Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10201096
Ryuku Hisasue, H. Inamura, S. Ishida
It is posited that Low-rate DoS (LDoS) attack against TCP short transfer has not yet been studied. Since LDoS attacks use pulse-shaped attack traffic, the probability of an attack pulse colliding with the targeted traffic is low when the transfer time is short. In this study, we investigated the feasibility of the Shrew LDoS method against short transfers. In the Shrew method, the time difference between the targeted traffic and the attack traffic, i.e., the attack timing skew, has a large impact on the attack effectiveness for short transfers. Therefore, we proposed the First-Attack Pulse Width Expansion Shrew (Fawe-Shrew) method to improve the attack effectiveness in the presence of this skew. We confirmed that the proposed method has increased tolerance of the skew in the attack initiation timing.
{"title":"A New Low-rate DoS Attack Method Robust to Timing Skew for TCP Short Transfers","authors":"Ryuku Hisasue, H. Inamura, S. Ishida","doi":"10.1109/ICUFN57995.2023.10201096","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10201096","url":null,"abstract":"It is posited that Low-rate DoS (LDoS) attack against TCP short transfer has not yet been studied. Since LDoS attacks use pulse-shaped attack traffic, the probability of an attack pulse colliding with the targeted traffic is low when the transfer time is short. In this study, we investigated the feasibility of the Shrew LDoS method against short transfers. In the Shrew method, the time difference between the targeted traffic and the attack traffic, i.e., the attack timing skew, has a large impact on the attack effectiveness for short transfers. Therefore, we proposed the First-Attack Pulse Width Expansion Shrew (Fawe-Shrew) method to improve the attack effectiveness in the presence of this skew. We confirmed that the proposed method has increased tolerance of the skew in the attack initiation timing.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199849
Wasinee Noonpakdee
The Internet of Things (IoT) has been receiving significant attention from academia, industry, and society due to its diverse range of applications. The IoT ecosystem is composed of different actors, each with a unique role and position. In Thailand, IoT ecosystem could help drive Thailand 4.0 policy that aims to unlock the country from several economic challenges. This paper presents challenges of promoting IoT Ecosystem in Thailand, and propose recommendations for addressing these challenges. The focus group interviews were conducted in five different regions of Thailand: North, East, Northeast, South, and Center. According to the analysis, challenges are addressed in the aspects of Strategy, Stakeholders, Human Resource, R&D and Innovation, Security & Privacy, Infrastructure & Platform, and Government Support. Based on the findings, recommendations for promoting IoT ecosystem in Thailand were proposed, which can be used as a guideline to support the country’s Thailand 4.0 policy for economic development in a rapidly changing environment.
{"title":"Challenges in promoting the Internet of Things Ecosystem for a government","authors":"Wasinee Noonpakdee","doi":"10.1109/ICUFN57995.2023.10199849","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199849","url":null,"abstract":"The Internet of Things (IoT) has been receiving significant attention from academia, industry, and society due to its diverse range of applications. The IoT ecosystem is composed of different actors, each with a unique role and position. In Thailand, IoT ecosystem could help drive Thailand 4.0 policy that aims to unlock the country from several economic challenges. This paper presents challenges of promoting IoT Ecosystem in Thailand, and propose recommendations for addressing these challenges. The focus group interviews were conducted in five different regions of Thailand: North, East, Northeast, South, and Center. According to the analysis, challenges are addressed in the aspects of Strategy, Stakeholders, Human Resource, R&D and Innovation, Security & Privacy, Infrastructure & Platform, and Government Support. Based on the findings, recommendations for promoting IoT ecosystem in Thailand were proposed, which can be used as a guideline to support the country’s Thailand 4.0 policy for economic development in a rapidly changing environment.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199942
Shivani Sanjay Kolekar, Haoyu Chen, Kyungbaek Kim
Recently, there has been a growing interest in researching and developing personalized medical AI services. The previous AI medical systems rarely provided model output compared to multiple datasets and AI models. Currently, only few medical AI systems offer integrated platforms for multidisciplinary precision medicine services. Most existing medical AI systems include AI prognosis with a singular discipline in focus, such as elderly healthcare. This paper proposes a novel digital twin-based integrated precision medicine web-services platform. Our proposed system architecture can be easily implemented in hospital organization interfaces because of the ensured platform independence. Based on the prognostic requirements, we design the service interface with a broad spectrum of patient medical parameter selection (survival time, vital signs, etc.) made available for each medical service. The data related to each patient can be effortlessly updated in real-time. The services will predict and evaluate the accuracy of the visualized output along with the patient clinical information. To verify the feasibility of the proposed architecture, we implemented it with different AI medical services, such as 5 year lung cancer survival prediction, survival analysis with lung tumor segmentation and rapid response analysis. We observed that the architecture showed excellent performance. The architecture for this comprehensive precision medicine web-service platform (Comp-Med) is highly efficient and flexible. It is easily extensible to the new features, services, and updates that may get accommodated in the future.
