{"title":"Copyright & Contact Information","authors":"","doi":"10.1109/icufn.2018.8436652","DOIUrl":"https://doi.org/10.1109/icufn.2018.8436652","url":null,"abstract":"","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Face Masking Scheme in Video Surveillance System","authors":"Dongchil Kim, Sungjoo Park","doi":"10.1109/ICUFN.2018.8436783","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436783","url":null,"abstract":"In this paper, we analyze face masking schemes in the video surveillance system for protecting the personal privacy from videos acquired by CCTV cameras. Existing face masking schemes have a problem that the face of humans can be identified because face masking setting values cannot be applied as an appropriate value. Through implementation results, we found optimal values for face masking to perfectly protect the personal privacy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Robustness Optimization Based on Radio Link Failure Prediction","authors":"Yi-Wei Ma, Jiann-Liang Chen, Hao-Kai Lin","doi":"10.1109/ICUFN.2018.8436964","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436964","url":null,"abstract":"This work proposes a Mobility Robustness Optimization (MRO) mechanism that is based on radio link failure prediction, called MBRP, for dealing with Radio Link Failures (RLFs) during the handover process. This work concerns these handover failures, considers a parameter that is defined in 3GPP-A3 offset, and derives models of handover between cells. The proposed Mobility Robustness Optimization based on Radio Link Failure Prediction (MBRP) mechanism is compared with the HO-region and reduces the number of RLFs by 1.08%.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EGE: A New Energy-Aware GPU Based Erasure Coding Scheduler for Cloud Storage Systems","authors":"M. Pirahandeh, Deok‐Hwan Kim","doi":"10.1109/ICUFN.2018.8436594","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436594","url":null,"abstract":"Redundant array of inexpensive disks (RAID) based storage systems performance is limited to the sequential nature of the central processing unit (CPU), and they consume high amounts of energy because they need erasure coding for striping data and parity into storage devices. This paper proposed an energy-aware GPU based scheduling. The proposed scheduler differs from existing RAID in that it can reduce the number of CPU cycles and coding time. The proposed system generates parity by using a GPU, stripes parity at the initiator server and stripes data at the target server. We also apply an energy-aware scheduling scheme based on solid state disk-based data storage and hard disk drive-based parity storage. Experimental results show that the energy consumption by GPU-RAID is 45% less than Linux-RAID.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114150391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Surveillance System Based on 3D Action Recognition","authors":"Sungjoo Park, Dongchil Kim","doi":"10.1109/ICUFN.2018.8436644","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436644","url":null,"abstract":"Human action recognition using depth-map images from 3D camera for surveillance system is a promising alternative to the conventional 2D video based surveillance. We propose a security-event detection method based on body part classification and human action recognition for more effective video surveillance system. Experimental results show that the body part classification accuracy of 65.0% and security event detection accuracy of 0.878 were achieved for 9 security events.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"48 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120983815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancements of IEEE802.15.4e DSME Model of Wireless Sensor Networks","authors":"Sameer K. Alsudany, S. Boussakta, M. Johnston","doi":"10.1109/ICUFN.2018.8436600","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436600","url":null,"abstract":"Internet embedded sensor nodes have attracted the attention of researchers and industry due to their wide application. The main standard, IEEE802.15.4e 2012, introduces a deterministic and synchronous multi-channel extension (DSME) model. Three main issues should be tackled and improved with this model; a high energy consumption of end nodes during the contention access period (CAP), a long association and guaranteed time slot (GTS) earning times during a network initialization phase and a long network discovery time. These issues have been analysed and improved in a star topology wireless sensor network (WSN). Four scenarios with different numbers of nodes are investigated. Nodes numbers are set according to network saturation ratios (25%, 50%, 75%, and 100%). This paper proposes three enhancements for the performance of this model. Two new approaches are proposed to reduce the energy consumption of end nodes during the CAP period, a new association scheme during network initialization phase using a tight TDMA algorithm to minimize the time required for association and getting a GTS slot and reduce power consumption due to collisions, and a new technique to reduce network discovery time. Simulation results show significant improvements in reducing energy consumption and radio duty cycle (RDC) of end nodes by a factor of (71) and (77) respectively. Good improvements are also achieved in reducing association and GTS earning times by a factor of (8) on average. Finally, network discovery time has been reduced for fast association and further energy saving of end nodes.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byungkyu Ahn, Ji-Youn Ha, Youngjin Seo, J. Heo, J. Shin, Kyungwoon Lee
{"title":"Implementation of Plug & Play Quantum Key Distribution Protocol","authors":"Byungkyu Ahn, Ji-Youn Ha, Youngjin Seo, J. Heo, J. Shin, Kyungwoon Lee","doi":"10.1109/ICUFN.2018.8436633","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436633","url":null,"abstract":"This paper represents an experimental implementation of the “Two way Plug & play” quantum key distribution (QKD) protocol, which uses weak coherent pulses at a single photon level to transfer key information from Alice to Bob via the quantum channel. In this experiment, we applied the 25km optical fiber channel and the results show a quantum bit error rate (QBER) of about 3%.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink Multiuser Superposition Using QPSK and 256-QAM in Mobile Communication Systems","authors":"Koki Senda, H. Otsuka","doi":"10.1109/ICUFN.2018.8436777","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436777","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is a potential candidate for the 5th-generation mobile systems (5G). In NOMA, two types of modulation signals are superposed for two different user equipment (UEs) in the power domain. The use of higher-order modulation such as 256-QAM is an also important technique under consideration for 5G. In this paper, we propose superposed modulation using QPSK and 256-QAM for downlink NOMA, and demonstrate the performance by link-level simulation under static propagation condition. The BER performance is investigated for the “superposed QPSK and 256-QAM” transmission as parameters of power allocation sets. From these results, we clarify the requirements for paired NOMA UEs when the superposed QPSK and 256-QAM is used in downlink NOMA.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization of Submerged Sensors with a Single Beacon for Non-Parallel Planes State","authors":"Anisur Rahman, V. Muthukkumarasamy","doi":"10.1109/ICUFN.2018.8437041","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437041","url":null,"abstract":"This paper delineates a new method of determining the coordinates of sensors with a single beacon for both the parallel and non-parallel state situations. Cayley-Menger determinant is mostly used when the beacon and deployed sensors are in the state of parallel planes. We have, however, proposed a mathematical model to compute the coordinates of the submerged sensors even when these sensors and beacon are in non-parallel state configuration. As the knowledge of precise coordinates of the sensors is as important as the collected data in underwater wireless sensor networks, the measure of exact distance between the nodes becomes the prime factor for improved accuracy. The proposed mathematical model of coordinate-determination has better immunity from multipath fading and linearization process of non-linear equations, resulting in more precise location of the sensors. Moreover, a single beacon is used to determine the coordinates of the sensor nodes where none of them have a priori knowledge about their locations.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient WOLA Structured OQAM-FBMC Transceiver","authors":"J. Park, W. Lee","doi":"10.1109/ICUFN.2018.8437042","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437042","url":null,"abstract":"In this paper, we evaluate and analyze performance of these systems with windowed overlap-add (WOLA) technique. The offset quadrature amplitude modulation - filter bank basis multi carrier (OQAM-FBMC) has been attracted. OQAM-FBMC was nominated as one of new waveforms for 5G communications due to its capability of frequency selectivity, cyclic prefix (CP) and robustness to carrier frequency offset (CFO). In spite of these advantages, many researchers have claimed pros and cons for the usage of FBMC, among those the excessive computational complexity is considered as a major hurdle to deploy for direct employment. We analyze the bit error rate (BER) performance through computer simulation to verify the validity of the proposed method.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121268607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}