Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3312614acmotherconferencesBook PagePublication PagescoinsConference Proceedingsconference-collections
COINS '19: Proceedings of the International Conference on Omni-Layer Intelligent Systems
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
COINS '19: INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS Crete Greece May 5 - 7, 2019
ISBN:
978-1-4503-6640-3
Published:
05 May 2019

Reflects downloads up to 24 Sep 2024Bibliometrics
research-article
Open Access
NeuroMesh: IoT Security Enabled by a Blockchain Powered Botnet Vaccine

Internet-of-Things (IoT) devices are ubiquitous and growing rapidly in number. However, IoT manufacturers have focused on the functionality and features of the devices and made security an afterthought. Since IoT devices have small memory capacities and ...

research-article
Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource Utilization

Edge computing has seen a great progress nowadays eliminating the network latency risks by placing data and functionality in low-end devices closer to the end user is central in application domains such as the support of the backend of mobile apps. When ...

research-article
Under Sampling Bagging Shapelet Transformation for Hydraulic System

In order to preserve the prediction of machine defects, fault conditions and normal conditions must be classified from time series data collected in real time from various sensors. For predictive maintenance of machine defects, fault conditions and ...

research-article
The 51 V's Of Big Data: Survey, Technologies, Characteristics, Opportunities, Issues and Challenges

Currently Big Data is the biggest buzzword, and definitely, we believe that Big Data is changing the world. Some researchers say Big Data will be even bigger buzzword than the Internet. With fast-growing computing resources, information and knowledge a ...

research-article
Dynamic Constraints for Mixed-Criticality Systems

We define quality of service requirements for mixed-criticality systems based on min-plus algebra rather than discrete criticality levels. The requirements (1) unify a spectrum of weakly-hard real-time requirements with strongly-hard real-time and soft ...

research-article
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks

Recently, researchers have demonstrated how the lack of security features in road vehicles may allow adversaries to take over partial or even full control. Specifically, in-vehicle communication protocols are prone to attacks, because no security ...

research-article
Representation learning for social networks using Homophily based Latent Space Model

Representing data in the form of a graph (network) is becoming an increasingly common approach for modelling complex systems. Graph representation models have thus emerged as a unified vocabulary across scientific domains. The advantage of graphs for ...

research-article
A Design Flow Framework for Fully-Connected Neural Networks Rapid Prototyping

The current work deploys a framework for rapid prototyping of Fully-Connected Neural Networks (FCNs). The scope is to provide an automatic design flow that generates a template-based VHDL code considering the accuracy, the resource utilization and the ...

research-article
Bitcoin Payment-Channels for Resource Limited IoT Devices

Resource-constrained devices are unable to maintain a full copy of the Bitcoin Blockchain in memory. This paper proposes a bidirectional payment channel framework for IoT devices. This framework utilizes Bitcoin Lightning-Network-like payment channels ...

research-article
Enhanced Data Transmission Platform in Smart Farms

The Internet of Things (IoT) is an emerging technology that incentivizes industry, agriculture and academia to develop smart platforms. One of the areas where IoT is being developed is in smart farms. IoT in agricultural systems helps farmers collect ...

research-article
IoT-based Urban Noise Identification Using Machine Learning: Performance of SVM, KNN, Bagging, and Random Forest

Noise is any undesired environmental sound. A sound at the same dB level may be perceived as annoying noise or as pleasant music. Therefore, it is necessary to go beyond the state-of-the-art approaches that measure only the dB level and also identify ...

research-article
Analysis of Performance and Energy Consumption of Wearable Devices and Mobile Gateways in IoT Applications

Smartphones and wearable devices, such as smart watches, can act as mobile gateways and sensor nodes in IoT applications, respectively. In conventional IoT systems, wearable devices gather and transmit data to mobile gateways where most of computations ...

research-article
Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds

Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of ...

research-article
Experimental Evaluation of Scenario Aware Synchronous Data Flow based Power Management

In all modern computer systems power consumption and thermal management is a major concern to control battery life and ageing to guarantee system availability. In such systems, a power manager changes the hardware component parameters at runtime to ...

research-article
A Design-flow for implementing, validating and evaluating Machine-learning Classifiers on FPGAs

