Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Factor graph-based deep reinforcement learning for path selection scheme in full-duplex wireless multihop networks
AbstractA wireless multihop network (WMN) is set of wirelessly connected nodes without an aid of centralized infrastructure that can forward any packets via intermediate nodes by a multihop fashion. In the WMN, there are still some issues that need to be ...
Highlights- Proposing a novel fDRL scheme to optimize network capacity and reduce computation time in WMNs;
- Using the FG approach, the fDRL scheme selects the best root node and reduces DRL computation time; and
- Applying NLC to data ...
- research-articleMay 2023
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms
AbstractCybersecurity training is a key endeavour for ensuring that the IT workforce possess the knowledge and practical skills required to counter the ever-increasing cybersecurity threats that our society is faced with. While some related systems, such ...
- research-articleJanuary 2023
Intent-Driven Secure System Design: Methodology and Implementation
AbstractGiven the typical complexity of networked systems in terms of number of components and their interconnections, manually designing their architecture is inherently difficult, and the design process requires expert knowledge and skills. ...
- research-articleNovember 2022
FD-MCST design and analysis for multihop wireless networks
AbstractFull-duplex (FD) wireless communication improves the attainable spectral efficiency of the wireless network with the simultaneous transmission and reception over the same frequency channel at a single timeslot. However, the effect of ...
Highlights- Cooperative mixture of concurrent and sequential transmission (MCST) scheme
- ...
- posterMay 2022
IoT System Trustworthiness Assurance
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 1222–1224https://doi.org/10.1145/3488932.3527287As the Internet of Things (IoT) becomes more and more pervasive, encompassing many aspects of our daily life, the issue of how much the IoT systems can be trusted is critical. However, the multitude of recent incidents that were caused by or somehow ...
-
- research-articleApril 2022
SecureWeaver: Intent-Driven Secure System Designer
Sat-CPS '22: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical SystemsPages 107–116https://doi.org/10.1145/3510547.3517923Design and management of networked systems, such as Information Technology/Network (IT/NW) or IoT systems, are inherently complex. Moreover, the need to adhere to security requirements adds even more complexity, as the manual audit and security ...
- research-articleNovember 2020
Adaptive security awareness training using linked open data datasets
Education and Information Technologies (KLU-EAIT), Volume 25, Issue 6Pages 5235–5259https://doi.org/10.1007/s10639-020-10155-xAbstractCybersecurity is no longer an issue discussed only between the professionals or technologists, but it is also closely related to ordinary people whose daily life is exposed to kinds of cyberattacks. And Womabat Security Technologies conducted a ...
- extended-abstractMay 2020
PICALA: an interactive presentation system to share reaction of audiences with light color
AsianHCI '19: Proceedings of Asian CHI Symposium 2019: Emerging HCI Research CollectionPages 46–52https://doi.org/10.1145/3309700.3338435In this paper, we propose a feeling-sharing system called PICALA, which can register the feelings of audiences during public presentations. We designed and implemented a system in which the colors of the light bulbs near the screen changed by clicking ...
- research-articleJanuary 2019
Efficient network coding-based data transfer framework for multihop wireless communication
International Journal of Networking and Virtual Organisations (IJNVO), Volume 21, Issue 1Pages 127–159https://doi.org/10.1504/ijnvo.2019.101162With the growing demands of wireless applications and mobile data connections, wireless communication is expected to provide the ever-increasing demand for higher data rate and efficient data communication. Energy is also one of the hot issues needed to ...
- research-articleDecember 2018
A Design of Overlapped Chunked Code over Compute-and-Forward in Multi-Source Multi-Relay Networks
2018 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOCOM.2018.8647922A physical-layer network coding approach, compute-and- forward based on nested lattice code (NLC), is considered for multi-source multi-relay networks. This paper proposes a design of overlapped chunked code (OCC) which is applied before NLC, which we ...
- research-articleOctober 2018
Multiple conformance to hybrid automata for checking smart house temperature change
DS-RT '18: Proceedings of the 22nd International Symposium on Distributed Simulation and Real Time ApplicationsPages 224–233Conformance testing is a formal approach for checking the validity of an implemented system against its specification. This paper adopts it to comprehensively check the conformance of smart house temperature with its requirements. However, besides its ...
