Yoonsung Chae, D. T. Nguyen, Sangcheol Park, Youngil Park
{"title":"Indoor Localization Using Digital Auto Zoom of a Smart-Phone Camera and Integrated Sensors","authors":"Yoonsung Chae, D. T. Nguyen, Sangcheol Park, Youngil Park","doi":"10.1109/ICUFN.2018.8436976","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436976","url":null,"abstract":"In this paper, we introduce a new indoor localization system that receives a reference information from LED lamps and utilizes smart-phone sensors in tracking the device. To receive data from LED lamps placed at high ceiling, a digital auto zoom based optical camera communication (OCC) scheme is used in increasing the transmission distance. In addition, a magnetic sensor, a gyro sensor, and an acceleration sensor are effectively combined to realize a precise pedestrian dead reckoning (PDR) system. In this paper, we provide algorithms to implement the proposed schemes and show the experimental results.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cache Replacement Strategy Based on Hierarchical Popularity in NDN","authors":"Yingqi Li, Meiju Yu, Ru Li","doi":"10.1109/ICUFN.2018.8436597","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436597","url":null,"abstract":"NDN(Named Data Networking, NDN) which is one of the next generation network architectures based on named-data, uses in-network caching. Cache has limited capacity, so the cache replacement policy determines which content is evicted when the cache space is full. This paper analyzes some cache replacement strategies in NDN, and puts forword a cache replacement strategy based on hierarchical popularity, then compares the effect of different cache replacement strategies to the cache performance through simulation experiments. Cache performance is evaluated in provision of cache hit ratio.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AL-FEC Application on NGMN-Edge Computing Integrated Systems","authors":"C. Bouras, N. Kanakis","doi":"10.1109/ICUFN.2018.8437004","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437004","url":null,"abstract":"Edge computing or edge networking is an architecture that uses one or more collaborative multitude of end-user clients or near-user edge devices to carry out a substantial amount of communication, control, management or other operations. Edge Computing for mobile networks is a new technology which is currently under standardization providing an IT service environment and cloud-computing capabilities at the edge of the mobile network in close proximity to the mobile end users. The aim of this technology is to reduce latency, ensure highly efficient network operation and service delivery, providing improved user experience. All of these can be translated into value and can create opportunities for operators, application and content providers enabling them to better utilize the mobile broadband capabilities. Furthermore, edge computing enables a new value chain for end users but also for industries allowing to efficient deliver their applications over the mobile network providing fresh business opportunities and new use cases. FEC is a feedback free error recovery method where the sender introduces redundant data in advance with the source data enabling the recipient to recover from different arbitrary packet losses. Recently, the adoption of FEC error control method has been boosted by the introduction of the powerful RaptorQ Application Layer FEC (AL-FEC) codes. In this work we propose the integration of AL-FEC error protection application at the edge layer. We propose a novel AL-FEC application architecture scheme based on RaptorQ codes and we analyze the performance enhancements such an error control architecture can introduce on Next Generation Mobile Networks (NGMN)-edge computing integrated systems.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127409282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Space Customized Recommendation Service Platform System in Mobile Edge Environment","authors":"E. Kim","doi":"10.1109/ICUFN.2018.8437010","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437010","url":null,"abstract":"Mobile network edge computing is an excellent technology to reduce service latency to users by extending services of existing central cloud computing to network edge. But the service provided to the user in the user space is not a service provided simply by reducing the delay time. The user space service provides a user's preferred spatial environment and automatically and promptly provides the user with preferred contents. So, the user space service is necessary to provide user space service platform infrastructure for automatically and promptly providing a user with a preferred spatial environment and contents. Therefore, this paper proposes a user space customized recommendation service platform system that can provide users with enhanced quality of service using shortened service delay time in mobile edge environment.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Integrated LDM Information for Intersection Safety","authors":"Shin-Kyung Lee, Jeong-Woo Lee, H. Oh","doi":"10.1109/ICUFN.2018.8436666","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436666","url":null,"abstract":"In autonomous vehicles, many sensors such as camera, LIDAR, and radar are used to accurately identify situations. However, using information from only the on-board sensors can lead to errors in recognizing the environment around the vehicle. Therefore, vehicle communications and Internet of Things infrastructure serve as alternative channels for gathering integrated information. The purpose of this study is to develop a scheme for providing intersection situation and local dynamic map information to a vehicle entering an intersection. Using infrastructure sensor information in conjunction with vehicle communication extends the range of safe driving at intersections.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Partha Pratim Banik, Rappy Saha, Tae-Ho Kwon, Ki-Doo Kim
