Huy Nguyen, Van Linh Nguyen, Duc Hoang Tran, Y. Jang
{"title":"Deep Learning for 2D-MIMO scheme based on Optical Camera Communication","authors":"Huy Nguyen, Van Linh Nguyen, Duc Hoang Tran, Y. Jang","doi":"10.1109/ICOIN56518.2023.10049055","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049055","url":null,"abstract":"Radio frequency (RF) waveforms are widely used in wireless technologies, such as mobile system, smart factory, and smart home systems. Due to its simplicity of installation, wireless communication is better than wire communication. However, the use of high frequencies for data transmission can be harmful to human health. To replace RF waveform for communication system, Optical Wireless Communication (OWC), which deploys visible light waveform for communication, was researched widely by researchers around the world. Visible Light Communication (VLC), Light Fidelity (LiFi), and Optical Camera Communication (OCC) are the three candidates for replacing RF system. In this research, we present an multiple-input multiple-output (MIMO) modulation system based on on-off keying (OOK) modulation in the time domain and a light-emitting diode (LED) array. By adjusting the exposure time, focal length, forward error correction, and Deep learning for object detection, it is still possible to implement this technique with 10 links in various locations at a distance of 20 m with a velocity of 2 m/s.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"71 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic reduction for out-of-band network management over LPWA","authors":"Kodai Tanabe, G. Hasegawa, G. Kitagata","doi":"10.1109/ICOIN56518.2023.10048968","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048968","url":null,"abstract":"In the remote management of network equipment, network administrators use the command-line interactive interface to troubleshoot problems and modify configurations. A dedicated network for out-of-band network management is required to ensure remote control of network equipment even in the event of system failures, increasing the cost of network management. LPWA is a possible candidate for constructing a network for out-of-band management due to its low-cost and long-distance communication performance. However, its low bandwidth would degrade the performance of the interactive management. This paper solves this problem by reducing the size of interactive commands sent to network equipment. We employ Huffman coding-based compression by exploiting biases and operator characteristics of used commands for network management. Performance evaluation results show that the proposed method can reduce the size of operation commands to 3.6%, which is quite better than the traditional deflate algorithm.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Lim, Hansu Oh, Kichun Sim, Sunyoung Kim, Ki-Hyung Kim
{"title":"A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)","authors":"J. Lim, Hansu Oh, Kichun Sim, Sunyoung Kim, Ki-Hyung Kim","doi":"10.1109/ICOIN56518.2023.10048986","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048986","url":null,"abstract":"In this paper, we propose DID/VC-based V2X Access Authorization Mechanism that improves the CA-centered structure problem of the V2X security authentication system developed to ensure the anonymity of V2X users and create a safe operating basis for ITS. The CA-centered PKI structure represents a structure in which there is a CA that can lead or control the identity of the identity subject. In this structure, the identity subject’s personal information and certificate can be stolen by a Misbehavior CA, and there is a risk of external attack such as MITM attack. Building trust in V2X networks is a major problem because it is difficult to evaluate reliability between vehicles and infrastructure in an untrustworthy environment. In this paper, we propose a DID/VC-based V2X Access Authorization Mechanism that selects a trusted authority to improve reliability, guarantees data sovereignty and privacy protection of identity subjects, and generates safe digital credentials.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nway Nway Ei, P. Aung, Seong-Bae Park, E. Huh, C. Hong
{"title":"Joint Association and Power Allocation for Data Collection in HAP-LEO-Assisted IoT Networks","authors":"Nway Nway Ei, P. Aung, Seong-Bae Park, E. Huh, C. Hong","doi":"10.1109/ICOIN56518.2023.10049035","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049035","url":null,"abstract":"Low earth orbit (LEO) satellites and high altitude platforms (HAPs) have recently gained popularity due to its seamless connectivity and global coverage. The aerial network comprising high altitude platforms (HAPs) collects the generated data of the ground internet of things (IoT) devices and then transmits the aggregated data to the terrestrial data processing center via the LEO satellites. However, LEO satellites are generally orbiting with high speed and their visibility times are limited according to the elevation angle and orbital height. Moreover, it is challenging for the HAPs to determine the feasible LEO satellite to associate with and decide the optimal transmit power due to their power constraint. Therefore, in this paper, we formulate a joint association and power allocation problem to maximize the data transmitted by the HAPs and minimize the energy consumption by considering the HAP’s power budget and QoS requirements as well as the data storage and visibility time of the LEO satellites. To address the formulated mixed-integer non-convex problem, the two sub-problems are introduced, namely, HAP-LEO satellite association and power allocation problems, which are then alternately solved by using the GUROBI optimizer and whale optimization method, respectively. The evaluation results have demonstrated that the proposed approach achieves the superior performance when compared to the random scheme.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junhan Zang, S. M. Raza, Hyunseung Choo, Gyurin Byun, Moonseong Kim
{"title":"Deep Reinforcement Learning Driven Aggregate Flow Entries Eviction in Software Defined Networking","authors":"Junhan Zang, S. M. Raza, Hyunseung Choo, Gyurin Byun, Moonseong Kim","doi":"10.1109/ICOIN56518.2023.10049020","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049020","url":null,"abstract":"Software-Defined Networking (SDN) separates control from network elements and logically centralizes it in SDN controller to provide global view and control of the network. Network elements, such as switches, only forward data using entries in the flow tables that are installed by the controller. The capacity of flow tables is limited and requires continuous management. Several studies have proposed eviction strategies to make space for new entries in the flow tables, but they assume 1:1 mapping between entries and incoming flows. This assumption is a major limitation, as in real networks many incoming flows can be handled by a single Aggregate Flow Entry (AFE). This paper handles this limitation by proposing Deep Reinforcement Learning (DRL) framework for eviction of AFEs. The proposed framework calculates the degree of AFEs (i.e., how many flows it entertains) along with other parameters to select AFE for eviction, where main objective is to minimize flow table overflows. The experiment results show that the proposed framework reduces the number of overflows by 37%, flow reinstallation by 87%, and the control signaling overhead by 45 % compared to the Random and Least Recently Used Algorithm (LRU).","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apurba Adhikary, M. S. Munir, Avi Deb Raha, Yu Qiao, S. Hong, E. Huh, C. Hong
