首页 > 最新文献

2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Blockchain based Removable Storage Device Log Management System 基于区块链的可移动存储设备日志管理系统
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061329
Gyuseong Lee, Minsung Son, Nakhoon Choi, Seongho Hong, Heeyoul Kim
Since the use of removable storage devices, security of the storage devices has been required as needed. In response to this demand, a method of managing/controlling removable storage devices through software is being utilized. However, because common management software stores logs about the use of the storage device on a personal PC or on a central server, there may be situations in which insiders tamper with the logs after malicious behavior. This paper proposes a blockchain-based log management system to solve the problem of log tamperability of existing removable storage management software.
由于可移动存储设备的使用,对存储设备的安全性提出了更高的要求。为了满足这一需求,一种通过软件管理/控制可移动存储设备的方法正在被利用。但是,由于普通管理软件将存储设备的使用日志保存在个人PC或中心服务器上,因此可能存在内部人员恶意篡改日志的情况。针对现有可移动存储管理软件的日志篡改问题,本文提出了一种基于区块链的日志管理系统。
{"title":"Blockchain based Removable Storage Device Log Management System","authors":"Gyuseong Lee, Minsung Son, Nakhoon Choi, Seongho Hong, Heeyoul Kim","doi":"10.23919/ICACT48636.2020.9061329","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061329","url":null,"abstract":"Since the use of removable storage devices, security of the storage devices has been required as needed. In response to this demand, a method of managing/controlling removable storage devices through software is being utilized. However, because common management software stores logs about the use of the storage device on a personal PC or on a central server, there may be situations in which insiders tamper with the logs after malicious behavior. This paper proposes a blockchain-based log management system to solve the problem of log tamperability of existing removable storage management software.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automating Public Administration in the Digital Age 数字化时代的公共管理自动化
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061426
EunSun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi
Automated administration, as a part of e-administration, is showing different characteristics from conventional automated administration in the digital age. This paper presents the development stages of automated administration, the concept and characteristics of automated administration in the digital age, and the legal challenges for its use. For the first time in academia, we defined automated administration as “machines performing all or part of administration without human intervention” and structured its development in 5 stages. Accordingly, machines will perform administrative acts from the current stage of automated administration after the third stage. Therefore, we need to resolve issues related to the scope and procedures of administrative tasks that will be performed by machines before introducing automated administration to specific administrative acts.
在数字化时代,自动化行政作为电子行政的一部分,呈现出不同于传统自动化行政的特点。本文介绍了自动化行政管理的发展阶段,数字时代自动化行政管理的概念和特点,以及自动化行政管理使用面临的法律挑战。在学术界,我们首次将自动化管理定义为“机器在没有人为干预的情况下执行全部或部分管理”,并将其发展分为5个阶段。因此,在第三阶段之后,机器将从目前的自动化行政阶段开始执行行政行为。因此,在对具体行政行为引入自动化管理之前,我们需要解决与机器执行的行政任务的范围和程序相关的问题。
{"title":"Automating Public Administration in the Digital Age","authors":"EunSun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi","doi":"10.23919/ICACT48636.2020.9061426","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061426","url":null,"abstract":"Automated administration, as a part of e-administration, is showing different characteristics from conventional automated administration in the digital age. This paper presents the development stages of automated administration, the concept and characteristics of automated administration in the digital age, and the legal challenges for its use. For the first time in academia, we defined automated administration as “machines performing all or part of administration without human intervention” and structured its development in 5 stages. Accordingly, machines will perform administrative acts from the current stage of automated administration after the third stage. Therefore, we need to resolve issues related to the scope and procedures of administrative tasks that will be performed by machines before introducing automated administration to specific administrative acts.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision variable anonymization method supporting transprecision computing 精度变量匿名化方法支持透光计算
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061512
K. Harada, H. Charles, H. Nishi
Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture.
