WINSYS 2022 Abstracts


Area 1 - Ciber-Physical Systems

Short Papers
Paper Nr: 11
Title:

Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm

Authors:

Mohiuddin Ahmed, A. S. Akhter, A. B. Rashid, Mahdi Fahmideh, Al-Sakib K. Pathan and Adnan Anwar

Abstract: Microservices are becoming an integral component in the architecture design and development of Internet-based distributed systems, such as the Internet of Things. A critical ongoing challenge in microservice architecture design is to ensure the integrity and availability of data. Blockchain technology offers the solution to these challenges in the distributed microservice architecture. Blockchains use consensus algorithms for validating their transactions and also providing extra security. Taming the advantages of consensus algorithms in blockchain-based architecture models, this paper proposes a trustworthy consensus algorithm to tackle data integrity challenges in microservice architectures. The results of the evaluation highlight the efficacy of the proposed algorithm in real-world scenarios of microservice architecture endeavour. Lessons learned in applying the algorithms, and future research directions are also discussed.
Download

Paper Nr: 1
Title:

Collaboration of Semantically Enriched Digital Twins based on a Marketplace Approach

Authors:

Joel Lehmann, Andreas Lober, Alessa Rache, Hartwig Baumgärtel and Julian Reichwald

Abstract: Digital Twins are a key concept and an enabling technology within the digital transformation. They can communicate bilaterally with their physical counterpart. Thus the twins are reflecting each other’s properties and state changes. Digital Twins add value to many use case domains, e. g., smart manufacturing. Nevertheless, today’s implementations are mostly data and state representations of their physical counterparts, tying the digital twin to a passive and reactive role. The authors argue that semantically enhanced digital twins that autonomously perform actions and interactions on digital market spaces can add substantial value to various use cases. An architectural approach is proposed, and an implemented proof of concept shows the feasibility.
Download

Paper Nr: 14
Title:

A Repository of Actionable Information on the Internet of Things

Authors:

Anna Felkner and Marcin Rytel

Abstract: This paper describes efforts to improve the security of the Internet of Things world. One of the many problems faced by the users, but also producers or owners of networks or people who deal with cybersecurity in a broad sense on a daily basis, such as employees of CSIRTs, is the issue of vulnerabilities in devices or software. Even though the most serious vulnerabilities are more commonly presented in the news, still the vast majority of them is only known to cybersecurity specialists and not to the users who own the vulnerable devices and therefore can be in danger. The results of our recent research show that there is still no satisfactory source of information about vulnerabilities in Internet of Things devices and software. This is why we decided to create such a repository (variotdbs.pl) where information about vulnerabilities and exploits targeting IoT devices can be easily found by everyone.
Download

Area 2 - e-Health Monitoring

Short Papers
Paper Nr: 9
Title:

Design an Intelligence System for Early Identification on Developmental Dyslexia of Chinese Language

Authors:

Man-Ching Yuen, Ka-Fai Ng, Ka-Ming Lau, Chun-Wing Lam and Ka-Yin Ng

Abstract: People with dyslexia have difficulties in fluently reading and writing characters which highly affect their learning progress. It is very important to identify dyslexic students that need intervention and extra support during their childhood. However, the waiting time for dyslexia assessment services is often long. To address the above problem, we propose a cloud-based early identification system of dyslexia. We design and develop a mobile app with AWS cloud platform as server. We have identified 27 representative traditional Chinese characters for handwriting data collection. After the first round of the data collection, 66 children aged 5-7 were recruited in Hong Kong. We carry out K-means clustering algorithm to investigate the characteristics of data points on a feature map for each character. We find out that some Chinese words contain more distinguishable characteristics for identifying children with dyslexia. Since children aged 5-7 are still learning how to write traditional Chinese characters properly, children with no risk of dyslexia still have certain possibilities of writing characters with characteristics of handwriting by children with dyslexia. It increases the difficulties of the early identification on developmental dyslexia of Chinese language. Finally, we present our findings and future work.
Download

Paper Nr: 21
Title:

Classification of Chest X-ray Images to Diagnose Covid-19 using Deep Learning Techniques

Authors:

Isabel S. Silva, Ramoni B. Negreiros, André F. Alves, Dalton G. Valadares and Angelo Perkusich

