{"title":"Text-To-Speech quality evaluation based on LSTM Recurrent Neural Networks","authors":"Meng Tang, Jie Zhu","doi":"10.1109/ICCNC.2019.8685619","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685619","url":null,"abstract":"Nowadays, the Text-To-Speech (TTS) system has developed to quite a high level, but there has not been an objective assessment method to evaluate the synthesized speech effectively. Research on the objective assessment method is around predicting the mean opinion score(MOS) of the speech in general. In this paper, a mandarin TTS evaluation method using LSTM+LR to predict the MOS is proposed. To the best of our knowledge, this is the first research in evaluating mandarin TTS. Compared with other methods such as the CNN+LR, which is the previous best method, this method achieves much higher accuracy with the root mean square(RMSE) of 0.40 and the correlation $mathbf { rho } _ { mathbf { S } }$ of 0.68.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A temporary communication system using DTN for improving power consumption of mobile terminals","authors":"Yoshitaka Nakamura, T. Kaneta, Osamu Takahashi","doi":"10.1109/ICCNC.2019.8685595","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685595","url":null,"abstract":"The power supply interruption and the destruction of communications infrastructure in the event of wide area disasters make it difficult to communicate urgent information such as disaster situation and safety information. DTN (Delay Tolerant Network), which is an infrastructure-less communication technique, is one of the solution methods. However DTN has a problem of power consumption in order to realize information communication in a wide area disaster. The evacuees are assumed to communicate with others by their own mobile terminals in the disaster-stricken areas. Since these terminals have limited electric power, it is preferable to use a communication method considering power usage efficiency. In this paper, we propose a disaster-time communication system using a message ferry method for exchanging and collecting disaster situation and safety information. Also, in order to improve the power usage efficiency of the network on the proposed system, we propose and evaluate a method to efficiently utilize electric power for communication by setting multistage threshold for power remaining.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chin-Tser Huang, M. N. Sakib, L. Njilla, C. Kamhoua
{"title":"A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak","authors":"Chin-Tser Huang, M. N. Sakib, L. Njilla, C. Kamhoua","doi":"10.1109/ICCNC.2019.8685493","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685493","url":null,"abstract":"The paradigm of Internet of Things (IoT) aims to connect all the devices into a network. However, most IoT devices don’t have appropriate security protection, which allows cyber criminals to infect them through the network with malware and exploit them to launch attacks such as DDoS attacks or information stealing. Many proposed countermeasures, such as authentication enhancement and software update, are not practical d be to the constraints of IoT devices, malware’s fast spreading speed, and manufacturer laziness. One viable approach is to temporarily disconnect IoT devices to protect them from exploitation and to prevent infected ones from infecting more devices. However, in an IoT network, some devices may have significant responsibilities, for example serving as gateway to the Internet or in charge of critical monitoring or control tasks, and it may be beneficial to defer their disconnection. In this paper, we aim to apply game theory to formulate the problem of making decisions on the connectivity of IoT devices during malware outbreak as a repeated game, which allows individual IoT devices to make connectivity decision over time. We consider possible strategies that IoT devices can apply when calculating their payoff function, use numeric simulations to evaluate our game theoretic models, and derive several insights that can serve as guidelines for IoT network managers to configure the best connection/disconnection strategy for their IoT devices.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131709573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bidding-Based Dynamic Power Pricing Scheme in Smart Grids","authors":"Andrew Ward, Zhengyuan Zhou, N. Bambos","doi":"10.1109/ICCNC.2019.8685512","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685512","url":null,"abstract":"The distributed, user-specific, bidirectional communication promised by smart grids allows for novel improvements to the current power grid’s naive power allocation and pricing strategies. We present a modeling framework for a smart microgrid power system which employs a bidding mechanism to distribute power efficiently and intelligently to residential houses, which are in turn modeled as smart homes with smart appliances. We model the power demand within these smart homes using queuing theory. We provide an algorithm that guarantees the houses’ powers (which are a function of the houses’ bids), to converge to the unique game-theoretic optimal power allocation (i.e. Nash equilibrium). We present numerical simulations in several different regimes to highlight the convergence properties.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices","authors":"Arman Pouraghily, T. Wolf","doi":"10.1109/ICCNC.2019.8685545","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685545","url":null,"abstract":"The Internet of Things (IoT) promises technical solutions to many important societal problems relating to the environment, healthcare, transportation, etc. One approach to making IoT solutions more cost-effective is the idea of horizontal integration, where sensors and actuators are shared between different applications. In such environments, economic transactions between system components are used to pay for data and services. Blockchain-based overlay networks have been developed to provide such financial mechanism for IoT devices with sufficient processing power and operating system support. However, no practical solutions for low-end devices exist. In addition, existing solutions also require setting up multiple blockchain accounts for a single administrative domain, which incurs high fees when consolidating those accounts. In this paper, we propose a Ticket-Based Verification Protocol, which defines two separate logical entities, contract manager and transaction verifier. Our design limits the need for high-performance embedded systems to only one unit per administrative domain and reduces the processing and networking overhead other IoT devices in that domain.