2021 3rd International Conference on Computer Communication and the Internet (ICCCI)最新文献

筛选
英文 中文
The Use of Communication Technology in Establishing Community Relationships Applied by School Administration Staff, in Relation to Their Education Level and Age 学校行政人员在建立社区关系中使用通讯技术,与他们的教育程度和年龄有关
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486784
B. Wiyono, Henny Indreswari, Arif Prastiawan
{"title":"The Use of Communication Technology in Establishing Community Relationships Applied by School Administration Staff, in Relation to Their Education Level and Age","authors":"B. Wiyono, Henny Indreswari, Arif Prastiawan","doi":"10.1109/ICCCI51764.2021.9486784","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486784","url":null,"abstract":"School administration staff has a very important role in the education and learning process in schools. One of the main duties of school administration staff is to provide services to school residents internally and the community. The technological developments demand changes in the way the school administration staff work in carrying out their duties. For this reason, it needs to find an effective one. This research purposed at exploring the use of online communication media used by school administration staff and find out their effectiveness. In addition, it aimed to know more about the relationship between their education level and age with the intensity of using these techniques. This research was conducted in East Java Indonesia, with a total of 56 samples through a quota random sampling technique. The data collection technique in this research employed questionnaires and the data analysis technique used descriptive statistics, correlation, and regression. The results showed that the online communication techniques most used by the school administration staff in carrying out community service tasks were WhatsApp, email, google drive, google form, website, google spreadsheet, google document, and zoom, while the least used by them were WeChat, BBM, Line, Twitter, and skype. In terms of effectiveness, the most effective techniques were WhatsApp, google drive, email, google form, google spreadsheet, google document, websites, and zoom, while the least effective ones were BBM, Line, WeChat, Twitter, and skype. There was no significant relationship between the education level and age of the school administration staff with the frequency of using online communication techniques.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Semi-personalized Loudness Difference for Improved Surround Sound Rendered by Headphones 使用半个性化的响度差来改善耳机渲染的环绕声
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486797
S. D. You, Fan-Hao-Chi Fang
{"title":"Using Semi-personalized Loudness Difference for Improved Surround Sound Rendered by Headphones","authors":"S. D. You, Fan-Hao-Chi Fang","doi":"10.1109/ICCCI51764.2021.9486797","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486797","url":null,"abstract":"The objective of this study is to improve the distance localization in surround sound rendered by headphones. By using the binaural room impulse response (BRIR), the surround sound rendered by headphones is acceptable for directional cue, but not for distance cue. To improve the distance cue, we propose to measure the loudness difference between the headphones and loudspeakers as a means of post-processing equalizer (EQ). To reduce the prolonged measurement time, only a portion of the EQ response is individually, whereas the rest response is a generic one. The experimental results show that the high-frequency bands are more important in distance cue, and thus this portion of response should be individually measured.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/iccci51764.2021.9486778
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccci51764.2021.9486778","DOIUrl":"https://doi.org/10.1109/iccci51764.2021.9486778","url":null,"abstract":"","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation on Concurrent Connecting QUIC and TCP Nodes over Wireless LAN 无线局域网中QUIC和TCP节点并发连接的性能评估
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486827
Nobuo Aoki, K. Okazaki, Hiroyasu Obata, J. Funasaka
{"title":"Performance Evaluation on Concurrent Connecting QUIC and TCP Nodes over Wireless LAN","authors":"Nobuo Aoki, K. Okazaki, Hiroyasu Obata, J. Funasaka","doi":"10.1109/ICCCI51764.2021.9486827","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486827","url":null,"abstract":"In IEEE 802.11g wireless LAN, the performance of TCP parallel connections has been evaluated, and the condition that the total throughput is saturated has also been investigated to some extent. On the other hand, QUIC (Quick UDP Internet Connections), which is being in the final review process of standardization, is a new transport layer protocol that re-implements congestion control and retransmission control similar to TCP in the user space on UDP instead of the kernel space. Since it is a relatively new protocol, there are many environments where its performance has not been evaluated. In this paper, we evaluate the conditions in terms of the number of concurrent connecting nodes to obtain the highest total throughput on an IEEE 802.11g network. In addition, congestion control version, CUBIC, Reno, delay and packet loss ratio are taken into account. As a result, it was confirmed that QUIC and TCP can achieve the same level of throughput, and the influence of delay and packet loss ratio on the performance in the wireless LAN was clarified, as well as the fairness among concurrent connecting nodes.