20 research outputs found

    Power vs. Spectrum 2-D Sensing in Energy Harvesting Cognitive Radio Networks

    Full text link
    Energy harvester based cognitive radio is a promising solution to address the shortage of both spectrum and energy. Since the spectrum access and power consumption patterns are interdependent, and the power value harvested from certain environmental sources are spatially correlated, the new power dimension could provide additional information to enhance the spectrum sensing accuracy. In this paper, the Markovian behavior of the primary users is considered, based on which we adopt a hidden input Markov model to specify the primary vs. secondary dynamics in the system. Accordingly, we propose a 2-D spectrum and power (harvested) sensing scheme to improve the primary user detection performance, which is also capable of estimating the primary transmit power level. Theoretical and simulated results demonstrate the effectiveness of the proposed scheme, in term of the performance gain achieved by considering the new power dimension. To the best of our knowledge, this is the first work to jointly consider the spectrum and power dimensions for the cognitive primary user detection problem

    Online vs. In-Store Shopping: How Problem Solving Strategies of Decision Support Systems influence Confidence in Purchase Decisions

    Get PDF
    Several studies have investigated the relevance of Decision Support Systems (DSS) on purchasebehaviour. Even though these studies show several aspects of the utility of DSS, they are limited toonline purchase situations, the use of one decision making strategy and one DSS technology. In thispaper, we therefore develop a theoretical model that measures the impact of DSS strategies relative toa given purchase problem and an adequate use of DSS technology on consumers’ perceivedconfidence in purchase decisions for both online and in-store purchase situations. Further, threemediating decision process variables are considered: perceived personalization of a DSS, perceivedrelevance of recommendations, and cognitive trust in DSS competence. As this paper represents awork in progress, the theoretical model has still to be tested empirically with regard to the proposedmethod. But as a result, we expect that the model not only allows evaluating different kinds ofpurchase-directed DSS but let researchers also draw conclusions on the appropriate use of technologyand decision strategies of one individual DSS

    A personalized system for scalable distribution of multimedia content in multicast wireless networks

