Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900720
Pit Hofmann, J. T. Gómez, F. Dressler, F. Fitzek
When conceiving molecular communication (MC) systems, it is of utmost importance to determine the threshold value for decoding bits and producing the smaller bit error rate (BER). At this optimum, the BER has the smallest value, and errors in the reception can be minimized, thereby improving the minimal throughput of molecular means. Despite its importance, prior research still presents little applicability and insights obtaining the optimal threshold for real testbeds. Filling this gap, in this paper, we feature a low-complex algorithm for the optimal threshold in single-input single-output (SISO) testbeds. Using a self-adaptive method, we assess a threshold close to the optimal, whereas the BER results are close to the minimum achievable. Furthermore, we show that for real existing molecular communication systems, an optimum can also be determined with respect to the BER. The BER can thus be reduced by up to 90 %.
{"title":"Testbed-based Receiver Optimization for SISO Molecular Communication Channels","authors":"Pit Hofmann, J. T. Gómez, F. Dressler, F. Fitzek","doi":"10.1109/BalkanCom55633.2022.9900720","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900720","url":null,"abstract":"When conceiving molecular communication (MC) systems, it is of utmost importance to determine the threshold value for decoding bits and producing the smaller bit error rate (BER). At this optimum, the BER has the smallest value, and errors in the reception can be minimized, thereby improving the minimal throughput of molecular means. Despite its importance, prior research still presents little applicability and insights obtaining the optimal threshold for real testbeds. Filling this gap, in this paper, we feature a low-complex algorithm for the optimal threshold in single-input single-output (SISO) testbeds. Using a self-adaptive method, we assess a threshold close to the optimal, whereas the BER results are close to the minimum achievable. Furthermore, we show that for real existing molecular communication systems, an optimum can also be determined with respect to the BER. The BER can thus be reduced by up to 90 %.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900625
Ravsan Aziz, Tolga Girici
The design of RIS-assisted THz wireless systems is envisioned to be one of the key roles in 6G evolution. In this paper, we implement an analytical pathloss model for reconfigurable intelligent surface (RIS) in terahertz (THz) band. We study the optimal 3D deployment problem and configuration of UAV-Mounted RIS in THz band environment with the objective of maximizing the achievable rate of the network considering the distances from transmitter/receiver to the RIS, blockage probability, the far field constraints for unit cells and antennas, the size of the RIS, absorption loss and we provide a discussion that can serve as guidelines for researchers and mobile network operators for designing UAV-Mounted RIS in the THz Band.
{"title":"Deployment of a UAV-Mounted Intelligent Reflecting Surface in the THz Band","authors":"Ravsan Aziz, Tolga Girici","doi":"10.1109/BalkanCom55633.2022.9900625","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900625","url":null,"abstract":"The design of RIS-assisted THz wireless systems is envisioned to be one of the key roles in 6G evolution. In this paper, we implement an analytical pathloss model for reconfigurable intelligent surface (RIS) in terahertz (THz) band. We study the optimal 3D deployment problem and configuration of UAV-Mounted RIS in THz band environment with the objective of maximizing the achievable rate of the network considering the distances from transmitter/receiver to the RIS, blockage probability, the far field constraints for unit cells and antennas, the size of the RIS, absorption loss and we provide a discussion that can serve as guidelines for researchers and mobile network operators for designing UAV-Mounted RIS in the THz Band.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125315033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900836
A. Yumusak, A. Demirtas
This paper evaluates the effect of end-to-end delay on lifetime and the average bit error rate for wireless sensor networks where each sensor node sends its data to sink via directional antennas. Using Mixed Integer Programming, lifetime is optimized for circular network topologies with different numbers of nodes. Using both directional and omnidirectional antennas, different end-to-end delay restrictions are applied to the same sensor network to examine the effect on lifetime and average bit error rate. When delay restriction is relaxed, an increase in lifetime and a decrease in average bit error rate are observed for both antennas. In this case, the directional antenna benefits more from relaxing the delay restriction. In the end, an optimal end-to-end delay was determined which provides sufficient lifetime and bit error rate while taking into account data freshness.
