In the recent years, blockchain has been widely studied and applied as a solution to address various healthcare challenges associated with the legacy systems. Availability of a trusted healthcare ecosystem for account...
详细信息
ISBN:
(纸本)9781450391634
In the recent years, blockchain has been widely studied and applied as a solution to address various healthcare challenges associated with the legacy systems. Availability of a trusted healthcare ecosystem for accountable medical data sharing still remains a problem. This paper discusses the potential applications of blockchain in healthcare and proposes a blockchain-based framework to facilitate health data availability and sharing. It identifies the implementation challenges of such a system and discusses their relationship with blockchain's intrinsic design and characteristics. In the end, this paper delineates the future research directions required to overcome the challenges in realizing a blockchain-based platform for accountable medical data management and sharing.
Large-scale high-performance computingsystems frequently experience a wide range of failure modes, such as reliability failures (e.g., hang or crash), and resource overload-related failures (e.g., congestion collapse...
详细信息
ISBN:
(纸本)9781728199986
Large-scale high-performance computingsystems frequently experience a wide range of failure modes, such as reliability failures (e.g., hang or crash), and resource overload-related failures (e.g., congestion collapse), impacting systems and applications. Despite the adverse effects of these failures, current systems do not provide methodologies for proactively detecting, localizing, and diagnosing failures. We present Kaleidoscope, a near real-time failure detection and diagnosis framework, consisting of of hierarchical domain-guided machine learning models that identify the failing components, the corresponding failure mode, and point to the most likely cause indicative of the failure in near real-time (within one minute of failure occurrence). Kaleidoscope has been deployed on Blue Waters supercomputer and evaluated with more than two years of production telemetry data. Our evaluation shows that Kaleidoscope successfully localized 99.3% and pinpointed the root causes of 95.8% of 843 real-world production issues, with less than 0.01% runtime overhead.
Intelligent sensor system design demands the efficient pattern recognition method that uses raw time-series sensor data to identify the target gas with fast and accurate results. The presented work uses gas sensor arr...
详细信息
ISBN:
(纸本)9781665426060
Intelligent sensor system design demands the efficient pattern recognition method that uses raw time-series sensor data to identify the target gas with fast and accurate results. The presented work uses gas sensor array response (open sampling setting) for 10 bio-marker gases. The responses are obtained at different concentrations. We propose a 2D convolution neural network (2D-CNN) based adaptive ensemble network for gas identification. The Spatio-temporal correlation of sensor array responses inspired us to design deep-learning-based gas identification networks. The network uses raw time-series gas sensor array data and identifies the target gas mixtures with improved accuracy despite sensor drift. Experimental results show that the proposed methods are an effective technique with identification accuracy approximately 91% for identifying gas mixture for smart sensor system application. The proposed method outperforms and provides higher identification accuracy than comparable various machine learning and deep learning methods.
Over the past years, interest in classifying drivers' behavior from data has surged. Such interest is particularly relevant for car insurance companies who, due to privacy constraints, often only have access to da...
详细信息
ISBN:
(纸本)9781728141497
Over the past years, interest in classifying drivers' behavior from data has surged. Such interest is particularly relevant for car insurance companies who, due to privacy constraints, often only have access to data from Inertial Measurement Units (IMU) or similar. In this paper, we present a semi-supervised learning solution to classify portions of trips according to whether drivers are driving aggressively or normally based on such IMU data. Since the amount of labeled IMU data is limited and costly to generate, we utilize Recurrent Conditional Generative Adversarial Networks (RCGAN) to generate more labeled data. Our results show that, by utilizing RCGAN-generated labeled data, the classification of the drivers is improved in 79% of the cases, compared to when the drivers are classified with no generated data.
Wireless sensor networks has been a large analysis topic over a decade. sensor networks are autonomous sensors distributed spatially to observe physical or environmental conditions. Those sensors generate record about...
详细信息
Monitoring ambient air temperature is one of the important operations to ensure resilience and efficiency in large-scale data centers. However, deployment of a data center monitoring system requires recording the loca...
详细信息
ISBN:
(纸本)9781728105703
Monitoring ambient air temperature is one of the important operations to ensure resilience and efficiency in large-scale data centers. However, deployment of a data center monitoring system requires recording the location of thousands of sensors which is a labor-intensive task if is done manually. Since Radio-Frequency (RF) based localization solutions in literature are inadequate in the multipath rich environment of data centers, we investigated the possibility of utilizing the measurements of the sensors in localizing themselves. The idea of thermal piloting is to correlate sensor measurements with the expected temperature values at their locations. It can be treated as a classification problem, in which the feature vector is formed by the temperature values at each sensor location across different cooling configurations. The training set is provided by Computational Fluid Dynamic (CFD) simulations. Since classical supervised learning techniques fail to account for the bijective relation between sensor indices and locations, we formulated an extra step based on the Maximum Weighted Bi-partite Matching (MWBM) problem. Experimental results show that the proposed methods can achieve an average localization error of 0.64 meters.
Mobile Wireless sensor Network do not have any protocols, hence the protocols from MANET are chosen for MWSN. Data discovery and dissemination is to disseminate small configuration parameters, variables, queries, and ...
详细信息
ISBN:
(纸本)9781665406116
Mobile Wireless sensor Network do not have any protocols, hence the protocols from MANET are chosen for MWSN. Data discovery and dissemination is to disseminate small configuration parameters, variables, queries, and commands in packets. The data gathered by the sensors should be transmitted to the base station or to any destination that requires *** systems are based on the centralized approach; where in it does not hold good for multiple owner-multiple users. These protocols have certain security issues due to which adversaries can easily hack the systems and can cause failure to the network. Many works have been proposed for the data dissemination but none of them could provide security for the *** work presented in this paper proposes the first reliable and secure protocol called DiDrip, that enables an effective data discovery and dissemination in a distributed system. The proposed protocol is robust and efficient. It allows multiple users (intermediate nodes) to get registered with network administrator and grants special privileges to the users so that users can directly disseminate data into the sensor nodes.
When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this....
详细信息
ISBN:
(纸本)9781665429528
When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the last stage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.
The advances of the wireless sensor network (WSN) has brought the development of many applications in various fields such as environment, military, traffic monitoring systems, etc. The WSN network consists of a sink n...
详细信息
This position paper describes CognitiveAR, a system that seamlessly interfaces AR devices with smart city environments. Edge computing nodes distributed throughout the city enable multi-user cognitive assistance appli...
详细信息
This position paper describes CognitiveAR, a system that seamlessly interfaces AR devices with smart city environments. Edge computing nodes distributed throughout the city enable multi-user cognitive assistance applications that require (1) real-time sensor data from the environment, such as approaching cars, and (2) computing resources for low-latency video processing. We discuss three such applications to elicit requirements for a platform to support them, and present our system design.
暂无评论