Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 793
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Jamil, Mohammad Newaj
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Belief Rule Based Expert System for Evaluating Technological Innovation Capability of High-Tech Firms Under Uncertainty2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Technological innovation capability (TIC) is a complicated and subtle concept which is based on multiple quantitative and qualitative criteria. The cores of a firm’s long-term competitive dominance are defined by technological innovation capability which is the incentive for a firm’s innovation. Various types of uncertainty can be noticed while considering multiple criteria for evaluating TIC. In order to evaluate TIC in a reliable way, a Belief Rule Base (BRB) Expert System can be used to handle both quantitative and qualitative data and their associated uncertainties. In this paper, a RESTful API-based BRB expert system is introduced to evaluate technological innovation capability by taking uncertainties into consideration. This expert system will facilitate firms’ managers to obtain a recapitulation of the TIC evaluation. It will help them to take essential steps to ensure corporate survival and strengthen their weak capabilities continuously to facilitate a competitive advantage. Other users can also use this API to apply BRB for a different domain. However, a comparison between the knowledge-driven approach (BRBES) and several data-driven models has been performed to find out the reliability in evaluating TIC. The result shows that the outcome of BRBES is better than other data-driven approaches.

  • 2.
    Huang, Mingfeng
    et al.
    School of Information Science and Engineering, Central South University, Changsha 410083, China..
    Liu, Anfeng
    School of Information Science and Engineering, Central South University, Changsha 410083, China.
    Xiong, Neal N.
    Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, USA.
    Wang, Tian
    School of Computer Science, National Huaqiao University, Quanzhou 362000, China..
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems2019Ingår i: IEEE Transactions on Systems, Man & Cybernetics. Systems, ISSN 2168-2216, E-ISSN 1349-2543, Vol. 49, nr 2, s. 317-332Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Millions of dedicated sensors are deployed in smart cities to enhance quality of urban living. Communication technologies are critical for connecting these sensors and transmitting events to sink. In control systems of mobile wireless sensor networks (MWSNs), mobile nodes are constantly moving to detect events, while static nodes constitute the communication infrastructure for information transmission. Therefore, how to communicate with sink quickly and effectively is an important research issue for control systems of MWSNs. In this paper, a communication scheme named first relay node selection based on fast response and multihop relay transmission with variable duty cycle (FRAVD) is proposed. The scheme can effectively reduce the network delay by combining first relay node selection with node duty cycles setting. In FRAVD scheme, first, for the first relay node selection, we propose a strategy based on fast response, that is, select the first relay node from adjacent nodes in the communication range within the shortest response time, and guarantee that the remaining energy and the distance from sink of the node are better than the average. Then for multihop data transmission of static nodes, variable duty cycle is introduced novelty, which utilizes the residual energy to improve the duty cycle of nodes in far-sink area, because nodes adopt a sleep-wake asynchronous mode, increasing the duty cycle can significantly improve network performance in terms of delays and transmission reliability. Our comprehensive performance analysis has demonstrated that compared with the communication scheme with fixed duty cycle, the FRAVD scheme reduces the network delay by 24.17%, improves the probability of finding first relay node by 17.68%, while also ensuring the network lifetime is not less than the previous researches, and is a relatively efficient low-latency communication scheme.

  • 3.
    Akter, Shamima
    et al.
    International Islamic University, Chittagong, Bangladesh.
    Nahar, Nazmun
    University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A New Crossover Technique to Improve Genetic Algorithm and Its Application to TSP2019Ingår i: Proceedings of 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 2019, artikel-id 18566123Konferensbidrag (Refereegranskat)
    Abstract [en]

    Optimization problem like Travelling Salesman Problem (TSP) can be solved by applying Genetic Algorithm (GA) to obtain perfect approximation in time. In addition, TSP is considered as a NP-hard problem as well as an optimal minimization problem. Selection, crossover and mutation are the three main operators of GA. The algorithm is usually employed to find the optimal minimum total distance to visit all the nodes in a TSP. Therefore, the research presents a new crossover operator for TSP, allowing the further minimization of the total distance. The proposed crossover operator consists of two crossover point selection and new offspring creation by performing cost comparison. The computational results as well as the comparison with available well-developed crossover operators are also presented. It has been found that the new crossover operator produces better results than that of other cross-over operators.

  • 4.
    Safkhani, Masoumeh
    et al.
    Department of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 23514-23526Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Telecare Medicine Information System (TMIS)'s security importance attracts a lot of attention these days. Whatever the security of TMIS improves, its application becomes wider. To address this requirement, recently, Li et al. proposed a new privacy-preserving RFID authentication protocol for TMIS. After that, Zhou et al. and also Benssalah et al. presented their scheme, which is not secure, and they presented their new authentication protocol and claim that their proposal can provide higher security for TMIS applications. In this stream, Zheng et al. proposed a novel authentication protocol with application in smart campus, including TMIS. In this paper, we present an efficient impersonation and replay attacks against Zheng et al. with the success probability of 1 and a desynchronization attack which is applicable against all of the rest three mentioned protocols with the success probability of 1-2^{-n} , where n is the protocols parameters length. After that, we proposed a new protocol despite these protocols can resist the attacks presented in this paper and also other active and passive attacks. Our proposed protocol's security is also done both informally and formally through the Scyther tool.

  • 5.
    Lan, Yihua
    et al.
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China.
    Bai, Kun
    School of Computer and Information Technology, Nanyang Normal University, Nanyang, China..
    Hung, Chih-Cheng
    Laboratory for Machine Vision and Security Research, College of Computing and Software Engineering, Kennesaw State University, Marietta, USA.
    Alelaiwi, Abdulhameed
    Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 45850-45857Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for health-care. The emergence of mobile cloud computing will provide cloud servers and storage for IMRT mobile applications, thus realizing visualized radiotherapy in a real sense.Equivalent uniform dose (EUD) is a biomedical indicator based on the dose measure. In this study, the dose volume histogram is used to describe the dose distribution of different tissues in target and nontarget regions. The traditional definition of equivalent uniform dose such as the exponential form and the linear form has only a few parameters in the model for fast calculation. However, there is no close relationship between this traditional definition and the dose volume histogram.In order to establish the consistency between the equivalent uniform dose and the dose volume histogram, this paper proposes a novel definition of equivalent uniform dose based on the volume dose curve, called VD-EUD. By using a unique organic volume weight curve, it is easy to calculate VD-EUD for different dose distributions. In the definition, different weight curves are used to represent the biological effects of different organs. For the target area, we should be more careful about those voxels with low dose (cold point); thus, the weight curve is monotonically decreasing. While for the nontarget area, the curve is monotonically increasing. Furthermore, we present the curves for parallel, serial and mixed organs of nontarget areas separately, and we define the weight curve form with only two parameters. Medical doctors can adjust the curve interactively according to different patients and organs. We also propose a fluence map optimization model with the VD-EUD constraint, which means the proposed EUD constraint will lead to a large feasible solution space.We compare the generalized equivalent uniform dose (gEUD) and the proposed VD-EUD by experiments, which show that the VD-EUD has a closer relationship with the dose volume histogram. If the biological survival probability is equivalent to the VD-EUD, the feasible solution space would be large, and the target areas can be covered.By establishing a personalized organic weight curve, medical doctors can have a unique VD-EUD for each patient. By using the flexible and adjustable equivalent uniform dose definition, we can establish VD-EUD-based fluence map optimization model, which will lead to a larger solution space than the traditional dose volume constraint-based model. The VD-EUD is a new definition; thus, we need more clinical testing and verification.