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-014-2139-3This paper presents a novel architecture for scalable multimedia content delivery over wireless networks. The architecture takes into account both the user preferences and context in order to provide personalized contents to each user. In this way, third-party applications filter the most appropriate contents for each client in each situation. One of the key characteristics of the proposal is the scalability, which is provided, apart from the use of filtering techniques, through the transmission in multicast networks. In this sense, content delivery is carried out by means of the FLUTE (File Delivery over Unidirectional Transport) protocol, which provides reliability in unidirectional environments through different mechanisms such as AL-FEC (Application Layer Forward Error Correction) codes, used in this paper. Another key characteristic is the context-awareness and personalization of content delivery, which is provided by means of context information, user profiles, and adaptation. The system proposed is validated through several empirical studies. Specifically, the paper presents evaluations of two types that collect objective and subjective measures. The first evaluate the efficiency of the transmission protocol, analyzing how the use of appropriate transmission parameters reduces the download time (and thus increasing the Quality of Experience), which can be minimized by using caching techniques. On the other hand, the subjective measures present a study about the user experience after testing the application and analyze the accuracy of the filtering process/strategy. Results show that using AL-FEC mechanisms produces download times until four times lower than when no protection is used. Also, results prove that there is a code rate that minimizes the download time depending on the losses and that, in general, code rates 0.7 and 0.9 provide good download times for a wide range of losses. On the other hand, subjective measures indicate a high user satisfaction (more than 80 %) and a relevant degree of accuracy of the content adaption.This work is supported in part by the Ministerio de Economia y Competitividad of the Government of Spain under project COMINN (IPT-2012-0883-430000) and by the project PAID/2012/313 from the PAID-05-12 program of the Vicerrectorado de Investigacion of the Universitat Politecnica de Valencia.De Fez Lava, I.; Gil Pascual, M.; Fons Cors, JJ.; Guerri Cebollada, JC.; Pelechano Ferragud, V. (2014). A personalized system for scalable distribution of multimedia content in multicast wireless networks. Multimedia Tools and Applications. 1-27. https://doi.org/10.1007/s11042-014-2139-3S127AdAdge (2013) A majority of U.S. mobile users are now smartphone users. Available at: http://adage.com/article/digital/a-majority-u-s-mobile-users-smartphone-users/241717 . Accessed November 2013Adomavicius G, Tuzhilin E (2005) Toward the next generation of recommender Systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering 17:734–749Adomavicius G, Tuzhilin A (2010) Context-aware recommender systems. Recommender Systems Handbook (Chapter 7): 217–253Androjena, Jena Android Porting (2013). Available at: https://code.google.com/p/androjena . Accessed December 2013Anind KD (2001) Understanding and Using Context. Personal Ubiquitous Comput 5:4–7Assad M, Carmichael DJ, Kay J, Kummerfeld B (2007) PersonisAD: distributed, active, scrutable model framework for context-aware services. Proc. of Pervasive Computing, Toronto, Canada:55–72Bai H, Atiquzzaman M (2003) Error modeling schemes for fading channels in wireless communications: a survey. IEEE Communications Surveys and Tutorials 5(2):2–9Baldauf M, Dustdar S, Rosenberg F (2007) A survey on context-aware systems. Int. J. AdHoc and Ubiquitous Computing, Springer-Verlag 2:263–277Barquero D, Bria A (2007) Forward Error Correction file delivery in DVB-H. Proc. of IEEE Vehicular Technology Conference (VTC), Dublin, Ireland:2951–2955Bright A, Kay J, Ler D, Ngo K, Niu W, Nuguid A (2005) Adaptively recommending museum tours. Proc. of the UbiComp Workshop on Smart Environments and their Applications to Cultural Heritage, Tokyo, Japan:29–32Chatfield C, Carmichael D, Hexel R, Kay J, Kummerfeld B (2005) Personalisation in intelligent environments: managing the information flow. Proc. of the OZCHI Computer-human interaction, Canberra, Australia:1–10Chen YFR, Jana R, Stern D, Wei B, Yang M, Sun H, Dyaberi J (2010) Zebroid: using IPTV data to support STB-assisted VoD content delivery. Multimedia System Journal 16(3):199–214Chen G, Kotz D (2000) A survey on context-aware mobile computing research. Technical Report TR2000-381, Dartmouth Computer ScienceCommunity Research and Development Information Service (CORDIS) – Seventh Framework Programme (FP7). Available at: http://cordis.europa.eu/fp7/home_en.html . Accesed October 2013de Fez I, Fraile F, Belda R, Guerri JC (2011) Performance evaluation of AL-FEC LDPC codes for push content applications in wireless unidirectional environments. Multimedia Tools and Applications 60(3):669–688de Fez I, Fraile F, Belda R, Guerri JC (2012) Analysis and evaluation of adaptive LDPC AL-FEC codes for content download services. IEEE Transactions on Multimedia 14(3):641–650de Fez I, Fraile F, Guerri JC (2013) Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol. Computer Communications 36(12):1298–1309de Fez I, Guerri JC (2014) An adaptive mechanism for optimal content download in wireless networks. IEEE Transactions on Multimedia 16(4):1140–1155Du R, Safavi-Naini R, Susilo W (2003) Web filtering using text classification (2003). Proc. of the Int Conf on Networks (ICON), Sydney, Australia:325–330ETSI TS 102 034 (2008), Transport of MPEG-2 TS Based DVB Services over IP based Networks (and associated XML), v1.4.1, available online: www.etsi.org/deliver/etsi_ts/102000_102099/102034/01.04.01_60/ts_102034v010401p.pdfETSI TS 102 472 (2009), Digital Video Broadcasting (DVB); IP Datacast over DVB-H: Content Delivery