to program, their variety and their correspondence to national curricula remain an uncharted territory. Consequently, this paper has three objectives. Firstly, an investigation on the guidelines on programming education in K‐12 in seven countries was performed by collecting curricula and other relevant data official from governmental and non‐profit educational websites. Secondly, a review of existing acquirable games that utilize programming topics in their gameplay was conducted by searching popular game stores. Lastly, we compared the curricula and made suggestions as to which age group the identified games would be suitable. The results of this study can be useful to educators and curriculum designers who wish to gamify programming education.

  • 31.
    Yang, Chao-Tung
    et al.
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Chen, Shuo-Tsung
    Artificial Intelligence Recognition Industry Service Research Center (AIR-IS Research Center), National Yunlin University of Science and Technology, Yunlin, Taiwan, ROC. College of Future, Bachelor Program in Interdisciplinary Studies, National Yunlin University of Science and Technology, Taiwan, ROC.
    Liu, Jung-Chun
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Yang, Yao-Yu
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ranjan, Rajiv
    School of Computer, China University of Geosciences, China. School of Computing Science, Newcastle University, United Kingdom.
    Implementation of a real-time network traffic monitoring service with network functions virtualization2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 93, s. 687-701Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Network Functions Virtualization (NFV) extends the functionality provided by Software-Defined Networking (SDN). It is a virtualization technology that aims to replace the functionality provided by traditional networking hardware using software solutions. Thereby, enabling cheaper and efficient network deployment and management. The use of NFV and SDN is anticipated to enhance the performance of Infrastructure-as-a-Service (IaaS) clouds. However, due to the presence of a large number of network devices in IaaS clouds offering a plethora of networked services, there is need to develop a traffic monitoring system for the efficient network. This paper proposes and validates an extensible SDN and NFV-enabled network traffic monitoring system. Using extensive experiments, we show that the proposed system can closely match the performance of traditional networks at cheaper costs and by adding more flexibility to network management tasks.

  • 32.
    Chowdury, Mohammad Salah Uddin
    et al.
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Bin Emranb, Talha
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Ghosha, Subhasish
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Pathak, Abhijit
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Alama, Mohd. Manjur
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Absar, Nurul
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    IoT Based Real-time River Water Quality Monitoring System2019Ingår i: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 155, s. 161-168Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Current water quality monitoring system is a manual system with a monotonous process and is very time-consuming. This paper proposes a sensor-based water quality monitoring system. The main components of Wireless Sensor Network (WSN) include a microcontroller for processing the system, communication system for inter and intra node communication and several sensors. Real-time data access can be done by using remote monitoring and Internet of Things (IoT) technology. Data collected at the apart site can be displayed in a visual format on a server PC with the help of Spark streaming analysis through Spark MLlib, Deep learning neural network models, Belief Rule Based (BRB) system and is also compared with standard values. If the acquired value is above the threshold value automated warning SMS alert will be sent to the agent. The uniqueness of our proposed paper is to obtain the water monitoring system with high frequency, high mobility, and low powered. Therefore, our proposed system will immensely help Bangladeshi populations to become conscious against contaminated water as well as to stop polluting the water.

  • 33.
    Pathak, Abhijit
    et al.
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Uddin, Mohammad Amaz
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Abedin, Md. Jainal
    BGC Trust University Bangladesh, Chandanaish, Chittagong-4381, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Mustafa, Rashed
    University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    IoT based Smart System to Support Agricultural Parameters: A Case Study2019Ingår i: Proceedings of the 6th International Symposium on Emerging Inter-networks, Communication and Mobility (EICM), Elsevier, 2019, s. 648-653Konferensbidrag (Refereegranskat)
    Abstract [en]

    Now-a-days, the natural irrigation system is under pressure due to the growing water shortages, which are mainly caused by population growth and climate change. Therefore, the control of water resources to increase the allocation of retained water is very important. It has been observed in the last two decades, especially in the Indian sub-continent, the change of climate affects the agricultural crops production significantly. However, the prediction of good harvests before harvesting, enables the farmers as well as the government officials to take appropriate measures of marketing and storage of crops. Some strategies for predicting and modelling crop yields have been developed, although they do not take into account the characteristics of climate, and they are empirical in nature. In the proposed system, a Cuckoo Search Algorithm has been developed, allowing the allocation of water for farming under any conditions. The various parameters such as temperature, turbidity, pH., moisture have been collected by using Internet of Things (IoT) platform, equipped with related sensors and wireless communication systems. In this IoT platform the sensor data have been displayed in the cloud environment by using ThingSpeak. The data received in the ThingSpeak used in the proposed Cuckoo Search Algorithm, allowing the selection of appropriate crops for particular soil