  • 6.
    Hossain, Mohammad Shahadat
    et al.
    University of Chittagong, Bangladesh.
    Sultana, Zinnia
    International Islamic University Chittagong, Bangladesh.
    Nahar, Lutfun
    International Islamic University Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    An Intelligent System to Diagnose Chikungunya under Uncertainty2019Ingår i: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 10, nr 2, s. 37-54Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Chikungunya is a virus-related disease, bring about by the virus called CHIKV that spreads throughmosquito biting. This virus first found in Tanzania, while blood from patients was isolated. Thecommon signs and symptoms, associated with Chikungunya are considered as fever, joint swelling,joint pain, muscle pain and headache. The examination of these signs and symptoms by the physician constitutes the typical preliminary diagnosis of this disease. However, the physician is unable tomeasure them with accuracy. Therefore, the preliminary diagnosis in most of the cases could sufferfrom inaccuracy, which leads to wrong treatment. Hence, this paper introduces the design and implementation of a belief rule based expert system (BRBES) which is capable to represent uncertainknowledge as well as inference under uncertainty. Here, the knowledge is illustrated by employing belief rule base while deduction is carried out by evidential reasoning. The real patient data of250 have been considered to demonstrate the accuracy and the robustness of the expert system. Acomparison has been performed with the results of BRBES and Fuzzy Logic Based Expert System(FLBES) as well as with the expert judgment. Furthermore, the result of BRBES has been contrastedwith various data-driven machine learning approaches, including ANN (Artificial Neural networks)and SVM (Support Vector Machine). The reliability of BRBESs was found better than those of datadriven machine learning approaches. Therefore, the BRBES presented in this paper could enable thephysician to conduct the analysis of Chikungunya more accurately.

  • 7.
    Chowdhury, Rumman Rashid
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Sazzad
    Department of Computer Science and Engineering, University of Liberal Arts Bangladesh, Dhaka, Bangladesh.
    Bangla Handwritten Character Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper proposes a process of Handwritten Character Recognition to recognize and convert images of individual Bangla handwritten characters into electronically editable format, which will create opportunities for further research and can also have various practical applications. The dataset used in this experiment is the BanglaLekha-Isolated dataset [1]. Using Convolutional Neural Network, this model achieves 91.81% accuracy on the alphabets (50 character classes) on the base dataset, and after expanding the number of images to 200,000 using data augmentation, the accuracy achieved on the test set is 95.25%. The model was hosted on a web server for the ease of testing and interaction with the model. Furthermore, a comparison with other machine learning approaches is presented.

  • 8.
    Li, Jianjiang
    et al.
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Zhang, Kai
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Yang, Xiaolei
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Wei, Peng
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Wang, Jie
    Department of Computer Science and Technology, University of Science and Technology, Beijing.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ranjan, Rajiv
    School of Computer Science, China University of Geosciences.
    Category Preferred Canopy-K-means based Collaborative Filtering algorithm2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 93, s. 1046-1054Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    It is the era of information explosion and overload. The recommender systems can help people quickly get the expected information when facing the enormous data flood. Therefore, researchers in both industry and academia are also paying more attention to this area. The Collaborative Filtering Algorithm (CF) is one of the most widely used algorithms in recommender systems. However, it has difficulty in dealing with the problems of sparsity and scalability of data. This paper presents Category Preferred Canopy-K-means based Collaborative Filtering Algorithm (CPCKCF) to solve the challenges of sparsity and scalability of data. In particular, CPCKCF proposes the definition of the User-Item Category Preferred Ratio (UICPR), and use it to compute the UICPR matrix. The results can be applied to cluster the user data and find the nearest users to obtain prediction ratings. Our experimentation results performed using the MovieLens dataset demonstrates that compared with traditional user-based Collaborative Filtering algorithm, the proposed CPCKCF algorithm proposed in this paper improved computational efficiency and recommendation accuracy by 2.81%.

  • 9.
    Alhamazani, Khalid
    et al.
    School of Computer Science and Engineering, University of New South Wales.
    Ranjan, Rajiv
    CSIRO Digital Productivity, Acton.
    Jayaraman, Prem
    CSIRO Digital Productivity, Acton.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liu, Chang
    Sydney University of Technology.
    Rabhi, Fethi
    School of Computer Science and Engineering, University of New South Wales.
    Georgakopoulos, Dimitrios
    Royal Melbourne Institute of Technology, Melbourne.
    Wang, Lizhe
    Chinese Academy of Sciences, Beijing.
    Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework2019Ingår i: I E E E Transactions on Cloud Computing, ISSN 2168-7161, Vol. 7, nr 1, s. 48-61Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cloud computing provides on-demand access to affordable hardware (e.g., multi-core CPUs, GPUs, disks, and networking equipment) and software (e.g., databases, application servers and data processing frameworks) platforms with features such as elasticity, pay-per-use, low upfront investment and low time to market. This has led to the proliferation of business critical applications that leverage various cloud platforms. Such applications hosted on single/multiple cloud provider platforms have diverse characteristics requiring extensive monitoring and benchmarking mechanisms to ensure run-time Quality of Service (QoS) (e.g., latency and throughput). This paper proposes, develops and validates CLAMBS—Cross-Layer Multi Cloud Application Monitoring and Benchmarking as-a-Service for efficient QoS monitoring and benchmarking of cloud applications hosted on multi-clouds environments. The major highlight of CLAMBS is its capability of monitoring and benchmarking individual application components such as databases and web servers, distributed across cloud layers (*-aaS), spread among multiple cloud providers. We validate CLAMBS using prototype implementation and extensive experimentation and show that CLAMBS efficiently monitors and benchmarks application components on multi-cloud platforms including Amazon EC2 and Microsoft Azure.  

  • 10.
    Synnes, Kåre
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Artopoulos, Georgios
    The Cyprus Institute, Nicosia, Cyprus.
    Smaniotto Costa, Carlos
    Universidade Lusófona, Lisbon, Portugal.
    Menezes, Marluci
    National Laboratory for Civil Engineering – LNEC, Lisbon, Portugal.
    Redaelli, Gaia
    Politecnico di Milano, Milan, Italy.
    CyberParks Songs and Stories - Enriching Public Spaces with Localized Culture Heritage Material such as Digitized Songs and Stories: Enriching Public Spaces with Localized Culture Heritage Material such as Digitized Songs and Stories2019Ingår i: CyberParks - The Interface Between People, Places and Technology: New Approaches and Perspectives / [ed] Carlos Smaniotto Costa, Springer, 2019, s. 224-237Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    This chapter offers theoretical considerations and reflections on technological solutions that contribute to digitally supported documentation, access and reuse of localised heritage content in public spaces. It addresses immaterial cultural heritage, including informal stories that could emerge and be communicated by drawing hyperlinks between digitised assets, such as songs, images, drawings, texts and more, and not yet documented metadata, as well as augmenting interaction opportunities with interactive elements that relate to multiple media stored in databases and archives across Europe. The aim is to enable cultural heritage to be experienced in novel ways, supported by the proliferation of smartphones and ubiquitous Internet access together with new technical means for user profiling, personalisation, localisation, contextawareness and gamification. The chapter considers cyberparks as digitally enhanced public spaces for accessing and analyzing European cultural heritage and for enriching the interpretation of the past, along with theoretical ramifications and technological limitations. It identifies the capacities of a proposed digital environment together with design guidelines for interaction with cultural heritage assets in public spaces. The chapter concludes with describing a taxonomy of digital content that can be used in order to enhance association and occupation conditions of public spaces, and with discussing technological challenges associated with enriching public spaces with localized cultural heritage material.

  • 11.
    Noor, Ayman
    et al.
    Newcastle University, Newcastle upon Tyne, UK. Taibah University, Madinah, Saudi Arabia.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Solaiman, Ellis
    Newcastle University, Newcastle upon Tyne, UK.
    Souza, Arthur
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Jha, Devki Nandan
    Newcastle University, Newcastle upon Tyne, UK.
    Demirbaga, Umit
    Newcastle University, Newcastle upon Tyne, UK. Bartin University, Bartin, Turkey.
    Jayaraman, Prem Prakash
    Swinburne University of Technology, Melbourne, Australia.
    Cacho, Nelio
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Ranjan, Rajiv
    Newcastle University, Newcastle upon Tyne, UK.
    Cyber-physical application monitoring across multiple clouds2019Ingår i: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 77, s. 314-324Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Cyber-physical systems (CPS) integrate cyber-infrastructure comprising computers and networks with physical processes. The cyber components monitor, control, and coordinate the physical processes typically via actuators. As CPS are characterized by reliability, availability, and performance, they are expected to have a tremendous impact not only on industrial systems but also in our daily lives. We have started to witness the emergence of cloud-based CPS. However, cloud systems are prone to stochastic conditions that may lead to quality of service degradation. In this paper, we propose M2CPA - a novel framework for multi-virtualization, and multi-cloud monitoring in cloud-based cyber-physical systems. M2CPA monitors the performance of application components running inside multiple virtualization platforms deployed on multiple clouds. M2CPA is validated through extensive experimental analysis using a real testbed comprising multiple public clouds and multi-virtualization technologies.

