2018 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Recognition of the upper structure using the RCS characteristic of the automotive radar 利用汽车雷达的RCS特性识别上部结构
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343264
J. Oh, Heemang Song, Hyun-Chool Shin
{"title":"Recognition of the upper structure using the RCS characteristic of the automotive radar","authors":"J. Oh, Heemang Song, Hyun-Chool Shin","doi":"10.1109/ICOIN.2018.8343264","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343264","url":null,"abstract":"Recently, Automotive radar sensors achieve a greatly increasingly market influence and essentially used for providing driving environment information required by driver assistance systems. Although they are good at measuring the distance and the radial velocity of other objects even under bad weather circumstance, they have difficulty in distinguishing clearly upper structure and stationary vehicle for ambiguity in elevation. As a result, upper structure(e. g overpass, road signal, bridge so on) crossing lane of the ego vehicle may look similar to stationary vehicle. For this reason, AEB(Autonomous Emergency Braking) system fails to operate properly. As closer to the upper structure and the stationary vehicle, the pattern of RCS(Radar Cross Section) measured from the object is different. This difference of RCS pattern can be used to provide features to distinguish the upper structure and the stationary vehicle. There may exists certain features that can help classify them base only on RCS. Feature calculated from real FMCW(Frequency Modulated Continuos Wave) radar sensor data show potential availability in real traffic condition.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size 基于能量高效k均值聚类的WSN路由协议,采用最优数据包大小
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343195
M. Razzaq, Devarani Devi Ningombam, Seokjoo Shin
{"title":"Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size","authors":"M. Razzaq, Devarani Devi Ningombam, Seokjoo Shin","doi":"10.1109/ICOIN.2018.8343195","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343195","url":null,"abstract":"In wireless sensor networks (WSNs), sensor nodes are operated by small batteries, thus they have limited energy resources which need careful utilization. The proposed algorithm is an energy efficient K-means clustering-based routing protocol and considers an optimal fixed packet size according to the radio parameters and channel conditions of the transceiver. This approach can minimize the energy consumption of individual node and increase the network lifetime as a whole. Moreover, different power levels are considered for data transmission from cluster head to cluster member and base station. Simulation results show that the proposed algorithm performs better than the conventional K-means based energy aware clustering (KEAC) in terms of network lifetime and increases the overall throughput of the network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Identifying signal source using channel state information in wireless LANs 无线局域网中利用信道状态信息识别信号源
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343192
Yonghwi Kim, S. An, Jungmin So
{"title":"Identifying signal source using channel state information in wireless LANs","authors":"Yonghwi Kim, S. An, Jungmin So","doi":"10.1109/ICOIN.2018.8343192","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343192","url":null,"abstract":"In this paper, we study the feasibility of identifying signal source in wireless LANs using channel state information obtained from preambles. In current standard, the signal source can be identified by reading the MAC header which requires high SNR and takes more time than receiving the preamble. For each packet, CSI is obtained for each (group of) subcarriers and for each TX-RX path, which makes the information rich in features to be used for machine learning-based classification. Experiments in a typical office environment show that with simple kNN or neural network models, we can classify tens of signal sources with over 90% accuracy. Moreover, confidence levels differ significantly between correct and incorrect samples, which can be exploited to avoid false positives with little sacrifice of correct samples. The CSI-based source identification method can be used to improve spectral efficiency of WLANs, and can be used along with schemes such as BSS coloring included in the IEEE 802.11ax standard for highly efficiency WLANs.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transfer IEEE 802.11ad快速会话传输中多gbps视频流的分布式动态功率感知缓冲
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343249
Dohyun Kwon, Joongheon Kim
{"title":"Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transfer","authors":"Dohyun Kwon, Joongheon Kim","doi":"10.1109/ICOIN.2018.8343249","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343249","url":null,"abstract":"This paper proposes a distributed and stochastic algorithm for power-aware buffer management in 60 GHz IEEE 802.11ad wireless video streaming. Since 60 GHz wireless packets are very weak in non-line-of-sight scenarios due to the high attenuation, related 60 GHz wireless algorithms have been investigated including beamforming, relaying, fast session transfer (FST). Among them, FST defines the policy for the inter-operation between 2.4/5 GHz and 60 GHz wireless channels. This paper designs a distributed and stochastic algorithm that computes the amounts of power allocations for streaming video packets in the multi-hop wireless networks of FST devices. The algorithm aims on the joint optimization of (i) minimization of the sum of time average expected power consumption and (ii) video transmission buffer stability. Our simulation results show the improvement and the tradeoffs between the two optimization criteria.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"82 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security 基于物联网安全的无线传感器网络隐私保护和可验证用户认证方案的密码分析
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343154
Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won
{"title":"Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security","authors":"Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won","doi":"10.1109/ICOIN.2018.8343154","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343154","url":null,"abstract":"User authentication in wireless sensor networks is more complex than normal networks due to sensor network characteristics such as unmanned operation, limited resources, and unreliable communication. For this reason, various authentication protocols have been presented to provide secure and efficient communication. In 2017, Wu et al. presented a provable and privacy-preserving user authentication protocol for wireless sensor networks. Unfortunately, we found that Wu et al.'s protocol was still vulnerable against user impersonation attack, and had a problem in the password change phase. We show how an attacker can impersonate an other user and why the password change phase is ineffective.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Throughput analysis of multi-antenna based SWIPT relay network 基于多天线的SWIPT中继网络吞吐量分析
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343136
Danish Mehmood Mughal, S. T. Shah, Daniyal Munir, K. Park, M. Chung
