{"title":"A Cross-Cultural Comparative Study on the Startup Discourse in 2000–2019 between United States and China","authors":"Jaeyeon Jang, Byungjun Kim, Kveo Re Lee, J. Kim","doi":"10.1109/IMCOM51814.2021.9377432","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377432","url":null,"abstract":"This essay explores significant cultural differences on startup discourses between United States and China by demonstrating a big data analysis through Structural Topic Modeling. Results and findings were interpreted with Hofstede”s cultural dimensions, indicating that the conventional theory of social science was applicable when it comes to explaining technological subjects","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130794983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication and Trustful Communication Protocol for IoT Devices","authors":"Seiya Kobayashi, T. Miyazaki","doi":"10.1109/IMCOM51814.2021.9377369","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377369","url":null,"abstract":"This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-dependent LSTM: Baseball Game Prediction with Starting and Finishing Lineups","authors":"Sungjin Chun, C. Son, Hyunseung Choo","doi":"10.1109/IMCOM51814.2021.9377370","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377370","url":null,"abstract":"With the wide availability of historical data from baseball games, one of the most popular sports, high accurate winner prediction has become a significant target of statistical analysis and machine learning. However, existing techniques for a pre-game prediction yield poor accuracies due to the incomplete player lists given in starting lineups and substitutions occurring during the game. We exploit the capability of Long Short-Term Memory (LSTM) in identifying hidden patterns of time series data to propose inter-dependent LSTM baseball game prediction with only the starting lineup information. Particularly, we preprocess historical data to generate a pair of pre-game and post-game records for each baseball game. The pre-game record indicates the incomplete player lists given in starting lineups, and the post-game one contains the list of all players who participated in the game. The inter-dependent LSTM model exploits the dependencies of the pairs to predict a game result with only pre-game input. Our experiment results show that the proposed model achieves up to 12% higher accuracy than the existing ones.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reconcile of Density Based and Hierarchical Clustering Based on the Laws of Physics","authors":"Nader Bazyari, H. Sajedi","doi":"10.1109/IMCOM51814.2021.9377417","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377417","url":null,"abstract":"In this paper a new approach toward data processing is proposed that is inspired by all the prominent data clustering algorithms proposed by scholars. The main motif that drove this approach was to mix hierarchical clustering methods with Gaussian Estimators as to find a hidden structure in data that was not reachable using traditional bandwidth estimators. Instead the criteria for assessing similarity among data was the principles for Newtonian Physics.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123053615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo
{"title":"Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing","authors":"Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo","doi":"10.1109/IMCOM51814.2021.9377383","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377383","url":null,"abstract":"During recent years, mobile edge computing is getting much attention from both academia and industry. However, many found that this emerging architecture needs a proper data privacy protection mechanism at mobile edge nodes against unintended data use by authorized data analysts. Due to the reason, the development of a proper lightweight privacy-preserving data analysis mechanism is of great urgency. Thus, we propose DP-FCNN, a light-weight Differential Privacy (DP) framework using Fuzzy Convolution Neural Network (FCNN) with Laplace Mechanism which injects noise into the personal data before uploading data from users generating the data into the storage so that the data is still useful but data privacy can be properly protected against unauthorized data analysis attempt. We implemented the proposed framework, and tested its performance in terms of scalability, processing time, and accuracy. The result shows that the proposed framework is very practical.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116778646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding","authors":"Tao Wang, Yaokai Feng, K. Sakurai","doi":"10.1109/IMCOM51814.2021.9377395","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377395","url":null,"abstract":"In recent years, the DDoS (Distributed Denial of Service) attack continues to be one of the most dangerous threats even in the SDN (Software Defined Networking) environment. Many approaches have been proposed to deal with the DDoS attacks in the SDN environment. Among those approaches, the two-step detection, in which a trigger mechanism is added before the detection algorithm is called, is gaining more and more attention. In other words, it is the trigger, not the resource-consuming detection algorithm, that constantly monitors network traffic. Thus, the detection algorithm is only called when it is triggered. However, in the existing two-step methods, the trigger uses a static threshold to determine whether or not to start the detection process. In practice, it is difficult to determine an appropriate threshold, and the threshold has a decisive effect on the frequency of the detection process being called and ultimately, it impacts detection performance. In this paper, we propose a self-feedback dynamic thresholding system in which the threshold used in the trigger is dynamically adjusted based on the previous results of trigger and detection. Experimental results and our discussion show that our proposal significantly reduces the number of calls to the resource-consuming detection algorithm with no sacrifice of detection result.