首页 > 最新文献

2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

英文 中文
BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel 基于伽玛近似信道的波分复用多波束调度方案的误码率分析
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436739
S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko
In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.
在本文中,我们统计分析了一种基于阈值的并行多波束选择方案,用于自由空间光学(FSO)波分复用(WDM)系统,在伽玛湍流条件下发生指向误差的情况下,它是伽玛分布的良好近似。我们基于Gamma分布的推导结果作为Gamma-Gamma分布的近似值,可以用作近似的性能度量(下)界限。
{"title":"BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel","authors":"S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko","doi":"10.1109/ICUFN.2018.8436739","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436739","url":null,"abstract":"In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Route Plan Exchange Scheme Based on Block Chain 基于区块链的路由计划交换方案
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436761
Doyoung Chung, Hae Sook Jeon
Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.
航路计划描述了建议的船只运动。它由航路点组成,每个航路点显示预期到达/离开时间、角度和方向。随着自主船舶的出现,航路规划的重要性日益凸显。为了实现安全、智能的航行,航线规划的完整性是非常重要的。为了避免路由计划的伪造和篡改,明确责任人,数字签名是可靠的解决方案之一。本文提出了一种基于区块链的路由计划管理方案,演示了如何对路由计划的数字签名进行管理。
{"title":"Route Plan Exchange Scheme Based on Block Chain","authors":"Doyoung Chung, Hae Sook Jeon","doi":"10.1109/ICUFN.2018.8436761","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436761","url":null,"abstract":"Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Effect of LTE on the Coexistence of NB-IoT LTE对NB-IoT共存的影响研究
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436641
Junghoon Oh, Hoyoung Song
The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.
3GPP Release-13引入了能够实现低功耗广域(LPWA)物联网服务的窄带物联网(NB-IOT)。NB-IoT可能会干扰LTE蜂窝网络,因为NB-IoT使用的许可频带与使用未许可频带的LPWA IoT (Sig-fox、LoRa等)不同。本文证明了NB-IoT在使用LTE一样的15 kHz副载波频率的情况下也会产生干扰,并通过测试显示了干扰的程度。测试结果显示了如何抑制NB-IoT对LTE的干扰和LTE资源分配。
{"title":"Study on the Effect of LTE on the Coexistence of NB-IoT","authors":"Junghoon Oh, Hoyoung Song","doi":"10.1109/ICUFN.2018.8436641","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436641","url":null,"abstract":"The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detectors for Intent ICC Security Vulnerability with Android IDE Android IDE的Intent ICC安全漏洞检测器
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436802
Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya
With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.
随着手机应用开发的上市时间压力越来越大,其开发周期越来越短,开发者几乎没有时间进行安全修复。许多手机应用开发者在开发周期中忽视了软件的安全质量。移动应用程序的缺陷和安全缺陷可能为黑客轻易攻击移动应用程序敞开大门。尽早消除可能的保安漏洞,有助保障我们的软件的安全,并减低潜在恶意攻击的保安风险威胁。然而,许多开发人员缺乏对安全漏洞的重要性和必要的安全软件开发知识和技能的认识。一个与IDE集成的有效的安全漏洞检测工具将对软件开发人员非常有益。本文探讨了Android常见的ICC漏洞,并在Android Studio IDE中集成了开源的FindSecurityBugs,提出了ICC意图漏洞检测器。
{"title":"Detectors for Intent ICC Security Vulnerability with Android IDE","authors":"Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya","doi":"10.1109/ICUFN.2018.8436802","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436802","url":null,"abstract":"With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"149 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE 基于信道观测的公平高效的LAA-WiFi无授权LTE共存先听后讲(CoLBT
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436776
R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim
License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.
LAA-WiFi (License Assisted Access-WiFi)共存,允许在LTE (Long Term Evolution)的无授权频谱上与现有的无授权无线局域网(wlan)一起运行。传统无线局域网目前的频谱接入过程采用清晰信道评估(CCA)和载波感知多址避碰(CSMA/CA),其中频谱在使用前被感知,并采用随机二进制指数后退(BEB)机制来避免碰撞。而LAA使用先听后讲(LBT)机制,与CCA的CSMA/CA通道访问适度相似。然而,当这两种技术共存时,存在公平性问题。在本文中,我们提出了一种基于信道观测的LBT (CoLBT)机制来实现LAA-Wi-Fi共存场景下的公平性。具体而言,我们引入了一种更现实的基于实际信道观测的碰撞概率,由LAA进化节点B (eNB)自适应地放大和缩小信道争用的退退争用窗口,以减少资源浪费,提高LAA- wifi共存性能。仿真结果验证了所提出的CoLBT机制在LAA-WiFi共存场景下的有效性,与现有的LBT机制相比,可以提高公平性性能。
{"title":"Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE","authors":"R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim","doi":"10.1109/ICUFN.2018.8436776","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436776","url":null,"abstract":"License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA 基于二维混沌映射和C-MLCA的彩色医学图像加密
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437025
Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim
In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.