{"title":"Design of Precision Medicine Web-service Platform Towards Health Care Digital Twin","authors":"Shivani Sanjay Kolekar, Haoyu Chen, Kyungbaek Kim","doi":"10.1109/ICUFN57995.2023.10199942","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199942","url":null,"abstract":"Recently, there has been a growing interest in researching and developing personalized medical AI services. The previous AI medical systems rarely provided model output compared to multiple datasets and AI models. Currently, only few medical AI systems offer integrated platforms for multidisciplinary precision medicine services. Most existing medical AI systems include AI prognosis with a singular discipline in focus, such as elderly healthcare. This paper proposes a novel digital twin-based integrated precision medicine web-services platform. Our proposed system architecture can be easily implemented in hospital organization interfaces because of the ensured platform independence. Based on the prognostic requirements, we design the service interface with a broad spectrum of patient medical parameter selection (survival time, vital signs, etc.) made available for each medical service. The data related to each patient can be effortlessly updated in real-time. The services will predict and evaluate the accuracy of the visualized output along with the patient clinical information. To verify the feasibility of the proposed architecture, we implemented it with different AI medical services, such as 5 year lung cancer survival prediction, survival analysis with lung tumor segmentation and rapid response analysis. We observed that the architecture showed excellent performance. The architecture for this comprehensive precision medicine web-service platform (Comp-Med) is highly efficient and flexible. It is easily extensible to the new features, services, and updates that may get accommodated in the future.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199543
I. Satoh
The paper presents a novel approach to the dynamic deployment of both networking and application software in ubiquitous networks. The proposed approach introduces the concept of first-class objects, enabling the dynamic construction and configuration of software components. This leads to the capability of dynamically deploying software components for defining both networking and application functions at nodes by utilizing network protocols specified within software components. The dynamic deployment improves the reliability and resilience of the network by actively managing network resources, configuring network components, and monitoring network conditions. Furthermore, the approach offers the added advantage of allowing the use of non-standard protocols, as components for defining protocols can be dynamically deployed at nodes using other component-based protocols.
{"title":"Self-Defined Protocols for Ubiquitous Networks","authors":"I. Satoh","doi":"10.1109/ICUFN57995.2023.10199543","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199543","url":null,"abstract":"The paper presents a novel approach to the dynamic deployment of both networking and application software in ubiquitous networks. The proposed approach introduces the concept of first-class objects, enabling the dynamic construction and configuration of software components. This leads to the capability of dynamically deploying software components for defining both networking and application functions at nodes by utilizing network protocols specified within software components. The dynamic deployment improves the reliability and resilience of the network by actively managing network resources, configuring network components, and monitoring network conditions. Furthermore, the approach offers the added advantage of allowing the use of non-standard protocols, as components for defining protocols can be dynamically deployed at nodes using other component-based protocols.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200695
Mingfu Li, G. Lu, Cheng-Bin Yao
In a wireless powered sensor network (WPSN), wireless sensors can receive energy from energy transmitters for operation. To improve the performance of the WPSN, the multisource wireless power transfer technique based on the beamforming multi-antenna architecture has emerged as an attractive solution. Thus, in this paper we consider the WPSN system which includes multiple wireless sensors and multiple multi-antenna energy transmitters. We proposed a dynamic programming-based antenna resource allocation algorithm, which takes the diverse distances among various energy transmitting antennas into account, for the radio frequency-based WPSN to maximize the energy transfer efficiency. According to the numerical results, the proposed dynamic programming-based antenna resource allocation algorithm can achieve near-optimal energy transfer efficiency while reducing the computation complexity significantly, compared with the backtracking algorithm which always achieves the optimal allocation but usually not tractable in practical scenarios.
