{"title":"ICOIN 2023 Cover Page","authors":"","doi":"10.1109/icoin56518.2023.10049021","DOIUrl":"https://doi.org/10.1109/icoin56518.2023.10049021","url":null,"abstract":"","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127267652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ETANet: An Efficient Triple-Attention Network for Salient Object Detection","authors":"Ngo Thien Thu, E. Huh, C. Hong","doi":"10.1109/ICOIN56518.2023.10048982","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048982","url":null,"abstract":"Salient object detection (SOD) is a critical vision task in ubiquitous applications. Most existing methods have complicated structure and large number of parameters, which prevents these methods to deploy on practical applications. In order to solve this problem, we propose an efficient triple attention network (ETANet), which consists of multiple attention mechanisms. In detail, we design a crossed spatial-channel attention mechanism to extract useful low-level features, an efficient branch to perceive high-level features based on self-attention through multi-scale receptive field. In addition, we propose a dilated criss-cross fusion mechanism to fuse low-level and high-level features in an efficient way. The experiment results show that our architecture achieved competitive performance and can trade off between the accuracy and efficiency compared to other heavy-weight methods.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower Bound for the Number of Accommodable End-devices in LPWAN with Multiple Interferences","authors":"Daisuke Kumamoto, S. Narieda, T. Fujii, H. Naruse","doi":"10.1109/ICOIN56518.2023.10049040","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049040","url":null,"abstract":"Coverage evaluation is necessary to derive the number of end devices that can be accommodated to wireless networks, and it is an evaluation metric for wireless network, such as low power wide area networks (LPWANs). In traditional analysis, conditional coverage probabilities are derived when the desired LoRa signal does not conflict with an interference signal and when the desired LoRa signal conflicts with a single interference signal. However, in the case that network load is 0.45, a probability of interference occurrence from two EDs is approximately 14.7%, whereas the probability from one EDs is approximately 36.1%. The difference between probabilities is approximately 20%, and we believe that it cannot be ignored on derivation of the number of accommodable end devices. In this study, we derive and evaluate the theoretical values of the conditional coverage probability when two interference signals arrive. Based on the probability, we derive a lower bound on the number of end devices that can be accommodated. Numerical examples are shown to validate the effectiveness of the derived lower bound on the number of accommodable end devices.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of Energy Harvesting Based D2D Communications in Cognitive Cellular Network","authors":"Koduru Sree Venkateswara Rao, Ashutosh Kumar Singh","doi":"10.1109/ICOIN56518.2023.10048923","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048923","url":null,"abstract":"This paper underpins the secrecy performance analysis of an energy harvesting-based device-to-device (D2D) communication in a cognitive cellular network. The energy constrained D2D transmitter (Alice) harvests energy from multi-antenna-based power beacons (PBs). The D2D communication system employs underlay scheme of dynamic spectrum access while Alice communicates with the D2D receiver (Bob) in the presence of Eavesdropper (Eve). In this network, we assume that the communication happens in a time frame that is compartmentalized into two-time slots. The energy harvesting is carried out in the first time slot, and the information signal is processed in the later time slot. An analytical expression for the secrecy outage probability is derived, and some useful insights are obtained from it.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129275265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongwook Kim, Hyunju Lee, Jung-Hyok Kwon, Jaehoon Park, Bokyoung Kim, Eui-Jik Kim
{"title":"Advanced Signal Processing of Photo-Excited Current Spectroscopy Based on Trap State Distribution for Photo-Sensor Applications","authors":"Dongwook Kim, Hyunju Lee, Jung-Hyok Kwon, Jaehoon Park, Bokyoung Kim, Eui-Jik Kim","doi":"10.1109/ICOIN56518.2023.10048911","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048911","url":null,"abstract":"An improved measurement method using photocurrent spectroscopy of an amorphous indium-zinc-oxide (a-IZO) optical sensor is proposed to analytically calculate the density of state (DOS) distributions. In the signal conversion method for DOS calculation, the photocurrent spectrum was measured in the on-state and off-state regions and the current signal was converted. In addition, the trap state distribution in the band gap of a-IZO semiconductor was modeled by calculating the photo-current signal of the photo-sensor. The validity of the proposed photo-carrier spectroscopy was verified through comparison with photo-excited charge collection spectroscopy analysis. This photo-current spectroscopy-based measurement method greatly improved measurement duration and accuracy compared to threshold voltage-based analysis.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a 3D Scene Reconstruction Network Robust to High-Frequency Areas Based on 2.5D Sketches and Encoders","authors":"Chan-Ho Lee, Jaeseok Yoo, K. Park","doi":"10.1109/ICOIN56518.2023.10048963","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048963","url":null,"abstract":"In this paper, we propose a new 3D scene reconstruction network that is robust to high-frequency areas by extracting multiple 3D feature volumes with accurate and various 3D information. Previous voxel representation-based methods did not perform well in high-frequency areas such as angled drawer parts and desk corners. In addition, the performance is poor even in the low-frequency areas with few feature points such as walls and floors. To solve this problem, we propose various backbone networks by extracting edge surface normal images from RGB images and constructing new branches. Edge images can provide information in the high-frequency areas, and surface normal images can compensate for the lack of information in edge images. As a result, not only 3D information but also the values of the high-frequency areas may be added. Using this as input for a new branch, various backbone networks such as ConvNeXt and Swin Transformer extract 2D image features that retain accurate 3D information. We designed a network that can represent detailed scenes from the entire scene using the hierarchical structure and unprojection of the backbone network to achieve robust performance in the high-frequency areas. We show that the proposed method outperforms the previous methods in quantitative and stereotyped 3D reconstruction results on the ScanNet dataset.