Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539591
H. Jeon
In recent years, virtualization has come into the spotlight as an enabler of cloud computing, and is evolving from the growth stage to the maturity stage. This paper presented the thematic structure of virtualization technologies over the period 1998–2013, in which virtualization technology shifted from a nascent technology to a key technology of cloud computing. More specifically, we discovered hidden thematic structure in a large collection of patents relating to virtualization by identifying topics through the Latent Dirichlet Allocation (LDA) topic model.
{"title":"The thematic landscape of virtualization technologies (1998 – 2013)","authors":"H. Jeon","doi":"10.1109/ICTC.2018.8539591","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539591","url":null,"abstract":"In recent years, virtualization has come into the spotlight as an enabler of cloud computing, and is evolving from the growth stage to the maturity stage. This paper presented the thematic structure of virtualization technologies over the period 1998–2013, in which virtualization technology shifted from a nascent technology to a key technology of cloud computing. More specifically, we discovered hidden thematic structure in a large collection of patents relating to virtualization by identifying topics through the Latent Dirichlet Allocation (LDA) topic model.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539366
Noh-Sam Park, Mikyong Han
In this paper, we introduce the authoring tool for Virtual Reality content with sensory effects information. We adopt MPEG-V part 3 standard as the means for representing and communicating sensory effects so the generated VR content can be compatible in other standard compatible devices. We propose the Unity plug-in for authoring to facilitate the easy use of a tool. Sensory effects can be made as active or passive, which renders the effects with or without the user’s interactions respectively. We developed the tool to communicate sensory data with both software and hardware simulators in order to represent the effects.
本文介绍了一种具有感官效果信息的虚拟现实内容创作工具。我们采用MPEG-V part 3标准作为表现和传达感官效果的手段,使生成的VR内容能够在其他标准兼容的设备中兼容。我们建议使用Unity插件进行创作,以方便使用工具。感官效果可以制作为主动或被动,分别在有或没有用户交互的情况下呈现效果。我们开发了一种工具来与软件和硬件模拟器交流感官数据,以表示效果。
{"title":"Sensory Effect Authoring Tool for Virtual Reality Simulation","authors":"Noh-Sam Park, Mikyong Han","doi":"10.1109/ICTC.2018.8539366","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539366","url":null,"abstract":"In this paper, we introduce the authoring tool for Virtual Reality content with sensory effects information. We adopt MPEG-V part 3 standard as the means for representing and communicating sensory effects so the generated VR content can be compatible in other standard compatible devices. We propose the Unity plug-in for authoring to facilitate the easy use of a tool. Sensory effects can be made as active or passive, which renders the effects with or without the user’s interactions respectively. We developed the tool to communicate sensory data with both software and hardware simulators in order to represent the effects.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539723
Meryam Essaid, Hyeonwoo Kim, W. Park, Kiyoung Lee, Se Jin Park, Hongtaek Ju
Bitcoin, the most popular peer-to-peer electronic cash system stands strong in its feature of decentralized architecture based on the blockchain technology. The blockchain platform allows the maintenance of a shared distributed ledger, which can be simultaneously read/accumulated by all participants without being owned/controlled by any central unit or person. This paper focuses on scoping the networking side of the Bitcoin blockchain network. In our study, we analyze how Bitcoin utilizes the flooding peer-to-peer (P2P) protocol to broadcast events through the bitcoin network to update the replicas of the ledger. We then use the collected data to identify the process of data propagation, the broadcasting delay, and the bandwidth needed to keep up with the ledger real-time updates.
{"title":"Network Usage of Bitcoin Full Node","authors":"Meryam Essaid, Hyeonwoo Kim, W. Park, Kiyoung Lee, Se Jin Park, Hongtaek Ju","doi":"10.1109/ICTC.2018.8539723","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539723","url":null,"abstract":"Bitcoin, the most popular peer-to-peer electronic cash system stands strong in its feature of decentralized architecture based on the blockchain technology. The blockchain platform allows the maintenance of a shared distributed ledger, which can be simultaneously read/accumulated by all participants without being owned/controlled by any central unit or person. This paper focuses on scoping the networking side of the Bitcoin blockchain network. In our study, we analyze how Bitcoin utilizes the flooding peer-to-peer (P2P) protocol to broadcast events through the bitcoin network to update the replicas of the ledger. We then use the collected data to identify the process of data propagation, the broadcasting delay, and the bandwidth needed to keep up with the ledger real-time updates.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539618
Jonghyun Lee, Youngjin Seo, J. Heo
This article shows that quantum noise source can be used as an entropy source to generate random number. We first collect entropy source output from software implemented random number generator and quantum random number generator and estimate minimum entropy of the entropy sources. We also generate random number by pseudorandom number generator mechanism. It was shown that quantum entropy source can work as a good entropy source and the random numbers generated by quantum entropy source contains enough randomness by performing statistical test.