{"title":"Dynamic Programming-Based Antenna Resource Allocation Algorithm for Wireless Powered Sensor Networks","authors":"Mingfu Li, G. Lu, Cheng-Bin Yao","doi":"10.1109/ICUFN57995.2023.10200695","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200695","url":null,"abstract":"In a wireless powered sensor network (WPSN), wireless sensors can receive energy from energy transmitters for operation. To improve the performance of the WPSN, the multisource wireless power transfer technique based on the beamforming multi-antenna architecture has emerged as an attractive solution. Thus, in this paper we consider the WPSN system which includes multiple wireless sensors and multiple multi-antenna energy transmitters. We proposed a dynamic programming-based antenna resource allocation algorithm, which takes the diverse distances among various energy transmitting antennas into account, for the radio frequency-based WPSN to maximize the energy transfer efficiency. According to the numerical results, the proposed dynamic programming-based antenna resource allocation algorithm can achieve near-optimal energy transfer efficiency while reducing the computation complexity significantly, compared with the backtracking algorithm which always achieves the optimal allocation but usually not tractable in practical scenarios.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200494
Jeongbae Park, Sang-Hwa Chung
IEEE 802.15.4 TSCH MAC uses time-sharing media access control and channel hopping technology to provide stable communication in an industrial environment. However, there is no scheduling technique defined by the standard. The Orchestra is an autonomous link-based cell scheduling technique in TSCH, but it has limitations such as link loss and delay time in high competition environments. ALICE addresses some of these limitations by creating links in both directions, but has the disadvantage of a high radio duty cycle proportional to the number of connected devices. When a device powered by a battery wants to connect, it generates a link using Orchestra, and a device that is supplied with constant power suggests using ALICE to generate a link. A TSCH SIM simulator was used to compare the performance of the Orchestra and ALICE networks, resulting in a 17.32% increase in PDR for the Orchestra network and a decrease in the duty cycle for battery-powered devices of up to 23.35% compared to ALICE.
{"title":"A Selective TSCH Autonomous Cell Scheduling Technique Depending on the Power Supply","authors":"Jeongbae Park, Sang-Hwa Chung","doi":"10.1109/ICUFN57995.2023.10200494","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200494","url":null,"abstract":"IEEE 802.15.4 TSCH MAC uses time-sharing media access control and channel hopping technology to provide stable communication in an industrial environment. However, there is no scheduling technique defined by the standard. The Orchestra is an autonomous link-based cell scheduling technique in TSCH, but it has limitations such as link loss and delay time in high competition environments. ALICE addresses some of these limitations by creating links in both directions, but has the disadvantage of a high radio duty cycle proportional to the number of connected devices. When a device powered by a battery wants to connect, it generates a link using Orchestra, and a device that is supplied with constant power suggests using ALICE to generate a link. A TSCH SIM simulator was used to compare the performance of the Orchestra and ALICE networks, resulting in a 17.32% increase in PDR for the Orchestra network and a decrease in the duty cycle for battery-powered devices of up to 23.35% compared to ALICE.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200567
J. Hwang, D. J. Lee, H. Y. Choi, B. H. Lee, C. G. Yu, S. C. Kim
The visually impaired are complaining of much inconveniences in moving at indoor area like metro station due to the restricted behavior and lack of guidance information. There are several route guidance services for the visually impaired through smartphone using the GPS signal, but these mobile apps cannot be used indoor areas because GPS signal can’t used. The smart block-based indoor route guidance technology was presented to improve the mobility of the visually impaired in indoor areas in this paper. The smart block is designed to check the location of the user indoors and installed on the floor. User positioning algorithm is performed on their smartphone using the location signal from smart block. In this paper, the proposed smart block, route guidance technology using it, and the results of empirical tests in actual railway stations are also represented. The smart block-based route guidance technology is expected to contribute greatly to the improvement of mobility of the visually impaired in indoor areas including railway stations.
{"title":"Smart Block-based Route Guidence Technology for the Visually Impaired","authors":"J. Hwang, D. J. Lee, H. Y. Choi, B. H. Lee, C. G. Yu, S. C. Kim","doi":"10.1109/ICUFN57995.2023.10200567","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200567","url":null,"abstract":"The visually impaired are complaining of much inconveniences in moving at indoor area like metro station due to the restricted behavior and lack of guidance information. There are several route guidance services for the visually impaired through smartphone using the GPS signal, but these mobile apps cannot be used indoor areas because GPS signal can’t used. The smart block-based indoor route guidance technology was presented to improve the mobility of the visually impaired in indoor areas in this paper. The smart block is designed to check the location of the user indoors and installed on the floor. User positioning algorithm is performed on their smartphone using the location signal from smart block. In this paper, the proposed smart block, route guidance technology using it, and the results of empirical tests in actual railway stations are also represented. The smart block-based route guidance technology is expected to contribute greatly to the improvement of mobility of the visually impaired in indoor areas including railway stations.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126504731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200629
Rémi Bouchayer, Jae-Yun Jun, H. Chaouchi, Philippe Millet
Expectations of detection systems have risen with the increase in cyber-attacks. In order to detect the latest and future attacks, systems capable of detecting unknown attacks are needed. Among the various approaches offered by machine learning models, anomaly detection methods can address this need. It is possible to use the autoencoder to detect anomalies and therefore attacks. An autoencoder trained on data from normal use is able to detect attacks, unknown to the model. The attack detection is possible by observing the reconstruction error, which is the distance between the input and the reconstructed input resulting from the model. We considered different distance functions to improve the separation between attacks and normal events, and thus, to improve the performance of the autoencoder. We propose to use the cosine function of the angle formed between the actual input vector and the reconstructed input vector, as a distance function to address the problem of overlapping between normal events and attacks. In addition, we used Tree-structured Parzen Estimator algorithm for the optimization of the hyperparameters of the model. We ran our method on the NSL-KDD dataset and compared the obtained results to those of other methods that exist in the literature.
{"title":"In Search of Distance Functions That Improve Autoencoder Performance for Intrusion Detection","authors":"Rémi Bouchayer, Jae-Yun Jun, H. Chaouchi, Philippe Millet","doi":"10.1109/ICUFN57995.2023.10200629","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200629","url":null,"abstract":"Expectations of detection systems have risen with the increase in cyber-attacks. In order to detect the latest and future attacks, systems capable of detecting unknown attacks are needed. Among the various approaches offered by machine learning models, anomaly detection methods can address this need. It is possible to use the autoencoder to detect anomalies and therefore attacks. An autoencoder trained on data from normal use is able to detect attacks, unknown to the model. The attack detection is possible by observing the reconstruction error, which is the distance between the input and the reconstructed input resulting from the model. We considered different distance functions to improve the separation between attacks and normal events, and thus, to improve the performance of the autoencoder. We propose to use the cosine function of the angle formed between the actual input vector and the reconstructed input vector, as a distance function to address the problem of overlapping between normal events and attacks. In addition, we used Tree-structured Parzen Estimator algorithm for the optimization of the hyperparameters of the model. We ran our method on the NSL-KDD dataset and compared the obtained results to those of other methods that exist in the literature.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114036003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199770
S. Yamada, T. Fujii, Katsuya Suto, Koya Sato
Toward next-generation mobile communication systems such as beyond 5G and 6G, non-terrestrial networks (NTNs) have attracted much attention as they extend the coverage of wireless communication services. In NTNs, drones have multiple roles, such as delivery service and transportation, while providing communication services. Therefore, radio environment estimation in three-dimensional (3D) space is crucial for stable drone operations. However, the impact of the surrounding structures and terrain on the radio environment is not well investigated. In this paper, we propose a method to estimate the received power in the direction of altitude by fusing observed signal data and a 3D map that records the geometry of terrain and structures. The proposed method divides the estimation area into a line-of-sight (LOS) altitude and a non-line-of-sight (NLOS) altitude, the estimation values for each range, and then integrates them to obtain the overall estimation values. Through the simulation using the actual measurement dataset, it is demonstrated that the proposed method outperforms the conventional empirical propagation model, i.e., Hata model.