  • 34.
    Liu, Xiao
    et al.
    School of Information Science and Engineering, Central South University, ChangSha .
    Zhao, Shaona
    School of Information Science and Engineering, Central South University, ChangSha .
    Liu, Anfeng
    School of Information Science and Engineering, Central South University, ChangSha .
    Xiong, Naixue
    Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK .
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, s. 1142-1156Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Internet of Things will serve communities across the different domains of life. Tracking mobile targets is one important system engineering application in IOT, and the resource of embedded devices and objects working under IoT implementation are constrained. Thus, building a scheme to make full use of energy is key issue for mobile target tracking applications. To achieve both energy efficiency and high monitoring performance, an effective Knowledge-aware Proactive Nodes Selection (KPNS) system is proposed in this paper. The innovations of KPNS are as follows: 1) the number of proactive nodes are dynamically adjusted based on prediction accuracy of target trajectory. If the prediction accuracy is high, the number of proactive nodes in the non-main predicted area will be decreased. If prediction accuracy of moving trajectory is low, large number of proactive nodes will be selected to enhance monitoring quality. 2) KPNS takes full advantage of energy to further enhance target tracking performance by properly selecting more proactive nodes in the network. We evaluated the efficiency of KPNS with both theory analysis and simulation based experiments. The experimental results demonstrate that compared with Probability-based target Prediction and Sleep Scheduling strategy (PPSS), KPNS scheme improves the energy efficiency by 60%, and can reduce target missing rate and tracking delay to 66%, 75% respectively.

  • 35.
    Song, Qiang
    et al.
    Henan University of Technology, College of Electrical Engineering, Zhengzhou, China.
    Liu, Fang
    Huanghuai University, Zhumadian, China.
    Cao, Jinde
    Southeast University, Research Center for Complex Systems and Network Sciences, Nanjing, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tang, Yang
    East China University of Science and Technology, Institute of Physics, Berlin, Germany.
    Leader-following synchronization of coupled homogeneous and heterogeneous harmonic oscillators based on relative position measurements2019Ingår i: IEEE Transactions on Control of Network Systems, ISSN 2325-5870, Vol. 6, nr 1, s. 13-23Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper considers the leader-following synchronization problem for a network of coupled harmonic oscillators by utilizing the relative position measurements between neighboring nodes, where the node dynamics can be either identical or nonidentical. For a homogeneous network with the same node dynamics, two types of first-order observer-based protocols are proposed to achieve leader-following synchronization in the network under some necessary and sufficient conditions, including some synchronization criteria for the homogeneous network subject to parameter uncertainty. For a heterogeneous network with different node dynamics, an output regulation approach is applied to solve the leader-following synchronization problem for the nominal network, based on which the robust synchronization of the uncertain network is investigated with an allowable bound being estimated for parameter uncertainties. Numerical examples are given to illustrate the correctness and the feasibility of the theoretical analysis. 

  • 36.
    Sun, Gang
    et al.
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Xu, Zhu
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Yu, Hongfang
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Chen, Xi
    School of Computer Science and Technology, Southwest Minzu University, Chengdu, China.
    Chang, Victor
    School of Computing & Digital Technologies, Teesside University, Middlesbrough, UK.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Low-latency and Resource-efficient Service Function Chaining Orchestration in Network Function Virtualization2019Ingår i: IEEE Internet of Things Journal, ISSN 2327-4662Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Recently, network function virtualization (NFV) has been proposed to solve the dilemma faced by traditional networks and to improve network performance through hardware and software decoupling. The deployment of the service function chain (SFC) is a key technology that affects the performance of virtual network function (VNF). The key issue in the deployment of SFCs is proposing effective algorithms to achieve efficient use of resources. In this paper, we propose a service function chain deployment optimization (SFCDO) algorithm based on a breadth-first search (BFS). The algorithm first uses a BFS based algorithm to find the shortest path between the source node and the destination node. Then, based on the shortest path, the path with the fewest hops is preferentially chosen to implement the SFC deployment. Finally, we compare the performances with the greedy and simulated annealing (G-SA) algorithm. The experiment results show that the proposed algorithm is optimized in terms of end-to-end delay and bandwidth resource consumption. In addition, we also consider the load rate of the nodes to achieve network load balancing.