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129637145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Prediction and Resource Allocation Based on Deep Bidirectional LSTM in Data Center Networks 基于深度双向LSTM的数据中心网络流量预测与资源分配
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486790
Yonghuai Wang
{"title":"Traffic Prediction and Resource Allocation Based on Deep Bidirectional LSTM in Data Center Networks","authors":"Yonghuai Wang","doi":"10.1109/ICCCI51764.2021.9486790","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486790","url":null,"abstract":"This article first proposes an adaptive traffic scheduling strategy for optoelectronic hybrid data centers. The strategy is composed of a deep bidirectional LSTM-based traffic prediction model and a prediction-assisted traffic scheduling method. The simulation results confirm that the presented method can achieve non-congested intra-data center traffic scheduling and higher network performance even under heavy traffic conditions.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134006575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Power Added Efficiency of Doherty Amplifier by Changing Power Ratio of Carrier Amplifier and Peak Amplifier 通过改变载波放大器和峰值放大器的功率比来提高多尔蒂放大器的附加功率效率
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486833
Guanyu Mu, H. Hayashi
{"title":"Enhancing Power Added Efficiency of Doherty Amplifier by Changing Power Ratio of Carrier Amplifier and Peak Amplifier","authors":"Guanyu Mu, H. Hayashi","doi":"10.1109/ICCCI51764.2021.9486833","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486833","url":null,"abstract":"In the classical Doherty power amplifier (DPA) design, we usually use an equally divided power divider (branch line coupler) to separate the signal between the peak amplifier and carrier amplifier. Theoretically, the efficiency of the DPA can be improved by increasing the power ratio of the carrier amplifier to the peak amplifier. In this paper, we analyze the change of power added efficiency of the DPA when the signal is unequally divided rather than being equally divided.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech Steganalysis Based on Multi-classifier Combination 基于多分类器组合的语音隐写分析
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486795
Chenlei Zhang, Junjun Guo
{"title":"Speech Steganalysis Based on Multi-classifier Combination","authors":"Chenlei Zhang, Junjun Guo","doi":"10.1109/ICCCI51764.2021.9486795","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486795","url":null,"abstract":"Aiming at the problems of low detection rate and high feature dimension in the current steganalysis method based on support vector machine (SVM), a speech steganalysis scheme based on multi-classifier combination is proposed. The steganalysis features are first input into the classifier set, and the first type of prediction results are obtained. Then, the output of the first set of classifiers is taken as the input of the other set of classifiers to get another result.Finally, the two results are processed by the fusion algorithm to obtain a detection result.Based on the feature of pitch delay second-order difference, the proposed steganalysis scheme is evaluated comprehensively, and compared with the existing steganalysis method based on SVM.Experimental results show that this method has better performance than existing steganalysis methods based on SVM.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EfficientNet Based Iris Biometric Recognition Methods with Pupil Positioning by U-Net 基于高效网的U-Net瞳孔定位虹膜生物识别方法
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486782
Cheng-Shun Hsiao, Chih-Peng Fan
{"title":"EfficientNet Based Iris Biometric Recognition Methods with Pupil Positioning by U-Net","authors":"Cheng-Shun Hsiao, Chih-Peng Fan","doi":"10.1109/ICCCI51764.2021.9486782","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486782","url":null,"abstract":"In this work, the deep-learning pupil location based iris recognition methods are studied for biometric authentication. First, by using U-Net, the developed design utilizes the semantic segmentation scheme to locate and extract the region of interest (ROI) of the pupil zone. Based on the located ROI of the pupil zone in the eye image, the iris region can be extracted effectively, and the entered eye image is cut to the small eye image with the ROI of the iris that has just been adjusted. Then the iris features of the cropped eye image are optionally enhanced by adaptive histogram equalization or the Gabor filter process. Finally, the cropped eye image with important iris region is classified by EfficientNet. By using the CASIA v3 database, the proposed deep learning based iris recognition scheme achieves recognition accuracies of up to 98.2%, and the Equal Error Rate (EER) of the proposed design can be close to near 0%.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Built-in Encrypted Health Cloud Environment for Sharing COVID-19 Data 内置加密健康云环境,用于共享COVID-19数据
