Hyung-Do Yoon, SoYoung Kim, Yea Sol Jang, M. Ghil, W. Rha, Y. Seok
{"title":"A study on the modeling of the IoT-based motion pattern analysis system to exterminating harmful wild animals","authors":"Hyung-Do Yoon, SoYoung Kim, Yea Sol Jang, M. Ghil, W. Rha, Y. Seok","doi":"10.1109/ICTC49870.2020.9289298","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289298","url":null,"abstract":"The damage of crops caused by harmful wild animals is not limited to individual farmland, but has been expanded to villages, regions, and even countries of interest. In other words, it goes beyond the damage of farmland and leads to social problems such as village appearance and road kill. Therefore, it is urgent to prepare a solution for controlling the population of harmful wild animals and managing an appropriate level of population. An IoT and AI-based intelligent harmful wild animal extermination system is needed that can be applied to farmhouses, orchards, airports and military boundaries through big data analysis algorithms of harmful wild animals (boar, elk, bird, mole), real-time wired/wireless data processing and performance monitoring research. Research was conducted on the construction of a system for extermination harmful wild animals and upgrading the real-time response system as an operating system. The core technology consists of multi IoT sensing technology, big data and AI analysis technology. In addition, the system consists of a main control device, a node device (long range), a control server, AI analysis SW, and a smartphone app.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Empirical Evaluation of Models Predicting Bike Sharing Demand","authors":"Seung Han Choi, Mijin Han","doi":"10.1109/ICTC49870.2020.9289176","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289176","url":null,"abstract":"Most bike sharing system has an imbalance problem in certain time zones and certain rental stations where bicycles are insufficient or overloaded. So, a demand forecasting model is required to solve this problem. In this paper, we evaluate the performance applying the machine learning, neural network model with the bicycle demand dataset collected from the bicycle sharing system in actual operation in order to develop a model that predicts bicycle demand information for choosing a proper demand forecasting model. From the results, the neural network models outperform the machine learning models.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 Suppl F 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125782874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Ullah, Asif Iqbal, Ajmal Khan, Rida Gul Khan, Laraib Malik, K. Kwak
{"title":"An Image-based Human Physical Activities Recognition in an Indoor Environment","authors":"F. Ullah, Asif Iqbal, Ajmal Khan, Rida Gul Khan, Laraib Malik, K. Kwak","doi":"10.1109/ICTC49870.2020.9289314","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289314","url":null,"abstract":"In this paper, we propose real-time image-based recognition of human activities from series of images considering different human actions performed in an indoor environment.The proposed image-based human activity recognition(IHAR)system can be utilized for assisting the life of disabled persons, surveillance and human tracking, human computer interaction,and efficient resource utilization. The proposed IHAR system consists of closed-circuit television (CCTV) camera based image acquisitioning, various filtering based image enhancement, principle component analysis(PCA) based features extraction, and various machine learning algorithms for recognition accuracy performance comparison. We collected dataset of 10 different activities such as walking, sitting down and standing up consists of 35,530 images. The dataset is divided into(90%,10%),(80%,20%), and(70%,30%)training and testing respectively and evaluated three classifier K-nearest neighbors (KNN), Random Forest (RF), and Decision Tree(DT). The experimental results show the accuracy of 95%, 97%, and 90% by KNN, RF, and DT respectively.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115818617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement of Video Classification using Generated Labeled Data","authors":"Alex Lee, Jeong-Woo Son, Sun-Joong Kim","doi":"10.1109/ICTC49870.2020.9289479","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289479","url":null,"abstract":"As the development of deep learning techniques is growing, applications using deep learning have been spreading. Among various applications, images and videos related applications are the most common example of the practical deep learning application. The performances in those applications have been boosted by adopting deep learning techniques. To achieve performance, securing a large amount of data-oriented to target tasks is crucial. In this paper, we have designed the experiments to examine the effect of generated data on both where the dataset can be easily collected and hard to secure. We use state-of-the-art generative model, MCnet, to enlarge the Sexually Harmful Contents dataset and UCF-101. By training C3D with augmented data, we measure the classification performance. The generated labeled data have increased the performance by 7% on harmful content detection.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115908932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Data Center Cooling Technology to Effectiveness of Turbo-Mode","authors":"Jaehyong Shin, Euiseong Seo","doi":"10.1109/ICTC49870.2020.9289200","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289200","url":null,"abstract":"The importance of cooling and energy efficiency is getting more and more important in data centers. The liquid cooling technology for CPUs is well known for its energy efficiency. In addition, it provides performance improvement by enriching the opportunity for turbo mode, which temporarily boost the clock frequency when the temperature and power consumption conditions stay below predefined thresholds. However, not all CPUs show improved performance when liquid cooling is applied. In this paper, we experimentally reveal that liquid cooling has different effects on performance improvement depending on the design of the cooling device and the thermal and power consumption characteristics of the processor. Through a series of experiments, we reveal that, in this paper, the higher the TDP, the greater the performance improvement obtainable through liquid cooling. We also identify that distributed temperature sensing (DTS) margin is the main cause of performance improvement of turbo mode. Intel's 200Watt CPU, in particular, has improved performance by 4.7% due to liquid cooling.