Kotaro Maruyama, Jungpil Shin, Cheol Min Kim, Chin-Ling Chen
There is a rising interest in non-touch human-computer interaction and enhanced user authentication. We think that the hand gesture will play an important role in non-touch HCI and that it will be requested to reinforce user authentication associated with the hand. In this paper, we propose a novel method to authenticate each user by recognizing his/her hand with Leap motion. We get the reference and test data about three dimensional positions of finger joints by letting users put his/her hand over Leap motion. We identify and verify a user by comparing the intra-digit and inter-digit feature values calculated from the three dimensional coordinates of finger joints. Twenty persons have participated as examinees in our experiments and we have measured the hand of each user 30 times. The experimental results show that we can get the identification rate 84.65% based on only distances between joints as intra-digit features. This implies that hand biometrics such as distances and angles between finger joints can be used to authenticate the user who interacts with computing devices using hand gestures.
{"title":"User Authentication using Leap Motion","authors":"Kotaro Maruyama, Jungpil Shin, Cheol Min Kim, Chin-Ling Chen","doi":"10.1145/3129676.3129698","DOIUrl":"https://doi.org/10.1145/3129676.3129698","url":null,"abstract":"There is a rising interest in non-touch human-computer interaction and enhanced user authentication. We think that the hand gesture will play an important role in non-touch HCI and that it will be requested to reinforce user authentication associated with the hand. In this paper, we propose a novel method to authenticate each user by recognizing his/her hand with Leap motion. We get the reference and test data about three dimensional positions of finger joints by letting users put his/her hand over Leap motion. We identify and verify a user by comparing the intra-digit and inter-digit feature values calculated from the three dimensional coordinates of finger joints. Twenty persons have participated as examinees in our experiments and we have measured the hand of each user 30 times. The experimental results show that we can get the identification rate 84.65% based on only distances between joints as intra-digit features. This implies that hand biometrics such as distances and angles between finger joints can be used to authenticate the user who interacts with computing devices using hand gestures.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Stochastic Point Location (SPL) problem introduced by Oommen [7] can be summarized as searching for an unknown point in the interval under a possibly faulty feedback. The search is performed via a Learning Mechanism (LM) (algorithm) that interacts with a stochastic environment which in turn informs it about the direction of the search. Since the environment is stochastic, the guidance for directions could be faulty. The first solution to the SPL problem which was pioneered by Oommen [7] two decades ago relies on discretizing the search interval and performing a controlled random walk on it. The state of the random walk at each step is considered to be the estimation of the point location. The convergence of the latter simplistic estimation strategy is proved for an infinite resolution. However, the latter strategy yields rather poor accuracy for low resolutions. In this paper, we present sophisticated tracking methods that outperform Oommen strategy [7]. Our methods revolve around tracking some key statistical properties of the underlying random walk using the family of weak estimators. Furthermore, we address the settings where the point location is non-stationary, i.e. LM is searching with uncertainty for a (possibly moving) point in an interval. In such settings, asymptotic results are no longer applicable. Simulation results show that the proposed methods outperform Oommen method for estimating point location by reducing the estimated error up to 75%.