  • 37.
    Seo, Jungryul
    et al.
    Ajou University.
    Laine, Teemu H.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Sohn, Kyung-Ah
    Ajou University.
    Machine learning approaches for boredom classification using EEG2019Ingår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Recently, commercial physiological sensors and computing devices have become cheaper and more accessible, while computer systems have become increasingly aware of their contexts, including but not limited to users’ emotions. Consequently, many studies on emotion recognition have been conducted. However, boredom has received relatively little attention as a target emotion due to its diverse nature. Moreover, only a few researchers have tried classifying boredom using electroencephalogram (EEG). In this study, to perform this classification, we first reviewed studies that tried classifying emotions using EEG. Further, we designed and executed an experiment, which used a video stimulus to evoke boredom and non-boredom, and collected EEG data from 28 Korean adult participants. After collecting the data, we extracted its absolute band power, normalized absolute band power, differential entropy, differential asymmetry, and rational asymmetry using EEG, and trained these on three machine learning algorithms: support vector machine, random forest, and k-nearest neighbors (k-NN). We validated the performance of each training model with 10-fold cross validation. As a result, we achieved the highest accuracy of 86.73% using k-NN. The findings of this study can be of interest to researchers working on emotion recognition, physiological signal processing, machine learning, and emotion-aware system development.

  • 38.
    Li, He
    et al.
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Ota, Kaoru
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Dong, Mianxiong
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nagano, Koji
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Multimedia Processing Pricing Strategy in GPU-accelerated Cloud Computing2019Ingår i: IEEE Transactions on Cloud Computing, E-ISSN 2168-7161Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Graphics processing unit (GPU) accelerated processing performs significant efficiency in many multimedia applications. With the development of GPU cloud computing, more and more cloud providers focus on GPU-accelerated services. Since the high maintenance cost and different speedups for various applications, GPU-accelerated services still need a different pricing strategy. Thus, in this paper, we propose an optimal GPU-accelerated multimedia processing service pricing strategy for maximize the profits of both cloud provider and users. We first analyze the revenues and costs of the cloud provider and users when users adopt GPU-accelerated multimedia processing services then state the profit functions of both the cloud provider and users. With a game theory based method, we find the optimal solutions of both the cloud provider’s and users’ profit functions. Finally, through large scale simulations, our pricing strategy brings higher profit to the cloud provider and users compared to the original pricing strategy of GPU cloud services.

  • 39.
    Talebian, H.
    et al.
    Centre for Mobile Cloud Computing (C4MCC), University of Malaya, Kuala Lumpur, Malaysia.
    Gani, A.
    Centre for Mobile Cloud Computing (C4MCC), University of Malaya, Kuala Lumpur, Malaysia.
    Sookhak, M.
    School of Informaion Technology, Illinois State University, Normal, United States.
    Abdelatif, A.A.
    The Future University, Khartoum, Sudan.
    Yousafzai, A.
    HITEC University, Taxila, Pakistan.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Yu, F.R.
    Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada.
    Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues2019Ingår i: Cluster Computing, ISSN 1386-7857, E-ISSN 1573-7543Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The unprecedented growth of energy consumption in data centers created critical concern in recent years for both the research community and industry. Besides its direct associated cost; high energy consumption also results in a large amount of CO2 emission and incurs extra cooling expenditure. The foremost reason for overly energy consumption is the underutilization of data center resources. In modern data centers, virtualization provides a promising approach to improve the hardware utilization level. Virtual machine placement is a process of mapping a group of virtual machines (VMs) onto a set of physical machines (PMs) in a data center with the aim of maximizing resource utilization and minimizing the total power consumption by PMs. An optimal virtual machine placement algorithm substantially contributes to cutting down the power consumption through assigning the input VMs to a minimum number of PMs and allowing the dispensable PMs to be turned off. However, VM Placement Problem is a complex combinatorial optimization problem and known to be NP-Hard problem. This paper presents an extensive review of virtual machine placement problem along with an overview of different approaches for solving virtual machine placement problem. The aim of this paper is to illuminate challenges and issues for current virtual machine placement techniques. Furthermore, we present a taxonomy of virtual machine placement based on various aspects such as methodology, number of objectives, operation mode, problem objectives, resource demand type and number of clouds. The state-of-the-art VM Placement techniques are classified in single objectives and multi-objective groups and a number of prominent works are reviewed in each group. Eventually, some open issues and future trends are discussed which serve as a platform for future research work in this domain.