Protocols, v1.3.1, available online: www.etsi.org/deliver/etsi_ts/102400_102499/102472/01.03.01_60/ts_102472v010301p.pdfETSI TS 126 346 (2013), Universal Mobile Telecommunications System (UMTS); LTE; Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs (release 10), v11.3.0, available online: www.etsi.org/deliver/etsi_ts/126300_126399/126346/11.03.00_60/ts_126346v110300p.pdfFelfernig A, Jeran M, Ninaus G, Reinfrank F, Reiterer S (2013) Toward the next generation of recommender systems: applications and research challenges. Multimedia Services in Intelligent Environments 24 (Chapter 5): 81–98Fraile F, de Fez I, Guerri JC (2009) Modela-TV: service personalization and business model management for mobile TV. Proc. of 7th European Interactive TV Conference (EuroITV), Leuven, Belgium:1–6Fraile F, de Fez I, Guerri JC (2014) Evaluation of background push content download services to mobile devices over DVB networks. IEEE Transactions on Broadcasting 60(1):1–15Gallager RG (1962) Low density parity check codes. IRE Transactions on Information Theory 8(1):21–28Gil M, Giner P, Pelechano V (2012) Personalization for unobtrusive service interaction. Personal Ubiquitous Comput 16(5):543–561Guillen J, Miranda J, Berrocal J, Garcia-Alonso J, Murillo J, Canal C (2014) People as a service: a mobile-centric model for providing collective sociological profiles. IEEE Software 31(2):48–53Hrvoje J, Stockhammer T, Xu W, Abdel Samad W (2006) Efficient video-on-demand services over mobile datacast channels. Journal of Zhejiang University 7(5):873–884Hsieh CC, Lin CH, Chang WT (2009) Design and implementation of the interactive multimedia broadcasting services in DVB-H. IEEE Transactions on Consumer Electronics 55(4):1779–1787Kellerer H, Pferschy U, Pisinger D (2004) Knapsack problems. SpringerKorpipaa P, Malm EJ, Rantakokko T, Kyllonen V, Kela J, Mantyjarvi J, Hakkila J, Kansala I (2006) Customizing user interaction in smart phones. IEEE Pervasive Computing 5:82–90Kuppusamy KS, Aghila G (2012) A personalized web page content filtering model based on segmentation. Int Journal of Information Sciences and Techniques (IJIST) 2(1):41–51Kutscher D, Greifenberg J, Loos K (2007) Scalable DTN distribution over uni-directional links. Proc. of the SIGCOMM workshop on networked systems in developing regions (NSDR), Kyoto, Japan: article no. 6Lewis JR (1995) Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int J Hum Comput Interact 7(1):57–78Liang L, Cruichkshank H, Sun Z, Kulatunga C, Fairhurst G (2010) The integration of TESLA and FLUTE over satellite networks. Proc. of the IEEE Global Telecommunications Conference (Globecom), Miami, FL, USA:1–6Lohmar T, Huschke J (2009) Radio resource optimization for MBMS file transmissions. Proc. of the IEEE Int Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain:1–7Neumann C, Roca V, Walsh R (2005) Large scale content distribution protocols. ACM Computer Communication Review 35(5):85–92Paila T, Walsh R, Luby M, Roca V, Lehtonen R (2012) FLUTE – File Delivery Over Unidirectional Transport. IETF RFC 6726Paolini E, Varrella M, Chiani M, Matuz B, Liva G (2008) Low-complexity LDPC codes with near-optimum performance over the BEC. Proc. Adv Satellite Mobile Systems (ASMS), Bologna, Italy:274–282Papastergiou G, Psaras I, Tsaoussidis V (2009) Deep-space transport protocol: a novel transport scheme for space DTNs. Computer Communications 32(16):1757–1767Peltotalo J, Harju J, Saukko M, Väätämöinen L, Bouazizi I, Curcio I (2008) Personal mobile broadcasting based on the 3GPP MBMS System. Proc. of MoMM, Linz, Austria:156–162Peltotalo J, Peltotalo S, Harju J, Walsh R (2007) Performance analysis of a file delivery system based on the FLUTE protocol. Int Journal of Communication Systems 20(6):633–659Podlipnig S, Böszörmenyi L (2003) A survey of web cache replacement strategies. ACM Computing Surveys 35(4):374–398Roca V, Neumann C, Furodet D (2008) Low density parity check (LDPC) staircase and triangle forward error correction (FEC) schemes. IETF RFC 5170Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164Schiller JH, Voisard A (2004) Location-based services. Kaufmann, MorganSerral E, Gil M, Valderas P, Pelechano V (2013) Automating unobtrusive personalized services in ambient media environments. Multimedia Tools and Applications, Springer US, available online, doi: 10.1007/s11042-013-1634-2Serral E, Valderas P, Pelechano V (2010) Towards the model driven development of context-aware pervasive systems. Pervasive and Mobile Computing 6(2):254–280Streefkerk JW, van Esch-Bussemakers MP, Neerincx MA (2006) Designing personal attentive user interfaces in the mobile public safety domain. Comput Hum Behav 22:749–770Valtonen M, Vainio AM, Vanhala J (2009) Proactive and adaptive fuzzy profile control for mobile phones. Proc. of the IEEE Int Conf on Pervasive Computing and Communications (PerCom), Galveston, Texas, USA:1–3van Woensel W, Gil M, Casteleyn S, Serral E, Pelechano V (2012) Adapting the obtrusiveness of service interactions in dynamically discovered environments. Proc. of MobiQuitous, Beijing, China:250–262W3C (2012), OWL 2Web Ontology Language Document Overview, Recommendation 11. Available at: http://www.w3.org/TR/owl2-overview. Accesed: November 2013Weld DS, Anderson C, Domingos P, Etzioni O, Gajos K, Lau T, Wolf S (2003) Automatically personalizing user interfaces. Proc. of the Int Joint Conference on Artificial Intelligence (IJCAI), Acapulco, Mexico:1613–1619Xu J, Hu Q, Lee W, Lee DL (2004) Performance evaluation of an optimal cache replacement policy for wireless data dissemination. IEEE Transactions on Knowledge and Data Engineering 16(1):125–139Yetgin Z, Çelik T (2012) Efficient progressive downloading over multimedia broadcast multicast service. Computer Networks 56(2):533–547Zheng Q, Zhu P, Wang Y, Xu M (2010) EPSP: Enhancing network protocol with social-aware plane. Proc. of IEEE/ACM Int Conference on Green Computing and Communications (GreenCom) and Int Conference on Cyber, Ohysical and Social Computing (CPSCom), Hangzhou, China:578–58