{"title":"Analysis of random number generated by quantum noise source and software entropy source","authors":"Jonghyun Lee, Youngjin Seo, J. Heo","doi":"10.1109/ICTC.2018.8539618","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539618","url":null,"abstract":"This article shows that quantum noise source can be used as an entropy source to generate random number. We first collect entropy source output from software implemented random number generator and quantum random number generator and estimate minimum entropy of the entropy sources. We also generate random number by pseudorandom number generator mechanism. It was shown that quantum entropy source can work as a good entropy source and the random numbers generated by quantum entropy source contains enough randomness by performing statistical test.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539421
Ryangsoo Kim, Hanbit Choi, Yonggang Kim, Hyuk Lim
A contention-based collision avoidance protocol for dense millimeter-wave wireless networks in which base stations (BSs) use directional beamforming to provide downlink data streaming services to mobile users is proposed. The proposed protocol allows the BSs to contend with interfering BSs successfully transmit their downlink packets. Under the assumption that the inter-BS packet collisions incurred by inter-BS beamforming interferences are statistically predictable, a random number mechanism was used to decide whether to transmit the downlink packets. The proposed protocol’s effectiveness was then evaluated through extensive numerical simulations.
{"title":"Contention-Based Transmission Coordination for Interfering BSs in Dense mmWave Networks","authors":"Ryangsoo Kim, Hanbit Choi, Yonggang Kim, Hyuk Lim","doi":"10.1109/ICTC.2018.8539421","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539421","url":null,"abstract":"A contention-based collision avoidance protocol for dense millimeter-wave wireless networks in which base stations (BSs) use directional beamforming to provide downlink data streaming services to mobile users is proposed. The proposed protocol allows the BSs to contend with interfering BSs successfully transmit their downlink packets. Under the assumption that the inter-BS packet collisions incurred by inter-BS beamforming interferences are statistically predictable, a random number mechanism was used to decide whether to transmit the downlink packets. The proposed protocol’s effectiveness was then evaluated through extensive numerical simulations.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539469
Sandhya Baskaran, H. Nagabushanam
Augmented Reality today operates around building environments over predefined image, model or object targets. This results in extensive utilization of device and network resources in a system. Millions of connected IOT devices are being deployed every year and with that there is increasing complexities in representing the data generated in human correlate-able form. Augmented Reality visual interface for IOT device data helps in better user experience and enables easy interaction or actuation. Training Augmented Reality interface for each of the IOT device is a tedious task and with dynamically changing networks it is not judicious or reliable. In this paper, we propose a system and a technique to blend Augmented Reality as a generic form of representation for IOT devices using relational localization methods along with metadata information of the sensors. This eliminates the necessity of pre-training the AR devices and also creates the ability to visualize data from any IOT device participating in the network.
{"title":"Relational localization based Augmented reality Interface for IOT applications","authors":"Sandhya Baskaran, H. Nagabushanam","doi":"10.1109/ICTC.2018.8539469","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539469","url":null,"abstract":"Augmented Reality today operates around building environments over predefined image, model or object targets. This results in extensive utilization of device and network resources in a system. Millions of connected IOT devices are being deployed every year and with that there is increasing complexities in representing the data generated in human correlate-able form. Augmented Reality visual interface for IOT device data helps in better user experience and enables easy interaction or actuation. Training Augmented Reality interface for each of the IOT device is a tedious task and with dynamically changing networks it is not judicious or reliable. In this paper, we propose a system and a technique to blend Augmented Reality as a generic form of representation for IOT devices using relational localization methods along with metadata information of the sensors. This eliminates the necessity of pre-training the AR devices and also creates the ability to visualize data from any IOT device participating in the network.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125840885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539372
Yong-Hwan Kim, Jingang Huh, Jinwoo Jeong
360° Virtual Reality (VR) services with resolutions of 8K and beyond are a challenging task due to limits of both decoding complexity and constrained public internet bandwidth of consumer devices. Also, general streaming servers cannot service these large-resolution video streams to many clients because of bandwidth limitation. In this paper, we propose a distributed video transcoding system for achieving viewport adaptive streaming, which is known as tiled streaming, of 8K 360° VR video. The proposed system consists of many motion-constrained High Efficiency Video Coding (HEVC) encoders, a Hadoop/Spark-based distributed computing platform, light-weight bitstream stitcher, and dual HEVC decoders. Experimental results show that 8K 360° videos which are split by 8×8 tiles, respectively, can be encoded at 99 fps, and 4×4 tiles are stitched at 9,585 fps, on average.