  • 12.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russian Federation.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, India.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Rodrigues, Joel J. P. C.
    National Institute of Telecommunications (Inatel), Brazil; Instituto de Telecomunicações, Portugal; University of Fortaleza (UNIFOR), Brazil.
    Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment2019Ingår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, nr 2, s. 3572-3584, artikel-id 8581510Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.

  • 13.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russian Federation.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, India.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Design of secure key management and user authentication scheme for fog computing services2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, s. 475-492Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.

  • 14.
    Xu, Xiwei
    et al.
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Lu, Qinghua
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Liu, Yue
    College of Computer and Communication Engineering, China. University of Petroleum (East China), Qingdao, China.
    Zhu, Liming
    Data61, CSIRO, Sydney, Australia. School of Computer Science and Engineering, UNSW, Sydney, Australia.
    Yao, Haonan
    College of Computer and Communication Engineering, China. University of Petroleum (East China), Qingdao, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Designing blockchain-based applications a case study for imported product traceability2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, s. 399-406Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Blockchain technology enables decentralization as new forms of distributed software architectures, where components can reach agreements on the shared system states without trusting on a central integration point. Since blockchain is an emerging technology which is still at an early stage of development, there is limited experience on applying blockchain to real-world software applications. We applied blockchain application design approaches proposed in software architecture community in a real-world project called originChain, which is a blockchain-based traceability system that restructures the current system by replacing the central database with blockchain. In this paper, we share our experience of building originChain. By using blockchain and designing towards security, originChain provides transparent tamper-proof traceability data with high availability and enables automated regulatory-compliance checking and adaptation in product traceability scenarios. We also demonstrate both qualitative and quantitative analysis of the software architecture of originChain. Based on our experience and analysis, we found that the structural design of smart contracts has large impact on the quality of the system.

  • 15.
    Sakr, Sherif
    et al.
    University of Taru, Estonia.
    Zomaya, Albert
    University of Sydney, Australia.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Editorial for Special issue of FGCS special issue on “Benchmarking big data systems”2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 96, s. 32-34Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Even though several big data processing and analytics systems have been introduced with various design architectures, we are still lacking a deeper understanding of the performance characteristics for the various design architectures in addition to lacking comprehensive benchmarks for the various Big Data platforms. There is a crucial need to conduct fundamental research with a more comprehensive performance evaluation for the various Big Data processing systems and architectures. We also lack the availability of validation tools, standard benchmarks, and system performance prediction methods that can help us have a deeper and more solid understanding of the strengths and weaknesses of the various Big Data processing platforms. This special issue is dedicated to original results and achievements by active researchers, designers, and developers working on various issues and challenges related to big data research.

  • 16.
    Kor, Ah-Lian
    et al.
    Leeds Beckett University.
    Rondeau, Eric
    University of Lorraine, Nancy, France.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Porras, Jari
    Lappeenranta University of Technology, Finland.
    Georges, Jean-Philippe
    University of Lorraine, Nance, France.
    Education in Green ICT and Control of Smart Systems: A First Hand Experience from the International PERCCOM Masters Programme2019Ingår i: Proceedings of the 12th International Federation of Automatic Control Symposium on Advances in Control Education (IFAC-ACE 2019), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    PERCCOM (PERvasive Computing and COMmunications in sustainable development) Masters is the first innovative international programme in Green ICT for educating and equipping new IT engineers with Green IT skills for sustainable digital applications design and implementation. After five years of running the PERCCOM programme, this paper provides an assessment of skills and employability in the context of Green jobs and skills. The paper ends with a list of recommendations for the development of environment related education curricula.

  • 17.
    Wu, Weiwei
    et al.
    School of Computer Science, Southeast University, Nanjing, Jiangsu, China.
    Wang, Wanyuan
    School of Computer Science and Engeering, Southeast University, Nanjing, Jiangsu China.
    Fang, Xiaolin
    Computer Science and Engineering, Harbin Institute of Technology, Harbin, Heilongjiang China.
    Junzhou, Luo
    School of Computer Science and Engineering, Southeast University, Nanjing, Jiangsu China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Electricity Price-aware Consolidation Algorithms for Time-sensitive VM Services in Cloud Systems2019Ingår i: IEEE Transactions on Services Computing, ISSN 1939-1374, E-ISSN 1939-1374Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Despite the salient feature of cloud computing, the cloud provider still suffers from electricity bill, which mainly comes from 1) the power consumption of running physical machines and 2) the dynamically varying electricity price offered by smart grids. In the literature, there exist viable solutions adaptive to electricity price variation to reduce the electricity bill. However, they are not applicable to serving time-sensitive VM requests. In serving time-sensitive VM requests, it is potential for the cloud provider to apply proper consolidation strategies to further reduce the electricity bill. In this work, to address this challenge, we develop electricity-price-aware consolidation algorithms for both the offline and online scenarios. For the offline scenario, we first develop an consolidation algorithm with constant approximation, which always approaches the optimal solution within a constant factor of 5. For the online scenario, we propose an $O(\log(\frac{L_{max}}{L_{min}}))$ -competitive algorithm that is able to approach the optimal offline solution within a logarithmic factor, where $\frac{L_{max}}{L_{min}}$ is the ratio of the longest length of the processing time requirement of VMs to the shortest one. Our trace-driven simulation results further demonstrate that the average performance of the proposed algorithms produce near-optimal electricity bill.

  • 18.
    Fu, Zhangjie
    et al.
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Huang, Fengxiao
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Sun, Xingming
    Department of Computer and Software, Nanjing University of Information Science and Technology.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Enabling Semantic Search based on ConceptualGraphs over Encrypted Outsourced Data2019Ingår i: IEEE Transactions on Services Computing, ISSN 1939-1374, E-ISSN 1939-1374Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Currently, searchable encryption is a hot topic in the field of cloud computing. The existing achievements are mainly focused on keyword-based search schemes, and almost all of them depend on predefined keywords extracted in the phases of index construction and query. However, keyword-based search schemes ignore the semantic representation information of users’ retrieval and cannot completely match users’ search intention. Therefore, how to design a content-based search scheme and make semantic search more effective and context-aware is a difficult challenge. In this paper, for the first time, we define and solve the problems of semantic search based on conceptual graphs(CGs) over encrypted outsourced data in clouding computing (SSCG).We firstly employ the efficient measure of ”sentence scoring” in text summarization and Tregex to extract the most important and simplified topic sentences from documents. We then convert these simplified sentences into CGs. To perform quantitative calculation of CGs, we design a new method that can map CGs to vectors. Next, we rank the returned results based on ”text summarization score”. Furthermore, we propose a basic idea for SSCG and give a significantly improved scheme to satisfy the security guarantee of searchable symmetric encryption (SSE). Finally, we choose a real-world dataset – ie., the CNN dataset to test our scheme. The results obtained from the experiment show the effectiveness of our proposed scheme.

  • 19.
    Poirot, Valentin
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ericson, Mårten
    Ericsson Research, Luleå, Sweden.
    Nordberg, Mats
    Ericsson Research, Luleå, Sweden.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Energy efficient multi-connectivity algorithms for ultra-dense 5G networks2019Ingår i: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, s. 1-16Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Two radio air interfaces, Evolved-LTE and New Radio, coexist in new 5G systems. New Radio operates in the millimeter band and provides a better bandwidth, but the higher frequencies also imply worse radio conditions. Multi-connectivity, a feature of 5G that allows users to connect to more than one base station simultaneously, can offer the advantages of both interfaces. In this paper, we investigate how multi-connectivity can improve user reliability and the system’s energy efficiency. Five algorithms for secondary cell association are presented and evaluated. We show a decrease in the radio link failure rate of up to 50% at high speeds and improvements of the energy efficiency of up to 20% at low speeds.