{"title":"Observation Data and 3D Map-based Radio Environment Estimation for Drone Wireless Communications","authors":"S. Yamada, T. Fujii, Katsuya Suto, Koya Sato","doi":"10.1109/ICUFN57995.2023.10199770","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199770","url":null,"abstract":"Toward next-generation mobile communication systems such as beyond 5G and 6G, non-terrestrial networks (NTNs) have attracted much attention as they extend the coverage of wireless communication services. In NTNs, drones have multiple roles, such as delivery service and transportation, while providing communication services. Therefore, radio environment estimation in three-dimensional (3D) space is crucial for stable drone operations. However, the impact of the surrounding structures and terrain on the radio environment is not well investigated. In this paper, we propose a method to estimate the received power in the direction of altitude by fusing observed signal data and a 3D map that records the geometry of terrain and structures. The proposed method divides the estimation area into a line-of-sight (LOS) altitude and a non-line-of-sight (NLOS) altitude, the estimation values for each range, and then integrates them to obtain the overall estimation values. Through the simulation using the actual measurement dataset, it is demonstrated that the proposed method outperforms the conventional empirical propagation model, i.e., Hata model.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200144
Junhyek Jang, Ki-Taeg Lim, Sanghun Yoon, Daewon Chae, Soo Hyun Jang
In recent years, there are collaborative efforts in establishing protocols between autonomous vehicles(AV) and infrastructures to provide safety and traffic efficiency on the road. Majority of recently proposed cooperative protocols are done using vehicle to vehicle(V2V) based cooperative driving protocol where AVs communicate with each other to negotiate its actions. However, V2V based cooperative protocols has its limitations in environments with obstructions such as buildings. To overcome such shortages, our team previously proposed a vehicle to infrastructure(V2I) based cooperative driving protocol using common surveillance cameras. To maximize V2I efficiency, the visible range of surveillance cameras needs to be extended. Our team present a developed re-identification algorithm between multi-cameras that can extend visible range of surveillance cameras and support real-time applications.
{"title":"Re-ID Technology for V2I based Cooperative Driving Protocol","authors":"Junhyek Jang, Ki-Taeg Lim, Sanghun Yoon, Daewon Chae, Soo Hyun Jang","doi":"10.1109/ICUFN57995.2023.10200144","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200144","url":null,"abstract":"In recent years, there are collaborative efforts in establishing protocols between autonomous vehicles(AV) and infrastructures to provide safety and traffic efficiency on the road. Majority of recently proposed cooperative protocols are done using vehicle to vehicle(V2V) based cooperative driving protocol where AVs communicate with each other to negotiate its actions. However, V2V based cooperative protocols has its limitations in environments with obstructions such as buildings. To overcome such shortages, our team previously proposed a vehicle to infrastructure(V2I) based cooperative driving protocol using common surveillance cameras. To maximize V2I efficiency, the visible range of surveillance cameras needs to be extended. Our team present a developed re-identification algorithm between multi-cameras that can extend visible range of surveillance cameras and support real-time applications.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128820728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}