Oommen[7]提出的随机点定位(Stochastic Point Location, SPL)问题可以概括为在可能存在错误反馈的情况下,在区间内寻找一个未知点。搜索是通过学习机制(LM)(算法)执行的,它与随机环境相互作用,从而通知它搜索的方向。由于环境是随机的,指示方向可能是错误的。20年前,由Oommen[7]率先提出的SPL问题的第一个解决方案依赖于离散搜索间隔并对其执行受控随机漫步。随机漫步在每一步的状态被认为是对点位置的估计。证明了后一种简化估计策略在无限分辨率下的收敛性。然而,后一种策略在低分辨率下产生相当差的精度。在本文中,我们提出了优于omommen策略的复杂跟踪方法[7]。我们的方法围绕着使用弱估计器族跟踪底层随机漫步的一些关键统计特性。此外,我们解决了点位置是非平稳的设置,即LM在一个区间内不确定地搜索一个(可能移动的)点。在这种情况下,渐近结果不再适用。仿真结果表明,该方法与omommen方法相比,可将估计误差降低75%。
{"title":"Solving Stochastic Point Location Problem in a Dynamic Environment with Weak Estimation","authors":"A. Mofrad, A. Yazidi, H. Hammer","doi":"10.1145/3129676.3129687","DOIUrl":"https://doi.org/10.1145/3129676.3129687","url":null,"abstract":"The Stochastic Point Location (SPL) problem introduced by Oommen [7] can be summarized as searching for an unknown point in the interval under a possibly faulty feedback. The search is performed via a Learning Mechanism (LM) (algorithm) that interacts with a stochastic environment which in turn informs it about the direction of the search. Since the environment is stochastic, the guidance for directions could be faulty. The first solution to the SPL problem which was pioneered by Oommen [7] two decades ago relies on discretizing the search interval and performing a controlled random walk on it. The state of the random walk at each step is considered to be the estimation of the point location. The convergence of the latter simplistic estimation strategy is proved for an infinite resolution. However, the latter strategy yields rather poor accuracy for low resolutions. In this paper, we present sophisticated tracking methods that outperform Oommen strategy [7]. Our methods revolve around tracking some key statistical properties of the underlying random walk using the family of weak estimators. Furthermore, we address the settings where the point location is non-stationary, i.e. LM is searching with uncertainty for a (possibly moving) point in an interval. In such settings, asymptotic results are no longer applicable. Simulation results show that the proposed methods outperform Oommen method for estimating point location by reducing the estimated error up to 75%.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127634227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Isavudeen, Nicolas Ngan, Eva Dokládalová, M. Akil
The integration of multiple and technologically heterogeneous sensors (infrared, color, etc) in vision systems tend to democratize. The objective is to benefit from the multimodal perception allowing to improve the quality and robustness of challenging applications such as the advanced driver assistance, 3-D vision, inspection systems or military observation equipment. However, the multiplication of heterogeneous processing pipelines makes the design of efficient computing resources for the multi-sensor systems very arduous task. In addition to the context of latency critical application and limited power budget, the designer has often to consider the parameters of sensors varying dynamically as well as the number of active sensors used at the moment. To optimize the computing resource management, we inspire from the self-aware architectures. We propose an original on-chip monitor, completed by an observation and command network-on-chip allowing the system resources supervision and their on-the-fly adaptation. We present the evaluation of the proposed monitoring solution through FPGA implementation. We estimate the cost of the proposed solution in the terms of surface occupation and latency. And finally, we show that the proposed solution guarantees a processing of 1080p resolution frames at more than 60 fps.
{"title":"Highly Scalable Monitoring System on Chip for Multi-Stream Auto-Adaptable Vision System","authors":"Ali Isavudeen, Nicolas Ngan, Eva Dokládalová, M. Akil","doi":"10.1145/3129676.3129721","DOIUrl":"https://doi.org/10.1145/3129676.3129721","url":null,"abstract":"The integration of multiple and technologically heterogeneous sensors (infrared, color, etc) in vision systems tend to democratize. The objective is to benefit from the multimodal perception allowing to improve the quality and robustness of challenging applications such as the advanced driver assistance, 3-D vision, inspection systems or military observation equipment. However, the multiplication of heterogeneous processing pipelines makes the design of efficient computing resources for the multi-sensor systems very arduous task. In addition to the context of latency critical application and limited power budget, the designer has often to consider the parameters of sensors varying dynamically as well as the number of active sensors used at the moment. To optimize the computing resource management, we inspire from the self-aware architectures. We propose an original on-chip monitor, completed by an observation and command network-on-chip allowing the system resources supervision and their on-the-fly adaptation. We present the evaluation of the proposed monitoring solution through FPGA implementation. We estimate the cost of the proposed solution in the terms of surface occupation and latency. And finally, we show that the proposed solution guarantees a processing of 1080p resolution frames at more than 60 fps.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Umar Chaudhry, Sang-Wook Kim, Jee-Hyong Lee
Feature selection is the challenging problem in the field of machine learning. The task is to identify the optimal feature subset by eliminating the redundant and irrelevant features from the dataset. The problem becomes more complicated when dealing with high-dimensional datasets. In this paper, we propose the novel technique based on Monte Carlo Tree Search (MCTS) to find the best feature subset to classify the dataset in hand. The effectiveness and validity of the proposed method is demonstrated by experimenting on many real world datasets.