近年来,物联网(IoT)传感器的数量迅速增加;因此,收集了各种数据。作为数据的二次使用,它们在提供新服务时很有用,例如智能电网中的需求响应服务。然而,数据服务在保护隐私和计算过程中引起了一些问题。本研究主要关注这两个重要问题。首先,在使用这些数据提供这种新服务时侵犯隐私是有问题的。数据中包含了大量的私人信息。例如,电力消耗数据可以揭示居民的生活方式,获取信息的技术被称为非侵入式负荷监测。其次,物联网设备和传感器的渗透增加了处理数据和使用数据提供各种服务的计算和通信能耗。本文提出了一种新的方法来解决这两个问题。这种方法是基于这样一个事实,即匿名化过程减少了信息量本身,以及所需的计算资源的数量。这导致了匿名化水平和计算成本之间的权衡。例如,原始数据具有最大的信息量和最大的计算成本。相比之下,完全广义数据(全部为零数据)具有最小的信息量和最小的计算成本。与传统方法相比,该方法精度较低,错误率较高。因此,与传统方法相比,该方法旨在控制权衡,以更少的信息、所需的匿名级别和较低的计算成本提供匿名数据。所提出的方法使用从城市设计中心任务(UDCMi)收集的功耗数据进行实践,并使用该数据评估需求响应服务作为实验。在此评估中,在计算中使用了一个简单的能耗模型,该模型使用算术逻辑单元(ALU)提供服务所需的位宽度。当k = 2时,该方法的计算效率比传统方法提高了60%,当k = 3,4,5,6时,该方法的计算效率比传统方法提高了65%。该方法还可以保持可接受的服务误差范围。该透光平台可以通过减小数据的位宽来限制能耗。因此,本文提出的匿名化方法还可以通过实现基于透读架构的低ALU使用率来降低能耗。
{"title":"Precision variable anonymization method supporting transprecision computing","authors":"K. Harada, H. Charles, H. Nishi","doi":"10.23919/ICACT48636.2020.9061512","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061512","url":null,"abstract":"Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE 802.15.4 Now and Then: Evolution of the LR-WPAN Standard IEEE 802.15.4过去与现在:LR-WPAN标准的演进
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061514
Alberto Gallegos Ramonet, Taku Noguchi
For 15 years, the popular IEEE 802.15.4 standard has served as de facto standard for applications with low latency and small energy consumption requirements. During this time, it has evolved and dramatically extend its original purpose. With thousand of possible parameters and combinations, its objectives are not as clear as they were when it was first introduced. In this paper, we present a concise and chronological description of the standard highlighting the main features introduced by each one of its revisions as well as a notion of its usage. A compendium of this kind can be valuable to researchers working on implementations and improvements and to users seeking a general reference. This is relevant now more than ever because the standard must coexist with hundreds of other standards that are also constantly evolving. As presented in this document and despite its popularity and importance, there are very few capable IEEE 802.15.4 simulators and these are often outdated and incomplete. The aim of this paper is to provide a quick reference but also present the evolution of the standard and its future directions. Similarly, we hope that this study fosters the creation of new implementations, particularly new simulations modules.
15年来,流行的IEEE 802.15.4标准一直是具有低延迟和小能耗要求的应用程序的事实上的标准。在这段时间里,它已经发展并戏剧性地扩展了它最初的目的。由于有数千种可能的参数和组合,它的目标不像最初引入时那么明确。在本文中,我们提出了一个简明的和按时间顺序的标准描述,突出了其每次修订引入的主要特征,以及其用法的概念。这种概要对于致力于实现和改进的研究人员以及寻求一般参考的用户来说是有价值的。这一点现在比以往任何时候都更加重要,因为该标准必须与数百个也在不断发展的其他标准共存。正如本文所介绍的那样,尽管IEEE 802.15.4很受欢迎,而且很重要,但功能强大的IEEE 802.15.4模拟器很少,而且往往是过时和不完整的。本文的目的是提供一个快速参考,同时也介绍了该标准的发展及其未来的方向。同样,我们希望这项研究能够促进新的实现,特别是新的模拟模块的创建。
{"title":"IEEE 802.15.4 Now and Then: Evolution of the LR-WPAN Standard","authors":"Alberto Gallegos Ramonet, Taku Noguchi","doi":"10.23919/ICACT48636.2020.9061514","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061514","url":null,"abstract":"For 15 years, the popular IEEE 802.15.4 standard has served as de facto standard for applications with low latency and small energy consumption requirements. During this time, it has evolved and dramatically extend its original purpose. With thousand of possible parameters and combinations, its objectives are not as clear as they were when it was first introduced. In this paper, we present a concise and chronological description of the standard highlighting the main features introduced by each one of its revisions as well as a notion of its usage. A compendium of this kind can be valuable to researchers working on implementations and improvements and to users seeking a general reference. This is relevant now more than ever because the standard must coexist with hundreds of other standards that are also constantly evolving. As presented in this document and despite its popularity and importance, there are very few capable IEEE 802.15.4 simulators and these are often outdated and incomplete. The aim of this paper is to provide a quick reference but also present the evolution of the standard and its future directions. Similarly, we hope that this study fosters the creation of new implementations, particularly new simulations modules.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile Traffic Assessment for 4G Network: Virtual Sample Region Approach 4G网络移动流量评估:虚拟样本区域方法
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061285
K. Cheon, Hye-yeon Kwon, Igor Kim, Seungkeun Park, J. Choi