  • 40.
    Araujo, Victor
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Saguna, Saguna
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Åhlund, Christer
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Performance evaluation of FIWARE: A cloud-based IoT platform for smart cities2019Ingår i: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 132, s. 250-261Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    As the Internet of Things (IoT) becomes a reality, millions of devices will be connected to IoT platforms in smart cities. These devices will cater to several areas within a smart city such as healthcare, logistics, and transportation. These devices are expected to generate significant amounts of data requests at high data rates, therefore, necessitating the performance benchmarking of IoT platforms to ascertain whether they can efficiently handle such devices. In this article, we present our results gathered from extensive performance evaluation of the cloud-based IoT platform, FIWARE. In particular, to study FIWARE’s performance, we developed a testbed and generated CoAP and MQTT data to emulate large-scale IoT deployments, crucial for future smart cities. We performed extensive tests and studied FIWARE’s performance regarding vertical and horizontal scalability. We present bottlenecks and limitations regarding FIWARE components and their cloud deployment. Finally, we discuss cost-efficient FIWARE deployment strategies that can be extremely beneficial to stakeholders aiming to deploy FIWARE as an IoT platform for smart cities.

  • 41.
    Dong, Pingping
    et al.
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xie, Jingyun
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Tang, Wensheng
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xiong, Naixue
    College of Intelligence and Computing, Tianjin University, Tianjin, 300350, China.
    Zhong, Hua
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Performance Evaluation of Multipath TCP Scheduling Algorithms2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 29818-29825Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    One of the goals of 5G is to provide enhanced mobile broadband and enable low latency in some use cases. To achieve this aim, the Internet Engineering Task Force (IETF) has proposed the Multipath TCP (MPTCP) by utilizing the feature of dual connectivity in 5G, where a 5G device can be served by two different base stations. However, the path heterogeneity between the 5G device to the server may cause packet out-of-order problem. The researchers proposed a number of scheduling algorithms to tackle this issue. This paper introduces the existing algorithms, and with the aim to make a thorough comparison between the existing scheduling algorithms and provide guidelines for designing new scheduling algorithms in 5G, we have conducted an extensive set of emulation studies based on the real Linux experimental platform. The evaluation covers a wide range of network scenarios to investigate the impact of different network metrics, namely, RTT, buffer size and file size on the performance of existing widely-deployed scheduling algorithms.

  • 42.
    Dong, Pingping
    et al.
    College of Information Science and Engineering, Hunan Normal University, Changsha, China. Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Gao, Kai
    College of Automotive and Mechanical Engineering, Changsha University of Science & Technology, Changsha 410114, China. Hunan Key Laboratory of Smart Roadway and Cooperative Vehicle-Infrastructure Systems, Changsha, China.
    Xie, Jingyun
    College of Information Science and Engineering, Hunan Normal University, Changsha, China. Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Tang, Wensheng
    College of Information Science and Engineering, Hunan Normal University, Changsha, China. Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xiong, Naixue
    College of Intelligence and Computing, Tianjin University, Tianjin, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Receiver-Side TCP Countermeasure in Cellular Networks2019Ingår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 19, nr 12, artikel-id 2791Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cellular-based networks keep large buffers at base stations to smooth out the bursty data traffic, which has a negative impact on the user’s Quality of Experience (QoE). With the boom of smart vehicles and phones, this has drawn growing attention. For this paper, we first conducted experiments to reveal the large delays, thus long flow completion time (FCT), caused by the large buffer in the cellular networks. Then, a receiver-side transmission control protocol (TCP) countermeasure named Delay-based Flow Control algorithm with Service Differentiation (DFCSD) was proposed to target interactive applications requiring high throughput and low delay in cellular networks by limiting the standing queue size and decreasing the amount of packets that are dropped in the eNodeB in Long Term Evolution (LTE). DFCSD stems from delay-based congestion control algorithms but works at the receiver side to avoid the performance degradation of the delay-based algorithms when competing with loss-based mechanisms. In addition, it is derived based on the TCP fluid model to maximize the network utility. Furthermore, DFCSD also takes service differentiation into consideration based on the size of competing flows to shorten their completion time, thus improving user QoE. Simulation results confirmed that DFCSD is compatible with existing TCP algorithms, significantly reduces the latency of TCP flows, and increases network throughput.