{"title":"An Effective Feature Selection method using Monte Carlo Search","authors":"Muhammad Umar Chaudhry, Sang-Wook Kim, Jee-Hyong Lee","doi":"10.1145/3129676.3130240","DOIUrl":"https://doi.org/10.1145/3129676.3130240","url":null,"abstract":"Feature selection is the challenging problem in the field of machine learning. The task is to identify the optimal feature subset by eliminating the redundant and irrelevant features from the dataset. The problem becomes more complicated when dealing with high-dimensional datasets. In this paper, we propose the novel technique based on Monte Carlo Tree Search (MCTS) to find the best feature subset to classify the dataset in hand. The effectiveness and validity of the proposed method is demonstrated by experimenting on many real world datasets.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyeongcheol Park, Sungwon Lee, Eunbae Moon, Syed Hassan Ahmed, Dongkyun Kim
The use of bicycles, Segway, Ninebot, and etc. has been rapidly increasing due to the development of personal mobility and technological shift. On the other hand, due to the extensive use of headphones, and smart phones while walking on the road and riding a bicycle, the probability of collisions between pedestrian and bicycle increases. In this regards, it is hard to find a dedicated effort being carried out by the research community. Though Vehicle-to-Pedestrian (V2P) safety applications can be deployed, nevertheless, the Dedicated Short Range Communication (DSRC) protocol consumes a massive amount of energy at the battery operated end user. In this paper, we propose Bicycle-to-Pedestrian (B2P) safety application that can solve the aforementioned issue in more optimized manner. More specifically, we designed and implemented a B2P safety application based on Bluetooth Low Energy (BLE) and have analyzed the failure cases of our safety application and grasped the case studies to improve the reliability.
{"title":"Performance Analysis of Bicycle-to-Pedestrian Safety Application using Bluetooth Low Energy","authors":"Hyeongcheol Park, Sungwon Lee, Eunbae Moon, Syed Hassan Ahmed, Dongkyun Kim","doi":"10.1145/3129676.3129727","DOIUrl":"https://doi.org/10.1145/3129676.3129727","url":null,"abstract":"The use of bicycles, Segway, Ninebot, and etc. has been rapidly increasing due to the development of personal mobility and technological shift. On the other hand, due to the extensive use of headphones, and smart phones while walking on the road and riding a bicycle, the probability of collisions between pedestrian and bicycle increases. In this regards, it is hard to find a dedicated effort being carried out by the research community. Though Vehicle-to-Pedestrian (V2P) safety applications can be deployed, nevertheless, the Dedicated Short Range Communication (DSRC) protocol consumes a massive amount of energy at the battery operated end user. In this paper, we propose Bicycle-to-Pedestrian (B2P) safety application that can solve the aforementioned issue in more optimized manner. More specifically, we designed and implemented a B2P safety application based on Bluetooth Low Energy (BLE) and have analyzed the failure cases of our safety application and grasped the case studies to improve the reliability.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"130 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113985630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gait velocity has become a valid and important metric for senior populations. However, existing approaches to measure gait velocity are either limited to specific location or too expensive to be applied. IoT middleware allows the systems to collect data in a large space in a collaborative manner. However, it is a great challenge of integrating large numbers of low-cost devices to accomplish the task. This paper presents the design, implementation, and findings of using low-cost thermal sensors to monitor the activity index in home environment. The system is built on top of WuKong middleware. The evaluation results show that the system can measure the gait velocity with negligible errors. When the parameters for noise filtering are correctly configured, the F-Score of the heat source detection can achieve 0.99.
