{"title":"Preliminary Results of a Motion-Based Interactive Game for Supporting Stroke Survivor Telerehabilitation","authors":"Atiqul Islam, Mark Tee Kit Tsun, Lau Bee Theng","doi":"10.1109/ICCCI51764.2021.9486771","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486771","url":null,"abstract":"Telerehabilitation is the delivery of rehabilitation services over the internet or telecommunication services. In the light of current lockdowns and quarantines due to the COVID-19 telerehabilitation can be considered as the second-best option after rehab centers for stroke patients. The purpose of this study is to investigate the in-home telerehabilitation system prototype which introduces a state-of-the-art telerehabilitation solution with two extra features that are not currently available with other solutions; a communication module that connects the patient and the therapist remotely using a client-side application and an admin-side dashboard and the second feature is the variable motion-range setter, this option allows setting a certain percentage of a whole range of motion of an exercise based on the condition of the patient. The prototype application has 8 exercises targeting different parts of the body such as the ankle, hip, knee, and shoulder. With a controlled group of healthy male participants, a pilot study was designed to test the accuracy, error rate, recall, and other matrices of the developed system. The testing consisted of 50 repetitions of each exercise where 40 reps were performed as they should be performed, and the last 10 reps were performed to detect false positives. A confusion matrix was used to evaluate the performance of each exercise and the average of all the matrix is taken to get an overall performance result for the prototype. A sample of the results is included as the summary of results. The overall outcome is mostly positive and promising for most exercises, except for one exercise which was consistently on the lower spectrum of accuracy. After repositioning the Kinect to get the full body in the frame, the system performed consistently well on all exercises.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121342966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Architecture Design for Publicizing Digital Competence to Online Job Market","authors":"Sukosol Wanotayapitak, K. Saraubon, P. Nilsook","doi":"10.1109/ICCCI51764.2021.9486834","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486834","url":null,"abstract":"There appear to be two problems with organizing educational programs in higher education institutions to meet the needs of the current job market. The first issue is that higher education institutions use the Work Integrated Learning (WIL) program solely for the development of professional competences, although digital competences are also important. The second issue is that the evidence from WIL information system cannot be publicized to the online job market due to lack of credibility. The objective of this research is to address both issues: (1) promote digital competence in the WIL program and (2) build the credibility of digital evidence with Blockchain technology. The research method has three phases: (1) study of related research, (2) study of related technologies, and (3) architecture designs. The result of the research is an architecture that can publicize reliable digital competence from WIL program to the job market with Blockchain technology.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Content Prepositioning Using Popularity Prediction in Hybrid Peer-to-Peer Network with Cloud Storage","authors":"Kazumasa Takahashi, S. Sugawara","doi":"10.1109/ICCCI51764.2021.9486798","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486798","url":null,"abstract":"This paper proposes a digital contents prepositioning method based on the prediction of the popularity trend for content sharing in an environment where Peer-to-Peer (P2P) network and cloud storage service are used together. In the proposed method, the popularity trend of contents is predicted by linear approximation, the contents are prepositioned over the P2P network, and placed in the cloud storage if necessary. The usefulness of the proposed method was verified using computer simulations from the viewpoints of network load, content loss, and cloud storage usage cost, changing the interval of preliminary content replica redeployment and the peers' storage capacity.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-Based Technical Solution for Cyberstalking Detection","authors":"Audrey Asante, Xiaohua Feng","doi":"10.1109/ICCCI51764.2021.9486770","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486770","url":null,"abstract":"The continued usage of technology has led to the rise of cyberstalking. Cyberstalking is seen as traditional method of stalking that has been altered by technology. This crime has now been modernized using technological tools and techniques. The continued increase in cyberstalking in the world today has drawn attention to the need to address this problem. Though studies on this crime have been conducted in the fields of criminology, legal, public health, sociology, and psychology, it still remains a challenge to detect, prevent, and investigate this crime. Traditional stalking methods have been used to combat it, despite the fact that this crime is committed online. Unfortunately, these methods have provided few solutions for detecting and preventing it. The prevalence of this crime, combined with technological advancement, has necessitated the development of technical strategies to mitigate it, protect victims, and assist law enforcement agencies. In this study, a content-based detection framework for cyberstalking is proposed. The framework consists of message identification, filtering, detection (content detection and profiling offender) and evidence modules. It is designed as a forensic readiness framework that can automatically detect cyberstalking, gather evidence and profile potential offenders. The framework employs machine learning, data mining techniques, digital forensics, and profiling to analyze text, image, and media contents, collect evidence, and profile offenders. This framework would not only detect cyberstalking automatically, but it would also be useful as an investigative tool for law enforcement.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Khalil, Anthony K. C. Chan, K. A. Shahriar, Lawrence R. Chen, D. Plant, Randy Kuang
