{"title":"A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression","authors":"Joseph Khoury, M. Pourazad, P. Nasiopoulos","doi":"10.1109/ICCNC.2019.8685526","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685526","url":null,"abstract":"Light Field imaging has emerged as a technology that enables the capture of images and video with richer information. Captured content is composed of numerous views aligned in both horizontal and vertical directions providing full parallax, offering light intensity and directional information, but at the same time significantly increasing bandwidth requirements. Several multi-view coding methods have attempted to tackle this problem. However, these approaches do not fully assess the intricacies that are found in light field content. This paper proposes a prediction structure for coding light field content using the MV-HEVC standard, exploiting the inter-view correlations in two directions along with the high similarity between views around the center of each frame. Experimental results show BD-rate gains up to 38% compared to an existing state-of-the-art method.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction","authors":"Sami Alesawi, Sakher Ghanem","doi":"10.1109/ICCNC.2019.8685575","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685575","url":null,"abstract":"Inspired by the potential power of random scheduling at data centers, a novel approach for combining arbitrary dispatching policy and tail-latency prediction in heterogeneous fork-join network environments is proposed. Tail prediction is of practical importance in commercial data centers, where the need for sharing resources between many applications is desired at most, to ensure client satisfaction with guaranteed service level objectives (SLOs). Lots of research works in parallel scheduling were presented using event-based simulations, but none of them were able to implant dynamic variation of tasks numbers and maintain the determined load region using a precise, and reliable approach. In this paper, we propose extensive case studies for the presented prediction model in heterogeneous black-box using model-driven simulations. Experimental results show that by using random scheduling algorithm accompanied with inserted effects of different requests fan-out, tail latency can be predicted and stay consistent with relative errors of 10% at high load regions.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"34 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Path Infrastructure-less Networks A Cooperative Approach","authors":"Razvan Cristian Voicu, J. Copeland, Yusun Chang","doi":"10.1109/ICCNC.2019.8685655","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685655","url":null,"abstract":"For future generation networks, the development of new and novel architectures is needed if integration, expansion, and usability demands are to be met. This paper proposes a new network architecture that can be used for developing and maintaining multi-path routes through a cooperative node approach. The cooperative nodes assist in the network development and are designed to act as forwarders of messages using idle or underutilized channels. The proposed architecture shows that, even without optimization, significant improvement can be seen in latency, goodput, and channel utilization. The architecture consists of five stages named Discovery, Decision, Utilization, Data Collection, and Dynamic Adaptation. By design, the architecture is developed to be modular with individual stages capable of functioning unaided by the other stages and developed to be easily implemented in any of the network layers. Due to space constraints, optimization and challenges such as the handling of unrelated packet formats are omitted and proposed in different works.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing UDP Flooding Amplification Attacks with Weak Authentication","authors":"E. Biagioni","doi":"10.1109/ICCNC.2019.8685648","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685648","url":null,"abstract":"An attacker wishing to flood a network with excess amounts of network traffic may send UDP packets with a spoofed IP source address corresponding to the target network. In many cases servers then amplify the attack by replying to the target network with more data than was sent by the attacker. This kind of attack has been successful in the past using both DNS and NTP servers.The AllNet protocol has been designed to deliver data over UDP as well as other media. Once an AllNet peer receives a suitable UDP packet, it records the sender’s IP address and begins to forward AllNet data to that address. This is a legitimate form of traffic amplification, with one packet being used to request that a limited number of other packets (currently 100) be sent to this IP address.To keep attackers from using AllNet peers for flooding amplification attacks, AllNet peers require potential contacts to return a bitstring that was sent to that specific IP address. In this way, legitimate contacts can receive and return the bitstring and start receiving their data. In contrast, attackers who spoof their IP address and do not receive the bitstring, are unable to direct amplified traffic to other networks.This very weak form of authentication, conceptually related to TCP SYN cookies, only verifies that the packet comes from a system that is able to receive packets sent to that specific IP address. Such weak authentication is sufficient to prevent flooding amplification attacks.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"3 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masafumi Moriyama, K. Takizawa, M. Oodo, Hayato Tezuka, F. Kojima
{"title":"Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity","authors":"Masafumi Moriyama, K. Takizawa, M. Oodo, Hayato Tezuka, F. Kojima","doi":"10.1109/ICCNC.2019.8685617","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685617","url":null,"abstract":"The number of Internet-of-Things (IoT) devices will increase rapidly. In next generation mobile communication systems, base stations (BSs) must effectively accommodate signals from massive IoT devices. In addition, some IoT devices will require low latency communication for quasi-real-time control systems. Hence, we have proposed a low latency no-orthogonal multiple access (NOMA) uplink system named the system simultaneous transmission access boosting ultra-low-latency (STABLE). We employed successive interference cancellation (SIC) for NOMA. We have also researched a receive space diversity (SD) which combines signals in a frequency domain to enhance system reliability. This paper shows experimental results when 5 users simultaneously transmit signals to a BS. We conducted two types of experiments, using a fading emulator and in the real field. In the fading emulator experiment, we evaluated the effect of antenna correlation on SD and investigated appropriate SIR for SIC. We confirmed that SD was effective even if the correlation is 0.8 and that appropriate SIR was about 4 dB when 5 users suffered from fading. From the results of the real field experiment where 3 fixed users and 2 mobile users sent signals, we confirmed that the system without SD could decode 3.5 users’ signals in average while the SD could make the number increase up to 4.1 in average. The antenna correlation is 0.33 in the environment.