{"title":"An Efficient RAID6 System Based on XOR Accelerator","authors":"Ruizhen Wu, Yan Wu, Mingming Wang, Lin Wang","doi":"10.1109/ICCCI51764.2021.9486809","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486809","url":null,"abstract":"An efficient RAID6 based on Reed-Solomon (RS) codes is proposed in this paper. Both the encoding and decoding can be implemented in same XOR accelerator. With same hardware module different environments only need to change parameters to multiply with the data input. To reduce the complexity of CODEC computation all data is cutting into 8bits each input to suit the Galois Field 8's operation. And to be more efficient the parameter calculation of GF(8) is converted with GF(2) which reduced 2 additions and 1 multiplication, 1 division in Galois Field to only 1 multiplication. Gates cost and IOPS performance are simulated. The proposed RS RAID6 can gain 2–3 times IOPS advantages by the cost of 47% more gates needed.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Tele-Force-Position Sharing System with 1000 Clients Considering MMOG","authors":"T. Miyoshi, Ho Duc Tho","doi":"10.1109/ICCCI51764.2021.9486791","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486791","url":null,"abstract":"In this paper, a new force-position telecontrol system is introduced to enable a force sharing experience between thousands of people at distant locations around the world, and thus adding one more dimension to the traditional communication. The established teleoperation architecture under the communication time delay is stabilized using the passivity formalism. Simulations are conducted for a scenario where 1000 of human clients simultaneously play an online tug-of-war game via the Internet. The results show that both (position) transparency and (force) telepresence can be adequately achieved; hence, the proposed telecontrol system has proved useful enough to be used as a new practical communication tool.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE Assessment of Human Perception of Softness in Networked Haptic Virtual Environment","authors":"M. Oo, Y. Ishibashi, K. Mya","doi":"10.1109/ICCCI51764.2021.9486768","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486768","url":null,"abstract":"In this paper, we examine human perception of softness in a networked haptic virtual environment by Quality of Experience (QoE) assessment. In our assessment, each subject bursts two balloons with different values of softness as soft objects by pushing the top of each balloon with a haptic interface device in a 3D virtual space. Then, the subject answers which balloon is softer or harder than the other. Assessment results clarify the imperceptible range and allowable range of softness difference.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CodeHelper: A Web-Based Lightweight IDE for E-Mentoring in Online Programming Courses","authors":"Xiao Liu, G. Woo","doi":"10.1109/ICCCI51764.2021.9486772","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486772","url":null,"abstract":"Many universities choose online courses instead of in-person during the COVID-19 pandemic. One of the limitations of online courses is that it is difficult to perform teacher-student interactions in online teaching environments. Especially in online programming courses, it is hard to find an appropriate approach to remotely guide students when they have trouble conducting program code. This paper presents a lightweight IDE named CodeHelper integrated with an online judge that allows the instructor or the teaching assistant (TA) to help students in a form of online pair programming. Students can share their code with the instructor or the TA in a sandbox programming environment generated by CodeHelper, and the instructor or the TA can guide students by marking the mistakes in the sandbox. CodeHelper allows real-time pair programming for both sides, which can reduce the time and the cost of distance learning. Besides, the source code shared in the sandbox can also be compiled for syntax check, executed with a user-defined input, and submitted to the online judge for automated assessment, which can let students check the correctness of their programs once their troubles have been solved. It is efficient to use CodeHelper for mentoring students in online programming courses.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116899568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Dimensional Light Detection and Ranging Decoder Design","authors":"Sheng-Bi Wang, Yu-Cheng Fan","doi":"10.1109/ICCCI51764.2021.9486826","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486826","url":null,"abstract":"In recent years, object detection has been applied in many fields. In one of the most well-known fields, autonomous driving system, the key skill lies in the breakthrough of LiDAR (Light Detection and Ranging). As the core component of object detection, LiDAR can instantly gather a large amount of three-dimensional (3D) depth information with high accuracy, which allows users to rebuild three-dimensional environment. Through the information provided by LiDAR, autonomous driving system can identify all kinds of circumstances nearby and to choose a much safer route. The mainstream of applying LiDAR skill in autonomous system is the product of Velodyne, HDL-64. Based on HDL-64, this paper aims to decode the data packets which transform the information of original packet into the point cloud data of X, Y, Z. This will allow users to make use of decoding information in more research and applications such as rebuilding three-dimensional environment, making deeper object detection and object classification.