{"title":"Security Performance of Public Key Distribution in Coherent Optical Communications Links","authors":"M. Khalil, Anthony K. C. Chan, K. A. Shahriar, Lawrence R. Chen, D. Plant, Randy Kuang","doi":"10.1109/ICCCI51764.2021.9486822","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486822","url":null,"abstract":"Theoretical uncertainties associated with the measurement of quantum bits have made Quantum Key Distribution (QKD) an attractive research topic for secure communication systems. Recent research in this area has focused on using weak coherent laser pulses as the carrier instead of the traditional approach of using single photon carriers. This opens the possibility to implement QKD infrastructure that is compatible with the existing optical fiber communication network. In this work, we report a theoretical study of a new approach that utilizes the Quantum Public Key Envelope (QPKE) based on the randomized Glauber states in a classical coherent optical communication system to obtain a secure communication. We verify the efficacy of the system using numerical simulation. We also study the possible approaches for an eavesdropper to test the degree of security enhancement of the proposed system at bitrate of 56 Gb/s. Two eavesdropping techniques are proposed for security analysis. A set of security parameters are used to simulate the variety of eavesdropping schemes.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Offloading in Heterogeneous Dynamic Fog Computing Network: A Contextual Bandit Approach","authors":"Yuchen Shan, Hui Wang, Zihao Cao, K. Yury","doi":"10.1109/ICCCI51764.2021.9486800","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486800","url":null,"abstract":"The urban environment is a particularly important application scenario for wireless sensor networks. Nevertheless, these environments are often dense and dynamic, and the sensor nodes are resource-constrained and heterogeneous. Hence, reliable data collection and scalable coordination are a challenge. In this paper, we model the data offloading problem as a bandit problem based on the context of the fog networking paradigm—an important extension of the multi-armed bandit. Through this way, we use the heterogeneity of sensor nodes as contextual information so that sensors can collaborate to offload data to the fog nodes and complete the data collection. Moreover, we have improved the algorithm for the dynamic movement characteristics of the nodes in the urban environment, so that the collaborative system has stable performance in the complex and changing urban environment. The analysis and trajectory simulations based on human movement data in urban environments demonstrate that the proposed scheme can significantly reduce the offloading delay and improve the offloading success rate.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114757799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Multi-Label Dataset of Internet Traffic for Digital Behavior Classification","authors":"Wenbin Li, Gaspard Quenard","doi":"10.1109/ICCCI51764.2021.9486831","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486831","url":null,"abstract":"With the digital transformation of model society, the deep understanding of digital behavior is critical for both users and service providers. Nevertheless this work is challenging due to the lack of an extensive model and the corresponding dataset to support digital behavior classification. In response to this, we presented in this work a complete process of modelling, data collection and classification of user digital behaviors over Internet: firstly the fundamental digital context model is introduced to provide a thorough understanding of digital behavior and digital environment properties. Based on the model, the data collection process is presented and a multi-label dataset of Internet traffic (MLDIT) has been collected with all model properties, finally a first series of classification experiments with MLDIT has been conducted showing promising results to identify user interaction state, applications and actions. Aiming at providing a thorough model of digital behavior and a reference process for data collection and classification, we expect likewise to attract community efforts to collaborate on the MLDIT enrichment.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123942476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Switching Scheme between Adaptive Viscosity Control and Stabilization Control by Viscosity in Remote Control System with Haptics","authors":"Lu Chen, Y. Ishibashi, Pingguo Huang, Y. Tateiwa","doi":"10.1109/ICCCI51764.2021.9486799","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486799","url":null,"abstract":"This paper proposes a switching scheme in a remote control system with haptics where a user operates a remote haptic interface device by manipulating another haptic interface device while monitoring the operation of the remote haptic interface device by a video camera. The proposed scheme exerts the adaptive viscosity control and adaptive elasticity control (i.e., the adaptive viscoelasticity control) when the network delay is small, and the scheme carries out the stabilization control by viscosity and the adaptive elasticity control when the network delay is large. By QoE (Quality of Experience) assessment, we investigate the effect of the switching scheme in terms of the operability of haptic interface device. As a result, we demonstrate that the switching scheme is superior to the other types of control.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Innovative High-Frequency Wireless Communication Technique Inspired by Multi-Frequency Carrier Signals","authors":"Prashnatita Pal, B. Sahana, Jayanta Poray","doi":"10.1109/ICCCI51764.2021.9486807","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486807","url":null,"abstract":"Modern intelligent broadcasting technologies using Internet-of-Things (IoT) and Wireless Communication mediums are playing an important role to connect multiple heterogeneous devices. This fulfills the requirement to achieve advanced and robust communication systems. This paper describes a data transmission technique using a high-frequency generator reflex klystron. Here, the high-frequency multi-level shift keying techniques are generated with the help of a single reflex klystron, namely M-ary High-Frequency Shift Keying (MHFSK). The reflex klystron plays the primary role to generate multiple independent high-frequency signals. In this scheme, the high-frequency carrier signal is selected through a sequence of binary bits which control the reflector voltage. As a result, this modulation system creates multiple high frequencies which act as an important parameter of this proposed multi-frequency modulation scheme. Here, the main goal is to improve the overall efficiency compared to other binary digital modulation systems. This new concept has been verified through an experimental framework.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"White Balance Color Correction Based on Micro LED Display Panel","authors":"Shih-Chang Hsia, Chun-Jung Liao","doi":"10.1109/ICCCI51764.2021.9486806","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486806","url":null,"abstract":"This study aims at the development of color correction for white balance on the Micro LED display panel. White balance must be kept under various luminance. However, the fixed method LED cannot achieve this requirement. First, we estimate the level of luminance Y for the current image, from RGB color conversion. The adaptive method is presented to modify the RGB level according to the Y signal. The adaptive parameters with $alpha$ and $beta$ value are employed to adjust the magnification value and DC level respectively. Before color correction, the micro LED displays blue in high brightness, and to be red in low brightness. By using the adaptive method, the red level increases in high brightness, and decreases in low brightness, to achieve color balance. Experiments show that the white balance as been completed under various white paper luminance testing. The most white light is excellent on Micro LED in human vision.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}