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"484 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133048883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal","authors":"Babu R. Dawadi, D. Rawat, S. R. Joshi, M. Keitsch","doi":"10.1109/ICCNC.2019.8685567","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685567","url":null,"abstract":"The use of Information and Communication Technology (ICT) has major impacts on social welfare, economic growth, transparency and good governance in the society. Due to the difficult geographic and demographic situation, ICT enhancement in rural Nepal is however quite challenging since private operators mostly confined their businesses to urban areas. Other reasons for this phenomenon are the lack of energy for power supply, content, security issues and high deployment costs with low return on investment. Currently, there is less than 1% broadband penetration in rural Nepal. Thus, there are benefits and challenges for the operators to deploy their fresh networking system focusing towards green ICT by the implementation of energy efficient Software Defined IPv6 (SoDIP6) Network. Nepal Telecommunications Authority (NTA), collects 2% royalty form Internet Service Provider (ISP) and Telecom operators to enhance ICT particularly for rural Nepal under Rural Telecommunications Disbursement Fund (RTDF). Recently, the NTA has initiated broadband deployment project utilizing its RTDF to expand ICT infrastructure by subsidizing service providers to expand their services towards rural Nepal. This paper presents benefits and challenges of green networking with respect to Software Defined Network (SDN) and Internet Protocol version 6 (IPv6) as an enabler of energy efficient next generation networking system recommended to be deployed for rural connectivity at the early stage network expansion for service provider sustainability. Proposed approach is evaluated with university campus network. Findings show that the proposed system would significantly reduce the energy consumption and carbon footprint leading to economic benefits for service providers.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems","authors":"Imad Ali, Ronald Y. Chang, Cheng-Hsin Hsu","doi":"10.1109/ICCNC.2019.8685645","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685645","url":null,"abstract":"Recent research has suggested that answers to the particular questions may be found when the questions are forwarded via suitable friends (or helpers) in a multi-hop manner. In mobile social network-based question answering systems, users are associated with limited resources; therefore, a light-weight scheme is crucial. However, improving the performance of the system with a light-weight scheme is challenging. To this end, we propose a distributed SOcial helpeR selecTion (SORT) scheme where all users share information with their 1-hop friends. SORT records and leverages the information to select and forward the questions to capable and cooperative helpers among the friends to improve the performance of the system. Our extensive trace-driven simulations reveal that, on average, SORT achieves higher response rate, higher best-answer rate, and lower response time by more than 14%, 13%, and 14%, respectively, in comparison to state-of-the-art helper selection schemes. Further, we observe that SORT performs consistently better than the state-of-the-art systems under a diverse number of system parameters.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124580607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks","authors":"Michal Rzepka, Piotr Boryło, P. Chołda, A. Lason","doi":"10.1109/ICCNC.2019.8685581","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685581","url":null,"abstract":"The Software Defined Networking (SDN) architecture becomes gradually more common in recent networking solutions considered in both research and commercial contexts. While SDN promises to simplify network management and monitoring processes, there are still numerous issues to address. Many of them involve the centralized network controller, depicted as a single point of failure able to make the whole network down in case of misconfiguration or unavailability. The SDN controller is typically involved in monitoring tasks that require uninterrupted connectivity with network nodes. Maintenance of up-to-date network state database generates frequent data transfers over the control channel and significant resource consumption. The both inevitably affect performance of other tasks. Considering such circumstances, it is desirable to find a tradeoff between measurements accuracy and the related overhead in terms of network and computational resources.In this paper, the Slotted Flow Stats Acquisition (SFSA) mechanism is proposed. Its aim is to spread in time the control channel load caused by network monitoring tasks, preventing the controller from being affected by resource consumption bursts. The mechanism may be adjusted to user-specific needs regarding desired accuracy of the periodically gathered measurement data. It is shown that the proposed solution effectively eliminates traffic spikes caused by requests for bulk flow statistics. Controller responsiveness in OpenFlow-based networks is thus improved.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nchinda Nchinda, Agnes Cameron, Kalli Retzepi, A. Lippman
{"title":"MedRec: A Network for Personal Information Distribution","authors":"Nchinda Nchinda, Agnes Cameron, Kalli Retzepi, A. Lippman","doi":"10.1109/ICCNC.2019.8685631","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685631","url":null,"abstract":"MedRec is a simple, distributed system for personal control of identity and distribution of personal information. The work is done in the context of a medical information distribution system where patients retain control over who can access their data. We present a new architecture for the MedRec project, creating a network of trusted data repositories, the access to which are determined by a set of ”smart contracts”. These contracts are stored on a distributed ledger maintained by those who generate data. The distributed nature of the system allows unified access from diverse sources in a single application with no intermediary. This increases patient control while retaining a measure of privacy of both data content and source. MedRec is amenable to extensions for decentralized messaging and distribution of information to third parties such as medical researchers, healthcare proxies, and other institutions. The system is based on a blockchain that contains smart contracts defining user identity and distribution specifics.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels","authors":"Amer Al-Baidhani, H. Fan","doi":"10.1109/ICCNC.2019.8685517","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685517","url":null,"abstract":"The evolution of data driven optimization has been shown advantageous in many applications. In this paper, we propose a deep learning architecture for the wireless communications receiver to optimize detection in terms of Bit Error Rate (BER), which enables reliable communication over AWGN and multipath Rayleigh fading channels with bandwidth constraints. Our approach uses a deep autoencoder to estimate the received signal along with an additional layer for symbol detection, which are jointly trained and fine-tuned. Significant improvement in terms of BER is achieved in simulation compared to the theoretical baseline.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128515810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}