  • 20.
    Sun, Gang
    et al.
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Li, Yayu
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Yu, Hongfang
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Du, Xiaojiang
    Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA.
    Guizani, Mohsen
    Department of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA.
    Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, s. 347-360Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Service function chaining (SFC) provisioning is helpful not only for saving the capital expenditure (CAPEX) and operational expenditure (OPEX) of a network provider but also for reducing energy consumption in the substrate network. However, to the best of our knowledge, there has been little research on the problem of energy consumption for orchestrating online SFC requests in multi-domain networks. In this paper, we first formulate the problem of an energy-efficient online SFC request that is orchestrated across multiple clouds as an integer linear programming (ILP) model to find an optimal solution. Then, we analyze the complexity of this ILP model and prove that the problem is NP-hard. Additionally, we propose a low-complexity heuristic algorithm named energy-efficient online SFC request orchestration across multiple domains (EE-SFCO-MD) for near-optimally solving the mentioned problem. Finally, we conduct simulation experiments to evaluate the performance of our algorithm. Simulation results show that EE-SFCO-MD consumes less energy than existing approaches while the online SFC’s requirements are met and the privacy of each cloud is effectively guaranteed. The low computational complexity of the heuristic approach makes it applicable for quickly responding to online SFC requests.

  • 21.
    Uddin Ahmed, Tawsin
    et al.
    Department of Computer Science and Engineering, University of Chittagong, Bangladesh.
    Hossain, Sazzad
    Department of Computer Science and Engineering, University of Liberal Arts Bangladesh, Dhaka, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Facial Expression Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Detecting emotion from facial expression has become an urgent need because of its immense applications in artificial intelligence such as human-computer collaboration, data-driven animation, human-robot communication etc. Since it is a demanding and interesting problem in computer vision, several works had been conducted regarding this topic. The objective of this research is to develop a facial expression recognition system based on convolutional neural network with data augmentation. This approach enables to classify seven basic emotions consist of angry, disgust, fear, happy, neutral, sad and surprise from image data. Convolutional neural network with data augmentation leads to higher validation accuracy than the other existing models (which is 96.24%) as well as helps to overcome their limitations.

  • 22.
    Makkie, Milad
    et al.
    Computer Science Department, University of Georgia, Athens, GA, USA.
    Huang, Heng
    School of Automation, Northwestern Polytechnical University, Xi'an, China.
    Zhao, Yu
    Computer Science Department, University of Georgia, Athens, GA, USA.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Liu, Tianming
    Harvard Center for Neurodegeneration and Repair, Boyd GSRC 420, Athens, GA 30602, United States.
    Fast and Scalable Distributed Deep Convolutional Autoencoder for fMRI Big Data Analytics2019Ingår i: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 325, s. 20-30Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, analyzing task-based fMRI (tfMRI) data has become an essential tool for understanding brain function and networks. However, due to the sheer size of tfMRI data, its intrinsic complex structure, and lack of ground truth of underlying neural activities, modeling tfMRI data is hard and challenging. Previously proposed data modeling methods including Independent Component Analysis (ICA) and Sparse Dictionary Learning only provided shallow models based on blind source separation under the strong assumption that original fMRI signals could be linearly decomposed into time series components with corresponding spatial maps. Given the Convolutional Neural Network (CNN) successes in learning hierarchical abstractions from low-level data such as tfMRI time series, in this work we propose a novel scalable distributed deep CNN autoencoder model and apply it for fMRI big data analysis. This model aims to both learn the complex hierarchical structures of the tfMRI big data and to leverage the processing power of multiple GPUs in a distributed fashion. To deploy such a model, we have created an enhanced processing pipeline on the top of Apache Spark and Tensorflow, leveraging from a large cluster of GPU nodes over cloud. Experimental results from applying the model on the Human Connectome Project (HCP) data show that the proposed model is efficient and scalable toward tfMRI big data modeling and analytics, thus enabling data-driven extraction of hierarchical neuroscientific information from massive fMRI big data.

  • 23.
    Dadhich, Siddharth
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Sandin, Fredrik
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Bodin, Ulf
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ulf
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Signaler och system.
    Martinsson, Torbjörn
    Volvo CE, Bolindervägen 5, 63185 Eskilstuna, Sweden.
    Field test of neural-network based automatic bucket-filling algorithm for wheel-loaders2019Ingår i: Automation in Construction, ISSN 0926-5805, E-ISSN 1872-7891, Vol. 97, s. 1-12Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Automation of earth-moving industries (construction, mining and quarry) require automatic bucket-filling algorithms for efficient operation of front-end loaders. Autonomous bucket-filling is an open problem since three decades due to difficulties in developing useful earth models (soil, gravel and rock) for automatic control. Operators make use of vision, sound and vestibular feedback to perform the bucket-filling operation with high productivity and fuel efficiency. In this paper, field experiments with a small time-delayed neural network (TDNN) implemented in the bucket control-loop of a Volvo L180H front-end loader filling medium coarse gravel are presented. The total delay time parameter of the TDNN is found to be an important hyperparameter due to the variable delay present in the hydraulics of the wheel-loader. The TDNN network successfully performs the bucket-filling operation after an initial period (100 examples) of imitation learning from an expert operator. The demonstrated solution show only 26% longer bucket-filling time, an improvement over manual tele-operation performance.

  • 24.
    Lindberg, Renny S. N.
    et al.
    Vrije Universiteit Brussel.
    Laine, Teemu H.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Haaranen, Lassi
    Aalto University.
    Gamifying programming education in K‐12: A review of programming curricula in seven countries and programming games2019Ingår i: British Journal of Educational Technology, ISSN 0007-1013, E-ISSN 1467-8535, Vol. 50, nr 4, s. 1979-1995Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    An increasing number of countries have recently included programming education in their curricula. Similarly, utilizing programming concepts in gameplay has become popular in the videogame industry. Although many games have been developed for learning to program, their variety and their correspondence to national curricula remain an uncharted territory. Consequently, this paper has three objectives. Firstly, an investigation on the guidelines on programming education in K‐12 in seven countries was performed by collecting curricula and other relevant data official from governmental and non‐profit educational websites. Secondly, a review of existing acquirable games that utilize programming topics in their gameplay was conducted by searching popular game stores. Lastly, we compared the curricula and made suggestions as to which age group the identified games would be suitable. The results of this study can be useful to educators and curriculum designers who wish to gamify programming education.

  • 25.
    Yang, Chao-Tung
    et al.
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Chen, Shuo-Tsung
    Artificial Intelligence Recognition Industry Service Research Center (AIR-IS Research Center), National Yunlin University of Science and Technology, Yunlin, Taiwan, ROC. College of Future, Bachelor Program in Interdisciplinary Studies, National Yunlin University of Science and Technology, Taiwan, ROC.
    Liu, Jung-Chun
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Yang, Yao-Yu
    Department of Computer Science, Tunghai University, Taichung City, Taiwan, ROC.
    Mitra, Karan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ranjan, Rajiv
    School of Computer, China University of Geosciences, China. School of Computing Science, Newcastle University, United Kingdom.
    Implementation of a real-time network traffic monitoring service with network functions virtualization2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 93, s. 687-701Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Network Functions Virtualization (NFV) extends the functionality provided by Software-Defined Networking (SDN). It is a virtualization technology that aims to replace the functionality provided by traditional networking hardware using software solutions. Thereby, enabling cheaper and efficient network deployment and management. The use of NFV and SDN is anticipated to enhance the performance of Infrastructure-as-a-Service (IaaS) clouds. However, due to the presence of a large number of network devices in IaaS clouds offering a plethora of networked services, there is need to develop a traffic monitoring system for the efficient network. This paper proposes and validates an extensible SDN and NFV-enabled network traffic monitoring system. Using extensive experiments, we show that the proposed system can closely match the performance of traditional networks at cheaper costs and by adding more flexibility to network management tasks.