{"title":"An Artificial Intelligence Framework for Holographic Beamforming: Coexistence of Holographic MIMO and Intelligent Omni-Surface","authors":"Apurba Adhikary, M. S. Munir, Avi Deb Raha, Yu Qiao, S. Hong, E. Huh, C. Hong","doi":"10.1109/ICOIN56518.2023.10048994","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048994","url":null,"abstract":"The forth-coming 6G wireless communication systems are required to meet the increasing demand for network connectivity that requires power savings for generating effective beamforming. Therefore, joint sensing and communication framework is proposed with the coexistence between holographic MIMO (HMIMO) and Intelligent Omni-Surface (IOS) which ensures the extension of the coverage area resulting in lower power consumption for beamforming. An optimization problem is formulated maximizing the utility function considering the channel capacity, beampattern gains with zenith and azimuth angles, distances, and losses during the sensing-communication process. An artificial intelligence framework is designed for solving the formulated NP-hard problem. Firstly, long short-term memory (LSTM) based scheme is utilized to determine the zenith and azimuth angles with a view to obtaining the current location of all the users that are served directly by the HMIMO and users that are served with reflective channel and refractive channel from the IOS. Afterward, a reinforcement learning (RL) based method is developed for allocating the communication resources to the intended users for generating the required beamforming based on the results obtained from the LSTM-based scheme. Finally, simulation results illustrate that the proposed artificial intelligence framework achieves a power gain of 1.5% compare to the baseline method to perform holographic beamforming for serving the users.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"7 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing Networks","authors":"Surjeet Kumar, Shilpa Thakur, Ajay Singh","doi":"10.1109/ICOIN56518.2023.10048975","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048975","url":null,"abstract":"This work considers a secure cognitive device-to-device (D2D) communications network, where the D2D source (S) transmits the secret information to the D2D destination (D) through energy-constrained D2D relay (R) using the spectrum of the primary base station (BS) under the malicious attempt of D2D eavesdropper (E). We propose secure time switching-based relaying (TSR) in a D2D wireless-powered cognitive radio network. D2D relay adapts the amount of energy harvested from the S using TSR protocol while assuming some information leakage to E. The exact and asymptotic closed-from expressions of secrecy outage probability of the proposed system are derived when the channel state information from R to the cellular user link is outdated. Furthermore, we derive novel exact and asymptotic expressions for the power outage probability.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116386103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research on Low Latency Motion Control System using Real-time Scheduling in Edge Server","authors":"Dongbeom Ko, Jaeho Jeon, Sungjoo Kang","doi":"10.1109/ICOIN56518.2023.10048964","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048964","url":null,"abstract":"Reducing end-to-end delay in safety-critical systems, such as controlling remote robots with motion controllers in industrial sites, is a major challenge. 5G mobile communication has greatly contributed to reducing transmission delay, but realtimeness in an edge server system responsible for packet processing and delivery in the middle of an industrial site can contribute even more. Although the Linux community released a kernel patch to enhance the real-time tasks, it occasionally violates the demand of bounded (worst case) latency. In this paper, we propose a real-time scheduling approach in the edge computing server to handle a latency violation and applies it to the two-way motion control system. As a result, our proposed approach shows that data packet processing is more effective than other comparison groups.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123640263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Ho Teck Khieng, Yu-Zhe Xie, Jia-Cheng Zhang, N. Huang
{"title":"A Long Distance Low Bandwidth Firmware Update process for LPWAN - Taking LoRaP2P+ as example","authors":"Daniel Ho Teck Khieng, Yu-Zhe Xie, Jia-Cheng Zhang, N. Huang","doi":"10.1109/ICOIN56518.2023.10048943","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048943","url":null,"abstract":"The increment of IoT devices in the world due to the manpower shortage can be commonly seen around the world nowadays. In agriculture, revolutionary technologies which involve automation has been anticipated in order to face this serious issue. With LPWAN technologies, we can achieve automated mass irrigation almost without the need for manpower involvement. For most crops, production and yield are directly related to crop water use, hence resulting in the importance of precise watering. Device firmware updates for the endpoint devices play an important role to maintain the reliability and security of these system. For a system that is using LPWAN, which is commonly deployed in rural areas, the firmware update over the air(FUOTA) feature can provide the possibility of rolling out a system update without the need to have physical contact with the device while also ensuring all the devices are up-to-date.In this article, we designed a FUOTA process for LPWAN. Through FUOTA, the update patches can be deployed to the devices effortlessly and efficiently further reducing the manpower shortage problem while improving the feature and functionality of the system.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128565184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study on TAVR Medical Twin Method Based on Real World Data(RWD)","authors":"Seung-Min Hyun, Kangyoon Lee","doi":"10.1109/ICOIN56518.2023.10049049","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049049","url":null,"abstract":"TAVR is becoming a standard procedure that can treat aortic valve stenosis without surgery, and accordingly, simulations to predict complications before TAVR procedures and obtain specific information are important. In this paper, we design a medical twin virtual environment based on Real World Data obtained from clinical patients to simulate TAVR procedures in advance. We implement a real-time digital twin model through synchronization of RWD, and design and study a framework capable of analysis and simulation.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}