Youngsam Kim, Jong-hyuk Roh, Kwantae Cho, Sangrae Cho
{"title":"How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings","authors":"Youngsam Kim, Jong-hyuk Roh, Kwantae Cho, Sangrae Cho","doi":"10.1109/ICTC49870.2020.9289205","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289205","url":null,"abstract":"Speaker verification based on deep speaker embeddings (DSE) network outperformed traditional i- vectors systems. Afterward, to improve the performance, various researches have been conducting and data augmentation methods are one of them. In this paper, we focus on acoustic delta features augmentation and their aggregation methods for DSE networks, X-vectors and MobileVoxNet. For CNN-based MobileVoxNet, we re-design the architecture to aggregate delta features in deeper layer with squeeze and excitation (SE) module. Experimental results show that the proposed methods achieve performance improvement compared to not using delta features on the VoxCeleb1 test dataset. We also compare the number of computations and parameters of models to analyze efficiency of the proposed methods.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmet Kaplan, Mehmet Can, I. Altunbas, Günes Karabulut-Kurt, D. Kucukyavuz
{"title":"LDPC Coded OFDM-IM Performance Evaluation Under Jamming Attack","authors":"Ahmet Kaplan, Mehmet Can, I. Altunbas, Günes Karabulut-Kurt, D. Kucukyavuz","doi":"10.1109/ICTC49870.2020.9289150","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289150","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) with index modulation (OFDM-IM) that carries part of the incoming bits by active subcarrier indices is a recently proposed multicarrier modulation technique. OFDM-IM is considered as a promising candidate for 5G and beyond, due to its superiority over OFDM. In this paper, we show that uncoded OFDM-IM can achieve better error performance than uncoded OFDM in the presence of barrage jamming (BJ). Low-density parity-check (LDPC) coding is used to further improve the robustness of OFDM-IM system against jamming attacks. We investigate the optimum log-likelihood ratio (LLR) values of index bits and modulation bits under a jamming attack. We also show the superior performance of coded OFDM-IM, when compared to classical OFDM, at a high code rate in the presence of BJ. We propose a new model for partial band jamming (PBJ) that can attack each subcarrier with different power by adjusting the jamming coefficients. Simulation results show that OFDM-IM is more robust against PBJ than BJ.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123691594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Score Prediction Network and Graph-based Selection for Semantic Line Detection","authors":"Dongkwon Jin, Chang-Su Kim","doi":"10.1109/ICTC49870.2020.9289236","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289236","url":null,"abstract":"In this paper, we propose a novel semantic line detection algorithm. For an input image, we first detect semantic lines using a semantic line detector by classifying candidate lines. Then, we predict scores indicating whether they are harmonized or not between the detected lines. To this end, we develop a score prediction network (SPNet). Finally, we construct a graph consisting of the detected lines and the predicted scores between them and iteratively select the reliable semantic lines. Experimental results demonstrate that the proposed algorithm detects semantic lines accurately.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Diagnosis of Rotating Machine Using an Indirect Observer and Machine Learning","authors":"Shahnaz TayebiHaghighi, Insoo Koo","doi":"10.1109/ICTC49870.2020.9289590","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289590","url":null,"abstract":"Bearing is one of the important mechanical components to reduce friction in rotating machines. Early fault diagnosis in bearings is an important challenge to the prevention of full failure and avoiding disorder of the machine. In this paper, an indirect observer and machine learning technique are adopted for fault identification in bearing. To develop an indirect observer, in the first step, the autoregressive with uncertainty modeling technique is proposed to modeling the RMS (indirect) normal signal of bearing. After that, the robust (sliding fault detection) proportional multi integral with autoregressive external input modeling (ARPMI) observer was used to solve the unknown signal estimation in bearing. Besides, the support vector machine (SVM) technique for fault classification is proposed. The effectiveness of the proposed scheme is validated using Case Western Reverse University (CWRU) dataset. Experimental results show that, the proposed scheme improves the average performance for various rotational speed fault identification by about 10.5% and 13.5% compared with the proportional multi integral with autoregressive external input modeling (APMI) observer and proportional-integral with autoregressive external input modeling (API) observer, respectively.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Selection-Scheduling of Accessing Node for High Efficiency Information Exchanging in Overloaded Wireless MIMO Switching","authors":"Arata Takahashi, O. Takyu, H. Fujiwara","doi":"10.1109/ICTC49870.2020.9289587","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289587","url":null,"abstract":"Communication using a repeater such as Wireless MIMO Switching is attracting attention because it enables efficient communication and the network can be easily deployed. In this paper, we propose the overloaded wireless mimo switching for adding one more node accessing to the relay. As a result, the high efficiency of information exchanging is achieved. When the number of accessing nodes is larger than the number of antennas of relay, the selection of nodes accessing to the node is required, where it is the selection-scheduling. In this paper, the selection-scheduling is constructed by linear programming. Some constraints of the overloaded mimo switching are given by mathematical models. From the computer simulation, the constructed selection-scheduling using a solver of linear programming is as good performance as the optimal one.