    An Aspect-Oriented Approach to Securing Distributed Systems

    Get PDF
    International audienceThe increasing size and complexity of distributed systems create a need to raise the level of abstraction for their development. This need becomes critical for pervasive computing where non-functional properties, such as security, must be guaranteed. Architecture description languages (ADLs) propose a promising approach to coping with the size and complexity of pervasive computing systems. A system is defined by a high-level description that may be used to produce a programming framework. However, non-functional properties are not specifically addressed by existing ADL works. To address this issue aspect-oriented programming is a well-proven technique to properly modularize non-functional concerns that can be dealt with by weaving dedicated code into a program. In this paper, we present DiaAspect, an aspect-oriented language for our ADL, DiaSpec. Like most ADLs, DiaSpec exposes features enabling an accurate coordination of aspects. We demonstrate the expressiveness of DiaAspect with two examples of security policies in pervasive computing. We also show how, combining the knowledge of the architecture description with aspect code, improves aspect weaving in the implementation code

    Activity recognition from smartphone sensing data

    Get PDF
    Tese de mestrado integrado. Engenharia Informática e Computação. Faculdade de Engenharia. Universidade do Porto. 201

    Intelligent Design in Wireless System

    Get PDF
    We are living in an era full of data services, and the advancement in statistical learning encourages the development of intelligent system design algorithms based on practical data. In our work, we plan to study two potential applications with intelligent design in wireless systems based on statistical and machine learning techniques. The first application we study is the spectrum sensing problem in energy harvesting based cognitive radio networks, which is a promising solution to address the shortage of both spectrum and energy. Since the spectrum access and power consumption pattern are interdependent, and the power value harvested from certain environmental sources are spatially correlated, the new power dimension could provide additional information to enhance the spectrum sensing accuracy. In our work, the Markovian behavior of the primary users is considered, based on which we adopt a hidden input Markov model to specify the primary vs. secondary dynamics in the system. Accordingly, we propose a 2-D spectrum vs. power (harvested) sensing scheme to improve the primary user detection performance, which is also capable of estimating the primary transmit power level. Theoretical and simulated results demonstrate the effectiveness of the proposed scheme, in terms of the performance gain achieved by considering the new power dimension. To the best of our knowledge, this is the first work to jointly consider the spectrum and power dimensions for the cognitive primary user detection problem. The second work is about spatio-temporal base station traffic prediction with machine learning. Accurate prediction of user traffic in cellular networks is crucial to improve the system performance in terms of energy efficiency and resource utilization. However, existing work mainly considers the temporal traffic correlations within each cell while neglecting the spatial correlation across neighboring cells. In this work, machine learning models that jointly explore the spatio-temporal correlations are proposed, where a multitask learning approach is adopted to explore the commonalities and differences across cells in improving the prediction performance. Base on real data, we demonstrate the benefits of joint learning over spatial and temporal dimensions