As service traffic increases in cellular networks, the mobile network must expand their system capacity. It is important to balance between the volume of mobile traffic and the capacity of mobile system in terms of user experience and operation cost. There are two approaches to assess the balance of demand and supply in cellular network: single cell and national wide scale. Nevertheless, both methods are insufficient to evaluate the balance reasonably in real cellular network in terms of scale: too narrow or wide. As radio resources cannot be exchanged between cells, network operators must perform statistical management on traffic dense areas. This paper introduces the virtual sample region concept that is composed of set of traffic-intensive cells in metropolitan area. We evaluate mobile traffic and system capacity based on real measurement from live 4G system in Seoul, South Korea. In this paper we provide the measurement results of mobile traffic per 10 MHz in real top 10% traffic-intensive cells about 3 years. We also estimate spectral efficiency of virtual sample region using system level simulation, and evaluate system capacity using spectral reuse factor, 4G spectrum bandwidth, simulated spectral efficiency. The margin of 4G system capacity is estimated about 30% in the last three years.
随着蜂窝网络业务流量的增加,移动网络必须扩展其系统容量。在用户体验和运营成本方面,平衡移动通信量和移动系统容量是非常重要的。目前有两种评估蜂窝网络供需平衡的方法:单蜂窝网络和全国范围的蜂窝网络。然而,这两种方法都不足以在实际蜂窝网络中合理地评估规模的平衡:太窄或太宽。由于无线资源无法在小区间交换,网络运营商必须对业务密集区进行统计管理。本文介绍了由城市交通密集小区组成的虚拟样本区域的概念。我们基于韩国首尔4G系统的实际测量来评估移动流量和系统容量。在本文中,我们提供了在实际的前10%的业务密集小区中大约3年的每10mhz移动流量的测量结果。利用系统级仿真估算虚拟采样区域的频谱效率,利用频谱复用系数、4G频谱带宽、模拟频谱效率评估系统容量。据估计,过去三年4G系统容量的利润率约为30%。
{"title":"Mobile Traffic Assessment for 4G Network: Virtual Sample Region Approach","authors":"K. Cheon, Hye-yeon Kwon, Igor Kim, Seungkeun Park, J. Choi","doi":"10.23919/ICACT48636.2020.9061285","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061285","url":null,"abstract":"As service traffic increases in cellular networks, the mobile network must expand their system capacity. It is important to balance between the volume of mobile traffic and the capacity of mobile system in terms of user experience and operation cost. There are two approaches to assess the balance of demand and supply in cellular network: single cell and national wide scale. Nevertheless, both methods are insufficient to evaluate the balance reasonably in real cellular network in terms of scale: too narrow or wide. As radio resources cannot be exchanged between cells, network operators must perform statistical management on traffic dense areas. This paper introduces the virtual sample region concept that is composed of set of traffic-intensive cells in metropolitan area. We evaluate mobile traffic and system capacity based on real measurement from live 4G system in Seoul, South Korea. In this paper we provide the measurement results of mobile traffic per 10 MHz in real top 10% traffic-intensive cells about 3 years. We also estimate spectral efficiency of virtual sample region using system level simulation, and evaluate system capacity using spectral reuse factor, 4G spectrum bandwidth, simulated spectral efficiency. The margin of 4G system capacity is estimated about 30% in the last three years.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Framework For Sentiment Analysis Using Deep Learning 基于深度学习的情感分析新框架
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061247
Andleeb Aslam, Usman Qamar, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer
Large amount of un-structured data is present online in the form of opinions and reviews. The most important task of NLP is to Extract useful information from unstructured data by first converting into structured form. Many customers write down reviews online but do not give rating to them. The main concern of this paper is to perform sentiment analysis by predicting two main types of polarities from reviews available online i-e positive and negative. Neural networks models fail to capture the contextual meaning of words and also fails to save long sequences of words and thus results in reducing performance. To overcome this issue a novel Hybrid model (RNN-LSTM-BiLSTM-CNN) using majority voting, word2vec and pre-trained Glove embedding (100d) is proposed to predict sentiment polarity against each review. Loss function used is Binary cross entropy. The proposed model is tested on different state-of-the-art datasets like SST-1, SST-2 and MR Movie review dataset. Results proved that our proposed model results in improved accuracy.