Abstract: The new coronavirus pandemic has brought disruption to the world. One of the significant dilemmas to be solved by countries, especially in underdeveloped countries like Brazil, is the lack of mass testing for the population. An alternative to these tests is detecting the disease through the analysis of radiographic images. To process different types of images automatically, we employed deep learning algorithms to achieve success in recognizing different diagnostics. This work aims to train a deep learning model capable of automatically recognizing the Covid-19 diagnosis through radiographic images. Comparing images of coronavirus, healthy lung, and bacterial and viral pneumonia, we obtained a result with 94% accuracy.
Download

Paper Nr: 22
Title:

IoT-based Health Monitoring System for Intensive Care Units

Authors:

Adriana Collaguazo, Rebeca Estrada and Nestor Arreaga

Abstract: Due to the critical condition and unique treatments required by ICU’s patients, their vital signs should be continuously and reliably monitored. In this paper, we present a system to address this problem including the design considerations. Our system has three components: i) a mobile application to present the collected data from the hospitals server, ii) a database server with patients data and iii) a transactional server that manages and keeps the connection between the other two components. The mobile application implements a vital signs monitor for each patient including an underlying emergency notification system. After several simulations, we were able to identify that the proposed solution takes around 3 seconds to generate the notification after an emergency alarm occurs. Moreover, the application uses an average of 2.11 Kb/s of traffic data and a maximum of 250Mb of RAM. This system is a feature that will help to track the ICU patients status, allowing doctors and ICU managers to work outside the unit and to determine when their presence is required. Results show that relevant and accurate notifications can effectively reduce the time response in cases of emergency and consequently increases the likelihood of the patients’ recovery.
Download

Area 3 - Wireless and Mobile Technologies

Full Papers
Paper Nr: 2
Title:

Ultra Low Power RF Energy Harvesting System using a Super Capacitor as an Energy Reservoir for an IoT Node

Authors:

Florian Grante, Ghalid Abib, Muriel Muller and Nel Samama

Abstract: In this paper, we propose a 2.45 GHz RF energy harvesting system to power a battery free Internet of Things (IoT) sensor node. The system operates from an RF signal with a power as low as -20 dBm and includes an RF to DC converter, a storage super capacitor and a voltage DC/DC up-conversion. The system components are sized to provide the required electric energy to operate the connected object. The tested connected object includes an ARM microcontroller, an ultra low-power sensor (temperature, pressure and humidity) and a Bluetooth Low Energy interface for a wireless transmission toward a terminal such as a smartphone or tablet. It requires 200 μJ per transmission cycle, which must be provided by the proposed harvesting system. This system is tested in an anechoic chamber and using a constant power RF signal to characterize the energy recovery time needed for measuring and transmitting the sensor data. Promising results show that the system is capable of sending data after 5 hours of RF energy harvesting from a source distant with one meter.
Download

Paper Nr: 18
Title:

Position Optimization for Swarm-based UAV-to-UAV Communication Systems

Authors:

Mingzhi Xu, Kuan Wu, Jianchao Chen, Xiaojing Huang and Ming Jiang

Abstract: Unmanned aerial vehicle (UAV) technologies have played an important role in the beyond-fifth-generation (B5G) networks. To meet the increasing demand for UAV swarm communications, in this paper we propose an intra-swarm UAV-to-UAV (IaS-U2U) communication mechanism for enabling data services in the so-called out-of-coverage (OOC) scenario, where the conventional terrestrial cellular network infrastructure is not available, for example in the cases of mountains, oceans, deserts and forests. Specifically, an optimization problem is formulated by jointly considering the single-pair transmission rate (STR) and the propulsion power (PP), where the UAVs’ pairing and relative positioning are taken into account. To solve the complicated joint optimization problem, we decompose it into the UAV pairing process and the relative position optimization (RPO) process, where in the latter a successive convex approximation (SCA) based RPO algorithm is proposed. Simulation results show that the new scheme can provide notable gains in terms of energy efficiency (EE) over selected benchmark methods under different conditions.
Download

Short Papers
Paper Nr: 15
Title:

A Fault Management Preventive Maintenance Approach in Mobile Networks using Sequential Pattern Mining

Authors:

Márcio Pereira, David Duarte and Pedro Vieira

Abstract: Mobile networks’ fault management can take advantage of Machine Learning (ML) algorithms making its maintenance more proactive and preventive. Currently, Network Operations Centers (NOCs) still operate in reactive mode, where the troubleshoot is only performed after the problem identification. The network evolution to a preventive maintenance enables the problem prevention or quick resolution, leading to a greater network and services availability, a better operational efficiency and, above all, ensures customer satisfaction. In this paper, different algorithms for Sequential Pattern Mining (SPM) and Association Rule Learning (ARL) are explored, to identify alarm patterns in a live Long Term Evolution (LTE) network, using Fault Management (FM) data. A comparative performance analysis between all the algorithms was carried out, having observed, in the best case scenario, a decrease of 3.31% in the total number of alarms and 70.45% in the number of alarms of a certain type. There was also a considerable reduction in the number of alarms per network node in a considered area, having identified 39 nodes that no longer had any unresolved alarm. These results demonstrate that the recognition of sequential alarm patterns allows taking the first steps in the direction of preventive maintenance in mobile networks.
Download

Paper Nr: 16
Title:

Agnostic Middleware for VANETs: Specification, Implementation and Testing

Authors:

Fábio Gonçalves, Bruno Ribeiro, Oscar Gama, Maria J. Nicolau, Bruno Dias, António Costa, Alexandre Santos and Joaquim Macedo

Abstract: Vehicular Ad hoc Networks (VANETs) are the basic support for Intelligent Transportation Systems (ITS), providing a framework for its multiple entities to communicate. The communications and services provided to the road entities are generally implemented by means of an On-Board Unit (OBU) and Road Side Unit (RSU), sharing a rather similar hardware and software architectures. These devices need to support multiple communications types and provide access to the needed vehicle data to the applications. Most of the existing solutions demand that the application developers have development control and knowledge about the OBU internals. Thus, most applications are developed by OBU makers and implemented directly on it. However, solutions based on middleware agnosticism separate the OBU internals and software development, facilitating the application development by software makers or researchers. This paper proposes an Application Programming Interface (API) and protocol that can easily be used to access the vehicle internals and services through an agnostic architecture without any knowledge on how they are implemented.
Download

Paper Nr: 23
Title:

Practical Design of a WiFi-based Wireless Sensor Network for Precision Agriculture in Citrus Crops

Authors:

Laura García, Sandra Viciano-Tudela, Sandra Sendra and Jaime Lloret

Abstract: Agriculture is one of the most important economic sectors in the world. On the one hand, most of its importance resides in the food that is produced. On the other hand, this sector employs millions of people in the world both directly and indirectly. The introduction of Internet of Things (IoT) solutions for crop monitoring and management was the next step to improve the quality of the product, the quantity in the production, and to reduce the use of resources such as water. In this paper, a practical design of a WiFi-based Wireless Sensor Network (WSN) for citrus crop monitoring is presented. A mathematical model is obtained from the results of practical tests performed with low-cost devices for different height configurations of both the Access Point (AP) and the emitter according to the distance. The maximum coverage for the AP for each configuration is obtained as well. The results show the number of sensor nodes necessary to monitor the field according to its extension, and the number of APs needed to provide coverage for all the nodes deployed on the citrus field for each configuration. This way, a tool for the design of WSNs to monitor citrus plots is provided.
Download

Paper Nr: 13
Title:

New Quantum Strategy for MIMO System Optimization

Authors:

Mohammed R. Almasaoodi, Abdulbasit A. Sabaawi, Sara El Gaily and Sándor Imre

Abstract: Co-channel interference and noise power could affect the performance of the MIMO system and can be evaluated with respect to the user’s signal to noise and interference ratio. As a result, the desired transmission rate of the users could be satisfied by consuming more transmit power. Owing to this, a quantum optimization strategy can be utilized in order to minimize the transmit power, as well as to achieve an optimum trade-off within the throughput and the resulting interference and noise. In this study, a constrained quantum optimization algorithm (CQOA) has been implemented in the MIMO-downlink system to reduce the transmit power and computational complexity. An analytical study is conducted along with a comparison between the water filling algorithm-based binary searching algorithm (WFA-BSA), exhaustive algorithm-based water filling algorithm (EWFA), and the CQOA. Finally, simulation results show that the aforementioned methods consume similar total transmit power, however, the computational complexity of the quantum strategy is dramatically low compared to the other methods.
Download