{"title":"Efficient power control for D2D with SWIPT","authors":"Jun Huang, Yong Liao, Cong-Cong Xing","doi":"10.1145/3264746.3264795","DOIUrl":"https://doi.org/10.1145/3264746.3264795","url":null,"abstract":"To mitigate the interference between Device-to-Device (D2D) and cellular communications, power control plays a crucial role. Simultaneous wireless information and power transfer (SWIPT) is an emerging technology that allows receivers to harvest energy from the received signal, of which information is decoded at the same time. In this paper, we investigate the D2D power control in the presence of SWIPT and model it under a non-cooperative game-theoretic framework. A fully distributed power control mechanism is then proposed. We theoretically and experimentally investigate the proposed mechanisms. The simulation results show that the power control mechanism proposed in this work is valid and effective.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of energy-efficient strategies for real-time task synchronization protocols","authors":"Jun Wu, Hsin-Hsien Yu","doi":"10.1145/3264746.3264767","DOIUrl":"https://doi.org/10.1145/3264746.3264767","url":null,"abstract":"Energy-efficient real-time task synchronization has received increased attention in recent years. In this paper, we are interested in comparing the performance of two energy-efficient strategies, i.e., optimistic dual speed (ODS) and pessimistic dual speed (PDS) strategies. In particular, we choose two SRP-based energy-efficient approaches as the examples to evaluate the performance of ODS and PDS strategies: the blocking-aware two-speed (BATS) and the blocking-time stealing (BTS) algorithms. Note that BATS and BTS have been shown to outperform existing ODS and PDS strategies in terms of energy efficiency. We have evaluated BATS and BTS with dynamic- and fixed-priority task scheduling algorithms, i.e., EDF and RM. The performance evaluation results presented in this paper were obtained by an open source simulation framework for DVS-capable real-time systems, called MCRTsim. Based on the experimental results, the performance of ODS and PDS strategies and the capabilities of BATS and BTS are compared and presented in this paper.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jisu Park, Young-Sun Yun, Seongbae Eun, Sin Cha, S. So, Jinmang Jung
{"title":"Deep neural networks based user interface detection for mobile applications using symbol marker","authors":"Jisu Park, Young-Sun Yun, Seongbae Eun, Sin Cha, S. So, Jinmang Jung","doi":"10.1145/3264746.3264808","DOIUrl":"https://doi.org/10.1145/3264746.3264808","url":null,"abstract":"The UI storyboard is a design drawing for the development of mobile application. The designer uses a storyboard as a tool to help communication between the developer and the designer. However, the developer can make an unintended widget which is different from the intention of the designer. In this paper, we propose a DNN (Deep Convolutional Neural Network) based automatic UI detection method using symbol markers to improve the accuracy of UI identification. The symbol marker can be useful for UI detection and developing the UI Code.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seoyeon Kim, Jisu Park, Jinmang Jung, T. Son, Choonghee Jo, Jaehyeok Jeong, Inhwan Na, Jinsung Song
{"title":"Multiple mobile devices based virtual display method using electronic LED stick","authors":"Seoyeon Kim, Jisu Park, Jinmang Jung, T. Son, Choonghee Jo, Jaehyeok Jeong, Inhwan Na, Jinsung Song","doi":"10.1145/3264746.3264806","DOIUrl":"https://doi.org/10.1145/3264746.3264806","url":null,"abstract":"In this paper, we propose a multiple Mobile Devices based virtual display technique using electronic LED stick. We design a virtual display technique in which each mobile device connects to a server and operates as a cell of the display. The proposed technique uses an electronic LED stick connected to the mobile device via micro USB or BlueTooth to display the real-time message received from the server. It can be scalable in the way that multiple mobile devices participate. Our method can be used as a new performance tool in a concert hall, venue, or stadium, replacing existing large electronic signage and card sections.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127002180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mutual authentication scheme with user anonymity for cyber-physical and internet of things","authors":"Yung-Feng Lu, Chin-Fu Kuo, Hung-Ming Chen, Guan-Bo Wang, Shih-Chun Chou","doi":"10.1145/3264746.3264762","DOIUrl":"https://doi.org/10.1145/3264746.3264762","url":null,"abstract":"Cyber-Physical Systems (CPS) and Internet of Things (IoT) are emerging technologies, which makes the remote sensing and control across heterogeneous network a reality, and has good prospects in industrial applications. Due to the resource constrained feature of CPS devices, the design of security and efficiency balanced authentication scheme for CPS/IoT devices becomes a big challenge in CPS/IoT applications. This paper presents a two-factor authentication with key agreement scheme for CPS/IoT applications. The proposed mechanism integrates IMSI identifier and identity-based remote mutual authentication scheme on BAN logic designs. It supports flawless two-factor and mutual authentication of participants and agreement of session keys for user, device and gateway server. The proposed mechanism also provide user anonymity, it can be adopt in critical applications. Besides, it does not require modifying the software of clients; thus, it is highly flexibly. We believe the proposed mechanism is usable for CPS/IoT applications.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130709138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eunkyong Lee, Yongcheon Park, Heejin Kim, Byeongoh Jung, Jiman Hong