  • 26.
    Liu, Xiao
    et al.
    School of Information Science and Engineering, Central South University, ChangSha .
    Zhao, Shaona
    School of Information Science and Engineering, Central South University, ChangSha .
    Liu, Anfeng
    School of Information Science and Engineering, Central South University, ChangSha .
    Xiong, Naixue
    Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK .
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things2019Ingår i: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, s. 1142-1156Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Internet of Things will serve communities across the different domains of life. Tracking mobile targets is one important system engineering application in IOT, and the resource of embedded devices and objects working under IoT implementation are constrained. Thus, building a scheme to make full use of energy is key issue for mobile target tracking applications. To achieve both energy efficiency and high monitoring performance, an effective Knowledge-aware Proactive Nodes Selection (KPNS) system is proposed in this paper. The innovations of KPNS are as follows: 1) the number of proactive nodes are dynamically adjusted based on prediction accuracy of target trajectory. If the prediction accuracy is high, the number of proactive nodes in the non-main predicted area will be decreased. If prediction accuracy of moving trajectory is low, large number of proactive nodes will be selected to enhance monitoring quality. 2) KPNS takes full advantage of energy to further enhance target tracking performance by properly selecting more proactive nodes in the network. We evaluated the efficiency of KPNS with both theory analysis and simulation based experiments. The experimental results demonstrate that compared with Probability-based target Prediction and Sleep Scheduling strategy (PPSS), KPNS scheme improves the energy efficiency by 60%, and can reduce target missing rate and tracking delay to 66%, 75% respectively.

  • 27.
    Song, Qiang
    et al.
    Henan University of Technology, College of Electrical Engineering, Zhengzhou, China.
    Liu, Fang
    Huanghuai University, Zhumadian, China.
    Cao, Jinde
    Southeast University, Research Center for Complex Systems and Network Sciences, Nanjing, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tang, Yang
    East China University of Science and Technology, Institute of Physics, Berlin, Germany.
    Leader-following synchronization of coupled homogeneous and heterogeneous harmonic oscillators based on relative position measurements2019Ingår i: IEEE Transactions on Control of Network Systems, ISSN 2325-5870, Vol. 6, nr 1, s. 13-23Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper considers the leader-following synchronization problem for a network of coupled harmonic oscillators by utilizing the relative position measurements between neighboring nodes, where the node dynamics can be either identical or nonidentical. For a homogeneous network with the same node dynamics, two types of first-order observer-based protocols are proposed to achieve leader-following synchronization in the network under some necessary and sufficient conditions, including some synchronization criteria for the homogeneous network subject to parameter uncertainty. For a heterogeneous network with different node dynamics, an output regulation approach is applied to solve the leader-following synchronization problem for the nominal network, based on which the robust synchronization of the uncertain network is investigated with an allowable bound being estimated for parameter uncertainties. Numerical examples are given to illustrate the correctness and the feasibility of the theoretical analysis. 

  • 28.
    Seo, Jungryul
    et al.
    Ajou University.
    Laine, Teemu H.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Sohn, Kyung-Ah
    Ajou University.
    Machine learning approaches for boredom classification using EEG2019Ingår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Recently, commercial physiological sensors and computing devices have become cheaper and more accessible, while computer systems have become increasingly aware of their contexts, including but not limited to users’ emotions. Consequently, many studies on emotion recognition have been conducted. However, boredom has received relatively little attention as a target emotion due to its diverse nature. Moreover, only a few researchers have tried classifying boredom using electroencephalogram (EEG). In this study, to perform this classification, we first reviewed studies that tried classifying emotions using EEG. Further, we designed and executed an experiment, which used a video stimulus to evoke boredom and non-boredom, and collected EEG data from 28 Korean adult participants. After collecting the data, we extracted its absolute band power, normalized absolute band power, differential entropy, differential asymmetry, and rational asymmetry using EEG, and trained these on three machine learning algorithms: support vector machine, random forest, and k-nearest neighbors (k-NN). We validated the performance of each training model with 10-fold cross validation. As a result, we achieved the highest accuracy of 86.73% using k-NN. The findings of this study can be of interest to researchers working on emotion recognition, physiological signal processing, machine learning, and emotion-aware system development.

  • 29.
    Li, He
    et al.
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Ota, Kaoru
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Dong, Mianxiong
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nagano, Koji
    Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Hokkaido.
    Multimedia Processing Pricing Strategy in GPU-accelerated Cloud Computing2019Ingår i: IEEE Transactions on Cloud Computing, E-ISSN 2168-7161Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Graphics processing unit (GPU) accelerated processing performs significant efficiency in many multimedia applications. With the development of GPU cloud computing, more and more cloud providers focus on GPU-accelerated services. Since the high maintenance cost and different speedups for various applications, GPU-accelerated services still need a different pricing strategy. Thus, in this paper, we propose an optimal GPU-accelerated multimedia processing service pricing strategy for maximize the profits of both cloud provider and users. We first analyze the revenues and costs of the cloud provider and users when users adopt GPU-accelerated multimedia processing services then state the profit functions of both the cloud provider and users. With a game theory based method, we find the optimal solutions of both the cloud provider’s and users’ profit functions. Finally, through large scale simulations, our pricing strategy brings higher profit to the cloud provider and users compared to the original pricing strategy of GPU cloud services.

  • 30.
    Araujo, Victor
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Saguna, Saguna
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Åhlund, Christer
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Performance evaluation of FIWARE: A cloud-based IoT platform for smart cities2019Ingår i: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 132, s. 250-261Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    As the Internet of Things (IoT) becomes a reality, millions of devices will be connected to IoT platforms in smart cities. These devices will cater to several areas within a smart city such as healthcare, logistics, and transportation. These devices are expected to generate significant amounts of data requests at high data rates, therefore, necessitating the performance benchmarking of IoT platforms to ascertain whether they can efficiently handle such devices. In this article, we present our results gathered from extensive performance evaluation of the cloud-based IoT platform, FIWARE. In particular, to study FIWARE’s performance, we developed a testbed and generated CoAP and MQTT data to emulate large-scale IoT deployments, crucial for future smart cities. We performed extensive tests and studied FIWARE’s performance regarding vertical and horizontal scalability. We present bottlenecks and limitations regarding FIWARE components and their cloud deployment. Finally, we discuss cost-efficient FIWARE deployment strategies that can be extremely beneficial to stakeholders aiming to deploy FIWARE as an IoT platform for smart cities.

  • 31.
    Dong, Pingping
    et al.
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xie, Jingyun
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Tang, Wensheng
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Xiong, Naixue
    College of Intelligence and Computing, Tianjin University, Tianjin, 300350, China.
    Zhong, Hua
    Hunnan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Performance Evaluation of Multipath TCP Scheduling Algorithms2019Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 29818-29825Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    One of the goals of 5G is to provide enhanced mobile broadband and enable low latency in some use cases. To achieve this aim, the Internet Engineering Task Force (IETF) has proposed the Multipath TCP (MPTCP) by utilizing the feature of dual connectivity in 5G, where a 5G device can be served by two different base stations. However, the path heterogeneity between the 5G device to the server may cause packet out-of-order problem. The researchers proposed a number of scheduling algorithms to tackle this issue. This paper introduces the existing algorithms, and with the aim to make a thorough comparison between the existing scheduling algorithms and provide guidelines for designing new scheduling algorithms in 5G, we have conducted an extensive set of emulation studies based on the real Linux experimental platform. The evaluation covers a wide range of network scenarios to investigate the impact of different network metrics, namely, RTT, buffer size and file size on the performance of existing widely-deployed scheduling algorithms.