- demonstrationOctober 2018
AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons
- Tsubasa Yumura,
- Masatoshi Enomoto,
- Kunio Akashi,
- Futoshi Hirose,
- Tomoya Inoue,
- Satoshi Uda,
- Toshiyuki Miyachi,
- Yasuo Tan,
- Yoichi Shinoda
UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable ComputersPages 476–479https://doi.org/10.1145/3267305.3267568In this study, we propose AOBAKO, a testbed for context-aware applications, which focuses on the testing of mobile applications using Bluetooth Low Energy (BLE) for indoor positioning. AOBAKO emulates BLE-beacon communications based on accurate frame-...
- research-articleJune 2018
Predictive Thermal Comfort Control for Cyber-Physical Home Systems
2018 13th Annual Conference on System of Systems Engineering (SoSE)Pages 444–451https://doi.org/10.1109/SYSOSE.2018.8428734With the emergence of Internet of Things (IoT) and smart homes, the demand for energy efficient thermal comfort has also increased significantly to address the importance of quality of life (QoL) in a modern society. In this paper, we present a model ...
- research-articleJune 2016
SOFL-based dependency graph generation for scheduling
2016 11th System of Systems Engineering Conference (SoSE)Pages 1–6https://doi.org/10.1109/SYSOSE.2016.7542958In multi-task systems, different tasks work together to achieve desired functions. To guarantee the correctness of the functions, the tasks are required to be completed in specific orders. Violation of such orders will lead to the systems in unpredictable ...
- research-articleMarch 2016
Balanced Cooperative Linear Data Exchange with Physical Layer Network Coding
ICC '16: Proceedings of the International Conference on Internet of things and Cloud ComputingArticle No.: 28, Pages 1–6https://doi.org/10.1145/2896387.2896413In this paper, we consider a group of nearby wireless end devices such as mobile phones cooperating to exchange their received packets from a common base station in order to fulfill the lost packets in other members. This problem can be solved by the ...
- ArticleDecember 2015
Towards Resilient Services in the Home
IWAAL 2015: Proceedings of the 7th International Work-Conference on Ambient Assisted Living. ICT-based Solutions in Real Life Situations - Volume 9455Pages 113–124https://doi.org/10.1007/978-3-319-26410-3_11Commercially available automation systems for the home are enjoying rising popularity in recent years, promising the dream of a smart home environment. However they leave a lot to be desired in terms of device and network protocol interoperability as ...
- ArticleDecember 2014
DPSC: A Novel Scheduling Strategy for Overloaded Real-Time Systems
CSE '14: Proceedings of the 2014 IEEE 17th International Conference on Computational Science and EngineeringPages 1017–1023https://doi.org/10.1109/CSE.2014.202For real-time systems, the correctness of system behavior depends on not only the computed results but also on the time at which results are produced. This requires tasks in such systems to be completed before their deadlines. However, when workload is ...
- ArticleApril 2014
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
SOSE '14: Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System EngineeringPages 192–197https://doi.org/10.1109/SOSE.2014.29Feedback loss can severely degrade the overall system performance, in addition, it can affect the control and computation of the Cyber-physical Systems (CPS). CPS hold enormous potential for a wide range of emerging applications including stochastic and ...
- ArticleJuly 2013
Architecture for Organizing Context-Aware Data in Smart Home for Activity Recognition System
Proceedings of the First International Conference on Distributed, Ambient, and Pervasive Interactions - Volume 8028Pages 173–182https://doi.org/10.1007/978-3-642-39351-8_20Knowing human activity in each day is relevant information in several purposes. However, existing activity recognition systems have limitation to identify the human activity because they cannot get the appropriate information for recognition. To address ...
- ArticleNovember 2012
Activity Recognition Using Context-Aware Infrastructure Ontology in Smart Home Domain
- Konlakorn Wongpatikaseree,
- Mitsuru Ikeda,
- Marut Buranarach,
- Thepchai Supnithi,
- Azman Osman Lim,
- Yasuo Tan
KICSS '12: Proceedings of the 2012 Seventh International Conference on Knowledge, Information and Creativity Support SystemsPages 50–57https://doi.org/10.1109/KICSS.2012.26Nowadays, activity recognition has been proposed in several researches. It is attractive to improve the ability of the activity recognition system because existing research on activity recognition systems still have an error in an ambiguous cases. In ...