  • 43.
    Niazi, Muaz A.
    et al.
    COSMOSE Research Group, Computer Science Department, COMSATS University, Islamabad, Pakistan.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Temkin, Anatoly
    Department of Computer Science, Boston University Metropolitan College, Boston, MA, USA.
    Review of “Exploratory Social Network Analysis with Pajek” by Wouter De Nooy, Andrej Mrvar and Vladimir Batageli2019Ingår i: Complex Adaptive Systems Modeling, E-ISSN 2194-3206, Vol. 7, nr 1Artikel, recension (Övrigt vetenskapligt)
  • 44.
    Andersson, Karl
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    You, Ilsun
    Soonchunhyang University, Asan, Republic of Korea.
    Rahmani, Rahim
    Stockholm University, Stockholm, Sweden.
    Sharma, Vishal
    Soonchunhyang University, Asan, Republic of Korea.
    Secure Computation on 4G/5G Enabled Internet-of-Things2019Ingår i: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2019, artikel-id 3978193Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

    Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.

    The scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making computing secure on 4G/5G enabled Internet-of-Things. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in 5G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data.

  • 45. de Lange, Michiel
    et al.
    Synnes, Kåre
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Leindecker, Gerald
    Smart Citizens in the Hackable City: On the Datafication, Playfulness, and Making of Urban Public Spaces Through Digital Art2019Ingår i: CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives / [ed] Carlos Smaniotta Costa, Springer, 2019, s. 157-166Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    This contribution explores concepts, approaches and technologies used to make urban public spaces more playful and artful. Through a variety of compelling narratives involving play and art it assists in the design of new cyberparks, public spaces where digitally mediated interactions are an inherent part. How can play and interactive art be used to strengthen urban public spaces by fostering citizen engagement and participation? We propose to not only utilise interactive media for designing urban (public) spaces, but also for social innovation for the benefit of citizens. in cyberparks. The contribution connects urbanity, play and games, as well as concepts of active and passive interactive digital art as part of trends towards pervasive urban interaction, gameful design and artification. We position this as an important part of developing human-centred smart cities where social capital is central, and where citizens engaging in play and art are prerequisites for sustainable communities. Using art, play and games to foster citizen engagement and collaboration is a means to develop social technologies and support the development of collective intelligence in cyberparks. This is studied in concrete cases, such as the Ice Castle in Luleå, Sweden and the Ars Electronica in Linz, from a multi-disciplinary stance involving interaction design, digital art, landscape design, architecture, and health proficiencies. We will analyse two cases of gameful design and one case of digital interactive art being used to address urban issues. Rezone the game is an interactive multimedia game developed to tackle vacancy in the city of Den Bosch in the Netherlands. The Neighbourhood is a board game developed to involve various stakeholders in making their neighbourhood using water as a collective resource.

  • 46.
    Lemlouma, T.
    et al.
    University of Rennes 1, Rennes, France.
    Laborie, S.
    University of Pau and Adour Countries, Anglet, France.
    Rachedi, A.
    University of Paris-Est Marne la Vallée, Champs-sur-Marne, France.
    Santos, A.
    Vestas, Leça do Balio, Porto, Portugal.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Special issue on selected papers from e-health pervasive wireless applications and services 20172019Ingår i: Information Science and Technology, ISSN 2078-2489, E-ISSN 2078-2489, Vol. 10, nr 2, artikel-id 52Artikel i tidskrift (Refereegranskat)
  • 47.
    Islam, Md. Zahirul
    et al.
    Department of Computer Science and Engineering University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Computer is a part and parcel in our day to day life and used in various fields. The interaction of human and computer is accomplished by traditional input devices like mouse, keyboard etc. Hand gestures can be a useful medium of human-computer interaction and can make the interaction easier. Gestures vary in orientation and shape from person to person. So, non-linearity exists in this problem. Recent research has proved the supremacy of Convolutional Neural Network (CNN) for image representation and classification. Since, CNN can learn complex and non-linear relationships among images, in this paper, a static hand gesture recognition method using CNN was proposed. Data augmentation like re-scaling, zooming, shearing, rotation, width and height shifting was applied to the dataset. The model was trained on 8000 images and tested on 1600 images which were divided into 10 classes. The model with augmented data achieved accuracy 97.12% which is nearly 4% higher than the model without augmentation (92.87%).