    Intelligent Design in Wireless System

    Get PDF
    We are living in an era full of data services, and the advancement in statistical learning encourages the development of intelligent system design algorithms based on practical data. In our work, we plan to study two potential applications with intelligent design in wireless systems based on statistical and machine learning techniques. The first application we study is the spectrum sensing problem in energy harvesting based cognitive radio networks, which is a promising solution to address the shortage of both spectrum and energy. Since the spectrum access and power consumption pattern are interdependent, and the power value harvested from certain environmental sources are spatially correlated, the new power dimension could provide additional information to enhance the spectrum sensing accuracy. In our work, the Markovian behavior of the primary users is considered, based on which we adopt a hidden input Markov model to specify the primary vs. secondary dynamics in the system. Accordingly, we propose a 2-D spectrum vs. power (harvested) sensing scheme to improve the primary user detection performance, which is also capable of estimating the primary transmit power level. Theoretical and simulated results demonstrate the effectiveness of the proposed scheme, in terms of the performance gain achieved by considering the new power dimension. To the best of our knowledge, this is the first work to jointly consider the spectrum and power dimensions for the cognitive primary user detection problem. The second work is about spatio-temporal base station traffic prediction with machine learning. Accurate prediction of user traffic in cellular networks is crucial to improve the system performance in terms of energy efficiency and resource utilization. However, existing work mainly considers the temporal traffic correlations within each cell while neglecting the spatial correlation across neighboring cells. In this work, machine learning models that jointly explore the spatio-temporal correlations are proposed, where a multitask learning approach is adopted to explore the commonalities and differences across cells in improving the prediction performance. Base on real data, we demonstrate the benefits of joint learning over spatial and temporal dimensions

    ICE-MILK: Intelligent Crowd Engineering using Machine-based Internet of Things Learning and Knowledge Building

    Get PDF
    Title from PDF of title page viewed June 1, 2022Dissertation advisor: Sejun SongVitaIncludes bibliographical references (pages 136-159)Thesis (Ph.D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2022The lack of proper crowd safety control and management often leads to spreading human casualties and infectious diseases (e.g., COVID-19). Many Machine Learning (ML) technologies inspired by computer vision and video surveillance systems have been developed for crowd counting and density estimation to prevent potential personal injuries and deaths at densely crowded political, entertaining, and religious events. However, existing crowd safety management systems have significant challenges and limitations on their accuracy, scalability, and capacity to identify crowd characterization among people in crowds in real-time, such as a group characterization, impact of occlusions, mobility and contact tracing, and distancing. In this dissertation, we propose an Intelligent Crowd Engineering platform using Machine-based Internet of Things Learning, and Knowledge Building approaches (ICE-MILK) to enhance the accuracy, scalability, and crowd safety management capacity in real-time. Specifically, we design an ICE-MILK structure with three critical layers: IoT-based mobility characterization, ML-based video surveillance, and semantic information-based application layers. We built an IoT-based mobility characterization system by predicting and preventing potential disasters through real-time Radio Frequency (RF) data characterization and analytics. We tackle object group identification, speed, direction detection, and density for the mobile group among the many crowd mobility characteristics. Also, we tackled an ML-based video surveillance approach for effective dense crowd counting by characterizing scattered occlusions, named CSONet. CSONet recognizes the implications of event-induced, scene-embedded, and multitudinous obstacles such as umbrellas and picket signs to achieve an accurate crowd analysis result. Finally, we developed a couple of group semantics to track and prevent crowd-caused infectious diseases. We introduce a novel COVID-19 tracing application named Crowd-based Alert and Tracing Services (CATS) and a novel face masking and social distancing monitoring system for Modeling Safety Index in Crowd (MOSAIC). CATS and MOSAIC apply privacy-aware contact tracing, social distancing, and calculate spatiotemporal Safety Index (SI) values for the individual community to provide higher privacy protection, efficient penetration of technology, greater accuracy, and effective practical policy assistance.Introduction -- Literature review -- IoT-based mobility characterization -- ML-based video/image surveillance -- Semantic knowledge information-based tracing application -- Conclusions and future directions -- Appendi
    corecore