2019 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression 基于MV-HEVC的高效光场视频压缩预测结构
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685526
Joseph Khoury, M. Pourazad, P. Nasiopoulos
{"title":"A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression","authors":"Joseph Khoury, M. Pourazad, P. Nasiopoulos","doi":"10.1109/ICCNC.2019.8685526","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685526","url":null,"abstract":"Light Field imaging has emerged as a technology that enables the capture of images and video with richer information. Captured content is composed of numerous views aligned in both horizontal and vertical directions providing full parallax, offering light intensity and directional information, but at the same time significantly increasing bandwidth requirements. Several multi-view coding methods have attempted to tackle this problem. However, these approaches do not fully assess the intricacies that are found in light field content. This paper proposes a prediction structure for coding light field content using the MV-HEVC standard, exploiting the inter-view correlations in two directions along with the high similarity between views around the center of each frame. Experimental results show BD-rate gains up to 38% compared to an existing state-of-the-art method.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction 克服模型分叉连接排队网络的异质性影响,用于尾部预测
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685575
Sami Alesawi, Sakher Ghanem
{"title":"Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction","authors":"Sami Alesawi, Sakher Ghanem","doi":"10.1109/ICCNC.2019.8685575","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685575","url":null,"abstract":"Inspired by the potential power of random scheduling at data centers, a novel approach for combining arbitrary dispatching policy and tail-latency prediction in heterogeneous fork-join network environments is proposed. Tail prediction is of practical importance in commercial data centers, where the need for sharing resources between many applications is desired at most, to ensure client satisfaction with guaranteed service level objectives (SLOs). Lots of research works in parallel scheduling were presented using event-based simulations, but none of them were able to implant dynamic variation of tasks numbers and maintain the determined load region using a precise, and reliable approach. In this paper, we propose extensive case studies for the presented prediction model in heterogeneous black-box using model-driven simulations. Experimental results show that by using random scheduling algorithm accompanied with inserted effects of different requests fan-out, tail latency can be predicted and stay consistent with relative errors of 10% at high load regions.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"34 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple Path Infrastructure-less Networks A Cooperative Approach 多路径无基础设施网络的一种协作方法
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685655
Razvan Cristian Voicu, J. Copeland, Yusun Chang
{"title":"Multiple Path Infrastructure-less Networks A Cooperative Approach","authors":"Razvan Cristian Voicu, J. Copeland, Yusun Chang","doi":"10.1109/ICCNC.2019.8685655","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685655","url":null,"abstract":"For future generation networks, the development of new and novel architectures is needed if integration, expansion, and usability demands are to be met. This paper proposes a new network architecture that can be used for developing and maintaining multi-path routes through a cooperative node approach. The cooperative nodes assist in the network development and are designed to act as forwarders of messages using idle or underutilized channels. The proposed architecture shows that, even without optimization, significant improvement can be seen in latency, goodput, and channel utilization. The architecture consists of five stages named Discovery, Decision, Utilization, Data Collection, and Dynamic Adaptation. By design, the architecture is developed to be modular with individual stages capable of functioning unaided by the other stages and developed to be easily implemented in any of the network layers. Due to space constraints, optimization and challenges such as the handling of unrelated packet formats are omitted and proposed in different works.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Preventing UDP Flooding Amplification Attacks with Weak Authentication 防范UDP flood弱认证放大攻击
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685648
E. Biagioni