{"title":"Effect of End-to-end Delay on Lifetime and Average Bit Error Rate in Directional Antenna Based Wireless Sensor Networks","authors":"A. Yumusak, A. Demirtas","doi":"10.1109/BalkanCom55633.2022.9900836","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900836","url":null,"abstract":"This paper evaluates the effect of end-to-end delay on lifetime and the average bit error rate for wireless sensor networks where each sensor node sends its data to sink via directional antennas. Using Mixed Integer Programming, lifetime is optimized for circular network topologies with different numbers of nodes. Using both directional and omnidirectional antennas, different end-to-end delay restrictions are applied to the same sensor network to examine the effect on lifetime and average bit error rate. When delay restriction is relaxed, an increase in lifetime and a decrease in average bit error rate are observed for both antennas. In this case, the directional antenna benefits more from relaxing the delay restriction. In the end, an optimal end-to-end delay was determined which provides sufficient lifetime and bit error rate while taking into account data freshness.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900767
S. C. Tokgoz, F. Yilmaz, Scott L. Miller, K. Qaraqe
Weibull random variates (RVs) is naturally of prime importance in wireless communications over fading channels. In this letter, the moment generation function (MGF), probability density function (PDF) and cumulative distribution function (CDF) of the sum of mutually independent Weibull RVs are represented in terms of inverse Laplace transform, and the obtained results are used to analyze the physical layer security performance of a single-input multiple-output system in terms of secrecy outage probability (SOP).
{"title":"On the Physical Layer Security of Maximal-Ratio Combining Over Weibull Fading Channels","authors":"S. C. Tokgoz, F. Yilmaz, Scott L. Miller, K. Qaraqe","doi":"10.1109/BalkanCom55633.2022.9900767","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900767","url":null,"abstract":"Weibull random variates (RVs) is naturally of prime importance in wireless communications over fading channels. In this letter, the moment generation function (MGF), probability density function (PDF) and cumulative distribution function (CDF) of the sum of mutually independent Weibull RVs are represented in terms of inverse Laplace transform, and the obtained results are used to analyze the physical layer security performance of a single-input multiple-output system in terms of secrecy outage probability (SOP).","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900815
Elmehdi Illi, M. Qaraqe, Faissal El Bouanani, S. Al-Kuwari
In this paper, we analyze the physical layer security of a jamming-aided wireless communication system assisted by a reconfigurable intelligent surface (RIS). Our setup consists of a source node communicating with a destination node with the help of a RIS, and under the presence of a malicious passive eavesdropper attempting to overhear the genuine transmission. Furthermore, an external cooperative jammer is incorporated to reinforce the system’s secrecy by broadcasting an artificial noise to disrupt the eavesdropper; such a noise can be removed at the destination. Finally, we assume that the tunable RIS phases based on the channel estimates are subject to quantization errors. By virtue of the well-adopted Gamma and Exponential distributions approximations, an approximate expression for the system’s intercept probability (IP) is derived in terms of the main setup parameters. The results show that the greater the number of reflective elements (REs) and jamming power, the better the secrecy, while the number of quantization bits has less impact when exceeding 3 bits. In particular, an IP of 10−3 can be reached with 50 REs even when the legitimate link’s average signal-to-noise ratio (SNR) is 15 dB below the wiretap channel’s average SNR. Monte Carlo simulations endorse the derived analytical results.
{"title":"On the Secrecy Analysis of a RIS-aided Wireless Communication System Subject to Phase Quantization Errors","authors":"Elmehdi Illi, M. Qaraqe, Faissal El Bouanani, S. Al-Kuwari","doi":"10.1109/BalkanCom55633.2022.9900815","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900815","url":null,"abstract":"In this paper, we analyze the physical layer security of a jamming-aided wireless communication system assisted by a reconfigurable intelligent surface (RIS). Our setup consists of a source node communicating with a destination node with the help of a RIS, and under the presence of a malicious passive eavesdropper attempting to overhear the genuine transmission. Furthermore, an external cooperative jammer is incorporated to reinforce the system’s secrecy by broadcasting an artificial noise to disrupt the eavesdropper; such a noise can be removed at the destination. Finally, we assume that the tunable RIS phases based on the channel estimates are subject to quantization errors. By virtue of the well-adopted Gamma and Exponential distributions approximations, an approximate expression for the system’s intercept probability (IP) is derived in terms of the main setup parameters. The results show that the greater the number of reflective elements (REs) and jamming power, the better the secrecy, while the number of quantization bits has less impact when exceeding 3 bits. In particular, an IP of 10−3 can be reached with 50 REs even when the legitimate link’s average signal-to-noise ratio (SNR) is 15 dB below the wiretap channel’s average SNR. Monte Carlo simulations endorse the derived analytical results.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123434194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900742
Melike Nur Durceylan, Ömer Faruk Gemici, Gülcihan Özdemir, Ibrahim Hökelek, H. A. Çırpan
Cooperative networks based on Non-Orthogonal Multiple Access (NOMA) is a promising radio access technology to cope with the challenging requirements of 5G and beyond systems. The power allocation in a cooperative NOMA system is a challenging task having a significant impact on the user perceived quality of service. In this paper, an adaptive power allocation technique is proposed using Fuzzy Logic (FL) for cooperative NOMA with imperfect successive interference cancellation (SIC). The FL system is trained to provide the power allocation coefficient by systematically varying signal-to-noise ratios (SNRs) at relays and users and randomly assigning all wireless channel coefficients. The power is allocated between the NOMA user pair within a resource block in such a way that the rate fairness is maximized and the system outage is minimized. The numerical results obtained by FL are close to the optimum outage probabilities and rate fairness results for all experiments when the number of relays and SNRs are varied. The results are promising since the computationally efficient FL can be successfully utilized at the run time for allocating power in a cooperative NOMA system.