大量的非结构化数据以意见和评论的形式出现在网上。NLP最重要的任务是从非结构化数据中提取有用的信息,首先将其转换成结构化的形式。许多顾客在网上写下评论,但不给他们打分。本文主要关注的是通过预测在线评论的两种主要类型的极性(积极和消极)来进行情感分析。神经网络模型无法捕获单词的上下文含义,也无法保存长序列的单词,从而导致性能下降。为了克服这一问题,提出了一种新的混合模型(RNN-LSTM-BiLSTM-CNN),该模型使用多数投票、word2vec和预训练手套嵌入(100d)来预测每个评论的情绪极性。使用的损失函数是二元交叉熵。该模型在不同的最新数据集(如SST-1、SST-2和MR电影评论数据集)上进行了测试。结果表明,该模型具有较高的精度。
{"title":"A Novel Framework For Sentiment Analysis Using Deep Learning","authors":"Andleeb Aslam, Usman Qamar, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer","doi":"10.23919/ICACT48636.2020.9061247","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061247","url":null,"abstract":"Large amount of un-structured data is present online in the form of opinions and reviews. The most important task of NLP is to Extract useful information from unstructured data by first converting into structured form. Many customers write down reviews online but do not give rating to them. The main concern of this paper is to perform sentiment analysis by predicting two main types of polarities from reviews available online i-e positive and negative. Neural networks models fail to capture the contextual meaning of words and also fails to save long sequences of words and thus results in reducing performance. To overcome this issue a novel Hybrid model (RNN-LSTM-BiLSTM-CNN) using majority voting, word2vec and pre-trained Glove embedding (100d) is proposed to predict sentiment polarity against each review. Loss function used is Binary cross entropy. The proposed model is tested on different state-of-the-art datasets like SST-1, SST-2 and MR Movie review dataset. Results proved that our proposed model results in improved accuracy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic Prediction on Communication Network based on Spatial-Temporal Information 基于时空信息的通信网络流量预测
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061516
Yue Ma, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao
With the development of the communication and computer science technology, the traffic prediction of the communication network has attracted more and more interests from the scholars, meanwhile, it is also a significant problem in the real world. A good prediction result can monitor the diversification of the traffic volume and give an early alarm of the outlier. A key challenge of the traffic prediction in the communication network is that how to combine the spatial-temporal information together to make full use of the data. In this paper, we get two observations: (1) At the same timestamp, different square has different traffic volume, while at the same square, different timestamp also has different traffic volume. (2) There exists some periodicity in the traffic volume data along time. To address the challenges we mentioned before, we propose a novel Multi-Channel Spatial-Temporal framework (MCST) to model the spatial-temporal information. The three-channel CNN can mine the spatial information and enrich the temporal information, while the LSTM can model the temporal information. MCST can fuse the spatial-temporal information together to achieve the goal of giving a better prediction. Experiments on the public dataset of the communication network in Milan verify the effectiveness of the proposed model.
