2022 13th International Conference on Information and Communication Technology Convergence (ICTC)最新文献

筛选
英文 中文
Design of Neural Network Model Converting Framework based on NNEF 基于NNEF的神经网络模型转换框架设计
Kyung-Hee Lee, Jaebok Park, Seon-Tae Kim, J. Kwak, Chang-Sik Cho
{"title":"Design of Neural Network Model Converting Framework based on NNEF","authors":"Kyung-Hee Lee, Jaebok Park, Seon-Tae Kim, J. Kwak, Chang-Sik Cho","doi":"10.1109/ICTC55196.2022.9952413","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952413","url":null,"abstract":"There are various engines that process artificial neural networks, such as Caffe, PyTorch, and Darknet. These engines can be operated on PCs, servers, as well as on-board devices. To cope with this kind of the diversity in these computing environments and neural network engines, compatibility among these engines is emerging as an important issue. This paper describes a neural network model converting framework to provide compatibility among these neural network engines. In this paper, we adopted a pivot model that can be used as common format among the engines. This pivot model is NNEF that was proposed by Khronos Group. With NNEF, we designed Neural Network Model Converting Framework. This framework provides user interface that configures the conversion modules between NNEF format and neural network engine's model saving formats. The framework has Manager that enables conversion and optimization of the neural network models. We also made a prototype for this framework to verify its functionalities. The prototype was tested with a neural network that recognizes hand-written numbers on Darknet and PyTorch engines.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beam Size Design for LEO Satellite Networks with Doppler Shift Characteristics 具有多普勒频移特性的LEO卫星网络波束尺寸设计
S. Han, W. Shin, Jae-Hyun Kim
{"title":"Beam Size Design for LEO Satellite Networks with Doppler Shift Characteristics","authors":"S. Han, W. Shin, Jae-Hyun Kim","doi":"10.1109/ICTC55196.2022.9952738","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952738","url":null,"abstract":"Low Earth Orbit (LEO) satellite networks need to consider the high mobility of LEO satellites. The high Doppler shift due to the mobility of LEO satellites occurs essentially and its scale is not considered in the terrestrial network. Therefore, it is difficult to overcome the Doppler shift in LEO satellite networks with the existing terrestrial network design. In this paper, we propose a LEO sate0llite beam design considering Doppler shift. After calculating Doppler shift and compensation, we analyze the characteristics of Doppler shift in LEO satellite networks. Given OFDM numerology technology of 5G NR (New Radio) and carrier frequency, the LEO satellite beam size is determined differently.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D occluded object visualization by using integral imaging and semantic segmentation 基于积分成像和语义分割的三维遮挡物可视化
Kazuaki Honda, Jaehoon Lee, Hyun-Woo Kim, Hideaki Uchino, M. Cho, Min-Chul Lee
{"title":"3D occluded object visualization by using integral imaging and semantic segmentation","authors":"Kazuaki Honda, Jaehoon Lee, Hyun-Woo Kim, Hideaki Uchino, M. Cho, Min-Chul Lee","doi":"10.1109/ICTC55196.2022.9952712","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952712","url":null,"abstract":"In this paper, we propose the improved occluded object visualization method by using integral imaging and semantic segmentation. Integral imaging is the passive 3D visualization technique that can generate 3D information through elemental images that have different perspectives of information on 3D objects. Moreover, it can be used to remove the occlusion in the 3D scene. The elemental image's various perspective information can be utilized to remove the occlusion in the 3D scene via the 3D image reconstruction process. However, the occlusion object pixels in the elemental image can degrade the image quality of the 3D image. Therefore, it is difficult to visualize the object without occlusion, clearly. To solve this problem, we propose the occluded object visualization method that can remove the occlusion and can visualize the target 3D object by using semantic segmentation. Semantic segmentation is the machine learning technique that can recognize the labeled object in the scene. Therefore, it can generate the specific labeled object mask image. Then, our proposed method can generate accurate 3D target object information. To prove our method, we carry out the simulation experiment and evaluate image quality with a correlation metric.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FedDDoS: An Efficient Federated Learning-based DDoS Attacks Classification in SDN-Enabled IIoT Networks FedDDoS:基于sdn的工业物联网网络中基于联邦学习的高效DDoS攻击分类
