2018 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
Survival Analysis of Elderly while Escaping from a Simulated Building 老年人逃离模拟建筑时的生存分析
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530904
W. Velásquez, T. Chalen, J. Salvachúa
{"title":"Survival Analysis of Elderly while Escaping from a Simulated Building","authors":"W. Velásquez, T. Chalen, J. Salvachúa","doi":"10.1109/ISNCC.2018.8530904","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530904","url":null,"abstract":"This paper presents a simulation that models the satisfactory evacuation index of elderly people in case a building structure is affected by an earthquake. The simulation considers some parameters like earthquake magnitude, Body Mass Index (BMI), person location inside the building, and current evacuation routes. To determine if a person inside the building could or not go out of it, the simulation uses a dataset of people age, genre and location in the building, also, it defines two scenarios, the first where people are located only in the base floor infrastructure, and the second, where people are spread out through various floors of the building.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble-based Adaptive Single-shot Multi-box Detector 基于集成的自适应单发多盒探测器
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530893
V. Thakar, Walid Ahmed, M. M. Soltani, Jia Yuan Yu
{"title":"Ensemble-based Adaptive Single-shot Multi-box Detector","authors":"V. Thakar, Walid Ahmed, M. M. Soltani, Jia Yuan Yu","doi":"10.1109/ISNCC.2018.8530893","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530893","url":null,"abstract":"We propose two improvements to the SSD—single shot multibox detector. First, we propose an adaptive approach for default box selection in SSD. This uses data to reduce the uncertainty in the selection of best aspect ratios for the default boxes and improves performance of SSD for datasets containing small and complex objects (e.g., equipments at construction sites). We do so by finding the distribution of aspect ratios of the given training dataset, and then choosing representative values. Secondly, we propose an ensemble algorithm, using SSD as components, which improves the performance of SSD, especially for small amount of training datasets. Compared to the conventional SSD algorithm, adaptive box selection improves mean average precision by 3%, while ensemble-based SSD improves it by 8%.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Softwarization of Network Coding Functions and Logical Mapping to SDN 网络编码功能的软件化与SDN的逻辑映射
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530982
M. Vázquez-Castro, L. M. C. Murillo
{"title":"Softwarization of Network Coding Functions and Logical Mapping to SDN","authors":"M. Vázquez-Castro, L. M. C. Murillo","doi":"10.1109/ISNCC.2018.8530982","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530982","url":null,"abstract":"It is becoming clear that softwarization and virtualization of networking entail fundamental changes in how networking industry can control or troubleshoot traffic flows or enforce network-wide policies. Also application developers bystander major changes, with new opportunities for fast development of innovative applications and services. Network functions (NFs) are key building blocks to realise such potential. Indeed, NFs are currently subject of great development by diverse vendors for a large range of applications beyond traditional well known networking functionalities. Such new capabilities may benefit from flexible and scalable design as opposite to current blackbox view of NFs. In this paper we propose one such novel NF with flexible and scalable design. Our NF exploits the capabilities of the network coding (NC) concept to improve different metrics of service performance, hence resulting in a NC service that can be offered either to external customers or used as internal service by the network provider. Our main contribution is three-fold. First, we justify our approach of internal logical visibility of network coding functions (NCFs), which allows proprietary while interoperable NCFs. Second, we propose the modelling of NCFs internal logic in terms of their software functional architecture. Finally, we show that our functional logic naturally maps to softwarized network architectures, which in turn facilitates NCFs virtualization. We also discuss the applicability of our architectures to representative conceptual scenarios and identify next steps.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Data-aided Interference Cancellation GFDM Receiver for Hybrid Satellite-Terrestrial Communication Systems 一种用于卫星-地面混合通信系统的数据辅助干扰消除GFDM接收机
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530913
Yang Yang, Lidong Zhu
{"title":"A Data-aided Interference Cancellation GFDM Receiver for Hybrid Satellite-Terrestrial Communication Systems","authors":"Yang Yang, Lidong Zhu","doi":"10.1109/ISNCC.2018.8530913","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530913","url":null,"abstract":"In order to meet the critical 5G requirements both in terms of global connectivity and large throughput, satellite communications provide a valuable solution to complement and extend terrestrial mobile communications. Considering physical layer transmission waveform integration in hybrid Satellite-Terrestrial (S-T) communication systems, generalized frequency division multiplexing (GFDM) technology is introduced to apply in satellite communications. As potential candidate waveform of 5G, GFDM has many advantages which is appropriate for S-T communications but the traditional GFDM receivers have high complexity due to its intrinsic inter-carriers-interference (ICI). In this paper, a new data-aided interference cancellation (IC) GFDM receiver is proposed for satellite communications. Based on pilot subcarriers and new match filter, the proposed scheme can solve the receiving problem of raised cosine (RC) filtering GFDM. The simulation results and the complexity analysis prove that the proposed GFDM receiver performed significantly better than traditional GFDM receiver at reasonable computational cost, which can promote the application of GFDM in hybrid S-T communication systems.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Effective Algorithm for Finding Common Control Channel in Cognitive Radio Ad Hoc Networks Using a Single Transceiver and a Backup Channel 一种基于单收发器和备份信道的认知无线自组网公共控制信道的有效算法