本文提出了一种基于二维混沌映射和C-MLCA的彩色医学图像加密新方法。二维混沌映射是一种具有自保性质的结构,它可以移动像素的位置并对图像进行加密。C-MLCA基于CA的特性,使用最大长度的PN序列。具有不可预测的复杂规则的序列创建一个基图像,该基图像与原始图像进行异或计算。即C-MLCA通过计算过程改变像素的特征值对图像进行加密。利用这两个特征,我们引入了一种有效的加密方法,克服了现有加密方法的局限性。通过将加密后的图像与原始图像进行对比分析,我们能够证实所提出的加密方法具有较高的稳定性和安全性。
{"title":"Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA","authors":"Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim","doi":"10.1109/ICUFN.2018.8437025","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437025","url":null,"abstract":"In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance Evaluation of Kademlia in Mobile Ad Hoc Networks 移动Ad Hoc网络中Kademlia的性能评估
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436723
Mohammad Al Mojamed, Awwadh Al-Shehri
MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.
MANET是一种分散的网络,针对无基础设施的地区进行了优化。它的应用程序被设计成以分布式方式运行。点对点(P2P)覆盖是manet的一个可能的补充,以帮助管理分布式网络中的资源和信息共享。在本文中,Kademlia P2P覆盖被部署在一个动态的和不同的MANET底层技术上。该覆盖层结合了两种不同类型的MANET路由:OLSR和AODV。对这些组合在不同动态网络设置下的性能进行了广泛的评估。结果表明,在大多数情况下,Kademlia在AODV上分层时达到最佳性能。然而,基于olsr的Kademlia在延迟和网络负载方面优于AODV。
{"title":"Performance Evaluation of Kademlia in Mobile Ad Hoc Networks","authors":"Mohammad Al Mojamed, Awwadh Al-Shehri","doi":"10.1109/ICUFN.2018.8436723","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436723","url":null,"abstract":"MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks 用有限元方法改进无线传感器网络高斯-塞德尔路由算法的收敛性和并行性
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436839
Ren-Song Ko
The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.
大规模密集无线传感器网络中许多问题的可扩展性挑战可以从宏观的角度得到缓解。一个例子是负载平衡路由问题的弱公式,该解决方案可用于路由信息。为此,提出了一种分布式高斯-赛德尔迭代(DGSI)路由算法,用于协调传感器迭代求解弱公式。本文提出了原子红黑分布Gauss-Seidel有限元迭代法(ARB-DGSI-FEM),消除了由于空穴的存在而导致的DGSI的早期终止问题,从而提高了数值解的精度。此外,ARB-DGSI-FEM允许按红黑顺序更新未知量的值,以达到最大的并行度,减少收敛时间。仿真结果表明,ARB-DGSI-FEM在不牺牲精度的情况下显著提高了并行度。
{"title":"To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks","authors":"Ren-Song Ko","doi":"10.1109/ICUFN.2018.8436839","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436839","url":null,"abstract":"The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming MPEG-DASH MPD基于瓷砖混合立体360度视频流
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437012
Dongho You, Eunyoung Jeong, Dong Ho Kim
In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.
在本文中,我们提出了基于tile的混合立体360°视频流服务,其中可以通过单个可扩展的HEVC (SHVC) en/decoder提供低质量的2D,高质量的2D和3D服务。此外,本文还介绍了其相关的MPEG-DASH媒体表示描述(MPD)信令。
{"title":"MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming","authors":"Dongho You, Eunyoung Jeong, Dong Ho Kim","doi":"10.1109/ICUFN.2018.8437012","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437012","url":null,"abstract":"In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain 基于topp的超级账本结构区块链双因素认证方案
Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436784
Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim
In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.
本文提出了一种新的认证方法,以防止私有区块链中提供的会员服务的索赔令牌方法的认证漏洞。我们选择了使用JWT身份验证方法的Hyperledger Fabric v1.0。TOTP生成OTP令牌和用户身份验证代码,从而在现有的身份验证服务器上生成额外的基于时间的密码。为了提供更安全的服务,TOTP已被应用于加强安全性和双因素身份验证方法。
{"title":"A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain","authors":"Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICUFN.2018.8436784","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436784","url":null,"abstract":"In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1