Ahmad Zainudin, Rubina Akter, Dong‐Seong Kim, Jae-Min Lee
{"title":"FedDDoS: An Efficient Federated Learning-based DDoS Attacks Classification in SDN-Enabled IIoT Networks","authors":"Ahmad Zainudin, Rubina Akter, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9952610","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952610","url":null,"abstract":"Independent distribution systems are made possible by Industry 4.0, and these systems produce heterogeneous data that is vulnerable to cyberattacks. The Distributed Denial of Service (DDoS) attack is a typical contemporary cyber threat that disables a target server by flooding it with malicious traffic. In this research, a deep-federated learning-based decentralized DDoS classification method enables independent clients to train local data while maintaining each industrial agent's data privacy. This framework applies a filter-based Pearson correlation coefficient (PCC) feature selection technique for selecting potential features to reduce complexity and improve the model performance. The proposed model has been evaluated with the recent DDoS attacks dataset, CICDDoS2019, and achieves great accuracy of 98.37% with a computational time of 3.917 ms.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Machine Learning based Scalable Blockchain architecture for a secure Healthcare system 用于安全医疗保健系统的基于机器学习的可扩展区块链架构
Mikail Mohammed Salim, Laihyuk Park, Jong Hyuk Park
{"title":"A Machine Learning based Scalable Blockchain architecture for a secure Healthcare system","authors":"Mikail Mohammed Salim, Laihyuk Park, Jong Hyuk Park","doi":"10.1109/ICTC55196.2022.9952962","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952962","url":null,"abstract":"The evolution of the Industrial revolution from 3.0 to 4.0 has transformed the Healthcare environment. Patient Electronic Health Records (EHR) are shared with medical research institutes for clinical research and to manage national disease outbreaks. Healthcare systems implementing centralized machine learning models risk cyberattacks exposing private patient data. Blockchain-based data storage systems enable data security of EHR. However, the low transactions/minute of decentralized systems limit the performance of Healthcare systems and increase network bottleneck concerns. In this paper, we propose a Machine Learning based Blockchain architecture for secure Healthcare systems to preserve patient data privacy using Federated Learning and address Blockchain bottleneck issues by adding sidechains for processing growing transaction requests. A local model using machine learning trains data locally in hospitals and uploads it via Smart Contracts to the Public Healthcare System for global model training. Sidechains enable increased processing speed of Smart Contracts reducing congestions in the network and increasing the transactions per second in the mainchain.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121337922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Hydrogen Safety Leakage Risk using Pseudo Hydrogen Leakage(%) 用伪氢气泄漏量(%)评价氢气安全泄漏风险
Hyunmi Lee, Jeong-Ah Jang, Yongju Yi, Si-Woo Kim
{"title":"Evaluation of Hydrogen Safety Leakage Risk using Pseudo Hydrogen Leakage(%)","authors":"Hyunmi Lee, Jeong-Ah Jang, Yongju Yi, Si-Woo Kim","doi":"10.1109/ICTC55196.2022.9952932","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952932","url":null,"abstract":"The introduction of hydrogen buses is expanding worldwide. Hydrogen is recognized as a dangerous source of energy, and safety measures in the hydrogen-powered Elec bus supply plan are required. Hydrogen gas leakage can be one of the most critical factors in bus operation. Particularly, when a hydrogen vehicle leaks continuously during its operation, the incident can lead to fatal accidents. Currently, information on hydrogen leakage is accumulated through a collection sensor mounted within the vehicle and is measured when the sensor detects a leakage. This study proposes PHL(Pseudo Hydrogen Leakage) as an additional indicator of hydrogen safety leakage to be evaluated and monitored. The PHL indicator is applied to Regulation Article 17 criteria of the Automobile Rules.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114256111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating and Modifying High Resolution Fashion Model Image using StyleGAN 生成和修改高分辨率时尚模型图像使用StyleGAN
I. Choi, Soonchan Park, Jiyoung Park