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ShaoPeng Che, Dongyan Nan, Pim Kamphuis, Xinvu Jin, J. Kim
{"title":"A Cluster Analysis of Lotte Young Plaza Using Semantic Network Analysis Method","authors":"ShaoPeng Che, Dongyan Nan, Pim Kamphuis, Xinvu Jin, J. Kim","doi":"10.1109/IMCOM51814.2021.9377390","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377390","url":null,"abstract":"The COVID-19 pandemic has had a significant impact on tourism-driven industries worldwide. As East Asia is gaining control in the fight against the coronavirus, countries in this region started easing their travel restrictions. Tourist-oriented retail stores are slowly preparing to receive international visitors again, and to be well adjusted, it is crucial to understand foreign customers' perceptions. From the seven most popular tourism platforms in China, we collected comments about Lotte Young Plaza in South Korea and applied semantic network analysis to understand its perception among young Chinese customers. Based on this analysis, we divided the conclusions into 6 aspects: People whose main purpose is to buy clothes, people who have communication needs in Chinese, the Lotte Department Store's driving force on customer flow to Lotte Young Plaza, young people, features of Lotte Young Plaza (mouthwash) and cosmetics.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131123683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Koki Ohtsuka, D. Kitayama, K. Sumiya, Kazushi Fujita, Goto Shin, Isshu Munemasa
{"title":"A Geographical Object Extraction Method Using User's Trajectories for Generating Artificial Maps","authors":"Koki Ohtsuka, D. Kitayama, K. Sumiya, Kazushi Fujita, Goto Shin, Isshu Munemasa","doi":"10.1109/IMCOM51814.2021.9377367","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377367","url":null,"abstract":"There have been many studies on automatic generation of artificial maps, but few have focused on the objects displayed on artificial maps. Therefore, in this research, we analyzed an object extraction method for automatically generating artificial map. In this research, objects are extracted using Biased Page Rank. Biased Page Rank is a method for improving the quality of search results by changing the rank source according to the interests and interests of individual users. By using this method for object extraction, it is possible to display the objects with a high evaluation value among the objects existing in a specific area on artificial map.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Detection using Local Patterns in FPGA","authors":"Jin Young Byun, J. Jeon","doi":"10.1109/IMCOM51814.2021.9377348","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377348","url":null,"abstract":"Face detection is currently one of the most common technologies used in a variety of applications. This paper presents the design and implementation of face detection with some local patterns for achieving real-time performance. It is designed to process the image received in real time from an industrial camera using local patterns to detect the face on the FPGA. Each development result is separately analyzed specifically in terms of hardware resources.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123002586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Random Access with Beamforming Techniques in 5G Networks","authors":"Jun-Woo Won, K. Kim, Tae-Jin Lee","doi":"10.1109/IMCOM51814.2021.9377362","DOIUrl":"https://doi.org/10.1109/IMCOM51814.2021.9377362","url":null,"abstract":"In cellular networks, User Equipments (UEs) must perform a Random Access (RA) process in which UEs are allocated resources for data transmission from the Base Station (BS). The 5G network using the high-frequency band adopts the beamforming technology in order to overcome the high path-loss. As the narrow coverage characteristic of the beam, the BS and UEs use the beam-sweeping and beam-switching methods at the RA process. In this paper, we propose an Enhanced Random Access (E-RA) process, in which the UE selects multiple preambles and transmits them through the beam-sweeping method, and transmits the Connection Request Message (Msg3) through the random beam-switching method. Furthermore, we also propose an improved re-access process that begins with Msg3 retransmission. Through the E-RA process, we can reduce the access delay of the network and the number of transmitted messages causing the energy consumption of the UE and increase the success probability of the RA process.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}