  • 32.
    Niazi, Muaz A.
    et al.
    COSMOSE Research Group, Computer Science Department, COMSATS University, Islamabad, Pakistan.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Temkin, Anatoly
    Department of Computer Science, Boston University Metropolitan College, Boston, MA, USA.
    Review of “Exploratory Social Network Analysis with Pajek” by Wouter De Nooy, Andrej Mrvar and Vladimir Batageli2019Ingår i: Complex Adaptive Systems Modeling, E-ISSN 2194-3206, Vol. 7, nr 1Artikel, recension (Övrigt vetenskapligt)
  • 33.
    Andersson, Karl
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    You, Ilsun
    Soonchunhyang University, Asan, Republic of Korea.
    Rahmani, Rahim
    Stockholm University, Stockholm, Sweden.
    Sharma, Vishal
    Soonchunhyang University, Asan, Republic of Korea.
    Secure Computation on 4G/5G Enabled Internet-of-Things2019Ingår i: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2019, artikel-id 3978193Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The rapid development of Internet-of-Things (IoT) techniques in 4G/5G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through 4G and 5G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

    Data privacy in a distributed environment like IoT can be attained through secure multiparty computation. An emerging area of potential applications for secure computation is to address privacy concerns in data aggregation and analysis to match the explosive growth of the amount of IoT data. However, the inherent complexity of IoT systems really complicates the design and deployment of efficient, interoperable, and scalable secure computation mechanisms. As a result, there is an increasing demand for the development of new secure computation methods and tools which can fill in the gap between security and practical usage in IoT.

    The scope of this special issue is in line with recent contributions from academia and industry on the recent activities that tackle the technical challenges making computing secure on 4G/5G enabled Internet-of-Things. For the current issue, we are pleased to introduce a collection of papers covering a range of topics such as securely verifiable remote erasure schemes, multiuser identification algorithms, privacy-preserving shared storage, situational aware threat assessment, authorized client-side deduplication in cloud storage, radio environment map construction, analysis of the vulnerabilities of connected car environments, combat pollution attacks in 5G multihop networks, automatically traceback RDP-based targeted ransomware attacks, multiresolution face recognition through virtual faces generation, anonymous communication via anonymous identity-based encryption, and Secure Storage and Retrieval of IoT Data.

  • 34. de Lange, Michiel
    et al.
    Synnes, Kåre
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Leindecker, Gerald
    Smart Citizens in the Hackable City: On the Datafication, Playfulness, and Making of Urban Public Spaces Through Digital Art2019Ingår i: CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives / [ed] Carlos Smaniotta Costa, Springer, 2019, s. 157-166Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    This contribution explores concepts, approaches and technologies used to make urban public spaces more playful and artful. Through a variety of compelling narratives involving play and art it assists in the design of new cyberparks, public spaces where digitally mediated interactions are an inherent part. How can play and interactive art be used to strengthen urban public spaces by fostering citizen engagement and participation? We propose to not only utilise interactive media for designing urban (public) spaces, but also for social innovation for the benefit of citizens. in cyberparks. The contribution connects urbanity, play and games, as well as concepts of active and passive interactive digital art as part of trends towards pervasive urban interaction, gameful design and artification. We position this as an important part of developing human-centred smart cities where social capital is central, and where citizens engaging in play and art are prerequisites for sustainable communities. Using art, play and games to foster citizen engagement and collaboration is a means to develop social technologies and support the development of collective intelligence in cyberparks. This is studied in concrete cases, such as the Ice Castle in Luleå, Sweden and the Ars Electronica in Linz, from a multi-disciplinary stance involving interaction design, digital art, landscape design, architecture, and health proficiencies. We will analyse two cases of gameful design and one case of digital interactive art being used to address urban issues. Rezone the game is an interactive multimedia game developed to tackle vacancy in the city of Den Bosch in the Netherlands. The Neighbourhood is a board game developed to involve various stakeholders in making their neighbourhood using water as a collective resource.

  • 35.
    Lemlouma, T.
    et al.
    University of Rennes 1, Rennes, France.
    Laborie, S.
    University of Pau and Adour Countries, Anglet, France.
    Rachedi, A.
    University of Paris-Est Marne la Vallée, Champs-sur-Marne, France.
    Santos, A.
    Vestas, Leça do Balio, Porto, Portugal.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Special issue on selected papers from e-health pervasive wireless applications and services 20172019Ingår i: Information Science and Technology, ISSN 2078-2489, E-ISSN 2078-2489, Vol. 10, nr 2, artikel-id 52Artikel i tidskrift (Refereegranskat)
  • 36.
    Islam, Md. Zahirul
    et al.
    Department of Computer Science and Engineering University of Chittagong, Bangladesh.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation2019Ingår i: Proceedings of the Joint 2019 8th International Conference on Informatics, Electronics & Vision (ICIEV), IEEE, 2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    Computer is a part and parcel in our day to day life and used in various fields. The interaction of human and computer is accomplished by traditional input devices like mouse, keyboard etc. Hand gestures can be a useful medium of human-computer interaction and can make the interaction easier. Gestures vary in orientation and shape from person to person. So, non-linearity exists in this problem. Recent research has proved the supremacy of Convolutional Neural Network (CNN) for image representation and classification. Since, CNN can learn complex and non-linear relationships among images, in this paper, a static hand gesture recognition method using CNN was proposed. Data augmentation like re-scaling, zooming, shearing, rotation, width and height shifting was applied to the dataset. The model was trained on 8000 images and tested on 1600 images which were divided into 10 classes. The model with augmented data achieved accuracy 97.12% which is nearly 4% higher than the model without augmentation (92.87%).

  • 37.
    Du, Rong
    et al.
    Department of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden.
    Santi, Paolo
    MIT Senseable City Laboratory, Cambridge, MA 02139 USA and also with the Istituto di Informatica e Telematica del CNR, 56124 Pisa, Italy.
    Xiao, Ming
    Department of Information Science and Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden..
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Fischione, Carlo
    Department of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, 10044, Sweden.
    The sensable city: A survey on the deployment and management for smart city monitoring2019Ingår i: IEEE Communications Surveys and Tutorials, ISSN 1553-877X, E-ISSN 1553-877X, Vol. 21, nr 2, s. 1533-1560Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In last two decades, various monitoring systems have been designed and deployed in urban environments, toward the realization of the so called smart cities. Such systems are based on both dedicated sensor nodes, and ubiquitous but not dedicated devices such as smart phones and vehicles’ sensors. When we design sensor network monitoring systems for smart cities, we have two essential problems: node deployment and sensing management. These design problems are challenging, due to large urban areas to monitor, constrained locations for deployments, and heterogeneous type of sensing devices. There is a vast body of literature from different disciplines that have addressed these challenges. However, we do not have yet a comprehensive understanding and sound design guidelines. This article addresses such a research gap and provides an overview of the theoretical problems we face, and what possible approaches we may use to solve these problems. Specifically, this paper focuses on the problems on both the deployment of the devices (which is the system design/configuration part) and the sensing management of the devices (which is the system running part). We also discuss how to choose the existing algorithms in different type of monitoring applications in smart cities, such as structural health monitoring, water pipeline networks, traffic monitoring. We finally discuss future research opportunities and open challenges for smart city monitoring.

  • 38.
    Liu, Ling
    et al.
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Zhou, Yiqing
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tian, Lin
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Shi, Jinglin
    Beijing Key Laboratory of Mobile Computing and Pervasive Devices, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China;University of Chinese Academy of Sciences, Beijing, China.
    Time-domain ICIC and optimized designs for 5G and beyond: a survey2019Ingår i: Science China Information Sciences, ISSN 1674-733X, E-ISSN 1869-1919, Vol. 62, nr 2, artikel-id 21302Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Time-domain enhanced inter-cell interference coordination (eICIC) is an effective technique to reduce the cross-tier inter-cell interference (ICI) in long term evolution (LTE)-based heterogeneous small cell networks (HetSCNs). This paper first clarifies two main communication scenarios in HetSCNs, i.e., macrocells deployed with femtocells (macro-femto) and with picocells (macro-pico). Then, the main challenges in HetSCNs, particularly the severe cross-tier ICI in macro-femto caused by femtocells with closed subscribe group (CSG) access or in macro-pico caused by picocells with range expansion are analyzed. Based on the prominent feature of dominant interference in HetSCNs, the main idea of time-domain interference coordination and two basic schemes in the eICIC standardization, i.e., almost blank subframe (ABS) and orthogonal frequency division multiplexing symbol shift are presented, with a systematic introduction to the interactions of these techniques with other network functions. Then, given macro-femto and macro-pico HetSCNs, an overview is provided on the advanced designs of ABS-based eICIC, including self-optimized designs with regard to key parameters such as ABS muting ratio, and joint optimized designs of ABS-based eICIC and other radio resource management techniques, such as user association and power control. Finally, the open issues and future research directions are discussed.