{"title":"Collaborative Sensing for Privacy Preserving Gait Tracking Using IoT Middleware","authors":"C. Shih, Tim-Yuao Wang, Jyun-Jhe Chou, Ze-Yu Chuang, Ching-Chih Chuang, Kwei-Jay Lin, Wei-Dean Wang, Kuo-Chin Huang","doi":"10.1145/3129676.3129696","DOIUrl":"https://doi.org/10.1145/3129676.3129696","url":null,"abstract":"Gait velocity has become a valid and important metric for senior populations. However, existing approaches to measure gait velocity are either limited to specific location or too expensive to be applied. IoT middleware allows the systems to collect data in a large space in a collaborative manner. However, it is a great challenge of integrating large numbers of low-cost devices to accomplish the task. This paper presents the design, implementation, and findings of using low-cost thermal sensors to monitor the activity index in home environment. The system is built on top of WuKong middleware. The evaluation results show that the system can measure the gait velocity with negligible errors. When the parameters for noise filtering are correctly configured, the F-Score of the heat source detection can achieve 0.99.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eunji Lee, Htet Myet Lynn, Chang Choi, Hanil Kim, Pankoo Kim
Text reuse has become prominent in the process of information content digitalization owing to the popularization of the Internet and smartphones. Problems related to text reuse are various and complex, and these include problems related to text insertion, deletion, and replacement, and changing of word order. Moreover, in order to inspect reuse in texts with many sources, there must be an efficient method to inspect within a reasonable amount of time and using a reasonable amount of resources. This work is an attempt to improve accuracy of text reuse measurement by using expanded index terms, expanding the range of reused inspection sentences, and circularizing words in order to resolve the issue of undetected reused sentences that arise from the replacement of similar terms. The efficiency of the proposed method was proven through a comparative evaluation with the existing reuse inspection methods.
{"title":"Study on a Text Reuse Measurement Method Using Expanded Index Term","authors":"Eunji Lee, Htet Myet Lynn, Chang Choi, Hanil Kim, Pankoo Kim","doi":"10.1145/3129676.3129686","DOIUrl":"https://doi.org/10.1145/3129676.3129686","url":null,"abstract":"Text reuse has become prominent in the process of information content digitalization owing to the popularization of the Internet and smartphones. Problems related to text reuse are various and complex, and these include problems related to text insertion, deletion, and replacement, and changing of word order. Moreover, in order to inspect reuse in texts with many sources, there must be an efficient method to inspect within a reasonable amount of time and using a reasonable amount of resources. This work is an attempt to improve accuracy of text reuse measurement by using expanded index terms, expanding the range of reused inspection sentences, and circularizing words in order to resolve the issue of undetected reused sentences that arise from the replacement of similar terms. The efficiency of the proposed method was proven through a comparative evaluation with the existing reuse inspection methods.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Hematian, James H. Nguyen, Chao Lu, Wei Yu, Daniel Ku
Software Defined Radio (SDR) can move the complicated signal processing and handling procedures involved in communications from radio equipment into computer software. Consequently, SDR equipment could consist of only a few chips connected to an antenna. In this paper, we present an implemented SDR testbed, which consists of four complete SDR nodes. Using the designed testbed, we have conducted two case studies. The first is designed to facilitate video transmission via adaptive LTE links. Our experimental results demonstrate that adaptive LTE link video transmission could reduce the bandwidth usage for data transmission. In the second case study, we perform UE location estimation by leveraging the signal strength from nearby cell towers, pertinent to various applications, such as public safety and disaster rescue scenarios where GPS (Global Position System) is not available (e.g., indoor environment). Our experimental results show that it is feasible to accurately derive the location of a UE (User Equipment) by signal strength. In addition, we design a Hardware In the Loop (HIL) simulation environment using the Vienna LTE simulator, srsLTE library, and our SDR testbed. We develop a software wrapper to connect the Vienna LTE simulator to our SDR testbed via the srsLTE library. Our experimental results demonstrate the comparative performance of simulated UEs and eNodeBs against real SDR UEs and eNodeBs, as well as how a simulated environment can interact with a real-world implementation.
