Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145969
W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen
This study addresses the handover management issue for Device-to-Device communication in 5G networks. The 3rd Generation Partnership Project (3GPP) drafted a standard for Proximity Services (ProSe), also named Device-to-Device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end-users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Currently, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency. Hence, we propose a handover management scheme for D2D communication to encourage both parties of a D2D pair to handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation.
{"title":"Handover Management for D2D Communication in 5G Networks","authors":"W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen","doi":"10.1109/ICCCI49374.2020.9145969","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145969","url":null,"abstract":"This study addresses the handover management issue for Device-to-Device communication in 5G networks. The 3rd Generation Partnership Project (3GPP) drafted a standard for Proximity Services (ProSe), also named Device-to-Device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end-users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Currently, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency. Hence, we propose a handover management scheme for D2D communication to encourage both parties of a D2D pair to handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145998
Naoto Hoshikawa, T. Shimobaba, T. Ito
Open connectivity is required to expand the IoT services, but such environments are prone to the risk of information leakage and illegal operation by spoofing. In this paper, we present clock fingerprints concept based on clock frequency trait, and propose a method for extracting trait using clock drifts and criterion server. This trait can be available in identifying digital equipment to increase security in the future open IoT services. In our two experiments, we demonstrate the extraction of traits from some computers. First one show that unique characteristics can be extracted from two kinds of clock signals. Second show that different characteristics can be extracted from the same model number and the same software settings. We conclude with the challenges that we plan to address in our future work to improve this method.
{"title":"Trait Extraction Method for Digital Equipment Using Clock Drifts Based on Comparison of Criterion Server","authors":"Naoto Hoshikawa, T. Shimobaba, T. Ito","doi":"10.1109/ICCCI49374.2020.9145998","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145998","url":null,"abstract":"Open connectivity is required to expand the IoT services, but such environments are prone to the risk of information leakage and illegal operation by spoofing. In this paper, we present clock fingerprints concept based on clock frequency trait, and propose a method for extracting trait using clock drifts and criterion server. This trait can be available in identifying digital equipment to increase security in the future open IoT services. In our two experiments, we demonstrate the extraction of traits from some computers. First one show that unique characteristics can be extracted from two kinds of clock signals. Second show that different characteristics can be extracted from the same model number and the same software settings. We conclude with the challenges that we plan to address in our future work to improve this method.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145964
E. Maro, Vadim Girichev
Paper presents an overview of power analysis attack and experimental results of the first main stage of simple power analysis (SPA) and differential power analysis (DPA) attacks-a practical correlation of power consumption measurement charts to each of encryption operations for standard Kuznyechik cipher (GOST R 34.12-2015 (n = 128)). As part of experiments we construct lightweight hardware implementation of Kuznyechik cipher on Arduino electric board (namely Arduino Nano) and compile measurements of power consumption by LECROY WavePro 7100A oscilloscope (with a 1 GHz bandwidth and 10 GHz / 4 channel sampling frequency). Our experiments led to finding signature (fixed structure and power consumption value) for encryption operations of Kuznyechik cipher: additions with round key, nonlinear transformation and linear transformation.
{"title":"Power Analysis of Symmetric Block Cipher Kuznyechik","authors":"E. Maro, Vadim Girichev","doi":"10.1109/ICCCI49374.2020.9145964","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145964","url":null,"abstract":"Paper presents an overview of power analysis attack and experimental results of the first main stage of simple power analysis (SPA) and differential power analysis (DPA) attacks-a practical correlation of power consumption measurement charts to each of encryption operations for standard Kuznyechik cipher (GOST R 34.12-2015 (n = 128)). As part of experiments we construct lightweight hardware implementation of Kuznyechik cipher on Arduino electric board (namely Arduino Nano) and compile measurements of power consumption by LECROY WavePro 7100A oscilloscope (with a 1 GHz bandwidth and 10 GHz / 4 channel sampling frequency). Our experiments led to finding signature (fixed structure and power consumption value) for encryption operations of Kuznyechik cipher: additions with round key, nonlinear transformation and linear transformation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the energy efficiency (EE) of full-duplex (FD) two-hop relay system with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols is studied. The residual self-interference (RSI) is modeled as a linear function of relay transmit power first. Then, with the constant transmission rate, the EE maximization problem is transformed into transmit power minimization problem and the minimum transmit power consumptions of the DF and AF protocols are obtained. Furthermore, the EE comparison of the DF and AF protocols is given with the minimum transmit power consumption. The simulation results are given to verify the theoretical EE analysis and comparison.
