Date post: | 28-Dec-2015 |
Category: |
Documents |
Upload: | felicia-ford |
View: | 218 times |
Download: | 1 times |
Introduction to Paper Writing and Poster
Presentation
REU SITE Talks
July 9th, 2015
Kemal AkkayaFlorida International University
Paper
• Scientific document to demonstrate a particular theory/outcome/result
• It contains original research results or reviews existing results– transparency and repeatability of the
research
• Peer-reviewed by experts
2
Components of a Paper• Abstract
– Summary of the work (technical parts)
• Intro– Background and Motivation of the problem– Description of Solution
• Related Work– Comparison of your work done by others
• Approach– Technical Stuff
• Experiments– Validation of your approach
• Conclusion
3
Types of papers
• Technical report• Conferences• Survey papers (literature review)• Journal• Book chapter• Magazines
5
1: Every paper tells a story• What is the “elevator pitch” of your
story?o Elevator pitch = summary that is short enough to
give during an elevator ride
• The story is not what you did, but rathero what you show, new ideas, new insightso why interesting, important?
• Why is the story of interest to others?o universal truths, hot topic, surprises or unexpected
results?
• Know your story!
6
1: Every paper tells a story
• Do not think that your idea is silly
o You may see someone else publishing the same idea in the near future
o Try writing down your ideas on a piece of paper to see if you can convince yourself
o Do not be "perfectionist", you will never be able to start • Every idea, even weak, can be presented as a
paper
o The point is how to and where to sell it o Set a target conference, workshop, journal and go ahead
7
2. Write top down
• Most human beings think this way!
• State broad themes/ideas first, then go into detailo context, context, context
• Even when going into detail … write top down!
8
3 Introduction: crucial, formulaic
• If reader not excited by intro, paper is lost
• Recipe:o para. 1: motivation: broadly, what is problem area,
why important? o para. 2: narrow down: what is problem you
specifically considero para. 3: “In the paper, we ….”: most crucial
paragraph, tell your elevator pitcho para. 4: how different/better/relates to other worko para. 5: “The remainder of this paper is structured
as follows”
9
4. Master the basics of organized writing
• Paragraph = ordered set of topically-related sentences
• Lead sentenceo sets context for paragrapho might tie to previous paragrapho transition is very important not to lose the reader
• Sentences in paragraph should have logical narrative flow, relating to theme/topic
• Don’t mix tenses in descriptive text• One sentence paragraph: warning!• Smooth logical flow
10
5. Put yourself in place of the reader• Less is more: o “I would have sent you less if I had had time”
take the time to write lesso Page upon page of dense text is no fun to read
avoid cramped feeling of tiny fonts, small margins create openness with white space: figures, lists
• Readers should not have to worko won’t “dig” to get story, understand context, resultso need textual signposts to know where ‘story” is going, context to know where they
are good: “e.g., Having seen that let’s next develop a model for.. Let Z be ..” bad: “Let Z be ..”
• What does reader know/not know, want/not want?o write for reader, not for yourselfo no one has as much background/content as youo no one can read your mindo all terms/notation defined?
11
6. No one (not even your mother) is as interested in this topic as you
• So you had better be (or appear) interested• Tell readers why they should be interested in
your “story”• Don’t overload reader with 40 graphs: o think about main points you want to convey with graphso can’t explore entire parameter space
• Don’t overload reader with pages of equations
o put long derivations/proofs in appendix, provide sketch in body of paper
12
7. State the results carefully
• Clearly state assumptions (see overstate/understate your results)
• Experiment/simulation description: enough info to nearly recreate experiment/description
• Simulation/measurements: o statistical properties of your results (e.g., confidence
intervals)
• Are results presented representative?o or just a corner case that makes the point you want to make
13
8. Don’t overstate/understate your results
• Overstatement mistake:o “We show that X is prevalent in the Internet”o “We show that X is better than Y”
• when only actually shown for one/small/limited cases• Understatement mistake: fail to consider
broader implications of your worko if your result is small, interest will be smallo “rock the world”
14
9. Study the art of writing
• Writing well gives you an “unfair advantage”• Writing well matters in getting your work
published in top venues• Highly recommended:o The Elements of Style, W. Strunk, E.B. White, Macmillan
Publishing, 1979o Writing for Computer Science: The Art of Effective
Communication, Justin Sobel, Springer 1997.
• Who do you think are the best writers in your area: study their style
15
10. Good writing takes times
• Give yourself time to reflect, write, review, refine
• Give others a chance to read/review and provide feedback
o get a reader’s point of viewo find a good writer/editor to critique your writing
• Starting a paper three days before the deadline, while results are still being generated, is a non-starter
16
Posters
• Presentation of your Paper in one page• Should be able to explain in a few
sentences– The goal of your work– Your approach– Results
• Organization – Need to be presented well for people to
read– Less text more figures
17
Possible Solutions
IEEE 802.11s-based SG AMI Networks
Challenges
Privacy Preserving via Obfuscation
PI: Kemal Akkaya
Advanced Wireless and Sensor Networking Lab (ADWISE), [email protected]
Privacy-preserving Data Collection on IEEE 802.11s-based Smart Grid AMI Networks
• Obfuscation method provides end-to-end privacy with no significant overhead and enable the utility company to do billing and state estimation at the same time by using the same reported data.
• The network needs to be clustered accordingly based on the needs of the applications.
• FHE is feasible for 802.11s-based AMI Networks despite its large message size and processing delay.