{"title":"An efficient method for automatic updating business rules","authors":"Eunkyong Lee, Yongcheon Park, Heejin Kim, Byeongoh Jung, Jiman Hong","doi":"10.1145/3264746.3264815","DOIUrl":"https://doi.org/10.1145/3264746.3264815","url":null,"abstract":"Information Systems operated by a corporation or government office must perform data quality management that identifies which part of the data is in error and what causes it to provide accurate and consistent data to the customer. However, in general, various problems arise because data quality management is manually performed by the data quality manager in the derivation and verification of business rules. Therefore, in this paper, we propose a method to automatically check the query performance of business rules and business rules to efficiently manage data quality.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECG-based biometric human identification based on backpropagation neural network","authors":"Htet Myet Lynn, Soonja Yeom, Pankoo Kim","doi":"10.1145/3264746.3264760","DOIUrl":"https://doi.org/10.1145/3264746.3264760","url":null,"abstract":"Biometric human identifications are expansively reshaping security applications in the emerging sophisticated era of smart devices. To inflate the level of security and privacy demands, human physiological signal based human identification and authentication systems are getting tremendous attention. This study focuses on producing feasible amount of segmented signals from a source signal for training dataset, and integrating 2-layer framework backpropagation neural network to handle the great amount of classes for identification without hesitation. The results suggest that the proposed method surpasses the recent technique with the similar architecture, and possesses more advantages in terms of computational complexity and high performance compared with the previously reported study.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leilei Meng, Xin Su, Xuewu Zhang, Chang Choi, Dongmin Choi
{"title":"Signal reception for successive interference cancellation in NOMA downlink","authors":"Leilei Meng, Xin Su, Xuewu Zhang, Chang Choi, Dongmin Choi","doi":"10.1145/3264746.3264751","DOIUrl":"https://doi.org/10.1145/3264746.3264751","url":null,"abstract":"Successive interference cancellation (SIC) receiver is adopted by power domain non-orthogonal multiple access (NOMA) at the receiver side as the baseline receiver scheme taking the forthcoming expected mobile device evolution into account. Development technologies and advanced techniques are boldly being considered in order to achieve power saving in many networks, to reach sustainability and reliability in communication due to envisioned huge amount of data delivery. In this paper, we propose a novel scheme of NOMA-SIC for the sake of balancing the trade-off between system performance and complexity. In the proposed scheme, each SIC level is comprised by a matching filter (MF), a MF detector and a regenerator. In simulations, the proposed scheme demonstrates the best performance on power saving, of which energy efficiency increases with an increase in the number of NOMA device pairs.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on utilization strategy of edu-tech-based MOOC for lifelong learning in the fourth industrial revolution","authors":"Sung Kwan Kang, Joonseub Cha, S. Ban","doi":"10.1145/3264746.3264803","DOIUrl":"https://doi.org/10.1145/3264746.3264803","url":null,"abstract":"In recent years, Korea has entered the fourth industrial revolution age. Due to the occupational environment change and rapid technological change, it is becoming difficult to gain or retain occupation with the knowledge acquired in existing university education or occupational education. In this fourth industrial revolution era and the aged society, the most important strategy to solve these education problems is lifelong learning. Therefore, this paper examines occupational environmental changes caused by entered fourth industrial revolution era and the aged society, and analyzes the problems of current lifelong education. Also we propose a strategy to utilize MOOC based on the education technology for lifelong learning to prepare for the fourth industrial revolution era and aged society.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Yaqub, Syed Hassan Ahmed, S. Bouk, Dongkyun Kim
{"title":"Enabling critical content dissemination in vehicular named data networks","authors":"M. A. Yaqub, Syed Hassan Ahmed, S. Bouk, Dongkyun Kim","doi":"10.1145/3264746.3264779","DOIUrl":"https://doi.org/10.1145/3264746.3264779","url":null,"abstract":"Named data networking has been efficiently utilized in Vehicular networks as a promising solution to enable reliable and efficient content retrieval. Vehicular named data networks (VNDN) employ a pull-based mechanism where an Interest packet is broadcast in order to receive the Content. This forwarding scheme mitigates the forwarding of unsolicited content, however, the dissemination of critical data forwarding generated randomly in the network is not considered. For instance, in the vanilla NDN framework any content received by a vehicle is considered unsolicited and dropped provided no corresponding entry is available in the pending interest table of that vehicle. Despite its potential, some modification in the NDN architecture are required to forward the high priority critical content. In this work, we enable the vehicles' NDN forwarding mechanism to reliably share the critical content from different vehicles sources in the networks. The solution is evaluated in NS2 and the findings show that the proposed scheme is able to collect the data from several vehicles in the networks with reduced network overhead and data retrieval delays.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}