{"title":"Fuzzy Logic Based Power Allocation for Cooperative NOMA Systems","authors":"Melike Nur Durceylan, Ömer Faruk Gemici, Gülcihan Özdemir, Ibrahim Hökelek, H. A. Çırpan","doi":"10.1109/BalkanCom55633.2022.9900742","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900742","url":null,"abstract":"Cooperative networks based on Non-Orthogonal Multiple Access (NOMA) is a promising radio access technology to cope with the challenging requirements of 5G and beyond systems. The power allocation in a cooperative NOMA system is a challenging task having a significant impact on the user perceived quality of service. In this paper, an adaptive power allocation technique is proposed using Fuzzy Logic (FL) for cooperative NOMA with imperfect successive interference cancellation (SIC). The FL system is trained to provide the power allocation coefficient by systematically varying signal-to-noise ratios (SNRs) at relays and users and randomly assigning all wireless channel coefficients. The power is allocated between the NOMA user pair within a resource block in such a way that the rate fairness is maximized and the system outage is minimized. The numerical results obtained by FL are close to the optimum outage probabilities and rate fairness results for all experiments when the number of relays and SNRs are varied. The results are promising since the computationally efficient FL can be successfully utilized at the run time for allocating power in a cooperative NOMA system.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900816
Melih Doğanay Sazak, A. Demirtas
In this study, three-dimensional optimal trajectory planning is performed for the Unmanned Aerial Vehicle (UAV) with the base station (BS) attached to it to increase the service provided to the users. The case that heterogeneous quality of service (QoS) requirements for different users are considered. While planning the trajectory, the coverage area of the UAV-BS and backhaul capacity between the UAV-BS and Ground Base Station (GBS) are limited. Under these constraints, the aim is to find a trajectory for the UAV-BS that maximizes the total data rate provided to the users during the flight using reinforcement learning. With the application of Q-learning in our problem, the UAV-BS learns to take action to achieve the desired goal. As a result of trial and error processes with different learning parameters, appropriate parameters are determined and a reinforcement learning model is trained. Different communication scenarios are compared for analyzing the effects of the constraints. According to the effects of the mentioned constraints and heterogeneous QoS demands, UAV-BS’s trajectory preferences and total transmission rate changes are examined. Three prominent results shows the effects of coverage, backhaul, and heterogeneous QoS. The UAV-BS tends to increase its altitude as the coverage constraint increases. Moreover, the backhaul constraint forces the UAV-BS’s trajectory closer to the GBS. Lastly, UAV-BS takes into account different QoS requirements of users as much as possible. UAV-BS maximizes the total transmission rate by determining the most suitable trajectory to meet these constraints.