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531064
Heydar Shariatzadeh, S. Ghazi-Maghrebi
{"title":"An Effective Algorithm for Finding Common Control Channel in Cognitive Radio Ad Hoc Networks Using a Single Transceiver and a Backup Channel","authors":"Heydar Shariatzadeh, S. Ghazi-Maghrebi","doi":"10.1109/ISNCC.2018.8531064","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531064","url":null,"abstract":"One of the fundamental challenges in distributed cognitive radio ad-hoc networks is to develop a common control channel (CCC) in which secondary users (SU)can meet and send control messages. This channel is exclusively used by cognitive radio users. In order to implement a CCC, a new method is presented in this paper. In this method, all SUs are equipped with a single radio card that has a cognitive capability. The proposed algorithm is very flexible which sustains the precise work of cognitive radio network as well as preparing a channel in which the users can visit each other. Our proposed method not only uses a backup channel, but also it uses a single transceiver.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Insights from Eye-movement Events in an Educational Computer-based-simulation Environment (ECE) for Endo-neurosurgery Training Considering Gender, Hand Condition and Scenario Effects 考虑性别、手部状况和场景影响的内神经外科教育计算机模拟环境(ECE)中眼动事件的见解
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530976
Gonca Gokce Menekse Dalveren, N. Cagiltay
{"title":"Insights from Eye-movement Events in an Educational Computer-based-simulation Environment (ECE) for Endo-neurosurgery Training Considering Gender, Hand Condition and Scenario Effects","authors":"Gonca Gokce Menekse Dalveren, N. Cagiltay","doi":"10.1109/ISNCC.2018.8530976","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530976","url":null,"abstract":"Surgical residents of endo-neurosurgery are required to develop several surgical skills such as eye-hand coordination, ability to use both hand coordination, and depth perception. During the process of gaining these skills, there are several effective factors on the individual performance such as gender, nature of the scenarios and hand condition that can be important to better organize appropriate training programs. Earlier studies show that, surgeons' mental workload show differences according to the difficulty levels of the tasks and hand conditions during the operations. Also there are some evidences showing that male surgeons performing the surgical tasks with a better performance compared to the females. However, in the literature there are not many studies conducted to better understand these effects by analyzing the eye-movements on simulation-based surgical training environments. This study aims to understand the mental workload and gender differences from fixation number and fixation duration eye-movement events. In this study four different computer-based-simulation scenarios which are developed for an Educational Computer-based-simulation Environment (ECE) for endo-neurosurgery training have been performed by 23 (3 female) surgical residents. Participants have performed each scenario in different hand conditions (dominant, non-dominant and both hand). While surgical residents were performing the scenarios their eye-movements were recorded by an eye-tracker. The Binocular Individual Threshold (BIT) classification algorithm was used for eye-movement event classification. According to the results of fixation number and fixation duration events in these four scenarios, hand conditions, scenario fidelity levels and gender are found to be important factors that make changes on mental workload of surgical residents. It can be concluded that, in non-dominant and both hand conditions mental workload increases according to the dominant hand condition. Additionally results show that scenario fidelity levels and gender have an effect on the eye-movements of surgical residents.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132382381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Earliest-Delivery Routing Algorithm in Double-layered Satellite Delay Tolerant Networks 一种改进的双层卫星容延迟网络中最早投递路由算法
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530902
G. Zhao, Mingchuan Yang, Qing Guo, G. Wang