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114761912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved AOMDV Routing Protocol in Manet UAV Based on Virtual Hop","authors":"M. J. M. Kiki, Ibrahim Iddi, H. Yunusa","doi":"10.1109/ICCCI51764.2021.9486832","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486832","url":null,"abstract":"In order to improve the load balancing capability of the AOMDV routing protocol of the ad hoc network, the network nodes are divided into two levels, Risk and No risk, based on the queue buffer ratio, and a different processing is done for different levels. Directly remove the risk level nodes and assign the corresponding virtual hops to the No Risk level nodes via the threshold comparison. The higher the queue cache rate, the higher the corresponding virtual hops. The RREP and Hello messages are expanded, and the node queue cache ratio is added to update and collect the latest path node status information. The improved protocol uses the minimum virtual hops containing node load information as the basis for optimal path selection, and uses OPNET to simulate at a fixed node rate under different network loads. The results show that the improved routing protocol plays a role in load balancing for nodes at the expense of limited routing overhead, relieves network congestion, increases the packet delivery rate, effectively reduces the end-to-end transmission delay, and improves self-organization. Network performance provides a relatively simple method.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAV-Assisted Resource Allocation Strategy in Energy Harvesting Edge Computing System","authors":"Lijia Tao, Yisheng Zhao, Xinya Xu, Zhimeng Xu","doi":"10.1109/ICCCI51764.2021.9486815","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486815","url":null,"abstract":"Aiming at the problem that the computing tasks requested by user equipments of (UEs) exceed the computing capacity of mobile edge computing (MEC) server in the ground base station (BS), an unmanned aerial vehicle (UAV)-assisted resource allocation strategy is proposed in this paper. By deploying a UAV carried with an MEC server, when the computing tasks requested by the UEs are beyond the computing capacity of the ground BS MEC server, the UEs can offload the extra computing tasks to the UAV. The resource allocation problem is formulated as a nonlinear programming problem by jointly optimizing transmitting power, system bandwidth, and computing resources. The objective is to minimize system energy consumption while satisfying the constraints of energy consumption, computing resource, and transmitting power. Genetic algorithm (GA) and nonlinear programming methods are combined to obtain the optimal solution to the formulated optimization problem. Simulation results demonstrate that the system energy consumption can be reduced to some extent under our proposed approach compared with the traditional GA and the partial fixed power, system bandwidth, or computing resources method based on GA and nonlinear programming.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Redundancy Features Detection and Removal for Simplification of Convolutional Neural Networks","authors":"Shih-Chang Hsia, Yuedong Yang","doi":"10.1109/ICCCI51764.2021.9486779","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486779","url":null,"abstract":"Since the rapid development of GPUs, the AI model of the convolutional neural network (CNN) has also made great progress. Researchers have gradually developed the model in a deeper and wider direction, hoping to have better accuracy. Although this is indeed effective, it also causes the model has too many parameters, and it takes a lot of time to calculate. In such a complex model, some operations are no effect on the output results. In this paper, we use several methods to remove the less important operations from the CNN model. This algorithm can reduce the amount of parameters and calculations while maintaining accuracy.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116096380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Single Sign-on Technology for Educational Administration Information Service Platform","authors":"Tao Huang, Fangming Guo","doi":"10.1109/ICCCI51764.2021.9486813","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486813","url":null,"abstract":"In order to meet the requirements of unified authentication, unified authorization and single sign-on of multiple application systems in the educational administration information service platform in the process of resource integration and joint service, a single sign-on scheme based on OAuth2.0 authentication protocol and certificate encryption technology is proposed in this paper. The technical framework can be combined with the existing educational administration information service platform, and integrates the login function modules in multiple educational administration information service systems in a non-intrusive way, which minimizes the modification of the original application platform code. The test results show that the overall performance of the login service constructed by the single sign-on technology is stable, the overall framework design is reasonable, and can meet the overall application needs of the educational administration information service platform.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VoWiFi Cell Capacity Evaluation Using IEEE 802.11ac for VBR Traffic","authors":"Ayes Chinmay, H. K. Pati","doi":"10.1109/ICCCI51764.2021.9486823","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486823","url":null,"abstract":"The popularity of Wireless Local Area Network (WLAN) is increasing tremendously. Recent research indicates that the number of voice calls accommodated in the IEEE 802.11 a/b/g/n standards supported Access Point (AP) is limited. To enhance the capacity of Voice over WiFi (VoWiFi), we have used variable bit rate (VBR) traffic instead of constant bit rate (CBR) traffic. We have seen that the Voice over Internet Protocol (VoIP) traffic is half-duplex due to a single talk conversation. To avoid the wastage of bandwidth resources, we have used silence suppression, which prevents background noise and generates VBR traffic. In this paper, we have proposed an analytical model to estimate the approximate number of VoWiFi calls possible in IEEE 802.11ac standard AP using VBR traffic. Further, we have used Compressed RTP (cRTP) and Arbitration Inter-frame Spacing (AIFS) in our derived model to improve the VoWiFi cell capacity.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}