The emergence of artificial intelligence (AI) applications have shown great benefits in saving costs and at the same time in executing efficiently many of our daily life tasks. Yet the application of AI in the safety-critical embedded systems domain is ...

research-article
Hardware Acceleration of Image Registration Algorithm on FPGA-based Systems on Chip

Image processing algorithms are dominating contemporary digital systems due to their importance and adoption by a large number of application domains. Despite their significance, their computational requirements often limit their usage, especially in ...

research-article
A Quality Attribute-based Evaluation of Time-series Databases for Edge-centric Architectures

Edge computing is unlocking the potential of Industrial Internet of Things (IIoT) to deliver business value and impact. Reliable data processing and guarantee of services within the IIoT sphere mandates the use of local storage within the device. The ...

research-article
SAFEPOWER: Application of Power Management Techniques in SoCs for Safety-Relevant Systems

With the ever increasing industrial demand for bigger, faster and more efficient systems, a growing number of cores is integrated on a single chip. Additionally, their performance is further maximized by simultaneously executing as many processes as ...

research-article
Workload-aware Management Targeting Multi-Gateway Internet-of-Things

Edge Computing has risen as a new promising computing paradigm, that relies on connected devices to communicate and exchange data closer to the end-user. Specifically, gateways are a critical component as they receive requests from multiple edge devices ...

research-article
An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous Agents

This article presents a system for creating an implemented open energy market for future smart grid systems, microgrids, the Internet of Things, and the Industrial Internet of Things. We also investigate and analyze different aspects of blockchain ...

research-article
Differentiating Attacks and Faults in Energy Aware Smart Home System using Supervised Machine Learning

The topics of fault diagnosis and security attack diagnosis in Cyber Physical Systems (CPS) have been studied extensively in a stand-alone manner. However, considering the co-existence of both of these sources of abnormality in a system, and being able ...

research-article
Metis: Optimal Task Allocation Framework for the Edge/Hub/Cloud Paradigm

Increased demands for real-time decision support and data analytics facilitate the need of performing significant computing away from the cloud and onto the IoT devices. In this paper, we propose Metis, a mathematical programming based framework, able ...

research-article
Towards Collaborative Machine Learning Driven Healthcare Internet of Things

The relationship between technology and healthcare due to the rise of Intelligent Internet of Things (IoT) and the rapid public embracement of medical-grade wearables has been dramatically transformed in the past few years. Powered by IoT, technology ...

research-article
Towards Distributed Runtime Monitoring with C++ Contracts

Design by Contract supports the specification of the intended behavior of a software component at its interfaces. Out of these specifications, runtime monitors can be generated. While those runtime monitors check the correct behavior of the software ...

research-article
Assessment of Model-based Methodologies to Architect Cyber-Physical Systems

The steady progression of the digital transformation within all business sectors and society thrive the importance of Cyber-Physical Systems (CPSs), whereas their areas of application grow and expand to an unmanageable amount. Since the model-based ...

research-article
Blockchain-based Smart-IoT Trust Zone Measurement Architecture

With a rapid growth in the IT industry, Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment. In IoT the things (devices) communicate and exchange the data without the act of human intervention. Such ...

research-article
Decentralized Directed acyclic graph based DLT Network

In this paper, we analyse the foundations of Blockchain and DAG Directed acyclic graph its evolution and the tangle, DAG try to solve the most issues in blockchain and make a system that stable for Internet-of Things (IOT) industry. In addition, to ...

research-article
Securing Over-The-Air IoT Firmware Updates using Blockchain

Over-the-air (OTA) firmware updates are very common in IoT (Internet of Things) devices with wireless capabilities. Although they are convenient, they may also be open to attack since physical access may not be needed. In addition, most frameworks use a ...

research-article
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection

Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number of IoT devices manufactured has grown exponentially through last years. In order to be competitive in terms of production cost, they usually need to ...

research-article
The Evolving Enterprise Architecture: A Digital Transformation Perspective

The advancement of technology has influenced all the enterprises. Enterprises should come up with the evolving approaches to face the challenges. With an evolving approach, the enterprise will be able to adapt to successive changes. Enterprise ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations