首页 > 最新文献

2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

英文 中文
Scattering Matrix Design of Reconfigurable Intelligent Surface Based on Group Connected Impedance Network in MU-MIMO System MU-MIMO系统中基于群连接阻抗网络的可重构智能曲面散射矩阵设计
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200055
Min-A Kim, Seung-Geun Yoo, Hyoung-Do Kim, Kyeung-Ho Shin, Hyoung-Kyu Song
Reconfigurable intelligent surface (RIS) is considered as a promising technology for next-generation 6G wireless system by controlling the propagation environment that degrades the quality of received signals in wireless communication. In contrast to the conventional RIS architecture in which an impedance of each RIS element is grounded, the general architecture having an impedance network connected to each other element can more flexibly control the signal. The computational complexity by optimization of the scattering matrix of the general RIS architecture increases according to the size of the channel matrix. Therefore, as the number of users increases, high computational complexity is paid for optimizing the scattering matrix. This paper proposes the effective scattering matrix design for RIS based on group connected impedance network in multi-user multiple-input multiple-output(MU-MIMO) wireless communication systems. By limiting the number of supported users per group to one, it is possible to effectively reduce computational complexity and ensure appropriate performance compared to the optimization of the scattering matrix that maximizes the channel gain of all users.
可重构智能表面(RIS)通过控制无线通信中降低接收信号质量的传播环境,被认为是下一代6G无线系统的一项有前途的技术。传统的RIS体系结构中每个RIS元件的阻抗都是接地的,相比之下,具有相互连接的阻抗网络的通用体系结构可以更灵活地控制信号。一般RIS结构散射矩阵优化的计算复杂度随着信道矩阵的增大而增大。因此,随着用户数量的增加,对散射矩阵的优化需要付出很高的计算复杂度。提出了多用户多输入多输出(MU-MIMO)无线通信系统中基于群连接阻抗网络的RIS有效散射矩阵设计方法。通过将每组支持的用户数量限制为一个,与使所有用户的信道增益最大化的散射矩阵优化相比,可以有效地降低计算复杂度并确保适当的性能。
{"title":"Scattering Matrix Design of Reconfigurable Intelligent Surface Based on Group Connected Impedance Network in MU-MIMO System","authors":"Min-A Kim, Seung-Geun Yoo, Hyoung-Do Kim, Kyeung-Ho Shin, Hyoung-Kyu Song","doi":"10.1109/ICUFN57995.2023.10200055","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200055","url":null,"abstract":"Reconfigurable intelligent surface (RIS) is considered as a promising technology for next-generation 6G wireless system by controlling the propagation environment that degrades the quality of received signals in wireless communication. In contrast to the conventional RIS architecture in which an impedance of each RIS element is grounded, the general architecture having an impedance network connected to each other element can more flexibly control the signal. The computational complexity by optimization of the scattering matrix of the general RIS architecture increases according to the size of the channel matrix. Therefore, as the number of users increases, high computational complexity is paid for optimizing the scattering matrix. This paper proposes the effective scattering matrix design for RIS based on group connected impedance network in multi-user multiple-input multiple-output(MU-MIMO) wireless communication systems. By limiting the number of supported users per group to one, it is possible to effectively reduce computational complexity and ensure appropriate performance compared to the optimization of the scattering matrix that maximizes the channel gain of all users.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123977937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Plenary Autonomous Intersection Management Protocol for Heterogeneous Connected Vehicles 异构网联车辆全自主交叉口管理协议
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200347
Ashkan Gholamhosseinian, J. Seitz
This paper proposes a centralized autonomous intersection management scheme for heterogeneous connected vehicles (HCVs). Contributions of this work are as follows. First, we sustainably classify heterogeneous vehicles with their distinctive safety-related characteristics. Second, we conduct a safe and efficient coordination algorithm with respect to some criteria such as vehicle types, road priorities and right of way rules. Third, we consider the impact of different road conditions, vehicle characteristics, load, and braking technology on the system performance. Forth, we demonstrate the efficiency of the system under various traffic densities with symmetric and asymmetric vehicle distribution. Besides, system performance is to be compared with traffic lights (TLs) scenarios in terms of throughput, average travel time (ATT), intersection busy time (IBT), channel busy rate (CBR), and packet loss rate (PLR) in various road conditions.
提出了一种异构互联车辆集中自主交叉口管理方案。本工作的贡献如下。首先,我们根据不同的安全相关特征对异质车辆进行可持续分类。其次,针对车辆类型、道路优先级、路权规则等标准,进行安全高效的协调算法。第三,我们考虑了不同道路条件、车辆特性、负载和制动技术对系统性能的影响。第四,在对称和非对称车辆分布情况下,验证了系统在不同交通密度下的效率。此外,还将系统性能与交通灯场景在不同路况下的吞吐量、平均通行时间(ATT)、交叉口忙时(IBT)、通道忙率(CBR)和丢包率(PLR)进行比较。
{"title":"Plenary Autonomous Intersection Management Protocol for Heterogeneous Connected Vehicles","authors":"Ashkan Gholamhosseinian, J. Seitz","doi":"10.1109/ICUFN57995.2023.10200347","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200347","url":null,"abstract":"This paper proposes a centralized autonomous intersection management scheme for heterogeneous connected vehicles (HCVs). Contributions of this work are as follows. First, we sustainably classify heterogeneous vehicles with their distinctive safety-related characteristics. Second, we conduct a safe and efficient coordination algorithm with respect to some criteria such as vehicle types, road priorities and right of way rules. Third, we consider the impact of different road conditions, vehicle characteristics, load, and braking technology on the system performance. Forth, we demonstrate the efficiency of the system under various traffic densities with symmetric and asymmetric vehicle distribution. Besides, system performance is to be compared with traffic lights (TLs) scenarios in terms of throughput, average travel time (ATT), intersection busy time (IBT), channel busy rate (CBR), and packet loss rate (PLR) in various road conditions.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 1.4mW Sigma Delta ADC with Configurable Filter for Sensor Applications 1.4mW Sigma Delta ADC,可配置滤波器,用于传感器应用
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200609
Phanidarapu Mounika, Younggun Pu, Kangyoon Lee
This paper presents a second order Sigma-Delta (SD) Analog-to-Digital Converter (ADC) is designed to achieve low power and high resolution in sensor applications. To reduce the power, CIC filter has been implemented as decimation filter. The digital filter's decimation factor can be adjusted, allowing it to be reconfigured for use with various data rates and input signal bandwidths. The proposed SD-ADC consists of Input Multiplexer, Input Buffer, Current Generator, Reference Generator bias, Common Mode Voltage generator, Clock divider, ADC Core and Digital Decimation Filter. The proposed SD-ADC has an Effective number of Bits (ENOB) of 15.2 bits and Signal to Noise and Distortion Ratio (SNDR) of 80.6 dB. The designed SD-ADC is implemented with $0.13 mu mathrm{m}$ Technology using 1.5V power supply and consumes 0.94 mA of current with input frequency of 1 kHz.
本文设计了一种二阶Sigma-Delta (SD)模数转换器(ADC),以实现传感器应用中的低功耗和高分辨率。为了降低功耗,CIC滤波器被实现为抽取滤波器。数字滤波器的抽取因子可以调整,允许它被重新配置,以使用各种数据速率和输入信号带宽。所提出的SD-ADC由输入多路复用器、输入缓冲器、电流发生器、参考偏置发生器、共模电压发生器、时钟分频器、ADC核心和数字抽取滤波器组成。该SD-ADC的有效位数(ENOB)为15.2位,信噪比和失真比(SNDR)为80.6 dB。所设计的SD-ADC采用$0.13 mu maththrm {m}$ Technology,采用1.5V电源,功耗为0.94 mA,输入频率为1 kHz。
{"title":"A 1.4mW Sigma Delta ADC with Configurable Filter for Sensor Applications","authors":"Phanidarapu Mounika, Younggun Pu, Kangyoon Lee","doi":"10.1109/ICUFN57995.2023.10200609","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200609","url":null,"abstract":"This paper presents a second order Sigma-Delta (SD) Analog-to-Digital Converter (ADC) is designed to achieve low power and high resolution in sensor applications. To reduce the power, CIC filter has been implemented as decimation filter. The digital filter's decimation factor can be adjusted, allowing it to be reconfigured for use with various data rates and input signal bandwidths. The proposed SD-ADC consists of Input Multiplexer, Input Buffer, Current Generator, Reference Generator bias, Common Mode Voltage generator, Clock divider, ADC Core and Digital Decimation Filter. The proposed SD-ADC has an Effective number of Bits (ENOB) of 15.2 bits and Signal to Noise and Distortion Ratio (SNDR) of 80.6 dB. The designed SD-ADC is implemented with $0.13 mu mathrm{m}$ Technology using 1.5V power supply and consumes 0.94 mA of current with input frequency of 1 kHz.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of Degree Distribution for Layer-aligned Multipriority Rateless Codes based on Safety Criteria of Ripple 基于Ripple安全准则的层对齐多优先级无速率码度分布优化
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10199801
Lien-En Hung, Chun-Kuan Lee, Hsu-Feng Hsiao
Data loss or errors happen frequently on real networks. A common way of addressing this issue is packet retransmission, at the cost of potentially excessive transmission delay. For applications such as multimedia streaming, using channel coding to combat packet loss or errors is a more attractive option. Rateless codes have been an interesting approach due to their lower coding complexity and versatility. Layer-aligned multipriority rateless codes were originally designed for streaming with the capability of unequal error protection. In this paper, we are interested in finding a better degree distribution for such codes. We firstly derive the safety criteria of ripple sizes using a proposed leaping random walk model. In addition, we design an estimate function to predict the ripple size variation for the layer-aligned multipriority rateless codes. To achieve a better degree distribution, we use a genetic algorithm to optimize a multi-objective problem that we have formulated. This enabled us to improve the overall performance of the coding methods. Our simulation results demonstrate that the optimized degree distribution lead to significant improvements in error correction and data recovery rates.
在现实网络中,数据丢失或错误是经常发生的。解决这个问题的一种常用方法是数据包重传,但代价是可能造成过多的传输延迟。对于诸如多媒体流这样的应用程序,使用信道编码来对抗数据包丢失或错误是一个更有吸引力的选择。无速率代码由于其较低的编码复杂性和通用性而成为一种有趣的方法。层对齐多优先级无速率码最初是为流通信设计的,具有不等错误保护功能。在本文中,我们感兴趣的是为这些码找到一个更好的度分布。我们首先利用一种提出的跳跃随机游走模型推导出波纹大小的安全准则。此外,我们设计了一个估计函数来预测层对齐多优先级无速率码的纹波大小变化。为了获得更好的度分布,我们使用遗传算法对我们制定的多目标问题进行优化。这使我们能够提高编码方法的整体性能。仿真结果表明,优化后的度分布可以显著提高纠错率和数据恢复率。
{"title":"Optimization of Degree Distribution for Layer-aligned Multipriority Rateless Codes based on Safety Criteria of Ripple","authors":"Lien-En Hung, Chun-Kuan Lee, Hsu-Feng Hsiao","doi":"10.1109/ICUFN57995.2023.10199801","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199801","url":null,"abstract":"Data loss or errors happen frequently on real networks. A common way of addressing this issue is packet retransmission, at the cost of potentially excessive transmission delay. For applications such as multimedia streaming, using channel coding to combat packet loss or errors is a more attractive option. Rateless codes have been an interesting approach due to their lower coding complexity and versatility. Layer-aligned multipriority rateless codes were originally designed for streaming with the capability of unequal error protection. In this paper, we are interested in finding a better degree distribution for such codes. We firstly derive the safety criteria of ripple sizes using a proposed leaping random walk model. In addition, we design an estimate function to predict the ripple size variation for the layer-aligned multipriority rateless codes. To achieve a better degree distribution, we use a genetic algorithm to optimize a multi-objective problem that we have formulated. This enabled us to improve the overall performance of the coding methods. Our simulation results demonstrate that the optimized degree distribution lead to significant improvements in error correction and data recovery rates.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System 端到端通信系统中可训练星座的神经需求器评估
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200350
Nazmul Islam, Seokjoo Shin
Conventional M-ary Quadrature Amplitude Modulation (M-QAM) constellation designs such as rectangular constellation, are based on mathematical data and estimated channel models to achieve equal probability of error for transmitted bits in communication systems. However, these designs are suboptimal as they are not receptive to practical channel conditions or system performance due to their fixed lattice structure, and their performance degrades with a higher number of bits per symbol. Deep learning (DL) based end-to-end communication systems can be utilized to circumvent these challenges for better overall performance. Such systems are implemented as deep neural network (DNN) autoencoders, where trainable constellations and neural demappers (ND) can be jointly trained to achieve optimum constellation design for a higher data rate communication system. In this study, we evaluate the performance of two NDs that implement trainable constellation design and compared them with two baseline demapping algorithms in an end-to-end communication system. In the analysis, the NDs outperformed the baseline demappers for higher bits per symbol transmission, and trainable constellation design corresponding to 1024-QAM achieved the highest gain of 0.8 dB compared to the baseline demappers.
传统的正交调幅(M-QAM)星座设计,如矩形星座,是基于数学数据和估计信道模型来实现通信系统中传输位的等概率误差。然而,这些设计是次优的,因为它们不接受实际的信道条件或系统性能,因为它们的固定晶格结构,并且它们的性能随着每个符号的比特数的增加而下降。基于深度学习(DL)的端到端通信系统可以用来规避这些挑战,以获得更好的整体性能。这种系统被实现为深度神经网络(DNN)自编码器,其中可训练的星座和神经分解器(ND)可以共同训练,以实现更高数据速率通信系统的最佳星座设计。在本研究中,我们评估了两种实现可训练星座设计的nd的性能,并将它们与端到端通信系统中的两种基线解映射算法进行了比较。在分析中,nd在更高的每符号比特传输方面优于基线demappers,与基线demappers相比,1024-QAM对应的可训练星座设计获得了0.8 dB的最高增益。
{"title":"Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System","authors":"Nazmul Islam, Seokjoo Shin","doi":"10.1109/ICUFN57995.2023.10200350","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200350","url":null,"abstract":"Conventional M-ary Quadrature Amplitude Modulation (M-QAM) constellation designs such as rectangular constellation, are based on mathematical data and estimated channel models to achieve equal probability of error for transmitted bits in communication systems. However, these designs are suboptimal as they are not receptive to practical channel conditions or system performance due to their fixed lattice structure, and their performance degrades with a higher number of bits per symbol. Deep learning (DL) based end-to-end communication systems can be utilized to circumvent these challenges for better overall performance. Such systems are implemented as deep neural network (DNN) autoencoders, where trainable constellations and neural demappers (ND) can be jointly trained to achieve optimum constellation design for a higher data rate communication system. In this study, we evaluate the performance of two NDs that implement trainable constellation design and compared them with two baseline demapping algorithms in an end-to-end communication system. In the analysis, the NDs outperformed the baseline demappers for higher bits per symbol transmission, and trainable constellation design corresponding to 1024-QAM achieved the highest gain of 0.8 dB compared to the baseline demappers.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Home IoT Authority Control Method Based on DID Auth 基于DID认证的家庭物联网权限控制方法
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200331
Jae-Ho Choi, Junhong Im, Hae-Jun Song, Ki-Hyung Kim
The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.
家庭物联网设备市场正在迅速扩大,这导致这些设备在家庭中的采用越来越多。然而,与其他设备相比,物联网设备长期以来一直受到各种漏洞的挑战,并构成独特的安全挑战。本文旨在通过利用分散式标识符(DID)身份验证来重新定义进入家庭物联网环境的过程,并提出了一种使用可验证凭证(VC)和可验证演示(VP)来控制访客等外部访问的综合方法。通过安全性分析,本文还强调了这些身份验证和权限控制如何解决传统的漏洞,并提供比传统物联网身份验证方法更高的安全性。这项研究的结果揭示了这种方法对家庭物联网环境安全的重大影响。
{"title":"Home IoT Authority Control Method Based on DID Auth","authors":"Jae-Ho Choi, Junhong Im, Hae-Jun Song, Ki-Hyung Kim","doi":"10.1109/ICUFN57995.2023.10200331","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200331","url":null,"abstract":"The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Multi-hop Time synchronization on a Network of AUVs Performing Lawn Mower Trajectory 多跳时间同步在自动水下机器人割草机运动网络中的应用
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10201060
Ansa Shermin, S. Dhongdi
This paper presents a use case of multi-hop time synchronization for autonomous underwater vehicles (AUVs) performing lawn mower trajectory. The work showcases a time synchronization protocol that could address mobility in multi-hop underwater scenarios. An existing time synchronization protocol named Doppler-Enhanced time synchronization (DE-sync) protocol is chosen and extended to an application-specific multi-hop scenario. It further considers the error analysis in the elapsed time duration after message exchanges in each hop. Simulations have been performed using MATLAB. It is observed that DE-sync shows better performance in terms of synchronization error than the other similar protocols. It is also found that error increases with the number of hops but with limited bounds.
提出了一种多跳时间同步的自动水下航行器(auv)执行割草机轨迹的用例。这项工作展示了一种时间同步协议,可以解决水下多跳场景下的移动性问题。选择现有的多普勒增强时间同步(DE-sync)协议,并将其扩展到特定于应用程序的多跳场景。它进一步考虑在每一跳的消息交换后经过的时间持续时间内的错误分析。利用MATLAB进行了仿真。我们观察到DE-sync在同步错误方面表现出比其他类似协议更好的性能。误差随跳数的增加而增加,但有限制。
{"title":"Application of Multi-hop Time synchronization on a Network of AUVs Performing Lawn Mower Trajectory","authors":"Ansa Shermin, S. Dhongdi","doi":"10.1109/ICUFN57995.2023.10201060","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10201060","url":null,"abstract":"This paper presents a use case of multi-hop time synchronization for autonomous underwater vehicles (AUVs) performing lawn mower trajectory. The work showcases a time synchronization protocol that could address mobility in multi-hop underwater scenarios. An existing time synchronization protocol named Doppler-Enhanced time synchronization (DE-sync) protocol is chosen and extended to an application-specific multi-hop scenario. It further considers the error analysis in the elapsed time duration after message exchanges in each hop. Simulations have been performed using MATLAB. It is observed that DE-sync shows better performance in terms of synchronization error than the other similar protocols. It is also found that error increases with the number of hops but with limited bounds.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129648422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traffic Accident Detection and Classification in Videos based on Deep Network Features 基于深度网络特征的视频交通事故检测与分类
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10199977
Zain Ul Arifeen, Jang-Eui Hong, B. Seo, Jae-Won Suh
The number of vehicles on the road has increased significantly, which pose a number of challenges to cope with for traffic management. Especially road accidents need instant attention to reduce the loss of people life and their property. In this paper, we propose a traffic accident detection and classification framework, which automatically detects accident in traffic videos using deep networks features and also classify that accident into car-car and car-bike collisions. The proposed framework works in two phases. Accident anomaly detection: We explore three convolution neural networks (CNN’s) named GoogLeNet, AlexNet and VGGNet, where deep features are extracted using these networks and a one class support vector machine (OCSVM) is trained on each network deep features, which are used to detect accident anomalies in a outlier fashion. Accident anomaly classification: where a multi-class SVM model is trained using the features of the detected accident frames and is used to classify accident into car-car and car-bike collisions. The experimental results on UCF-Crime road accident video sequences show that the proposed approach achieves high accuracy on both traffic accident anomaly detection and classification.
道路上的车辆数量大幅增加,这给交通管理带来了许多挑战。特别是道路交通事故需要立即注意,以减少人们生命和财产的损失。本文提出了一种交通事故检测与分类框架,该框架利用深度网络特征自动检测交通视频中的事故,并将事故分类为汽车-汽车碰撞和汽车-自行车碰撞。拟议的框架分为两个阶段。事故异常检测:我们探索了GoogLeNet、AlexNet和VGGNet三种卷积神经网络(CNN),其中使用这些网络提取深度特征,并在每个网络深度特征上训练一类支持向量机(OCSVM),用于以离群值方式检测事故异常。事故异常分类:利用检测到的事故帧特征训练多类SVM模型,将事故分类为汽车-汽车碰撞和汽车-自行车碰撞。在UCF-Crime道路交通事故视频序列上的实验结果表明,该方法在交通事故异常检测和分类上都取得了较高的准确率。
{"title":"Traffic Accident Detection and Classification in Videos based on Deep Network Features","authors":"Zain Ul Arifeen, Jang-Eui Hong, B. Seo, Jae-Won Suh","doi":"10.1109/ICUFN57995.2023.10199977","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199977","url":null,"abstract":"The number of vehicles on the road has increased significantly, which pose a number of challenges to cope with for traffic management. Especially road accidents need instant attention to reduce the loss of people life and their property. In this paper, we propose a traffic accident detection and classification framework, which automatically detects accident in traffic videos using deep networks features and also classify that accident into car-car and car-bike collisions. The proposed framework works in two phases. Accident anomaly detection: We explore three convolution neural networks (CNN’s) named GoogLeNet, AlexNet and VGGNet, where deep features are extracted using these networks and a one class support vector machine (OCSVM) is trained on each network deep features, which are used to detect accident anomalies in a outlier fashion. Accident anomaly classification: where a multi-class SVM model is trained using the features of the detected accident frames and is used to classify accident into car-car and car-bike collisions. The experimental results on UCF-Crime road accident video sequences show that the proposed approach achieves high accuracy on both traffic accident anomaly detection and classification.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Classification of Cross-Layer Optimization Approaches in LoRaWAN for Internet of Things 物联网LoRaWAN跨层优化方法分类
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10199434
Carl Christian Chaguile, Melchizedek I. Alipio, Miroslav Bures
The Internet of Things (IoT) uses Low-Power Wide Area Networks (LPWAN) for applications that require long-range, energy-efficient, and low-cost end devices. LoRaWAN is one of the most popular LPWAN technologies because of its key features and openness making it highly suitable for IoT. Despite its exceptional features, some challenges faced by this technology are optimizing the protocol used for scheduling, low data rate, and duty cycle restrictions. One possible way to address these challenges is by using cross-layer optimization. This optimization technique violates the restrictions of the traditional OSI protocol stack giving freedom to its protocol layers. However, there is currently no summary of cross-layer methods implemented in LoRaWAN. This paper presents a classification of state-of-the-art cross-layer approaches that were used in optimizing the LoRaWAN technology in IoT. The cross-layer techniques were classified based on the merging of adjacent layers, direct communication between layers, and completely new abstractions. In addition, this paper identified the issues and challenges featured in these state-of-the-art cross-layer approaches. Finally, this paper serves as an overview of the performance of cross-layer optimization in LoRaWAN technology for IoT applications.
