2023 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
AI BOX: Artificial intelligence-based autonomous abnormal network traffic response mechanism AI BOX:基于人工智能的自主异常网络流量响应机制
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048979
Jiann-Liang Chen, Zhengxu Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu
{"title":"AI BOX: Artificial intelligence-based autonomous abnormal network traffic response mechanism","authors":"Jiann-Liang Chen, Zhengxu Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu","doi":"10.1109/ICOIN56518.2023.10048979","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048979","url":null,"abstract":"This paper presents an artificial intelligence-based approach to detecting intrusions. The artificial intelligence analyses intercepted packets and detect the presence of network attacks or abnormal network traffic based on artificial intelligence algorithms. If the network traffic behavior is unnatural or disruptive, it decides whether to interrupt, modify or isolate it immediately. Artificial intelligence models are used to detect anomalies. It enables or restricts data transmission to secure information technology (IT) and operational (OT) devices against attacks from anomalous network traffic, system outages, betrayal, and other threats. It can also move freely between heterogeneous networks to support data processing and transformation. We have developed machine learning models, packet tracking capabilities, and AI BOX environment options. We trained the model using two public datasets and obtained a 99.9% prediction accuracy. The AI BOX device successfully tested the effect of artificial intelligence models.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM-based PdM Platform for Automobile SCU Inspection Equipment 基于lstm的汽车SCU检测设备PdM平台
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048924
S. Oh, J. Kim
{"title":"LSTM-based PdM Platform for Automobile SCU Inspection Equipment","authors":"S. Oh, J. Kim","doi":"10.1109/ICOIN56518.2023.10048924","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048924","url":null,"abstract":"With the recent rapid development of the Industrial Internet of Things(IIoT), factory automation has become an important issue. Accordingly, research on Predictive Maintenance(PdM) technology is being conducted to improve the Remaining Useful Lifetime(RUL) of equipment in factory automation. PdM technology predicts the condition of equipment based on Artificial Intelligence(AI) and based on this, repairs equipment before problems occur to improve the lifespan of the equipment. In this paper, we intend to apply PdM to inspection equipment that inspects Shift-by-wire Control Unit(SCU), a type of electric vehicle transmission. The proposed technology is to perform equipment condition prediction based on Long Short-Term Memory(LSTM) and visualize the prediction results through monitoring program development. As a result of the simulation, it was confirmed that the prediction results through the LSTM model follow the trend of the actual values.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129921385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCGit: Decentralized Internet Hosting for Software Development DCGit:用于软件开发的分散式互联网托管
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10049006
Pratham Gupta, Kunjan Shah, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari
{"title":"DCGit: Decentralized Internet Hosting for Software Development","authors":"Pratham Gupta, Kunjan Shah, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari","doi":"10.1109/ICOIN56518.2023.10049006","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049006","url":null,"abstract":"Git has been the de-facto version control system for the Software Development industry. Although Git is distributed, developers’ tools for collaboration, such as GitHub, are centralized entities owned by large corporations such as Microsoft. The centralization creates trust and privacy issues for software development companies (preserving their intellectual property), along with a significant\" single point of failure\" issue. In addition, such centralized systems are susceptible to Sybil and distributed denial of service (DDoS) attacks due to the presence of malicious individuals. Blockchain technology has many key characteristics (such as decentralization, transparency, immutability, and audibility), solving these centralization issues. However, the requirement of having a storage system to store the user’s repositories over the blockchain creates a scalability issue (in terms of storage). Most importantly, it makes data (code) privacy more severe due to its open nature. In this paper, we propose a privacy-preserving decentralized alternative solution and framework named \"DCGit\" powered by Web3 technologies such as the Ethereum Blockchain and InterPlanetary File System (IPFS) to provide security and scalability yet user-friendly collaboration for software development.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Collaborative UAV Routing Algorithm for Time Sensitive Surveillance Tasks 一种用于时间敏感监视任务的协同无人机路由算法
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048936
Yang Yu, Sanghwan Lee