随着通信技术和计算机科学技术的发展,通信网络的流量预测问题越来越受到学者们的关注,同时也是现实世界中的一个重大问题。良好的预测结果可以监测交通流量的变化,对异常点进行预警。如何将时空信息结合起来,充分利用数据,是通信网流量预测面临的一个关键挑战。本文得到两个观察结果:(1)在同一时间戳,不同广场的交通量不同,而在同一广场,不同时间戳的交通量也不同。(2)随着时间的推移,交通量数据存在一定的周期性。为了解决前面提到的问题,我们提出了一种新的多通道时空框架(MCST)来模拟时空信息。三通道CNN可以挖掘空间信息,丰富时间信息,而LSTM可以对时间信息进行建模。MCST可以将时空信息融合在一起,达到更好预测的目的。在米兰通信网公共数据集上的实验验证了该模型的有效性。
{"title":"Traffic Prediction on Communication Network based on Spatial-Temporal Information","authors":"Yue Ma, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao","doi":"10.23919/ICACT48636.2020.9061516","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061516","url":null,"abstract":"With the development of the communication and computer science technology, the traffic prediction of the communication network has attracted more and more interests from the scholars, meanwhile, it is also a significant problem in the real world. A good prediction result can monitor the diversification of the traffic volume and give an early alarm of the outlier. A key challenge of the traffic prediction in the communication network is that how to combine the spatial-temporal information together to make full use of the data. In this paper, we get two observations: (1) At the same timestamp, different square has different traffic volume, while at the same square, different timestamp also has different traffic volume. (2) There exists some periodicity in the traffic volume data along time. To address the challenges we mentioned before, we propose a novel Multi-Channel Spatial-Temporal framework (MCST) to model the spatial-temporal information. The three-channel CNN can mine the spatial information and enrich the temporal information, while the LSTM can model the temporal information. MCST can fuse the spatial-temporal information together to achieve the goal of giving a better prediction. Experiments on the public dataset of the communication network in Milan verify the effectiveness of the proposed model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parametric Analysis of FBMC/OQAM under SUI Fading Channel Models SUI衰落信道模型下FBMC/OQAM的参数分析
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061556
Amna Javed Tiwana, M. Zeeshan
Filter-bank Multicarrier (FBMC) modulation is the most promising 5th Generation (5G) waveform candidate in order to fulfill modern day requirements of ultra-high data rates with minimum latency. With lower side-lobes and faster spectral decay, FBMC is also well suited for reconfigurable radios such as Software Defined Radio (SDR) or Cognitive Radio (CR) for efficient spectrum utilization. In this paper, a performance as well as a parametric analysis of FBMC over Stanford University Interim (SUI) channel models has been analyzed. Performance is evaluated on the basis of Bit error rate (BER) using multipath fading environment that is characterized by Rician distribution, under different scenarios. The evaluation provides a useful basis for FBMC-based dynamic link adaptation in SDR wideband waveform.
滤波器组多载波(FBMC)调制是最有前途的第五代(5G)波形候选,以满足现代对超高数据速率和最小延迟的要求。FBMC具有更低的旁瓣和更快的频谱衰减,也非常适合用于可重构无线电,如软件定义无线电(SDR)或认知无线电(CR),以实现高效的频谱利用。本文分析了FBMC在Stanford University Interim (SUI)信道模型上的性能和参数分析。基于误码率(BER)在不同场景下的性能评估,采用了以时延分布为特征的多径衰落环境。该评价为基于fbmc的SDR宽带动态链路自适应提供了有益的依据。
{"title":"Parametric Analysis of FBMC/OQAM under SUI Fading Channel Models","authors":"Amna Javed Tiwana, M. Zeeshan","doi":"10.23919/ICACT48636.2020.9061556","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061556","url":null,"abstract":"Filter-bank Multicarrier (FBMC) modulation is the most promising 5th Generation (5G) waveform candidate in order to fulfill modern day requirements of ultra-high data rates with minimum latency. With lower side-lobes and faster spectral decay, FBMC is also well suited for reconfigurable radios such as Software Defined Radio (SDR) or Cognitive Radio (CR) for efficient spectrum utilization. In this paper, a performance as well as a parametric analysis of FBMC over Stanford University Interim (SUI) channel models has been analyzed. Performance is evaluated on the basis of Bit error rate (BER) using multipath fading environment that is characterized by Rician distribution, under different scenarios. The evaluation provides a useful basis for FBMC-based dynamic link adaptation in SDR wideband waveform.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Orthogonal Defect Classification-based Software Error Pattern Ontology Construction Researches 基于正交缺陷分类的软件错误模式本体构建研究
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061537
Xuan Hu, Jie Liu, Bo Wu
Orthogonal defect classification is a multi-dimensional measurement system with both qualitative and quantitative features, which is widely used in the software industry. However, the level of abstraction is high, which leads to limited semantic information. Therefore, it has a limited effect in the process of software engineering of complex software systems. To solve this problem, this paper first analyses the software error lifetime from the perspective of knowledge-based software engineering. Furthermore, based on the orthogonal defect classification, the concept of software error pattern is proposed, and its constituent elements and value sets are given. Moreover construct the software error pattern ontology in the requirements analysis phase, focusing on the elements such as “scenario”, “error-manifestation” and “solution”. The example verification part takes unmanned aerial vehicle flight control and management system software as an example to carry out the software requirements error pattern ontology representation and conducts software verification activities based on this and measures the development quality. The results show that the software error pattern can effectively guide the verification of complex software systems and measure the development quality. Therefore, the proposal of software error pattern is of great significance to improve the quality of software development and verification.