{"title":"An Improved Earliest-Delivery Routing Algorithm in Double-layered Satellite Delay Tolerant Networks","authors":"G. Zhao, Mingchuan Yang, Qing Guo, G. Wang","doi":"10.1109/ISNCC.2018.8530902","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530902","url":null,"abstract":"Since presented by K. Fall, the new-type network Delay and Disruption Tolerant Network (DTN) came to become a hot area of research. In recent years, many kinds of DTN routing algorithms have been proposed. With the characteristics of long time delay, high packet loss rate and intermittent connectivity. Satellite networks also belong to a kind of DTN. But meanwhile, they have their unique characteristics of satellite nodes regular running in orbits and predictable inter-satellite links on and off, for which deterministic routing algorithm is more suited in Satellite DTN networks. This paper focuses on studying the theoretical knowledge of a kind of deterministic DTN routing algorithm, Earliest-Delivery(ED) algorithm. And combining with the characteristics of the satellite network above, we propose an improved ED algorithm from three aspects of distributed routing, routing update strategy and tag - based dynamic storage scheme. Ultimately, we simulate the LEO/MEO two-layer satellite delay tolerant network in OPNET, and analyze the performance of two algorithms upon packet delivery ratio, average end-to-end delay and the number of packets destroyed in the storage queue. The result shows the improved algorithm performs better in satellite DTN network.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Placement of Virtual Security Functions to Minimize Energy Consumption 虚拟安全功能的优化配置,最大限度地减少能耗
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530989
Sedef Demirci, Mehmet C. Demirci, Ş. Sağiroğlu
{"title":"Optimal Placement of Virtual Security Functions to Minimize Energy Consumption","authors":"Sedef Demirci, Mehmet C. Demirci, Ş. Sağiroğlu","doi":"10.1109/ISNCC.2018.8530989","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530989","url":null,"abstract":"NFV (Network Functions Virtualization) is one of the latest promising technologies making networks more flexible, controllable, cost-efficient and innovative. NFV is being utilized extensively for providing cutting edge networking solutions, including virtual cyber security functions. Functions virtualized with NFV such as firewall, deep packet inspection, intrusion detection systems etc. can reside as applications in the network architecture. Determining the deployment locations of these functions in the network is an important research challenge due to the necessity of achieving different operational objectives such as minimizing latency, network load, cost or energy consumption etc. while meeting cyber security requirements. Among these objectives, optimizing the energy consumption of a network is of vital importance to reduce operating expenses. In this study, we propose an ILP (Integer Linear Programming) model for placing virtualized cyber security functions in a network with the objective of minimizing server energy consumption. We implement and test our model on two different network topologies. Experimental results show that our model can reduce energy consumption significantly while providing cyber security at the desired level.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA implementation of Spectrum Sensing methods for Cognitive Radio 认知无线电频谱感知方法的FPGA实现
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530971
D. Teguig, M. S. Azzaz
{"title":"FPGA implementation of Spectrum Sensing methods for Cognitive Radio","authors":"D. Teguig, M. S. Azzaz","doi":"10.1109/ISNCC.2018.8530971","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530971","url":null,"abstract":"Spectrum sensing (SS) plays a significant role in cognitive radio network. In this paper, we present FPGA architecture implementation of Energy Detection (ED) based spectrum sensing and Goodness of Fit (GoF) based spectrum sensing methods. The aim of these methods is to detect the presence of signal in cognitive radio network (CRN) environment. These techniques have been described in VHDL and implemented on Xilinx FPGA technology, through an experimental demonstration via a bench composed of dongle (RTL2832U), a laptop and a XUP Virtex-II Pro FPGA platform. Implementation results and performance evaluation validate and demonstrate the feasibility of our hardware design. Therefore, this implementation confirms the efficiency (performance and complexity) of blind detection methods for cognitive radio. The results showed that the hardware performances matched well with theoretical analysis.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quasi-Orthogonal FHMA System under Large Access Delay: Code Design and Performance Analysis 大接入延迟下的准正交FHMA系统:编码设计与性能分析
2018 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531031
Qi Zeng, Xing Liu
{"title":"Quasi-Orthogonal FHMA System under Large Access Delay: Code Design and Performance Analysis","authors":"Qi Zeng, Xing Liu","doi":"10.1109/ISNCC.2018.8531031","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531031","url":null,"abstract":"The performance of frequency-hopping multiple-access (FHMA) systems is mainly determined by the FH sequence set (FHS). Constructing the FHS with optimal Hamming cross- and auto-correlations under the varying access-delay is a major challenge for FHMA systems to achieve the superior performance. In this paper, we propose a novel kind of no-hit zone FH sequence (NHZ-FHS), which has the orthogonality for small access-delay and the near-orthogonality for large access-delay. A design algorithm of the new NHZ-FHS is presented based on the traditional FH sequences. Then, as a case study of FHMA system with $M$-ary frequency-shift-keying (MFSK/FHMA), the multiple-access interference (MAI) rejection benefited from the proposed FHS are analyzed, and the decision variable is derived as a function of the Hamming correlation, which is utilized for Monte Carlo simulation. The simulation and numerical results show that the proposed NHZ-FHS can completely avoid MAI for quasi-synchronous FHMA system; meanwhile it can provide the lower MAI and better performance for synchronous system, compared with the exiting pseudo-random FHSs. The proposed NHZ-FHS relaxes the requirement of strict synchronization mechanism, which is more suitable for the FHMA network deploying under the poor communication conditions.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信