• Again the network size should be adjusted based on the data collection frequency to ensure collection of all the data on time.
1. Data explosion in Smart Grid (SG)
2. Security, and privacy requirements in SG
• Multihop network of smart meters
• Routing done at MAC layer (Hybrid Wireless Mesh Protocol)
• Suitable for AMI applications
References:1.Nico Saputro and Kemal Akkaya, "On Preserving User Privacy in Smart Grid Advanced Metering Infrastructure Applications“, Security and Communication Networks Vol 7, Issue 1, January 2014. John Wiley & Sons.2.Andrew Beussink et.al, "Preserving consumer privacy on ieee 802.11 s-based smart grid ami networks using data obfuscation“, In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pp. 658-663. IEEE, 2014.
Summary
• Household activities can be inferred from fined-grained power usage data
• Arithmetic operation on encrypted message = addition operation on plaintext
• Fully (addition and multiplication) – Smart-Vercauteren’s FHE (SV-FHE)• Produces relatively small key and ciphertext size• Key generation, bit wise encryption/decryption, bitwise addition/multiplication,
recryption operation
• Partially (addition or multiplication) – Paillier (PHE)
• lower message expansion size.
Quinn E. Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February 2009.
1. Power data masking : obfuscation of readings
2. Data aggregation via homomorphic encryption
• Partially Homomorphic Encryption
• Fully Homomorphic Encryption
3. Anonymization : disassociation of customer ID and data
4. Power data reshaping : hiding the actual use
Data Masking - Goal: •To preserve the privacy of the consumer •Give the utility the opportunity to do billing and distribution state estimation
Lead Gateway (LG) picks random weights for the basis set at each data collection (e.g., t1) for the obfuscation vector
However, the sum of all weights for a billing period (e.g. t1, t2, t3, ….tn) should sum to 0.
LG encrypts and signs obfuscation value for each smart meter (SM) using Elliptic Curve Cryptography (ECC)
Compared to :Baseline: no privacy and securityBaseline Sign: authentication onlyBaseline Sec: authentication and
confidentiality
Data aggregation via homomorphic encryption
In each SM, reading + obfuscation value is time-stamped and signed (using ECC), and then send to LG.
LG sends to the utility in clear
Results :1. The delay in Obfuscation is lower since the SMs send at different time
schedule depend on the arrival of obfuscation value while the baselines send at the same time (contention)
2. The PDR of Obfuscation is lower since some SMs do not receive some obfuscation values from the gateway (i.e. the PDR from the gateway to SMs is not 100%), This lead to small goodput.
Homomorphic Systems - Goal : •Feasibility assessment of Fully Homomorphic Encryption in a real network
No Aggregation
Aggregation
Results : •The overhead of FHE is significantly higher then PHE, but the 802.11s-based SG AMI can handle the overhead even when the network scales.•Data aggregation reduces the traffic overhead significantly
*NE-NA = No Encryption – No aggregation approach
The 37th IEEE Local Computer Networks (LCN) 2012 Clearwater, Florida, USA
4. Conclusion
1. Designing The Hardware
A Mobile Sensor Network Testbed using iRobots
Abstract
A new mobile sensor called iRobotSense which uses iRobot Create as the mobile platform and an IRIS mote for sensing and communication capabilities is introduced. An MSN testbed which implements and tests PADRA is created to practice the effects of cascaded movement on connectivity issues.
Acknowledgment
This work is supported by US National Science Foundation under the grant number CNS 1018404.
Shadi Janansefat, Izzet F. Senturk, Kemal Akkaya, Micheal GloffDepartment of Computer ScienceSouthern Illinois UniversityCarbondale, IL 62901Email: [email protected], [email protected], [email protected], [email protected],
3. Mobile WSN Testbed ForConnectivity Restoration
Need: Low-cost mobile sensing platform for Wireless Sensor Networks (WSNs) and using it in a real testbed.
Our Approach: Designing a mobile sensing device (iRobotSense) by integrating IRIS mote with an iRobot Create, both commercially available and economically efficient. Testing it in a real testbed created at SIU.
Components: IRIS Mote: A wireless sensor module used in WSNs widely iRobot Create: An educational development kit that can
perform the common drive tasks of a robot IRIS Interface Board: An interface board with breakout
region HMC6352 Compass Module: A fully integrated compass
module, capable of I2C communication New node is called iRobotSense and costs only $130.
Using iRobotSense, a connectivity restoration algorithm named PArtition Detection and Recovery Algorithm (PADRA) [1] is implemented in a 7 node testbed.
Upon partitioning of the network due to failure of a node, the connectivity is restored through cascaded movement of nodes that are dominatee nodes
The moving nodes autonomously made the decision to move to the right locations.
2. Robot-Mote Interaction Using nesC, programming the iRobot through serial port
of the mote, interfaced by the iRobot When an iRobotSense needs to move:
It reads the current deviation angle it is facing from the compass via I2C interface
Based on (x, y) of the current location and the destination, the direction it needs to face and distance to the destination (i.e., d) are computed
Given the deviation angle and the moving direction toward the destination, the degrees the iRobotSense should turn before travel is calculated (i.e. ω)
The movement command is sent to the iRobot from the IRIS mote:
Turn until calculated angle ω is reached Drive until calculated distance d is reached
References[1] K. Akkaya et al. “Distributed recovery from network partitioning in movable sensoractor networks via controlled,” in IEEE Transactions on Computers, vol. 59, no. 2, Feb. 2010, pp. 258–271.