  • 39.
    Wang, Sen
    et al.
    School of Software Engineering, Chongqing University, Chongqing, China.
    Bi, Jun
    Network Architecture & IPv6 Research Division, Institute for Network Sciences and Cyberspace of Tsinghua University, China.
    Wu, Jianping
    Network Research Center, Tsinghua University, Beijing, China.
    Vasilakos, Athanasios V.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Fan, Qilin
    School of Software Engineering, Chongqing University, Chongqing, China.
    VNE-TD: a Virtual Network Embedding Algorithm Based on Temporal-Difference Learning2019Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Recently, network virtualization is considered as a promising solution for the future Internet which can help to overcome the resistance of the current Internet to fundamental changes. The problem of embedding Virtual Networks (VN) in a Substrate Network (SN) is the main resource allocation challenge in network virtualization. The major challenge of the Virtual Network Embedding (VNE) problem lies in the contradiction between making online embedding decisions and pursuing a long-term objective. Most previous works resort to balancing the SN workload with various methods to deal with this contradiction. Rather than passive balancing, we try to overcome it by learning actively and making online decisions based on previous experiences. In this article, we model the VNE problem as Markov Decision Process (MDP) and develop a neural network to approximate the value function of VNE states. Further, a VNE algorithm based on Temporal-Difference Learning (one kind of Reinforcement Learning methods), named VNE-TD, is proposed. In VNE-TD, multiple embedding candidates of node-mapping are generated probabilistically, and TD Learning is involved to evaluate the long-run potential of each candidate. Extensive simulation results show that VNE-TD outperforms previous algorithms significantly in terms of both block ratio and revenue.

  • 40.
    Hossain, Mohammad Shahadat
    et al.
    University of Chittagong, Bangladesh.
    Al Hasan, Abdullah
    University of Chittagong, Bangladesh.
    Guha, Sunanda
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Belief Rule Based Expert System to Predict Earthquake under Uncertainty2018Ingår i: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ISSN 2093-5374, E-ISSN 2093-5382, Vol. 9, nr 2, s. 26-41Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The impact of earthquake is devastating, which has the capability to stop the socio-economic activities of a region within a short span of time. Therefore, an earlier prediction of earthquake could play an important role to save human lives as well as socio-economic activities. The signs of animal behavior along with environmental and chemical changes in nature could be considered as a way to predict the earthquake. These factors cannot be determined accurately because of the presence of different categories of uncertainties. Therefore, this article presents a belief rule based expert system (BRBES) which has the capability to predict earthquake under uncertainty. Historical data of various earthquakes of the world with specific reference to animal behavior as well as environmental and chemical changes have been considered in validating the BRBES. The reliability of our proposed BRBES’s output is measured in comparison with Fuzzy Logic Based Expert System (FLBES) and Artificial Neural Networks (ANN) based system, whereas our BRBES’s results are found more reliable than that of FLBES and ANN. Therefore, this BRBES can be considered to predict the occurrence of an earthquake in a region by taking account of the data, related to the animal, environmental and chemical changes.

  • 41.
    Monrat, Ahmed Afif
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Islam, Raihan Ul
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Mohammad Shahadat
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Belief Rule Based Flood Risk Assessment Expert System using Real Time Sensor Data Streaming2018Ingår i: Proveedings of the 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Piscataway, NJ: IEEE Computer Society, 2018, s. 8-45Konferensbidrag (Refereegranskat)
    Abstract [en]

    Among the various natural calamities, flood is considered one of the most catastrophic natural hazards, which has a significant impact on the socio-economic lifeline of a country. The Assessment of flood risks facilitates taking appropriate measures to reduce the consequences of flooding. The flood risk assessment requires Big data which are coming from different sources, such as sensors, social media, and organizations. However, these data sources contain various types of uncertainties because of the presence of incomplete and inaccurate information. This paper presents a Belief rule-based expert system (BRBES) which is developed in Big data platform to assess flood risk in real time. The system processes extremely large dataset by integrating BRBES with Apache Spark while a web-based interface has developed allowing the visualization of flood risk in real time. Since the integrated BRBES employs knowledge driven learning mechanism, it has been compared with other data-driven learning mechanisms to determine the reliability in assessing flood risk. The integrated BRBES produces reliable results in comparison to other data-driven approaches. Data for the expert system has been collected by considering different case study areas of Bangladesh to validate the system.

  • 42.
    Hossain, Mohammad Shahadat
    et al.
    University of Chittagong, Bangladesh.
    Rahaman, Saifur
    International Islamic University Chittagong.
    Mustafa, Rashed
    University of Chittagong, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A belief rule-based expert system to assess suspicion of acute coronary syndrome (ACS) under uncertainty2018Ingår i: Soft Computing - A Fusion of Foundations, Methodologies and Applications, ISSN 1432-7643, E-ISSN 1433-7479, Vol. 22, nr 22, s. 7571-7586Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Acute coronary syndrome (ACS) is responsible for the obstruction of coronary arteries, resulting in the loss of lives. The onset of ACS can be determined by looking at the various signs and symptoms of a patient. However, the accuracy of ACS determination is often put into question since there exist different types of uncertainties with the signs and symptoms. Belief rule-based expert systems (BRBESs) are widely used to capture uncertain knowledge and to accomplish the task of reasoning under uncertainty by employing belief rule base and evidential reasoning. This article presents the process of developing a BRBES to determine ACS predictability. The BRBES has been validated against the data of 250 patients suffering from chest pain. It is noticed that the outputs created from the BRBES are more dependable than that of the opinion of cardiologists as well as other two expert system tools, namely artificial neural networks and support vector machine. Hence, it can be argued that the BRBES is capable of playing an important role in decision making as well as in avoiding costly laboratory investigations. A procedure to train the system, allowing its enhancement of performance, is also presented.

  • 43.
    Yin, Lihua
    et al.
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, .
    Guo, Yunchuan
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing.
    Li, Fenghua
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing.
    Sun, Yanwei
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing .
    Qian, Junyan
    Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A game-theoretic approach to advertisement dissemination in ephemeral networks2018Ingår i: World wide web (Bussum), ISSN 1386-145X, E-ISSN 1573-1413, Vol. 21, nr 2, s. 241-260Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In ephemeral networks, disseminating advertisements faces two dilemmatic problems: on the one hand, disseminators own the limited resources and have privacy concerns, thus, often preferring to avoid disseminating advertisements without enough incentives; Even if advertisements are disseminated, their dissemination accuracy is lower. On the other hand, false advertisements may flood in ephemeral networks if too many incentives but no punishments are given. Thus, it is a challenge to design an effective scheme to guarantee rational disseminators have sufficient impetus to forward true advertisements to the interested consumers and report false advertisements, despite facing the limitation of resources and the risk of privacy leakage. To solve this problem, in this paper, a bargaining-based scheme is proposed to motive disseminators to forward the true advertisements to the interested node and a semi-grim policy is designed for punishing the disseminators who releases and disseminates false advertisements. Acknowledging the assumption of incomplete information, a repeated dissemination game is proposed to help disseminators to decide whether to forward advertisements or report false advertisements. Simulation results demonstrate that our scheme not only provides disseminators a strong impetus to disseminate the advertisements with higher dissemination accuracy, but also effectively prevents disseminators from forwarding false advertisements.