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115048421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient User Clustering and Reinforcement Learning Based Power Allocation for NOMA Systems","authors":"Sifat Rezwan, Seokjoo Shin, Wooyeol Choi","doi":"10.1109/ICTC49870.2020.9289376","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289376","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is a popular multiplexing technique for the 5th generation (5G) network due to its spectral efficiency, high reliability, and massive connectivity support. However, some technical challenges in NOMA needs to be addressed properly. Usually, NOMA exploits the channel gains of multiple users to serve them from the same radio resource block at different power levels using a complex power allocation policy. In this paper, we propose a reinforcement learning-based power allocation algorithm with a simple and efficient user clustering technique. We use a Q-learning algorithm among all reinforcement learning techniques, which can easily obtain an optimal strategy to allocate power efficiently to maximize the sum data-rate of the NOMA system. In addition, we propose a channel gain-based user clustering technique that also contributes to the maximization of sum data-rate. To verify the performance of the proposed scheme, we conduct extensive simulations under various environments. We can confirm that the proposed Q-learning algorithm with user clustering achieves the maximum sum data-rate compared to other scenarios.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115348240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Namkyu Kim, Yunseong Lee, Chunghyun Lee, The-Vi Nguyen, Van Dat Tuong, Sungrae Cho
{"title":"GPU-specific Task Offloading in the Mobile Edge Computing Network","authors":"Namkyu Kim, Yunseong Lee, Chunghyun Lee, The-Vi Nguyen, Van Dat Tuong, Sungrae Cho","doi":"10.1109/ICTC49870.2020.9289354","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289354","url":null,"abstract":"Graphics processing unit (GPU)-specific tasks can be done by mobile edge computing in 5G networks because user equipments (UEs) offload the tasks near to Edge Server such as smart phones, access points, and so on. The data produced by Internet of Things devices can not be managed by traditional cloud computing system because of limited resource. Edge Computing is promising solution to this problem. The edge computing server is placed at the edge of network near the UEs. As a result, edge computing system guarantees low latency and energy-efficient task processing of the UEs. This paper introduces the system model for GPU-specific Task Offloading in the Mobile Edge Computing Networks and discusses the solutions for this problem.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mareska Pratiwi Maharani, P. T. Daely, Jae-Min Lee, Dong-Seong Kim
{"title":"Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach","authors":"Mareska Pratiwi Maharani, P. T. Daely, Jae-Min Lee, Dong-Seong Kim","doi":"10.1109/ICTC49870.2020.9289380","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289380","url":null,"abstract":"In Industrial internet of things(IIoT), the infrastructure and the technology has been improved a lot throughout times. With those improvements, the threats and attacks are also growing rapidly to become more various and advanced attacks. One of the weakest parts in IIoT infrastructure is in the cloud layer that can cause the system failure, but it can reduce the possibility by controlling and maximizing the ability in the fog layer as its near to the edge of devices. In this paper, attack detection in fog computing framework with several machine learning algorithms to efficiently detecting malicious activities is proposed. The evaluation performed by using KDD Cup’99 dataset and compared by using Decision Tree, K-Means, and Random Forest algorithms.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123008763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Distillation based Compact Model Learning Method for Object Detection","authors":"Jong-gook Ko, Wonyoung Yoo","doi":"10.1109/ICTC49870.2020.9289463","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289463","url":null,"abstract":"Recently, video analysis technology through deep learning has been developing at a very rapid pace, and most of the technology related to improving recognition performance in server environment is being developed. However, in addition to video analysis technology in the existing server environment, the demand of object detection in visual image analysis have been increasing recently in embedded boards of low specification and mobile environments such as smartphones, drones, and industrial boards. Despite the significant improvement in the accuracy of existing object detectors, image processing for real- time applications often requires a lot of runtime. Therefore, many studies are being conducted on lightweight object detection technology, and knowledge distillation is one of the solutions. Efforts such as model compression use fewer parameters, but there is a problem that accuracy is significantly reduced. In this paper, we propose method to improve the performance of lightweight mobilenet-SSD models in object detection by using knowledge transfer methods. We conduct evaluation with PASCAL VOC dataset. Our results show detection accuracy improvement in object detection.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Automatic Classification of Construction Workers by Degree of Risk","authors":"Youhee Choi, Do Hyun Kim","doi":"10.1109/ICTC49870.2020.9289519","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289519","url":null,"abstract":"Most of construction accidents are caused by the unsafe behavior of construction workers. To reduce the risk of accidents, safety manages should be assigned to manage safety. However, it is difficult for safety manages to manage risks of all worksites. To address this issue, it is necessary to continuously monitor worksites in a timely manner. However, since it is difficult that a safety manager identify hazard areas in many worksites where various tasks are carried out simultaneously, it is necessary to be able to monitor safety of high-risk worksites and identify worksites with high risk of accidents. Therefore, we propose a method to detect and classify workers by degree of risk for the worksites where hazard area has been identified.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}