正交缺陷分类是一种具有定性和定量双重特点的多维度测量系统,在软件工业中得到了广泛的应用。然而,由于抽象程度较高,导致语义信息有限。因此,它在复杂软件系统的软件工程过程中作用有限。为了解决这一问题,本文首先从基于知识的软件工程的角度对软件错误寿命进行了分析。在正交缺陷分类的基础上,提出了软件错误模式的概念,给出了软件错误模式的组成元素和值集。在需求分析阶段构建软件错误模式本体,重点关注“场景”、“错误表现”和“解决方案”等要素。实例验证部分以无人机飞行控制与管理系统软件为例,开展软件需求错误模式本体表示,并以此为基础进行软件验证活动,对开发质量进行度量。结果表明,软件错误模式可以有效地指导复杂软件系统的验证,衡量开发质量。因此,软件错误模式的提出对提高软件开发和验证质量具有重要意义。
{"title":"The Orthogonal Defect Classification-based Software Error Pattern Ontology Construction Researches","authors":"Xuan Hu, Jie Liu, Bo Wu","doi":"10.23919/ICACT48636.2020.9061537","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061537","url":null,"abstract":"Orthogonal defect classification is a multi-dimensional measurement system with both qualitative and quantitative features, which is widely used in the software industry. However, the level of abstraction is high, which leads to limited semantic information. Therefore, it has a limited effect in the process of software engineering of complex software systems. To solve this problem, this paper first analyses the software error lifetime from the perspective of knowledge-based software engineering. Furthermore, based on the orthogonal defect classification, the concept of software error pattern is proposed, and its constituent elements and value sets are given. Moreover construct the software error pattern ontology in the requirements analysis phase, focusing on the elements such as “scenario”, “error-manifestation” and “solution”. The example verification part takes unmanned aerial vehicle flight control and management system software as an example to carry out the software requirements error pattern ontology representation and conducts software verification activities based on this and measures the development quality. The results show that the software error pattern can effectively guide the verification of complex software systems and measure the development quality. Therefore, the proposal of software error pattern is of great significance to improve the quality of software development and verification.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Color Watermarking within Past Seven Years 近七年来的图像彩色水印
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061263
A. Ghobadi, H. Alvandi
In these day and age by fast growing the knowledge and internet, producing, distributing and manipulating of digital date become an easy task to do. Based on the other researcher result, illegal reproduction of digital information reported as the main concerned and a real problem [1], [2]. There are many problems, which arise such as copyright protection, tamper detection, ownership rights and so on [3]–[6]. This has raised questions and concerns about [4]. Thus, many researchers try to find the solution to addressing these problems. Digital watermarking provides a solution which purpose to solve these problems [5].
在知识和互联网快速发展的今天,数字数据的生产、发布和操作变得很容易。根据其他研究者的研究结果,数字信息的非法复制被报道为主要关注和现实问题[1],[2]。这就产生了版权保护、篡改检测、所有权等诸多问题[3]-[6]。这引发了以下问题和担忧[4]。因此,许多研究者试图找到解决这些问题的方法。数字水印为解决这些问题提供了一种解决方案[5]。
{"title":"Image Color Watermarking within Past Seven Years","authors":"A. Ghobadi, H. Alvandi","doi":"10.23919/ICACT48636.2020.9061263","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061263","url":null,"abstract":"In these day and age by fast growing the knowledge and internet, producing, distributing and manipulating of digital date become an easy task to do. Based on the other researcher result, illegal reproduction of digital information reported as the main concerned and a real problem [1], [2]. There are many problems, which arise such as copyright protection, tamper detection, ownership rights and so on [3]–[6]. This has raised questions and concerns about [4]. Thus, many researchers try to find the solution to addressing these problems. Digital watermarking provides a solution which purpose to solve these problems [5].","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 22nd International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1