{"title":"Preventing UDP Flooding Amplification Attacks with Weak Authentication","authors":"E. Biagioni","doi":"10.1109/ICCNC.2019.8685648","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685648","url":null,"abstract":"An attacker wishing to flood a network with excess amounts of network traffic may send UDP packets with a spoofed IP source address corresponding to the target network. In many cases servers then amplify the attack by replying to the target network with more data than was sent by the attacker. This kind of attack has been successful in the past using both DNS and NTP servers.The AllNet protocol has been designed to deliver data over UDP as well as other media. Once an AllNet peer receives a suitable UDP packet, it records the sender’s IP address and begins to forward AllNet data to that address. This is a legitimate form of traffic amplification, with one packet being used to request that a limited number of other packets (currently 100) be sent to this IP address.To keep attackers from using AllNet peers for flooding amplification attacks, AllNet peers require potential contacts to return a bitstring that was sent to that specific IP address. In this way, legitimate contacts can receive and return the bitstring and start receiving their data. In contrast, attackers who spoof their IP address and do not receive the bitstring, are unable to direct amplified traffic to other networks.This very weak form of authentication, conceptually related to TCP SYN cookies, only verifies that the packet comes from a system that is able to receive packets sent to that specific IP address. Such weak authentication is sufficient to prevent flooding amplification attacks.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"3 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity 基于相关接收分集的UL-NOMA系统实验评估
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685617
Masafumi Moriyama, K. Takizawa, M. Oodo, Hayato Tezuka, F. Kojima
{"title":"Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity","authors":"Masafumi Moriyama, K. Takizawa, M. Oodo, Hayato Tezuka, F. Kojima","doi":"10.1109/ICCNC.2019.8685617","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685617","url":null,"abstract":"The number of Internet-of-Things (IoT) devices will increase rapidly. In next generation mobile communication systems, base stations (BSs) must effectively accommodate signals from massive IoT devices. In addition, some IoT devices will require low latency communication for quasi-real-time control systems. Hence, we have proposed a low latency no-orthogonal multiple access (NOMA) uplink system named the system simultaneous transmission access boosting ultra-low-latency (STABLE). We employed successive interference cancellation (SIC) for NOMA. We have also researched a receive space diversity (SD) which combines signals in a frequency domain to enhance system reliability. This paper shows experimental results when 5 users simultaneously transmit signals to a BS. We conducted two types of experiments, using a fading emulator and in the real field. In the fading emulator experiment, we evaluated the effect of antenna correlation on SD and investigated appropriate SIR for SIC. We confirmed that SD was effective even if the correlation is 0.8 and that appropriate SIR was about 4 dB when 5 users suffered from fading. From the results of the real field experiment where 3 fixed users and 2 mobile users sent signals, we confirmed that the system without SD could decode 3.5 users’ signals in average while the SD could make the number increase up to 4.1 in average. The antenna correlation is 0.33 in the environment.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment 不确定环境下多机器人增强智能多用户毫米波MIMO系统
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685667
Ming Feng, Hao Xu
{"title":"Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment","authors":"Ming Feng, Hao Xu","doi":"10.1109/ICCNC.2019.8685667","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685667","url":null,"abstract":"This paper investigates how to maximize the practical communication quality of multi-user millimeter-wave (mmWave) MIMO systems with uncertain environment through effectively using the mobility from multi-robots as dynamic relays and adopting machine learning techniques. mmWave MIMO has been considered as a promising wireless communication technology due to the high frequency usage efficiency from beamforming. However, the uncertain environment could seriously affect the effectiveness and practicality of beamforming since wireless channels may have a more complicated structure, and the coordination among multiple nodes could be more difficult. For instance, the uncertain distribution of mobile users could significantly affect the performance of wireless channels, and then significantly degrade practical communication quality. Therefore, this paper presents a novel Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO (MREI-MU-MIMO) system that adopt both dynamic codebook based beam training protocol and online reinforcement learning to supervise the mobility of multi-robot-relay as well as handle the serious effects form the uncertain environment. Firstly, a novel dynamic codebook development is presented that cannot only lower the complexity of existing beamforming codebooks and also handle the complicated channel structure under uncertainty during multi-user beam training. Then, a decentralized Deep Q-Network (DQN) rein-forcement learning algorithm has been developed to intelligently manage multi-robot mobility and further effectively assign the optimal MIMO to handle the uncertainty from environment. The effectiveness of the proposed design has been demonstrated through real-time simulation and experiment.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/iccnc.2019.8685643
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccnc.2019.8685643","DOIUrl":"https://doi.org/10.1109/iccnc.2019.8685643","url":null,"abstract":"","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection 基于深度学习的飞机发动机内径检测损伤自动检测框架