{"title":"UAV-BS Trajectory Optimization Under Coverage, Backhaul and QoS Constraints Using Q-Learning","authors":"Melih Doğanay Sazak, A. Demirtas","doi":"10.1109/BalkanCom55633.2022.9900816","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900816","url":null,"abstract":"In this study, three-dimensional optimal trajectory planning is performed for the Unmanned Aerial Vehicle (UAV) with the base station (BS) attached to it to increase the service provided to the users. The case that heterogeneous quality of service (QoS) requirements for different users are considered. While planning the trajectory, the coverage area of the UAV-BS and backhaul capacity between the UAV-BS and Ground Base Station (GBS) are limited. Under these constraints, the aim is to find a trajectory for the UAV-BS that maximizes the total data rate provided to the users during the flight using reinforcement learning. With the application of Q-learning in our problem, the UAV-BS learns to take action to achieve the desired goal. As a result of trial and error processes with different learning parameters, appropriate parameters are determined and a reinforcement learning model is trained. Different communication scenarios are compared for analyzing the effects of the constraints. According to the effects of the mentioned constraints and heterogeneous QoS demands, UAV-BS’s trajectory preferences and total transmission rate changes are examined. Three prominent results shows the effects of coverage, backhaul, and heterogeneous QoS. The UAV-BS tends to increase its altitude as the coverage constraint increases. Moreover, the backhaul constraint forces the UAV-BS’s trajectory closer to the GBS. Lastly, UAV-BS takes into account different QoS requirements of users as much as possible. UAV-BS maximizes the total transmission rate by determining the most suitable trajectory to meet these constraints.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900681
M. Shahbazi, Murat Simsek, B. Kantarci
In-Flight Entertainment and Connectivity (IFEC) is becoming a key trend and an essential need. A grand challenge is to provide in-flight connectivity in high altitudes, and particularly in isolated locations, such as the oceans, where establishing an air-to-ground link is not possible. Aeronautical Ad-Hoc Networking (AANET) intends to cope with this challenge by forming a network of airplanes having air-to-air (A2A) connections. However, the dynamic nature of such a network is likely to lead to unstable connections. The primary cause of the majority of these stability issues is known to be poor clustering of aircrafts. Consequently, concentrating on aircraft clustering and making them more stable can improve connection. This paper aims to unveil the benefits of density-based clustering to improve the AANET performance. To do so, the paper employs a multi-feature DBSCAN algorithm for the clustering problem that exploits several features of real flight datasets, including latitude, longitude, altitude, direction, and velocity. Instead of a typical distance metric such as Euclidean or Haversine, the technique produces a precomputed distance matrix and feeds it to DBSCAN. This method also includes a weighted scheme to reflect the relative importance of each component of the distance calculation. Simulations under OMNET++ by using real-time flight data point out that packet delivery ratio and end-to-end latency of the state of the art clustering-based AANET solutions can be improved by 40 % and 30 %, respectively. Furthermore, the proposed method achieves a 20% reduction in cluster changes and the number of clusters.
{"title":"Density-Based Clustering and Performance Enhancement of Aeronautical Ad Hoc Networks","authors":"M. Shahbazi, Murat Simsek, B. Kantarci","doi":"10.1109/BalkanCom55633.2022.9900681","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900681","url":null,"abstract":"In-Flight Entertainment and Connectivity (IFEC) is becoming a key trend and an essential need. A grand challenge is to provide in-flight connectivity in high altitudes, and particularly in isolated locations, such as the oceans, where establishing an air-to-ground link is not possible. Aeronautical Ad-Hoc Networking (AANET) intends to cope with this challenge by forming a network of airplanes having air-to-air (A2A) connections. However, the dynamic nature of such a network is likely to lead to unstable connections. The primary cause of the majority of these stability issues is known to be poor clustering of aircrafts. Consequently, concentrating on aircraft clustering and making them more stable can improve connection. This paper aims to unveil the benefits of density-based clustering to improve the AANET performance. To do so, the paper employs a multi-feature DBSCAN algorithm for the clustering problem that exploits several features of real flight datasets, including latitude, longitude, altitude, direction, and velocity. Instead of a typical distance metric such as Euclidean or Haversine, the technique produces a precomputed distance matrix and feeds it to DBSCAN. This method also includes a weighted scheme to reflect the relative importance of each component of the distance calculation. Simulations under OMNET++ by using real-time flight data point out that packet delivery ratio and end-to-end latency of the state of the art clustering-based AANET solutions can be improved by 40 % and 30 %, respectively. Furthermore, the proposed method achieves a 20% reduction in cluster changes and the number of clusters.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132211525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900847
Sinan Chen, Masahide Nakamura
Our research group is currently studying and developing listening services using spoken dialogue agents and IoT technologies to assist the “mind” of the elderly at home. However, the user identification function, an essential part of the service, has not yet been realized. It is difficult to determine the identity of the person who interacts with the spoken dialogue agent. Although with the rapid development of the artificial intelligence field, various smart devices and services using deep learning have appeared in the face recognition technology, problems exist, including costs and computational resources to build and apply a recognition model. The purpose of this paper is to develop a facial identification system using the pre-trained model and spoken dialogue agent. Our key ideas include automatic training data generation by spoken dialogue between the user and the agent and the acquisition and comparison of facial features using a pre-trained model. In this way, our face identification system can be easier introduced and expected with only a general-purpose computer and a Web camera, without needing a conventional Internet connection and manual labeling of training data.