{"title":"LED Color Detection of Visual-MIMO System Using Boosting Neural Network Algorithm","authors":"Partha Pratim Banik, Rappy Saha, Tae-Ho Kwon, Ki-Doo Kim","doi":"10.1109/ICUFN.2018.8436957","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436957","url":null,"abstract":"LED color detection is a vital part in visual-MIMO system. For deciding transmitted symbols from an LED array image, it is important to detect the color of LED on receiver side. In this paper, we propose a training algorithm, called boosting neural network (BNN) to predict the color of LED on receiver side. First, we take the image of LED array and segment the LED image by using LED detection algorithm. After segmenting the LED image, the LED image is resized in 10 by 10 dimension that means 100 pixels. Each pixel is the input to the BNN model for each RGB color channel. For studying the behavior of each color LED image in low (565 lux) and strong (2450 lux) environmental light intensity, we train our BNN model for low and strong environmental light intensity. Finally, we compare the performance of our BNN model with the regression analysis model at low and strong environmental light intensity. We obtain greater closeness accuracy for each color channel at both environmental light intensities.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eulhyeon Go, Soyi Kim, Yoonseok Song, Junghwan Kim, M. Rim
{"title":"Relay Position Considering Interference from Other Sub-Channels in D2D Group-casting Systems","authors":"Eulhyeon Go, Soyi Kim, Yoonseok Song, Junghwan Kim, M. Rim","doi":"10.1109/ICUFN.2018.8437023","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437023","url":null,"abstract":"Device-to-device (D2D) communication is a way to communicate directly between devices without going through the base station or other infrastructure. In many D2D communication systems, orthogonal frequency division multiple access (OFDMA) is used in order to maintain the similarity with the mobile communication systems and to secure a sufficient transmission distance. In OFDMA systems, sub-channels, consisting of multiple subcarriers, are used to concurrently support multiple users. Although sub-channels in OFDMA systems are theoretically orthogonal, there is non-negligible interference from other sub-channels due to in-band emission. This paper considers a D2D group-casting system with a relay focusing on the effect of the interference from other subchannels, and calculates the outage probabilities according to the relay position.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae
{"title":"Malicious Activity Against an HPC Service Environment Exhibits a Power-Law-Like Frequency Distribution","authors":"Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae","doi":"10.1109/ICUFN.2018.8436667","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436667","url":null,"abstract":"Many researchers often use the HPC (High Performance Computing) service at KISTI via advanced high-speed network technology. In particular, the 4th Supercomputer at KISTI provides HPC services through an internet connection via 10-Gbps high-speed networks. However, there has been an increasing number of cyberattacks targeting the supercomputing services every year. In this study, based on the collected data, we show that the number of cyberattacks against KISTI supercomputing services is increasing every year. In addition, we show that this malicious activity appears to follow a power-law distribution by categorizing the source IP addresses of these attacks based on the originating country and analyzing the frequency of these attacks.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Magnetic Field Detection and Localization Scheme for Internet of Underwater Things","authors":"Kwang-Yul Kim, Y. Shin","doi":"10.1109/ICUFN.2018.8436628","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436628","url":null,"abstract":"The magnetic field whose intensity is changed by the magnetic permeability of the medium can be considered as a new underwater communication method. However, the magnetometer in the base station must compensate for the geomagnetic field to detect the underwater moving node for the communication and the localization. Therefore, this paper proposes a magnetic field detection and a localization scheme based on the exponential smoothing method. Simulation results show that the proposed scheme can extend the detection range and improve the localization accuracy by considering the trend of the geomagnetic field.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gregor Frick, A. Tchinda, U. Trick, A. Lehmann, B. Ghita
{"title":"Distributed NFV Orchestration in a WMN-Based Disaster Network","authors":"Gregor Frick, A. Tchinda, U. Trick, A. Lehmann, B. Ghita","doi":"10.1109/ICUFN.2018.8436705","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436705","url":null,"abstract":"This publication deals with distributed NFV orchestration in a WMN-based disaster network. The NFV orchestrator defined by ETSI is designed as a central unit and therefore includes the possibility of a single point of failure. Due to the environment of a disaster, a WMN node hosting this centralized orchestrator might get destroyed at events such as aftershocks resulting in a breakdown of the NFV infrastructure as it cannot be maintained and orchestrated anymore. To eliminate this aspect, requirements for a distributed NFV orchestration are defined. The requirements are categorized into architectural and orchestration specific aspects and are derived from the characteristics of a WMN and the conditions of a disaster environment. A concept for realizing a distributed NFV orchestration in a WMN-based disaster network according to the defined requirements is presented. The architecture consists of five logical layers with each layer fulfilling a specific functionality.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}