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486774
Mohammed Y. Shakor, Nigar M. Shafiq Surameery
{"title":"Built-in Encrypted Health Cloud Environment for Sharing COVID-19 Data","authors":"Mohammed Y. Shakor, Nigar M. Shafiq Surameery","doi":"10.1109/ICCCI51764.2021.9486774","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486774","url":null,"abstract":"During the COVID-19 pandemic, the increasing amount of personal and sensitive data collected in the healthcare inistiutions, make it necessary to use the cloud not only to store the data, but also to process it in the cloud. Obviously, most people would like to get a secure information related to their health. Therefore, with the recent growth of cloud computing privacy and data protection requirements have been evolving toto protect individuals from surveillance and data leakage. However, due to security concerns about frequent data breaches and recently upgraded legal data protection requirements (such as the EU's General Data Protection Regulation), it is recommended not to outsourcing unprotected sensitive data to public clouds. Cloud computing offers on-demand services including platforms, infrastructure and software that have been developed. To ensure confidentiality, the encryption algorithm is the most commonly used technique. However, Using a single algorithm is not effective for the high-level security of data in cloud computing. To fix this issue, we have introduced a new security mechanism using a built-in encrypted cloud storage system, which makes the proposed system strong against vulnerabilities. Various symmetric and asymmetric encryption techniques have been used to protect data from external threats. These techniques can help restrict the access to the stored data in order to be available for authorized users only. Combining Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC), the sensitive files are stored in client side and uploaded to the server. The results show that the impact of this built-in approach is more important than the other secure algorithms. In addition, it also showed that in the built-in algorithm, adding additional layers of security did not cause an increase in the download and upload time from and to the cloud.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130240129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resource Allocation Strategy for Dual UAVs-Assisted MEC System with Hybrid Solar and RF Energy Harvesting 太阳能和射频混合能量采集双无人机辅助MEC系统的资源分配策略
2021 3rd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2021-06-25 DOI: 10.1109/ICCCI51764.2021.9486814
Xinya Xu, Yisheng Zhao, Lijia Tao, Zhimeng Xu
{"title":"Resource Allocation Strategy for Dual UAVs-Assisted MEC System with Hybrid Solar and RF Energy Harvesting","authors":"Xinya Xu, Yisheng Zhao, Lijia Tao, Zhimeng Xu","doi":"10.1109/ICCCI51764.2021.9486814","DOIUrl":"https://doi.org/10.1109/ICCCI51764.2021.9486814","url":null,"abstract":"To address the problem that user device (UD) harvests less energy from environmental radio frequency (RF) sources, a resource allocation strategy in dual unmanned aerial vehicles (UAVs)-assisted mobile edge computing (MEC) system with hybrid energy harvesting is studied in this paper. By deploying two UAVs with hybrid solar and RF energy harvesting, they can provide edge computing services for the UDs and supply energy for the low energy UDs, respectively. When the UD has a large computing task, the computing task can be offloaded to the MEC server carried by the UAV. The computing pressure of this UD can be greatly reduced. If the energy harvested by the UD from the ambient RF sources is not enough, another UAV flies close to this UD. The UAV acts as a dedicated RF source and transfers energy to the UD. The problem of resource allocation is formulated as a mixed-integer nonlinear programming problem by jointly considering the energy consumed by UDs and UAVs. The objective is to minimize the total energy consumption under the constraints of computing capacity and energy consumption of MDs and UAVs. The suboptimal solution can be obtained by introducing a quantum-behaved particle swarm optimization (QPSO) algorithm. Simulation results verify that the proposed QPSO algorithm has lower energy consumption in contrast to the other traditional schemes.","PeriodicalId":180004,"journal":{"name":"2021 3rd International Conference on Computer Communication and the Internet (ICCCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128680493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信