RFID systems nowadays are operated at large-scale in terms of both occupied space and tag quantity. One may have prior knowledge of the complete set of tags (denoted by N) and any set of wanted tags (denoted by M) wit...
详细信息
ISBN:
(纸本)9781509032822
RFID systems nowadays are operated at large-scale in terms of both occupied space and tag quantity. One may have prior knowledge of the complete set of tags (denoted by N) and any set of wanted tags (denoted by M) within the complete set, i.e., M ⊆ N. Then here comes an open problem: when one is particularly interested in a subarea of the system, how to collect information (not simply tagIDs) from a wanted subset (denoted by d M ) of the interrogated tags (denoted by d N ) in that subarea? This issue has great significance in many practical applications but appears to be challenging when there is a stringent time constraint. In this work, we first establish the lower-bound of this problem, and show a straightforward polling solution. Then, we propose a novel polling protocol called LocP, which consists of two phases: the Tags-Filtering phase and the Ordering-and-Reporting phase. LocP employs Bloom Filter twice to significantly reduce the scale of candidate tags in the Tags-Filtering phase. In the Ordering-and-Reporting phase, tags determine their own transmission time-slots according to the allocation vectors iteratively broadcasted by the reader. LocP thus achieves a delicate tradeoff between time and polling accuracy. We conduct extensive simulations to evaluate the performance of LocP. The results demonstrate that LocP is highly efficient in terms of information collection time, leading to convincing applicability and scalability of large-scale RFID systems.
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg...
详细信息
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication algorithm is proposed. First, the certificate authority may generate parameters of elliptic curve and its own public key and private key, and announce the parameters and its own public key, so that the registered users can inquire and use them. Second, the client registers at the certificate authority. The certificate authority will generate the public key of the client and the evidence of the client's private key which is signed by private key of the certificate authority. If the generated evidence of private key passes verification of the client, the client will generate its own private key. When a client sends a query request to an ONS server, the ONS server will authenticate identity of the client. If the client gets through the authentication, the ONS server will respond to the query request. The experimental result shows that this algorithm has high security and can avoid the ONS server providing query service for illegitimate client, so as to ensure the security of user privacy.
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propo...
详细信息
ISBN:
(纸本)9781509056972
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propose a novel design that using the multi-layer filtering of channel state information (CSI) to identify moving targets in dynamic environments and analyze the gait periodicity of human. We employ an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal component analysis (PCA) and discrete wavelet transform (DWT) to eliminate the noises. Furthermore, we propose a profile matching mechanism for human detection and a periodicity analysis mechanism for human gait taking advantage of the above design. We evaluated it with the commodity Wi-Fi infrastructures in different environments. Experimental results indicate that our approach performs identification of human with an average accuracy of 94%.
With the proliferation of the digital economy, cloud API has become the best carrier for data transmission and capability replication in software development. In the service-oriented software development paradigm, dev...
详细信息
ISBN:
(数字)9798350368550
ISBN:
(纸本)9798350368567
With the proliferation of the digital economy, cloud API has become the best carrier for data transmission and capability replication in software development. In the service-oriented software development paradigm, developers select appropriate cloud APIs for mashup creation based on their practical needs, where complementarity is an important consideration. Complementarity is reflected in various implicit relationships within mashups and cloud APIs, making complementarity analysis of cloud API ecosystems a critical issue. However, existing studies have overlooked the complementarity, and the lack of application variety in the primary dataset ProgrammableWeb has added a threat to the validity and generalization. In this paper, we first build a dataset of two cloud API ecosystems: ProgrammableWeb centering on mashup creation and Huawei AppGallery centering on mobile app development. Then, we conduct statistical and graph analysis to compare the two ecosystems. Finally, we propose a modeling approach to quantify complementarity and perform an analysis to investigate the role of complementarity in cloud API ecosystems. The results reveal differences between mashups and mobile apps in their preferences for cloud APIs. It also highlights the potential of complementarity in addressing the long-tail problem in cloud API ecosystems and improving cloud API recommendations.
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (N...
详细信息
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (NSE) proposed recently by us quantifies synchronization between neuronal signals at multiple *** paper meant to explore the behavior of synchronization of multichannel EEG in AD and healthy normal controls at rest, and preliminarily make clear the clinical significance of the NSE in AD *** (EEG) were recorded from 10 AD patients and 12 age-matched healthy normal controls (NC). NSE values were computed both across the all frequency band and separately in the delta, theta, alpha, beta (including beta1, beta2 and beta3), and gamma bands. The Mini-Mental Status Examination (MMSE) was used to assess the symptom severity of AD patients and *** values in the beta1 and beta2 bands were significantly lower in AD patients than in NC. NSE values in the alpha and beta1 bands were positively correlated with the MMSE scores in all participants (AD and NC). In AD patients, NSE values in the alpha, beta1 and beta2 bands were also positively correlated with MMSE *** results suggest that NSE values are a useful correlate of EEG synchronization in AD patients.
Most of the traditional outlier mining algorithms are not suitable for high dimensional datasets. However, the dimensionality of the dataset in the field of the Internet of Things is high. Therefore, Hypergraph-based ...
详细信息
Sequential pattern mining has a wide range of applications in data streams. The real data involves multiple data streams and each data stream is itemset-sequence. However, most algorithms mine a single item in a singl...
详细信息
Based on the centralized channel allocation strategy in the Cognitive Radio Networks, considering the opportunistic channel access for Secondary Users, a discretetime queueing model with a general transmission time an...
详细信息
In this paper, we proposed a new sequential pattern mining algorithm called WSPD for mining weighted sequential patterns in data streams. The algorithm produces no false negatives and places a bound on the error of th...
详细信息
With the explosive growth of wireless application, how to improve the spectrum efficiency as well as reduce the communication consumption is a hot topic of research. In this paper, we propose a novel energy saving str...
详细信息
暂无评论