{"title":"Throughput analysis of multi-antenna based SWIPT relay network","authors":"Danish Mehmood Mughal, S. T. Shah, Daniyal Munir, K. Park, M. Chung","doi":"10.1109/ICOIN.2018.8343136","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343136","url":null,"abstract":"Radio frequency (RF) energy harvesting is a promising solution to increase the lifetime of energy-constrained wireless sensor networks. In this paper, we studied the performance of simultaneous wireless information and power transfer (SWIPT) based multi-antenna decode and forward relay network where relay and destination can have multiple antennas. Energy constraint relay, first harvest energy from the source signal and uses harvested energy to forward the information to the destination, employing time switching (TS) receiver architecture. Deploying multiple antennas on relay and destination, we investigated its benefits using maximum ratio combining (MRC) and maximal ratio transmit (MRT) techniques in delay tolerant and delay limited transmission modes. We have analyzed our system numerically, in terms of throughput and outage. Through simulation results, we have provided key insights on possible benefits of using multiple antennas including throughput, outage, and harvested power.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MAEC-X: DDoS prevention leveraging multi-access edge computing MAEC-X:利用多访问边缘计算的DDoS防护
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343118
Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho
{"title":"MAEC-X: DDoS prevention leveraging multi-access edge computing","authors":"Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho","doi":"10.1109/ICOIN.2018.8343118","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343118","url":null,"abstract":"The convergence of access networks in the fifth-generation (5G) evolution promises multi-tier networking infrastructures for the successes of various applications realizing the Internet-of-Everything era. However, in this context, the support of a massive number of connected devices also opens great opportunities for attackers to exploit these devices in illegal actions against their victims, especially within the distributed denial-of-services (DDoS) attacks. Nowadays, DDoS prevention still remains an open issue in term of performance improvement although there is a significant number of existing solutions have been proposed in the literature. In this paper, we investigate the advances of multi-access edge computing (MAEC), which is considered as one of the most important emerging technologies in 5G networks, in order to provide an effective DDoS prevention solution (referred to be MAEC-X). The proposed MAEC-X architecture and mechanism are developed as well as proved its effectiveness against DDoS attacks through intensive security analysis.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Video streaming service and CD sales 视频流媒体服务和CD销售
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343161
K. Yoshida, Tomonori Manabe
{"title":"Video streaming service and CD sales","authors":"K. Yoshida, Tomonori Manabe","doi":"10.1109/ICOIN.2018.8343161","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343161","url":null,"abstract":"Various studies have analyzed the effects of online video services, such as YouTube, on compact disc (CD) sales. They reported both positive and negative effects of online video services on CD sales. Their positive effect is advertisement. Their negative effect is the existence of free alternatives such as pirated copies. The results of such studies vary according to the area of study, date, method, etc. To promote new Internet services, analyzing the effect of new services on traditional businesses is important in order to obtain support from business persons. Thus, in this study, we attempt to conduct such an analysis. It should be noted that the Japanese CD market has unique characteristics. For example, the sale of CDs still has a large volume in the music market. It is important to investigate the effects of online video services on CD sales. We have analyzed such effects by analyzing the initial-week sales and, decay ratio of CD sales and online video services. We found that 1) frequent viewings of YouTube increased CD sales in later periods. Thus, it has a positive advertising effect on CD sales in the Japanese Market. 2) The initial-week sale had already decreased before a large online video service, i.e., YouTube, became available. 3) In contrast, the decay speed of the CD sales increased after the second week, which was a negative effect of online video services. In this paper, we discuss how to utilize this contradicting information in business scenarios.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient processing of range spatial keyword queries over moving objects 对移动对象的范围空间关键字查询的有效处理
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343174
Sujin Oh, HaRim Jung, U. Kim
{"title":"An efficient processing of range spatial keyword queries over moving objects","authors":"Sujin Oh, HaRim Jung, U. Kim","doi":"10.1109/ICOIN.2018.8343174","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343174","url":null,"abstract":"In this paper, we propose an efficient method of processing range spatial keyword queries. In particular, we focus on minimizing (i) the computation cost at the server and (ii) the communication cost between moving objects and the server. As the moving objects dynamically change their location, they should contact the server. This, however, increases the communication cost as well as the server computation cost, as the number of moving objects is increased. In the traditional researches, the concept of safe region is used. A safe region assigned to each moving object o is an area such that o cannot affect the results of the queries as long as it is moving within this area. However, the construction cost of the safe region can become a burden to the server. Therefore, we introduce pruning rules to decrease the overhead of constructing the safe region. In addition, the proposed algorithm for processing continuous range spatial keyword queries over moving objects utilizes a new spatial index structure, called the partition retrieved list, to help the system quickly construct the safe region of each object. Through experimental evaluations, we verify the effectiveness of our proposed algorithm.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Evaluation of efficiency of using bank smart-card in Russian financial institutions 俄罗斯金融机构银行智能卡使用效率评价
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343187
A. Bataev, D. Rodionov, E. S. Kosonogova
{"title":"Evaluation of efficiency of using bank smart-card in Russian financial institutions","authors":"A. Bataev, D. Rodionov, E. S. Kosonogova","doi":"10.1109/ICOIN.2018.8343187","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343187","url":null,"abstract":"The introduction of information technology happened in all spheres of economic development. Therefore, there occurs a concept “information economy”, designating economic activity, based on application of information and communication technologies. One of the leaders on investment into information technologies is financial institutions, which strongly take the second place after IT companies. One of the areas of information and communication technologies application are remote banking systems. In the paper, the classification of bank plastic cards is considered. The method for assessing the effectiveness of using smart bank cards, based on comparing the expenses on introducing and using bank chip cards and reducing the volume of stolen funds from bank cards, was proposed. On the basis of the offered methodology, the economic efficiency of the application of bank smart cards was calculated using the example of PJSC “SBERBANK”, which is one of the banking sector leaders.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信