{"title":"Energy Efficiency Comparison for Full-Duplex DF and AF Relaying Protocols","authors":"Zhongxia Gao, Runhe Qiu, Caixia Cai, Jiai Xue, Chen Wang, Sijing Chen","doi":"10.1109/ICCCI49374.2020.9145975","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145975","url":null,"abstract":"In this paper, the energy efficiency (EE) of full-duplex (FD) two-hop relay system with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols is studied. The residual self-interference (RSI) is modeled as a linear function of relay transmit power first. Then, with the constant transmission rate, the EE maximization problem is transformed into transmit power minimization problem and the minimum transmit power consumptions of the DF and AF protocols are obtained. Furthermore, the EE comparison of the DF and AF protocols is given with the minimum transmit power consumption. The simulation results are given to verify the theoretical EE analysis and comparison.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145965
Kaito Shibutani, A. Kobayashi
In large-scale disasters such as earthquakes, sharing of disaster information is required without relying on the existing communication infrastructure. In this paper, we propose a disaster information sharing system using passive portable storages such as a USB memory stick as for communication media. Our pro-posed system assumes a serious disaster that requires the physical transport of communication media. In this system, the portable storages are transported by local citizens. In such situations, each sending node cannot know both the destination node of each message and the receiver node of portable storages. Therefore, an efficiency content selection method is required for our proposed system. We also propose a content selection method based on priority. The proposed method calculates the content priority based on the transportation frequency information between nodes estimated from the transportation history of portable storages and the content diffusion information in the network. We have revealed the effectiveness of our proposed method by simulation using actual geographical points of evacuation centers.
{"title":"Bayesian Estimation Method of Transportation Frequency for Disaster Information Sharing System","authors":"Kaito Shibutani, A. Kobayashi","doi":"10.1109/ICCCI49374.2020.9145965","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145965","url":null,"abstract":"In large-scale disasters such as earthquakes, sharing of disaster information is required without relying on the existing communication infrastructure. In this paper, we propose a disaster information sharing system using passive portable storages such as a USB memory stick as for communication media. Our pro-posed system assumes a serious disaster that requires the physical transport of communication media. In this system, the portable storages are transported by local citizens. In such situations, each sending node cannot know both the destination node of each message and the receiver node of portable storages. Therefore, an efficiency content selection method is required for our proposed system. We also propose a content selection method based on priority. The proposed method calculates the content priority based on the transportation frequency information between nodes estimated from the transportation history of portable storages and the content diffusion information in the network. We have revealed the effectiveness of our proposed method by simulation using actual geographical points of evacuation centers.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Focus on the access point deployment and topology control problem in Wireless Mesh Networks (WMNs), a topology planning method based on deep reinforcement learning was proposed. Developing a method of sample data generation using monte-carlo tree search and self-game, then a policy and value network based on residual network was established. A model based on Tensorflow was developed to solve the training problem. Finally, simulation results show that the proposed method can provide efficient network planning solution with high performance on timeliness and validity.
{"title":"Research on Topology Planning for Wireless Mesh Networks Based on Deep Reinforcement Learning","authors":"Changsheng Yin, Ruopeng Yang, Xiaofei Zou, Wei Zhu","doi":"10.1109/ICCCI49374.2020.9145985","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145985","url":null,"abstract":"Focus on the access point deployment and topology control problem in Wireless Mesh Networks (WMNs), a topology planning method based on deep reinforcement learning was proposed. Developing a method of sample data generation using monte-carlo tree search and self-game, then a policy and value network based on residual network was established. A model based on Tensorflow was developed to solve the training problem. Finally, simulation results show that the proposed method can provide efficient network planning solution with high performance on timeliness and validity.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126265417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145997
Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang
Instrumentation technology can obtain the status information of the distributed system when it is running. It is the core part of software performance management tools. But the use of instrumentation technology is often accompanied by a waste of resources. In this paper, we designed an adaptive instrumentation mechanism to balance the monitoring needs and resource load. Using analytical models based on linear regression and K-Means based on density algorithm to analyze performance data, determine the actual operating conditions and monitoring requirements of the monitored system, dynamically change the insertion point, and reduce resource consumption. Experiments show that compared with traditional tools, using the method of this article for monitoring, when the user clicks a lot, the system throughput is lower, the resource load is smaller, the average response time of the tested web page is reduced by 3.37%, and the target program is Interference is smaller.
{"title":"Diagnostic Framework for Distributed Application Performance Anomaly Based on Adaptive Instrumentation","authors":"Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang","doi":"10.1109/ICCCI49374.2020.9145997","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145997","url":null,"abstract":"Instrumentation technology can obtain the status information of the distributed system when it is running. It is the core part of software performance management tools. But the use of instrumentation technology is often accompanied by a waste of resources. In this paper, we designed an adaptive instrumentation mechanism to balance the monitoring needs and resource load. Using analytical models based on linear regression and K-Means based on density algorithm to analyze performance data, determine the actual operating conditions and monitoring requirements of the monitored system, dynamically change the insertion point, and reduce resource consumption. Experiments show that compared with traditional tools, using the method of this article for monitoring, when the user clicks a lot, the system throughput is lower, the resource load is smaller, the average response time of the tested web page is reduced by 3.37%, and the target program is Interference is smaller.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145966
Yue Xu, M. Ni, Fei Ying, Jingwen Zhang
The increasing vehicles have brought convenience to people as well as many traffic problems. The Internet of Vehicles (IoV) is an extension of the intelligent transportation system based on the Internet of Things (IoT), which is the omnibearing network connection among “Vehicles, Loads, Clouds”. However, IoV also faces threats from various known and unknown security vulnerabilities. Traditional security defense methods can only deal with known attacks, while there is no effective way to deal with unknown attacks. In this paper, we show an IoV system deployed on a Mimic Common Operating Environment (MCOE). At the sensing layer, we introduce a lightweight cryptographic algorithm, LBlock, to encrypt the data collected by the hardware. Thus, we can prevent malicious tampering of information such as vehicle conditions. At the application layer, we firstly put the IoV system platform into MCOE to make it dynamic, heterogeneous and redundant. Extensive experiments prove that the sensing layer can encrypt data reliably and energy-efficiently. And we prove the feasibility and security of the Internet of Vehicles system platform on MCOE.