{"title":"Generating and Modifying High Resolution Fashion Model Image using StyleGAN","authors":"I. Choi, Soonchan Park, Jiyoung Park","doi":"10.1109/ICTC55196.2022.9952574","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952574","url":null,"abstract":"In this paper, a research of synthesizing fashion model images by utilizing a state-of-the-art generative adversarial network (i.e., GAN) is introduced. After training GAN with fashion model images, the network was able to generate realistic fashion model images having various characteristics such as pose and clothes. Moreover, two image modifications named Fashion Model Morphing and Fashion Transfer are also proposed by merging attributes of two generated fashion model images. The research investigates the effectiveness of using GAN for fashion to create a large number of images for exploring new design and styles. The generated images are even more beneficial for fashion industries because the generated images have no legal issues such as portrait right and copyright.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topic Modelling Supreme Court Case Decisions using Latent Dirichlet Allocation 题目用潜在狄利克雷分配模拟最高法院案件判决
Bermylle John U. Razon, Geoffrey A. Solano, Lorenz Timothy B. Ranera
{"title":"Topic Modelling Supreme Court Case Decisions using Latent Dirichlet Allocation","authors":"Bermylle John U. Razon, Geoffrey A. Solano, Lorenz Timothy B. Ranera","doi":"10.1109/ICTC55196.2022.9952945","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952945","url":null,"abstract":"Extracting dominant topics from a bulk amount of Philippine Supreme Court case decisions can be time consuming and intensive. Furthermore, being able to find relevant topics automatically without close reading can aid legal researchers, law practitioners, and historians in studying and analyzing judicial behaviors of the high court. The six topic models generated in this study shows to have an average score of 86.67% in determining the dominant topic of case decisions via modified topic intrusion experiment.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7071 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV arming Authorization using DIM and Flight Authorization Code 无人机武装授权使用DIM和飞行授权代码
Ju-Han Kim, Yousung Kang
{"title":"UAV arming Authorization using DIM and Flight Authorization Code","authors":"Ju-Han Kim, Yousung Kang","doi":"10.1109/ICTC55196.2022.9952583","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952583","url":null,"abstract":"The UAV management system is a system that reviews and approves the scheduled flight time, traffic conditions and route safety before the UAV is flying. Through this system, only approved aircraft must be able to make scheduled flights to prevent accidents and abuse by UAVs. In addition, the UAV service provider receives prior authorization through this management system and controls the UAV according to the set time and route. In this paper, by designing the UAV arming authorization using DIM and flight authentication code, we provide a method to prevent the UAV service provider's mistake from flying in the unauthorized time and route of another identification code.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131208721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lazy Net: Lazy Entry Neural Networks for Accelerated and Efficient Inference 懒网:用于加速和高效推理的懒入口神经网络
Junyong Park, Dae-Young Kim, Yong-Hyuk Moon
{"title":"Lazy Net: Lazy Entry Neural Networks for Accelerated and Efficient Inference","authors":"Junyong Park, Dae-Young Kim, Yong-Hyuk Moon","doi":"10.1109/ICTC55196.2022.9953031","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9953031","url":null,"abstract":"Modern edge devices have become powerful enough to run deep learning tasks, but there are still many challenges, such as limited resources such as computing power, memory space, and energy. To address these challenges, methods such as channel pruning, network quantization and early exiting has been introduced to reduce the computational load for achieve this tasks. In this paper, we propose LazyNet, an alternative network of applying skip modules instead of early exiting on a pre-trained neural network. We use a small module that preserves the spatial information and also provides metrics to decide the computational flow. If the data sample is easy, the network skips most of the computation load and if not, the network computes the sample for accurate classification. We test our model with various backbone networks and cifar-10 dataset and show reduction on model inference time, memory consumption and increased accuracy to prove our results.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信