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Histopathological Classification of Colorectal Polyps using Deep Learning","authors":"M. P. Paing, One-Sun Cho, Jae-Wan Cho","doi":"10.1109/ICOIN56518.2023.10048925","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048925","url":null,"abstract":"Early diagnosis and classification of colorectal polyps are critical in reducing the morbidity and mortality rate of colorectal cancer (CRC). This paper proposes an automated method for histopathologically classifying colorectal polyps from 7000 µm H&E-stained images. First, a number of state-of-the-art deep learning models are developed and fine-tuned using transfer learning and ImageNet pre-trained weights. Subsequently, a baseline architecture is selected by comparing the trained models, and its performance is then optimized using data augmentation methods such as rotation, rescaling, mixup and cutout. Moreover, an extended variant of the adaptive moment estimation (Adam) optimizer called rectified Adam (Radam) and label smoothing are also used to boost the model performance. Based on the experimentation results using an open dataset, the proposed method achieved an accuracy of 90%, a precision of 90%, a recall of 89% and an F1-score of 0.91%.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121664052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal human behavior detection based on VAE-LSTM hybrid model in WiFi CSI with PCA","authors":"Yonghwan Kim, Sang-Chul Kim","doi":"10.1109/ICOIN56518.2023.10048984","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048984","url":null,"abstract":"Recently, It is easy to find network access points(APs), which can be used for more than simply connecting devices to the Internet. For example, the waveform of a WiFi signal changes when a human action is performed between the two APs. In previous research, we demonstrated how changes in an electric wave affect the channel state information of a signal and how deep learning can utilize this information to detect and predict human behavior. In this paper, we proposed a method to detect human behavior. The proposed method improves the performance of detection of human behavior and effective in a changing environment. We found that using a VAE-LSTM hybrid model with PCA is useful in terms of detecting abnormal human behavior Experimental results demonstrate that the proposed method can detect general abnormal behavior with >-79% overall precision in a changing environment.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-armed Bandit Learning for TDMA Transmission Slot Scheduling and Defragmentation for Improved Bandwidth Usage","authors":"H. Dutta, Amit Kumar Bhuyan, S. Biswas","doi":"10.1109/ICOIN56518.2023.10048935","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048935","url":null,"abstract":"This paper proposes a Time Division Multiple Access (TDMA) MAC slot allocation protocol with efficient bandwidth usage in wireless sensor networks and Internet of Things (IoTs). The developed protocol has two primary components: a Multi-Armed Bandits (MAB)-based slot allocation mechanism for collision free transmission, and a Decentralized Defragmented Slot Backshift (DDSB) operation for improving bandwidth usage efficiency. The proposed framework is decentralized in that each node finds its transmission schedule independently without the control of any centralized arbitrator. The developed mechanism is suitable for networks with or without time synchronization, thus, making it suitable for low-complexity wireless transceivers for wireless sensor and IoT nodes. This framework is able to manage the trade-off between learning convergence time and bandwidth. In addition, it allows the nodes to adapt to topological changes while maintaining efficient bandwidth usage. The developed logic is tested for both fully-connected and arbitrary mesh networks with extensive simulation experiments. It is shown how the nodes can learn to select collision-free transmission slots using MAB. Moreover, the nodes learn to self-adjust their transmission schedules using a novel DDSB framework in order to reduce bandwidth usage.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shougo Matsuo, Sunao Miyamoto, Hirofumi Nakajo, T. Fujii
{"title":"Beam Pattern Estimation of 5G Millimeter-Wave Base Station Based on Radio Map and Multi-Beam Antenna Model at 28GHz","authors":"Shougo Matsuo, Sunao Miyamoto, Hirofumi Nakajo, T. Fujii","doi":"10.1109/ICOIN56518.2023.10048917","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048917","url":null,"abstract":"Nowadays, radio maps attract attention for estimating tools of accurate radio propagation. Radio maps require interpolation and extrapolation of the average received power because the data can be obtained, based on measurements. When beam patterns with complex geometry are used, it is important to recognize the exact beam patterns for interpolation and extrapolation. In particular, the antenna patterns of 5G millimeter-wave (mmWave) base stations are formed by multiple beams and are complex. The miss estimation of the complex beam patterns has a significant impact on the accuracy of radio maps. Therefore, this paper focuses on the estimation of beam patterns by radio maps and the definition of the radio maps which are suitable for 5G mmWave base stations. The proposed method estimates the beam patterns based on the line-of-sight measured data of the radio map and the multi-beam antenna model. The emulation results show that it is possible to quantify the beam patterns based on actual measurements and estimate the angle of the base station with an accuracy of about 10 degrees.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}