  • 44.
    Espinilla, Macarena
    et al.
    Department of Computer Science, University of Jaén, Jaén, Spain.
    Medina, Javier
    Department of Computer Science, University of Jaén, Jaén, Spain.
    Hallberg, Josef
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nugent, Chris
    School of Computing and Mathematics, Ulster University, Coleraine, UK.
    A new approach based on temporal sub-windows for online sensor-based activity recognition2018Ingår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Usually, approaches driven by data proposed in literature for sensor-based activity recognition use the begin label and the end label of each activity in the dataset, fixing a temporal window with sensor data events to identify the activity carried out in this window. This type of approach cannot be carried out in real time because it is not possible to predict the start time of an activity, i.e., the class of the future activity that an inhabitant will perform, neither when he/she will begin to carry out this activity. However, an activity can be marked as finished in real time only with the previous observations. Therefore, there is a need of online activity recognition approaches that classify activities using only the end label of the activity. In this paper, we propose and evaluate a new approach for online activity recognition with three temporal sub-windows that uses only the end label of the activity. The advantage of our approach is that the temporal sub-windows keep a partial order in the sensor data stream from the end time of the activity in a short-term, medium-term, long-term. The experiments conducted to evaluate our approach suggest the importance of the use of temporal sub-windows versus a single temporal window in terms of accuracy, using only the end time of the activity. The use of temporal sub-windows has improved the accuracy in the 98.95% of experiments carried out.

  • 45.
    Islam, Raihan Ul
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hossain, Mohammad Shahadat
    Department of Computer Science and Engineering, University of Chittagong, Chittagong 4331, Bangladesh.
    Andersson, Karl
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A novel anomaly detection algorithm for sensor data under uncertainty2018Ingår i: Soft Computing - A Fusion of Foundations, Methodologies and Applications, ISSN 1432-7643, E-ISSN 1433-7479, Vol. 22, nr 5, s. 1623-1639Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    It is an era of Internet of Things, where various types of sensors, especially wireless, are widely used to collect huge amount of data to feed various systems such as surveillance, environmental monitoring, and disaster management. In these systems, wireless sensors are deployed to make decisions or to predict an event in a real-time basis. However, the accuracy of such decisions or predictions depends upon the reliability of the sensor data. Unfortunately, erroneous data are received from the sensors. Consequently, it hampers the appropriate operations of the mentioned systems, especially in making decisions and prediction. Therefore, the detection of anomaly that exists with the sensor data drew significant attention and hence, it needs to be filtered before feeding a system to increase its reliability in making decisions or prediction. There exists various sensor anomaly detection algorithms, but few of them are able to address the uncertain phenomenon, associated with the sensor data. If these uncertain phenomena cannot be addressed by the algorithms, the filtered data into the system will not be able to increase the reliability of the decision-making process. These uncertainties may be due to the incompleteness, ignorance, vagueness, imprecision and ambiguity. Therefore, in this paper we propose a new belief-rule-based association rule (BRBAR) with the ability to handle the various types of uncertainties as mentioned.The reliability of this novel algorithm has been compared with other existing anomaly detection algorithms such as Gaussian, binary association rule and fuzzy association rule by using sensor data from various domains such as rainfall, temperature and cancer cell data. Receiver operating characteristic curves are used for comparing the performance of our proposed BRBAR with the aforementioned algorithms. The comparisons demonstrate that BRBAR is more accurate and reliable in detecting anomalies from sensor data under uncertainty. Hence, the use of such algorithm to feed the decision-making systems could be beneficial. Therefore, we have used this algorithm to feed appropriate sensor data to our recently developed belief-rule-based expert system to predict flooding in an area. Consequently, the reliability and the accuracy of the flood prediction system increase significantly. Such novel algorithm (BRBAR) can be used in other areas of applications. 

  • 46.
    Wazid, Mohammad
    et al.
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad India 500032 .
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad India 500032 .
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala, Patiala, Punjab India .
    Conti, Mauro
    Department of Mathematics, University of Padua, Padua, Padua Italy .
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment2018Ingår i: IEEE journal of biomedical and health informatics, ISSN 2168-2194, E-ISSN 2168-2208, Vol. 2, nr 4, s. 1299-1309Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In healthcare applications, after mutual authentication, a user (for example, doctor) can access the health data from the IMDs implanted in a patient's body. However, in this kind of communication environment, there are always security and privacy issues such as leakage of health data and malfunctioning of IMDs by an unauthorized access.

  • 47.
    Lee, Cheng-Chi
    et al.
    Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, Taiwan, Republic of China; Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, Republic of China.
    Li, Chun-Ta
    Department of Information Management, Tainan University of Technology, Tainan, Taiwan, Republic of China.
    Cheng, Chung-Lun
    Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, Taiwan, Republic of China.
    Lai, Yan-Ming
    Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, Republic of China.
    Vasilakos, Athanasios V.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A Novel Group Ownership Delegate Protocol for RFID Systems2018Ingår i: Information Systems Frontiers, ISSN 1387-3326, E-ISSN 1572-9419Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation.

  • 48.
    Zhang, Shengzhi
    et al.
    Florida Institute of Technology, Melbourne, FL.
    Makke, Omar
    Ford Motor, Detroit, MI.
    Gusikhin, Oleg Yu
    Ford Motor, Detroit, MI.
    Shah, Ayush
    Ford Motor, Detroit, MI.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A security model for dependable vehicle middleware and mobile applications connection2018Ingår i: VEHITS 2018: Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems / [ed] Gusikhin O.,Helfert M., 2018, s. 379-386Konferensbidrag (Refereegranskat)
    Abstract [en]

    Nowadays automotive industry has been working on the connectivity between automobile and smartphones, e.g., Ford’s SmartDeviceLink, MirrorLink, etc. However, as the interoperability between the smartphone and automotive system increase, the security concern of the increased attack surface bothers the automotive industry as well as the security community. In this paper, we thoroughly study the attack vectors against the novel connection framework between automobile and smartphones, and propose a generic security model to implement a dependable connection to eliminate the summarized attack vectors. Finally, we present how our proposed model can be integrated into existing automotive framework, and discuss the security benefits of our model. Copyright

  • 49.
    Seo, Jungryul
    et al.
    Ajou University.
    Laine, Teemu H.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Accurate position and orientation independent step counting algorithm for smartphones2018Ingår i: Journal of Ambient Intelligence and Smart Environments, ISSN 1876-1364, E-ISSN 1876-1372, Vol. 10, nr 6, s. 481-495Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Step counting (SC) algorithms can be applied to different areas such as well-being applications, games, and indoor navigation. Many existing SC algorithms for smartphones use data from inertial sensors to infer the number of steps taken, but their usefulness in real-life situations is limited since typically only a few positions and orientations are supported. Moreover, the algorithms may suffer from dynamic orientation and position changes during walking. To alleviate these shortcomings, we propose the Position and Orientation Independent Step Counting Algorithm (POISCA), which uses an accelerometer and a gyroscope to count the number of steps while allowing the smartphone’s position and orientation to change dynamically. In a nutshell, the algorithm first determines the orientation of the smartphone, and then detects zero crossings with a predetermined buffer range. 48 young adults (36 males, 12 females) participated in an experiment that simulated a real-life scenario to evaluate the performance of POISCA against three other step counting algorithms. The data from 24 participants were randomly assigned to a training group, which was then used to establish threshold parameters for POISCA. The remaining 24 participants’ data were used for accuracy measurement. The results show that POISCA outperforms the other algorithms with a Symmetric Mean Absolute Percentage Error of 4.54%, which can be lower if the algorithm is calibrated for each user. The results suggest that POISCA has potential for use in real-life situations where changes in position and orientation of the smartphone are dynamic.

  • 50.
    Johansson, Ingemar
    et al.
    Ericsson AB, Luleå.
    Dadhich, Siddharth
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Bodin, Ulf
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Jönsson, Tomas
    Ericsson AB, Luleå.
    Adaptive Video with SCReAM over LTE for Remote-Operated Working Machines2018Ingår i: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2018, artikel-id 3142496Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Remote operation is a step toward the automation of mobile working machines. Safe and efficient teleremote operation requires good-quality video feedback. Varying radio conditions make it desirable to adapt the video sending rate of cameras to make the best use of the wireless capacity. The adaptation should be able to prioritize camera feeds in different directions depending on motion, ongoing tasks, and safety concerns. Self-Clocked Rate Adaptation for Multimedia (SCReAM) provides a rate adaptation algorithm for these needs. SCReAM can control the compression used for multiple video streams using differentiating priorities and thereby provide sufficient congestion control to achieve both low latency and high video throughput. We present results from the testing of prioritized adaptation of four video streams with SCReAM over LTE and discuss how such adaptation can be useful for the teleremote operation of working machines.

1