物联网(IoT)采用低功耗广域网(Low-Power Wide Area network, LPWAN)来满足需要远程、节能和低成本终端设备的应用。LoRaWAN是最流行的LPWAN技术之一,因为它的关键特性和开放性使其非常适合物联网。尽管具有特殊的功能,但该技术面临的一些挑战是优化用于调度、低数据速率和占空比限制的协议。解决这些挑战的一种可能方法是使用跨层优化。这种优化技术打破了传统OSI协议栈的限制,使其协议层具有自由度。然而,目前还没有关于在LoRaWAN中实现的跨层方法的总结。本文介绍了用于优化物联网中LoRaWAN技术的最先进的跨层方法的分类。跨层技术根据相邻层的合并、层之间的直接通信和全新的抽象进行分类。此外,本文还确定了这些最先进的跨层方法所面临的问题和挑战。最后,本文概述了物联网应用中LoRaWAN技术的跨层优化性能。
{"title":"A Classification of Cross-Layer Optimization Approaches in LoRaWAN for Internet of Things","authors":"Carl Christian Chaguile, Melchizedek I. Alipio, Miroslav Bures","doi":"10.1109/ICUFN57995.2023.10199434","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199434","url":null,"abstract":"The Internet of Things (IoT) uses Low-Power Wide Area Networks (LPWAN) for applications that require long-range, energy-efficient, and low-cost end devices. LoRaWAN is one of the most popular LPWAN technologies because of its key features and openness making it highly suitable for IoT. Despite its exceptional features, some challenges faced by this technology are optimizing the protocol used for scheduling, low data rate, and duty cycle restrictions. One possible way to address these challenges is by using cross-layer optimization. This optimization technique violates the restrictions of the traditional OSI protocol stack giving freedom to its protocol layers. However, there is currently no summary of cross-layer methods implemented in LoRaWAN. This paper presents a classification of state-of-the-art cross-layer approaches that were used in optimizing the LoRaWAN technology in IoT. The cross-layer techniques were classified based on the merging of adjacent layers, direct communication between layers, and completely new abstractions. In addition, this paper identified the issues and challenges featured in these state-of-the-art cross-layer approaches. Finally, this paper serves as an overview of the performance of cross-layer optimization in LoRaWAN technology for IoT applications.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Seamless Authentication Scheme for Edge-Assisted IoV networks 边缘辅助车联网的轻量级无缝认证方案
Pub Date : 2023-07-04 DOI: 10.1109/ICUFN57995.2023.10200823
Seunghwan Son, Myeonghyun Kim, Youngho Park
Internet of vehicles (IoV) is an expanded concept of vehicular ad-hoc networks (VANET), and it is more scalable and can be combined with the latest mobile communication technology such as 5G and 6G. The IoV environment aims to realize autonomous driving through communication such as vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-person (V2P). Among them, V2I interaction is the most basic communication. In IoV environments, vehicles have mobility, and it is very frequent to authenticate with the same RSU or another RSU after authenticating with a RSU in its first region. If the authentication process is repeated in re-authentication situations, it can put a burden on the vehicle and RSU and have negatively the performance of the network. In this paper, we proposed authentication protocols considering three situations: Initial authentication, re-authentication, and handover authentication. We demonstrate that our scheme has resistance to various attack scenarios, and compared the performance of the proposed scheme with existing schemes.
车联网(IoV)是车辆自组织网络(VANET)的扩展概念,具有更高的可扩展性,可以与5G和6G等最新移动通信技术相结合。车联网环境旨在通过车辆对基础设施(V2I)、车辆对车辆(V2V)、车辆对人(V2P)等通信实现自动驾驶。其中,V2I交互是最基本的沟通方式。在物联网环境中,车辆具有移动性,并且在与第一个区域的RSU进行身份验证后,经常会与相同的RSU或另一个RSU进行身份验证。如果在重新身份验证的情况下重复身份验证过程,可能会给车辆和RSU带来负担,并对网络性能产生负面影响。在本文中,我们提出了三种情况下的认证协议:初始认证、重新认证和移交认证。我们证明了该方案能够抵抗各种攻击场景,并将其性能与现有方案进行了比较。
{"title":"A Lightweight Seamless Authentication Scheme for Edge-Assisted IoV networks","authors":"Seunghwan Son, Myeonghyun Kim, Youngho Park","doi":"10.1109/ICUFN57995.2023.10200823","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200823","url":null,"abstract":"Internet of vehicles (IoV) is an expanded concept of vehicular ad-hoc networks (VANET), and it is more scalable and can be combined with the latest mobile communication technology such as 5G and 6G. The IoV environment aims to realize autonomous driving through communication such as vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-person (V2P). Among them, V2I interaction is the most basic communication. In IoV environments, vehicles have mobility, and it is very frequent to authenticate with the same RSU or another RSU after authenticating with a RSU in its first region. If the authentication process is repeated in re-authentication situations, it can put a burden on the vehicle and RSU and have negatively the performance of the network. In this paper, we proposed authentication protocols considering three situations: Initial authentication, re-authentication, and handover authentication. We demonstrate that our scheme has resistance to various attack scenarios, and compared the performance of the proposed scheme with existing schemes.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1