{"title":"Developing a Facial Identification System Using Pre-Trained Model and Spoken Dialogue Agent","authors":"Sinan Chen, Masahide Nakamura","doi":"10.1109/BalkanCom55633.2022.9900847","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900847","url":null,"abstract":"Our research group is currently studying and developing listening services using spoken dialogue agents and IoT technologies to assist the “mind” of the elderly at home. However, the user identification function, an essential part of the service, has not yet been realized. It is difficult to determine the identity of the person who interacts with the spoken dialogue agent. Although with the rapid development of the artificial intelligence field, various smart devices and services using deep learning have appeared in the face recognition technology, problems exist, including costs and computational resources to build and apply a recognition model. The purpose of this paper is to develop a facial identification system using the pre-trained model and spoken dialogue agent. Our key ideas include automatic training data generation by spoken dialogue between the user and the agent and the acquisition and comparison of facial features using a pre-trained model. In this way, our face identification system can be easier introduced and expected with only a general-purpose computer and a Web camera, without needing a conventional Internet connection and manual labeling of training data.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-22DOI: 10.1109/BalkanCom55633.2022.9900866
S. Rizvić, B. Mijatovic, D. Boskovic, I. Ivkovic-Kihic
A rapid increase in development and use of Extended Reality applications for all areas of life is expected in metaverse age. Many museums are in the last decade introducing digital content in their exhibitions. They hired digital curators to establish connection with developers and IT industry. Extended Reality technologies enable museum visitors to experience the topics of exhibitions, see original appearances of exhibits and travel to the past through Virtual Reality headsets or Augmented Reality applications on mobile devices. In this paper we show an example of good practice, describing the application Battle on Neretva VR installed in the Museum in Jablanica, Bosnia and Herzegovina. We present the application design and development workflow and show the impressions of museum management and visitors after introducing it in the exhibition. This workflow can be replicated to any museum topic or collection.
在虚拟时代,扩展现实应用在生活各个领域的开发和使用预计会迅速增加。在过去的十年里,许多博物馆都在展览中引入了数字内容。他们聘请了数字馆长,以建立与开发商和IT行业的联系。扩展现实技术使博物馆参观者能够通过虚拟现实耳机或移动设备上的增强现实应用程序体验展览的主题,看到展品的原始外观,并穿越到过去。在本文中,我们展示了一个很好的实践例子,描述了在波斯尼亚和黑塞哥维那的雅布拉尼察博物馆安装的应用程序Battle on Neretva VR。我们展示了应用程序的设计和开发流程,并展示了在展览中介绍后博物馆管理层和参观者的印象。这个工作流程可以复制到任何博物馆主题或收藏。
{"title":"Workflow of Extended Reality Applications for Museum Exhibitions","authors":"S. Rizvić, B. Mijatovic, D. Boskovic, I. Ivkovic-Kihic","doi":"10.1109/BalkanCom55633.2022.9900866","DOIUrl":"https://doi.org/10.1109/BalkanCom55633.2022.9900866","url":null,"abstract":"A rapid increase in development and use of Extended Reality applications for all areas of life is expected in metaverse age. Many museums are in the last decade introducing digital content in their exhibitions. They hired digital curators to establish connection with developers and IT industry. Extended Reality technologies enable museum visitors to experience the topics of exhibitions, see original appearances of exhibits and travel to the past through Virtual Reality headsets or Augmented Reality applications on mobile devices. In this paper we show an example of good practice, describing the application Battle on Neretva VR installed in the Museum in Jablanica, Bosnia and Herzegovina. We present the application design and development workflow and show the impressions of museum management and visitors after introducing it in the exhibition. This workflow can be replicated to any museum topic or collection.","PeriodicalId":114443,"journal":{"name":"2022 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}