{"title":"A Collaborative UAV Routing Algorithm for Time Sensitive Surveillance Tasks","authors":"Yang Yu, Sanghwan Lee","doi":"10.1109/ICOIN56518.2023.10048936","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048936","url":null,"abstract":"Surveillance and monitoring of an area are fundamental to a variety of missions, especially in the military field, where quadrotor UAV swarms can be used for area reconnaissance to build awareness of the environment and targets of interest. Aiming at the problem of surveillance and monitoring of a given area, this paper proposes a distributed cooperative vehicle routing algorithm for multi-quadrotor UAV swarms called MUCS-BS. In order to reduce the complexity of the algorithm, we use sweep search to search the area with a \"square wave signal\" path. In this algorithm, each UAV covers a segment of the \"square wave signal\" path in such a way that the surveillance time can be minimized.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of WLAN Topology Display System WLAN拓扑显示系统的开发
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048958
O. Wongwirat, Supannada Chotipant, Tadchapon Hongtong, Nattawat Suttijumnong
{"title":"Development of WLAN Topology Display System","authors":"O. Wongwirat, Supannada Chotipant, Tadchapon Hongtong, Nattawat Suttijumnong","doi":"10.1109/ICOIN56518.2023.10048958","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048958","url":null,"abstract":"Currently, packet sniffer tools can capture packets and provide information for monitoring, analyzing, and troubleshooting networks, e.g., traffic, bandwidth, protocol, etc. However, these tools lack the capability, or feature, to display a network topology diagram on the screen, particularly for a WLAN (Wireless Local Area Network), which is different from expensive network monitoring software sold commercially in the market. Therefore, it is difficult for a network administrator to visualize which client is connected to which AP (Access point) in the service areas of WLAN, or hotspots, for monitoring. This paper presents the development of the WLAN topology display system to support the network administrator in monitoring and enhancing the network services in the future. The system acquires the packet data captured by the packet sniffer tool, i.e., Wireshark. Then, the packet information is analyzed by using the data from the MAC (Medium Access Control) header following the IEEE802.11 standard to find the types, connection modes, and MAC addresses. Finally, the mapping table associated with the connected devices, i.e., client stations and APs, is constructed and used to create the WLAN topology diagram to display on the screen. The prototype system is implemented and tested in the laboratory environment, and the WLAN topology diagram showing the connections between the clients and the APs can be displayed on screen accurately as required.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128549335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offloading Visual SLAM Processing to the Edge: An Energy Perspective 卸载视觉SLAM处理到边缘:能量视角
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048921
Peter Sossalla, Johannes Hofer, Christian L. Vielhaus, Justus Rischke, F. Fitzek
{"title":"Offloading Visual SLAM Processing to the Edge: An Energy Perspective","authors":"Peter Sossalla, Johannes Hofer, Christian L. Vielhaus, Justus Rischke, F. Fitzek","doi":"10.1109/ICOIN56518.2023.10048921","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048921","url":null,"abstract":"Localization of mobile systems with visual Simultaneous Localization and Mapping (SLAM) is computationally expensive and therefore leads to high power consumption. The higher power consumption results in a shorter runtime for battery-powered mobile systems. A feasible solution to save energy for mobile systems is to offload SLAM to an external server. To achieve low latencies this server should be in close proximity to the mobile system at the edge. We evaluate the energy savings for three different offloading schemes for visual SLAM: (i) local computation on the mobile system, (ii) partially offloaded, and (iii) fully offloaded. We demonstrate that the power consumption can be reduced by up to 43 % by fully offloading the computation of visual SLAM. Furthermore, for the partially offloading scheme, the power consumption can be reduced by more than 20 % with the advantage of requiring a lower bit rate to transmit the sensor data compared to the fully offloaded scheme. Our paper shows the trade-off between power consumption and network utilization for offloading visual SLAM.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Streaming Scheme with Reinforcement Learning in Edge Computing Environments 边缘计算环境下具有强化学习的自适应流方案
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048966
Jeong-Gu Kang, K. Chung