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limit Action Space to Enhance Drone Control with Deep Reinforcement Learning","authors":"Sooyoung Jang, Noh-Sam Park","doi":"10.1109/ICTC49870.2020.9289571","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289571","url":null,"abstract":"Although many research progresses on deep reinforcement learning, it is not yet perfect. It may take too much time or even fail to solve the problem. Therefore, simplifying the problem by intentionally limiting the agent’s action space should help train the agent efficiently and effectively. To verify that, in this paper, we analyze the performances of various action space designs for controlling a drone with deep reinforcement learning. We have designed six different action spaces according to the degree of freedom to analyze the effect of limiting the agent’s action space on performance metrics such as travel distance and time, goal rate, and total reward. We show that by limiting the degree of freedom, the agent learns to reach the goal faster with less travel distance and achieve a higher goal rate and reward.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu-Lim Min, Seung-Jin Hong, Hye-jin Kim, Seung-Ik Lee
{"title":"Generative Adversarial Network for Robust Regression using Continuous Dataset","authors":"Yu-Lim Min, Seung-Jin Hong, Hye-jin Kim, Seung-Ik Lee","doi":"10.1109/ICTC49870.2020.9289188","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289188","url":null,"abstract":"Recently, advanced neural network, which is implementing technical method, has focus on dealing with image classification problems. Unlike classification problems, regression provides a value of output in complex and sophisticated continuous datasets. Though nonlinear models can perform regression better than linear model as Linear Regression(LR), the difficulty to make robust model still remain. In this paper, our purpose is to design training architecture for robust regression. We approach Neural Network known as nonlinear regression to solve limitation of Linear Regression. Additionally, Our architecture uses a new artificial Neural Network(NN) based on adversarial architecture by using the Generator(G) and Discriminator(D). The Discriminator shows the better performance while competing with the Generator and learning regression problem as same time. In evaluation experiments, we compare our proposed model with baseline models including Linear Regression and Neural Network using continuous real world data. We split four datasets into train and test sets as 90:10 and evaluate them by using Mean Squared Error(MSE) function. In summary, our model trained with Generative Adversarial Network(GAN) shows better performance than the baseline models.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Blockchain-based Music Distribution Framework: Focusing on Copyright Protection","authors":"Ahyoung Kim, Mucheol Kim","doi":"10.1109/ICTC49870.2020.9289184","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289184","url":null,"abstract":"Blockchain, which started as a cryptocurrency bitcoin, has recently been applied to various fields such as finance, distribution, and public services beyond the category of cryptocurrency. In this paper, we propose a music distribution model to protect music copyrights and rights holders' rights based on blockchain and smart contract technology. By designing and implementing a blockchain-based music distribution model, it organizes music assets into blocks and distributes them among blockchain participating nodes, providing integrity, confidentiality and non-repudiation of assets, and a single point of blockchain advantage. Single Point of Failure (SPOF) problem can be minimized. Blockchain allows musicians to easily approve and manage their music copyright with distributed ledger technology. Rights holders can automatically and immediately receive royalties from the music industry, even if no broker is involved in the distribution process. By distributing and managing music using the proposed model, we can provide all transaction information and related tasks in the music market safely and transparently.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130120251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Frequency Domain Preamble Detection for OFDM based WLAN Systems","authors":"E. Jin, Hyuncheol Park","doi":"10.1109/ICTC49870.2020.9289165","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289165","url":null,"abstract":"In this paper, we propose a preamble detection scheme in the frequency domain that has not been attempted until now for OFDM based WLAN systems. We explain the reason for trying the preamble detection method in the frequency domain and analyze the reason why the preamble detection method has never been tried in the frequency domain. By introducing the concept of sample-based FFT, we propose a solution to enable sample-based operation even in the frequency domain. The proposed algorithm shows improved performance in terms of SNR than the existing algorithm.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134035088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yeong-Jun Song, Won-Ju Eom, Jeong-Keun Kim, Chang-hoon Park, Geon-Hwan Kim, You-Ze Cho
{"title":"Intra-protocol Convergence Problem in BBRv2’s Bandwidth Probing","authors":"Yeong-Jun Song, Won-Ju Eom, Jeong-Keun Kim, Chang-hoon Park, Geon-Hwan Kim, You-Ze Cho","doi":"10.1109/ICTC49870.2020.9289384","DOIUrl":"https://doi.org/10.1109/ICTC49870.2020.9289384","url":null,"abstract":"Google introduced Bottleneck Bandwidth Round-trip propagation time (BBR), which is a new concept of congestion control algorithm. BBR measures the available bottleneck bandwidth and minimum round-trip time. It then creates network path models to maximize the delivery rate and minimize latency. However, BBR creates unfairness problem with other TCP flows and excessive packet loss in a small buffer. Google, therefore, updated BBR, creating a new version, called BBRv2, to improve coexistence with other flows and reduce aggressiveness. BBRv2 significantly improved the fairness with loss-based congestion control algorithms and reduced the number of packet retransmissions in a small buffer compared to the existing BBR. However, in this study, we confirmed that multiple BBRv2 flows that enter the same link at different times do not take up bandwidth fairly. Therefore, we evaluate the fairness between identical BBRv2 flows through the Mininet emulation and analyze the reason for this problem. The test results show that when the bottleneck buffer size is smaller than 0.2 BDP, two BBRv2 flows have similar throughput and the number of packet retransmissions greatly reduces compared to BBRv1. However, with a large buffer, the flow starting first occupies more bandwidth.","PeriodicalId":282243,"journal":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}