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment","authors":"Ming Feng, Hao Xu","doi":"10.1109/ICCNC.2019.8685667","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685667","url":null,"abstract":"This paper investigates how to maximize the practical communication quality of multi-user millimeter-wave (mmWave) MIMO systems with uncertain environment through effectively using the mobility from multi-robots as dynamic relays and adopting machine learning techniques. mmWave MIMO has been considered as a promising wireless communication technology due to the high frequency usage efficiency from beamforming. However, the uncertain environment could seriously affect the effectiveness and practicality of beamforming since wireless channels may have a more complicated structure, and the coordination among multiple nodes could be more difficult. For instance, the uncertain distribution of mobile users could significantly affect the performance of wireless channels, and then significantly degrade practical communication quality. Therefore, this paper presents a novel Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO (MREI-MU-MIMO) system that adopt both dynamic codebook based beam training protocol and online reinforcement learning to supervise the mobility of multi-robot-relay as well as handle the serious effects form the uncertain environment. Firstly, a novel dynamic codebook development is presented that cannot only lower the complexity of existing beamforming codebooks and also handle the complicated channel structure under uncertainty during multi-user beam training. Then, a decentralized Deep Q-Network (DQN) rein-forcement learning algorithm has been developed to intelligently manage multi-robot mobility and further effectively assign the optimal MIMO to handle the uncertainty from environment. The effectiveness of the proposed design has been demonstrated through real-time simulation and experiment.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccnc.2019.8685643","DOIUrl":"https://doi.org/10.1109/iccnc.2019.8685643","url":null,"abstract":"","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, S. Liu
{"title":"Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection","authors":"Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, S. Liu","doi":"10.1109/ICCNC.2019.8685593","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685593","url":null,"abstract":"To ensure high safety in civil aviation, borescope inspection has been widely applied in early damage detection of aircraft engines. Current manual damage inspection on borescope images inevitably results in low efficiency for engine status inspection. Traditional recognition methods are inefficient for damage detection due to complicated and noisy scenarios inside them. In this paper, a deep learning based framework is proposed which utilizes the state-of-the-art algorithm called Fully Convolutional Networks (FCN) to identify and locate damages from borescope images. Our framework can successfully identify two major types of damages, namely crack and burn, from borescope images and extract their region on these images with high prediction accuracy. Moreover, by applying the fine-tuning method, the proposed framework is further optimized to significantly reduce the amount of training data. With experiments on real borescope images data from one major airline company, we validate the efficiency and accuracy of our proposed framework through comparisons with other CNN architectures for damage identification and recognition.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis","authors":"Nadir H. Adam, C. Tapparello, W. Heinzelman","doi":"10.1109/ICCNC.2019.8685663","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685663","url":null,"abstract":"With the increasing number of wireless networks available, and mobile devices with access to the Internet, it is essential to obtain the best connection, whether this is a direct path through Wi-Fi or cellular or an indirect path via one or multiple peer to peer devices. As an example, multi-hop ad hoc networks are essential in areas where infrastructure networks are unavailable or sparsely available due to natural disasters such as earthquakes, or in conflict or war zone areas. In this paper, we present and analyze the accessibility of WiFi and cellular networks in Rochester, NY, and compare the performance in terms of the upload and download speeds of direct Wi-Fi and cellular connections with 1-hop, 2-hop and a 3hop ad hoc networks based on Wi-Fi Direct. Experimental results show that although Wi-Fi access points are widely available, in more than 20% of locations all of the available access points are inaccessible due to security restrictions. Moreover, the LTE cellular networks provides the highest download speed compared to Wi-Fi and multi-hop Device-to-Device (D2D) networks, while the upload speeds of Wi-Fi and cellular are comparable. Finally, our experimental results show that extending access to the Internet to devices that might not otherwise have a direct connection through multi-hop D2D connections is feasible at the expense of a 62% reduction in upload and 64% reduction in download speed, in the worst case.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Engoulou, Martine Bellaïche, Talal Halabi, S. Pierre
{"title":"A Decentralized Reputation Management System for Securing the Internet of Vehicles","authors":"R. Engoulou, Martine Bellaïche, Talal Halabi, S. Pierre","doi":"10.1109/ICCNC.2019.8685551","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685551","url":null,"abstract":"The evolution of the Internet of Vehicles (IoV) paradigm has recently attracted a lot of researchers and industries. Vehicular Ad Hoc Networks (VANET) is the networking model that lies at the heart of this technology. It enables the vehicles to exchange relevant information concerning road conditions and safety. However, ensuring communication security has been and still is one of the main challenges to vehicles’ interconnection. To secure the interconnected vehicular system, many cryptography techniques, communication protocols, and certification and reputation-based security approaches were proposed. Nonetheless, some limitations are still present, preventing the practical implementation of such approaches. In this paper, we first define a set of locally-perceived behavioral reputation parameters that enable a distributed evaluation of vehicles’ reputation. Then, we integrate these parameters into the design of a reputation management system to exclude malicious or faulty vehicles from the IoV network. Our system can help in the prevention of several attacks on the VANET environment such as Sybil and Denial of Service attacks, and can be implemented in a fully decentralized fashion.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}