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685593
Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, S. Liu
{"title":"Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection","authors":"Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, S. Liu","doi":"10.1109/ICCNC.2019.8685593","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685593","url":null,"abstract":"To ensure high safety in civil aviation, borescope inspection has been widely applied in early damage detection of aircraft engines. Current manual damage inspection on borescope images inevitably results in low efficiency for engine status inspection. Traditional recognition methods are inefficient for damage detection due to complicated and noisy scenarios inside them. In this paper, a deep learning based framework is proposed which utilizes the state-of-the-art algorithm called Fully Convolutional Networks (FCN) to identify and locate damages from borescope images. Our framework can successfully identify two major types of damages, namely crack and burn, from borescope images and extract their region on these images with high prediction accuracy. Moreover, by applying the fine-tuning method, the proposed framework is further optimized to significantly reduce the amount of training data. With experiments on real borescope images data from one major airline company, we validate the efficiency and accuracy of our proposed framework through comparisons with other CNN architectures for damage identification and recognition.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis 基础设施与多跳D2D网络:可用性和性能分析
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685663
Nadir H. Adam, C. Tapparello, W. Heinzelman
{"title":"Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis","authors":"Nadir H. Adam, C. Tapparello, W. Heinzelman","doi":"10.1109/ICCNC.2019.8685663","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685663","url":null,"abstract":"With the increasing number of wireless networks available, and mobile devices with access to the Internet, it is essential to obtain the best connection, whether this is a direct path through Wi-Fi or cellular or an indirect path via one or multiple peer to peer devices. As an example, multi-hop ad hoc networks are essential in areas where infrastructure networks are unavailable or sparsely available due to natural disasters such as earthquakes, or in conflict or war zone areas. In this paper, we present and analyze the accessibility of WiFi and cellular networks in Rochester, NY, and compare the performance in terms of the upload and download speeds of direct Wi-Fi and cellular connections with 1-hop, 2-hop and a 3hop ad hoc networks based on Wi-Fi Direct. Experimental results show that although Wi-Fi access points are widely available, in more than 20% of locations all of the available access points are inaccessible due to security restrictions. Moreover, the LTE cellular networks provides the highest download speed compared to Wi-Fi and multi-hop Device-to-Device (D2D) networks, while the upload speeds of Wi-Fi and cellular are comparable. Finally, our experimental results show that extending access to the Internet to devices that might not otherwise have a direct connection through multi-hop D2D connections is feasible at the expense of a 62% reduction in upload and 64% reduction in download speed, in the worst case.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Decentralized Reputation Management System for Securing the Internet of Vehicles 保障车联网安全的分散式信誉管理系统
2019 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2019-02-01 DOI: 10.1109/ICCNC.2019.8685551
R. Engoulou, Martine Bellaïche, Talal Halabi, S. Pierre
{"title":"A Decentralized Reputation Management System for Securing the Internet of Vehicles","authors":"R. Engoulou, Martine Bellaïche, Talal Halabi, S. Pierre","doi":"10.1109/ICCNC.2019.8685551","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685551","url":null,"abstract":"The evolution of the Internet of Vehicles (IoV) paradigm has recently attracted a lot of researchers and industries. Vehicular Ad Hoc Networks (VANET) is the networking model that lies at the heart of this technology. It enables the vehicles to exchange relevant information concerning road conditions and safety. However, ensuring communication security has been and still is one of the main challenges to vehicles’ interconnection. To secure the interconnected vehicular system, many cryptography techniques, communication protocols, and certification and reputation-based security approaches were proposed. Nonetheless, some limitations are still present, preventing the practical implementation of such approaches. In this paper, we first define a set of locally-perceived behavioral reputation parameters that enable a distributed evaluation of vehicles’ reputation. Then, we integrate these parameters into the design of a reputation management system to exclude malicious or faulty vehicles from the IoV network. Our system can help in the prevention of several attacks on the VANET environment such as Sybil and Denial of Service attacks, and can be implemented in a fully decentralized fashion.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信