{"title":"Software Defined Radio Testbed Setup and Experimentation","authors":"A. Hematian, James H. Nguyen, Chao Lu, Wei Yu, Daniel Ku","doi":"10.1145/3129676.3129690","DOIUrl":"https://doi.org/10.1145/3129676.3129690","url":null,"abstract":"Software Defined Radio (SDR) can move the complicated signal processing and handling procedures involved in communications from radio equipment into computer software. Consequently, SDR equipment could consist of only a few chips connected to an antenna. In this paper, we present an implemented SDR testbed, which consists of four complete SDR nodes. Using the designed testbed, we have conducted two case studies. The first is designed to facilitate video transmission via adaptive LTE links. Our experimental results demonstrate that adaptive LTE link video transmission could reduce the bandwidth usage for data transmission. In the second case study, we perform UE location estimation by leveraging the signal strength from nearby cell towers, pertinent to various applications, such as public safety and disaster rescue scenarios where GPS (Global Position System) is not available (e.g., indoor environment). Our experimental results show that it is feasible to accurately derive the location of a UE (User Equipment) by signal strength. In addition, we design a Hardware In the Loop (HIL) simulation environment using the Vienna LTE simulator, srsLTE library, and our SDR testbed. We develop a software wrapper to connect the Vienna LTE simulator to our SDR testbed via the srsLTE library. Our experimental results demonstrate the comparative performance of simulated UEs and eNodeBs against real SDR UEs and eNodeBs, as well as how a simulated environment can interact with a real-world implementation.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose a hand gesture recognition system for door opening. Because the usage of door knobs and the way of opening doors are similar worldwide, people will naturally do similar actions without special promise when opening the door. When a user wears a smart watch, it is possible to perform movements more natural than the movement at the situation with holding a smartphone in hand. We used an accelerometer embedded in a smart watch to collect hand gesture data, which opens each of three types of door, hinged, slide, and shutter. We preprocessed the raw data with two steps. We trimmed the data and normalized trimmed data using akima spline for multi-layer perceptron (MLP). Also, we used MLP to classify the preprocessed hand gesture data in our system.
{"title":"Hand Gesture Recognition for Doors with Neural Network","authors":"Hyunsang Ahn, Jun Sung Kim, J. Shim, Jin Suk Kim","doi":"10.1145/3129676.3129725","DOIUrl":"https://doi.org/10.1145/3129676.3129725","url":null,"abstract":"In this paper we propose a hand gesture recognition system for door opening. Because the usage of door knobs and the way of opening doors are similar worldwide, people will naturally do similar actions without special promise when opening the door. When a user wears a smart watch, it is possible to perform movements more natural than the movement at the situation with holding a smartphone in hand. We used an accelerometer embedded in a smart watch to collect hand gesture data, which opens each of three types of door, hinged, slide, and shutter. We preprocessed the raw data with two steps. We trimmed the data and normalized trimmed data using akima spline for multi-layer perceptron (MLP). Also, we used MLP to classify the preprocessed hand gesture data in our system.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126936702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As one of the core technologies for the future 5G communications, device-to-device (D2D) communication is known to be effective in enhancing spectrum efficiency and improving network throughput. While substantial progress has been made regarding D2D communications in various applications, most of the studies, however, focus on the single-hop D2D communication scenario, leaving the multi-hop D2D communication scenario inadequately investigated. Considering the multi-hop D2D communications are extremely useful in extending the communication range between two devices, and when D2D meets network coding, the potentials of both technologies can be fully unlocked, in this article, we present a tutorial case study on the long-distance D2D communication protocol in which multi-hop data transmissions are enhanced by network coding. We investigate four representative scenarios experimentally to demonstrate the performance gain of applying network coding to D2D communications. Our intention is to provide an in-depth study showing how network coding can be essentially beneficial to multi-hop D2D communications, and to encourage additional research in this area forthcoming.
{"title":"When D2D Meets Network Coding: A Tutorial Case Study","authors":"Jun Huang, Shuai Huang, Cong-Cong Xing","doi":"10.1145/3129676.3129689","DOIUrl":"https://doi.org/10.1145/3129676.3129689","url":null,"abstract":"As one of the core technologies for the future 5G communications, device-to-device (D2D) communication is known to be effective in enhancing spectrum efficiency and improving network throughput. While substantial progress has been made regarding D2D communications in various applications, most of the studies, however, focus on the single-hop D2D communication scenario, leaving the multi-hop D2D communication scenario inadequately investigated. Considering the multi-hop D2D communications are extremely useful in extending the communication range between two devices, and when D2D meets network coding, the potentials of both technologies can be fully unlocked, in this article, we present a tutorial case study on the long-distance D2D communication protocol in which multi-hop data transmissions are enhanced by network coding. We investigate four representative scenarios experimentally to demonstrate the performance gain of applying network coding to D2D communications. Our intention is to provide an in-depth study showing how network coding can be essentially beneficial to multi-hop D2D communications, and to encourage additional research in this area forthcoming.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}