  • 48.
    Monrat, Ahmed Afif
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Schelén, Olov
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Survey of Blockchain from the Perspectives of Applications, Challenges and Opportunities2019Ingår i: IEEE Access, E-ISSN 2169-3536Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Blockchain is the underlying technology of a number of digital cryptocurrencies. Blockchain is a chain of blocks that store information with digital signatures in a decentralized and distributed network. The features of blockchain, including decentralization, immutability, transparency and auditability, make transactions more secure and tamper proof. Apart from cryptocurrency, blockchain technology can be used in financial and social services, risk management, healthcare facilities, and so on. A number of research studies focus on the opportunity that blockchain provides in various application domains. This paper presents a comparative study of the tradeoffs of blockchain and also explains the taxonomy and architecture of blockchain, provides a comparison among different consensus mechanisms and discusses challenges, including scalability, privacy, interoperability, energy consumption and regulatory issues. In addition, this paper also notes the future scope of blockchain technology.

  • 49.
    Du, Rong
    et al.
    Department of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden.
    Santi, Paolo
    MIT Senseable City Laboratory, Cambridge, MA 02139 USA and also with the Istituto di Informatica e Telematica del CNR, 56124 Pisa, Italy.
    Xiao, Ming
    Department of Information Science and Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden..
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Fischione, Carlo
    Department of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden.
    The sensable city: A survey on the deployment and management for smart city monitoring2019Ingår i: IEEE Communications Surveys and Tutorials, ISSN 1553-877X, E-ISSN 1553-877X, Vol. 21, nr 2, s. 1533-1560Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In last two decades, various monitoring systems have been designed and deployed in urban environments, toward the realization of the so called smart cities. Such systems are based on both dedicated sensor nodes, and ubiquitous but not dedicated devices such as smart phones and vehicles’ sensors. When we design sensor network monitoring systems for smart cities, we have two essential problems: node deployment and sensing management. These design problems are challenging, due to large urban areas to monitor, constrained locations for deployments, and heterogeneous type of sensing devices. There is a vast body of literature from different disciplines that have addressed these challenges. However, we do not have yet a comprehensive understanding and sound design guidelines. This article addresses such a research gap and provides an overview of the theoretical problems we face, and what possible approaches we may use to solve these problems. Specifically, this paper focuses on the problems on both the deployment of the devices (which is the system design/configuration part) and the sensing management of the devices (which is the system running part). We also discuss how to choose the existing algorithms in different type of monitoring applications in smart cities, such as structural health monitoring, water pipeline networks, traffic monitoring. We finally discuss future research opportunities and open challenges for smart city monitoring.

  • 50.
    Liu, Ling
    et al.
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Zhou, Yiqing
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tian, Lin
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Shi, Jinglin
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Time-domain ICIC and optimized designs for 5G and beyond: a survey2019Ingår i: Science China Information Sciences, ISSN 1674-733X, E-ISSN 1869-1919, Vol. 62, nr 2, artikel-id 21302Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Time-domain enhanced inter-cell interference coordination (eICIC) is an effective technique to reduce the cross-tier inter-cell interference (ICI) in long term evolution (LTE)-based heterogeneous small cell networks (HetSCNs). This paper first clarifies two main communication scenarios in HetSCNs, i.e., macrocells deployed with femtocells (macro-femto) and with picocells (macro-pico). Then, the main challenges in HetSCNs, particularly the severe cross-tier ICI in macro-femto caused by femtocells with closed subscribe group (CSG) access or in macro-pico caused by picocells with range expansion are analyzed. Based on the prominent feature of dominant interference in HetSCNs, the main idea of time-domain interference coordination and two basic schemes in the eICIC standardization, i.e., almost blank subframe (ABS) and orthogonal frequency division multiplexing symbol shift are presented, with a systematic introduction to the interactions of these tec