{"title":"Security Optimization Based on Mimic Common Operating Environment for the Internet of Vehicles","authors":"Yue Xu, M. Ni, Fei Ying, Jingwen Zhang","doi":"10.1109/ICCCI49374.2020.9145966","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145966","url":null,"abstract":"The increasing vehicles have brought convenience to people as well as many traffic problems. The Internet of Vehicles (IoV) is an extension of the intelligent transportation system based on the Internet of Things (IoT), which is the omnibearing network connection among “Vehicles, Loads, Clouds”. However, IoV also faces threats from various known and unknown security vulnerabilities. Traditional security defense methods can only deal with known attacks, while there is no effective way to deal with unknown attacks. In this paper, we show an IoV system deployed on a Mimic Common Operating Environment (MCOE). At the sensing layer, we introduce a lightweight cryptographic algorithm, LBlock, to encrypt the data collected by the hardware. Thus, we can prevent malicious tampering of information such as vehicle conditions. At the application layer, we firstly put the IoV system platform into MCOE to make it dynamic, heterogeneous and redundant. Extensive experiments prove that the sensing layer can encrypt data reliably and energy-efficiently. And we prove the feasibility and security of the Internet of Vehicles system platform on MCOE.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145986
Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou
Spatial modulation (SM) as a new transmission technique has a wide application prospect in multiple-input multiple-output (MIMO) wireless communications. In this paper, a novel physical layer security enhancing scheme using artificial noise (AN)is proposed for SM systems. In the proposed scheme, the transmitted signals contain the useful information symbols and the AN that is designed by exploiting the knowledge of the channel state information (CSI) over the legitimate channel. A new detection scheme is also proposed, which detects the information symbols by using signals received across two successive time slots such that the AN can only be perfectly cancelled at the legitimate receiver while confusing the passive eavesdropper. Furthermore, the simulation results on secrecy rate verify that the proposed security enhancing scheme can achieve a satisfactory performance.
{"title":"Successive Artificial Noise Cancellation for Security Enhancing Spatial Modulation","authors":"Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou","doi":"10.1109/ICCCI49374.2020.9145986","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145986","url":null,"abstract":"Spatial modulation (SM) as a new transmission technique has a wide application prospect in multiple-input multiple-output (MIMO) wireless communications. In this paper, a novel physical layer security enhancing scheme using artificial noise (AN)is proposed for SM systems. In the proposed scheme, the transmitted signals contain the useful information symbols and the AN that is designed by exploiting the knowledge of the channel state information (CSI) over the legitimate channel. A new detection scheme is also proposed, which detects the information symbols by using signals received across two successive time slots such that the AN can only be perfectly cancelled at the legitimate receiver while confusing the passive eavesdropper. Furthermore, the simulation results on secrecy rate verify that the proposed security enhancing scheme can achieve a satisfactory performance.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICCCI49374.2020.9145962
S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa
By experiment, this paper investigates effects of the robot position control using force information, which we previously proposed, for cooperative work between two remote robot systems with force feedback. As cooperative work, we deal with work in which a human and a robot arm in the system (i.e. human-robot) or two robot arms (robot-robot) carry an object together. Then, one robot arm which is operated automatically under the robot position control using force information follows a human or another robot arm. In our experiment, we compare force applied to the object between the human-robot and the robot-robot cases. In the robot-robot case, we also deal with the case in which the control is carried out in both systems, and the case in which the control is performed in only one system. Experimental results demonstrate that the human-robot case is the best among the three cases.
{"title":"Effects of Robot Position Control Using Force Information in Remote Robot Systems with Force Feedback: Comparition between Human-Robot and Robot-Robot Cases","authors":"S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa","doi":"10.1109/ICCCI49374.2020.9145962","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145962","url":null,"abstract":"By experiment, this paper investigates effects of the robot position control using force information, which we previously proposed, for cooperative work between two remote robot systems with force feedback. As cooperative work, we deal with work in which a human and a robot arm in the system (i.e. human-robot) or two robot arms (robot-robot) carry an object together. Then, one robot arm which is operated automatically under the robot position control using force information follows a human or another robot arm. In our experiment, we compare force applied to the object between the human-robot and the robot-robot cases. In the robot-robot case, we also deal with the case in which the control is carried out in both systems, and the case in which the control is performed in only one system. Experimental results demonstrate that the human-robot case is the best among the three cases.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}