{"title":"Adaptive Streaming Scheme with Reinforcement Learning in Edge Computing Environments","authors":"Jeong-Gu Kang, K. Chung","doi":"10.1109/ICOIN56518.2023.10048966","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048966","url":null,"abstract":"DASH is an effective way to improve the Quality of Experience (QoE) of video streaming. However, existing schemes lack consideration for a multi-client environment, so QoE fairness deteriorates when multiple clients stream video through the same network. In this paper, we propose an adaptive streaming scheme with reinforcement learning in edge computing environments. The proposed scheme learns policy based on reinforcement learning to improve QoE and uses edge computing to improve QoE fairness. We evaluated the performance of the proposed scheme through simulation-based experiments under various network conditions. Through the experimental results, we confirmed that the proposed scheme achieves better performance than the existing schemes in a multi-client environment.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heimdall: Blockchain-Based Consent Management Framework Heimdall:基于区块链的同意管理框架
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048920
F. M. V. Filho, B. Batista, J. Celestino, J. Souza
{"title":"Heimdall: Blockchain-Based Consent Management Framework","authors":"F. M. V. Filho, B. Batista, J. Celestino, J. Souza","doi":"10.1109/ICOIN56518.2023.10048920","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048920","url":null,"abstract":"The healthcare sector has undergone drastic changes with the adoption of information technology. One of the main changes in healthcare is the creation of the Electronic Health Record (EHR), which records all the patient’s medical data in a digital medium. However, with creating the General Data Protection Regulation (GDPR), the data owner must grant consent for third parties to collect, process, and store user data. In this context, the present work proposes Heimdall, a blockchain-based consent management framework that meets the requirements set by GDPR. We used a queuing system to assist in receiving requests, an object storage system to store patient data, and a memory database to record the transaction status. In our tests, Heimdall managed consents satisfactorily, where we were able to achieve a consistent amount of reading and writing transactions before saturating our test environment.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Application of Distributed Ledger Technology in Agribusiness 分布式账本技术在农业综合企业中的应用
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048992
Zheyu Chen
{"title":"The Application of Distributed Ledger Technology in Agribusiness","authors":"Zheyu Chen","doi":"10.1109/ICOIN56518.2023.10048992","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048992","url":null,"abstract":"This paper is about the simulation analysis of the dynamics of an agribusiness enterprise under the assessment and improvement of Distributed Ledger Technology (DLT). In recent years, the company has been under pressure from the industry to provide more data on the traceability of its entire supply chain system and raw materials. However, the existing food traceability system is often faced with many challenging problems and difficulties under technical limitations, such as different regulations and restrictive policies, lack of standardized data management system; and complicated product tracing is often accompanied by human error, classification difficulty, tracing speed, and low efficiency. By analyzing the successful application paths of DLT in two well-known agricultural enterprises, this paper qualitatively and quantitatively evaluates the utilization of DLT. Using the logistic regression equation, it is proposed that the company check the factor variables in the real environment through the hypothetical pilot project to popularize DLT application. The study verifies that DLT can help agribusiness improve the traceability performance of raw materials and the entire supply chain and provides empirical evidence for the transparency and traceability of supply chain information in the industry. At the end of the paper, to further explore the reverso context of cases on DLT.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE 802.11ac WLAN Analysis in 160Mhz Channel IEEE 802.11ac 160Mhz信道无线局域网分析
2023 International Conference on Information Networking (ICOIN) Pub Date : 2023-01-11 DOI: 10.1109/ICOIN56518.2023.10048903
S. S. Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique
{"title":"IEEE 802.11ac WLAN Analysis in 160Mhz Channel","authors":"S. S. Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique","doi":"10.1109/ICOIN56518.2023.10048903","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048903","url":null,"abstract":"In this paper, we measure WLAN 802.11ac performance using the 160MHz Channel size; for IPv4, IPv6, UDP, and TCP protocols. Tests are done for both client-server and peer-peer LANs. We measure Throughput, Round Trip Time (RTT), and CPU utilization. Results show that the client-server using UDP and IPv4 gave us the highest throughput results at 1124 Mb/s which was over 100 Mb/s higher than the result for IPv6. This is less than the theoretical value of 1700 Mbps which cannot be achieved. Results also show how much the client-server throughput is higher than peer-to-peer, IPv4 higher than IPv6, and UDP higher than TCP.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131129984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信