{"title":"Distributed Video Transcoding System for 8K 360° VR Tiled Streaming Service","authors":"Yong-Hwan Kim, Jingang Huh, Jinwoo Jeong","doi":"10.1109/ICTC.2018.8539372","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539372","url":null,"abstract":"360° Virtual Reality (VR) services with resolutions of 8K and beyond are a challenging task due to limits of both decoding complexity and constrained public internet bandwidth of consumer devices. Also, general streaming servers cannot service these large-resolution video streams to many clients because of bandwidth limitation. In this paper, we propose a distributed video transcoding system for achieving viewport adaptive streaming, which is known as tiled streaming, of 8K 360° VR video. The proposed system consists of many motion-constrained High Efficiency Video Coding (HEVC) encoders, a Hadoop/Spark-based distributed computing platform, light-weight bitstream stitcher, and dual HEVC decoders. Experimental results show that 8K 360° videos which are split by 8×8 tiles, respectively, can be encoded at 99 fps, and 4×4 tiles are stitched at 9,585 fps, on average.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125995057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539688
Jeongtae Kim, Soyoung Park
With the continuing development of ICT and rapid spread of high-speed networks, several computer-aided design tools have been improved to support distributed collaborative design. As the information which is generated through these kinds of tools begins to be shared instantly, productivity of collaboration is increasing continuously. To ensure this information is conveniently and safely accessible, many mechanisms have been proposed to manage systematically product information using access control and encryption. However, the previous methods have drawbacks in aspect of scalability, flexibility and security, so new approach is proposed in this paper. In the proposed system, permission-based access control with lazy revocation is used in which each set of product data is encrypted and stored in data storage. We examined the effectiveness of the proposed method and the advantage of proposed method.
{"title":"Data sharing in a collaborative product design environment based on cryptographic mechanisms","authors":"Jeongtae Kim, Soyoung Park","doi":"10.1109/ICTC.2018.8539688","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539688","url":null,"abstract":"With the continuing development of ICT and rapid spread of high-speed networks, several computer-aided design tools have been improved to support distributed collaborative design. As the information which is generated through these kinds of tools begins to be shared instantly, productivity of collaboration is increasing continuously. To ensure this information is conveniently and safely accessible, many mechanisms have been proposed to manage systematically product information using access control and encryption. However, the previous methods have drawbacks in aspect of scalability, flexibility and security, so new approach is proposed in this paper. In the proposed system, permission-based access control with lazy revocation is used in which each set of product data is encrypted and stored in data storage. We examined the effectiveness of the proposed method and the advantage of proposed method.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539457
K. Cho, C. Kang
The antenna pattern model is critical to analyze the cellular coverage in mobile communication system, especially for the millimeter-wave (mmW) communication system. In this paper, we propose an accurate yet tractable antenna model for the Uniform Linear Array (ULA), which approximates all lobes by multiple scaled and shifted cosine functions, each with the constant beam gain. Based on this antenna model, we derived exact expressions for the coverage probability by employing the Poisson Point Process (PPP) distribution of base stations. It has been shown that our analytical model can match well as long as the compensation factor is properly selected.
{"title":"Coverage Analysis of Cellular Network with Bidirectional Beamforming","authors":"K. Cho, C. Kang","doi":"10.1109/ICTC.2018.8539457","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539457","url":null,"abstract":"The antenna pattern model is critical to analyze the cellular coverage in mobile communication system, especially for the millimeter-wave (mmW) communication system. In this paper, we propose an accurate yet tractable antenna model for the Uniform Linear Array (ULA), which approximates all lobes by multiple scaled and shifted cosine functions, each with the constant beam gain. Based on this antenna model, we derived exact expressions for the coverage probability by employing the Poisson Point Process (PPP) distribution of base stations. It has been shown that our analytical model can match well as long as the compensation factor is properly selected.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539699
Jong Won Kim, Chang-Sik Choi, Wan-ki Park
Many countries have increased Renewable Energy Generation (REG) to reduce greenhouse gas emissions. The more we install REG, the more we damage the reliability of electric distribution system and the stability of grid. We need to analyze the effect of REG on grid for the optimal connection between REG and Energy Storage System (ESS), need to research the reliability index and the flexibility index of the optimal connection between REG and ESS to maximize the reliability of electric distribution system and the stability of grid, and need to develop a design and value evaluation tool that can contribute to the stability of grid. In this paper, we describe the operational process of a design and value evaluation tool for the optimal connection between REG and ESS, and explain our design and value evaluation tool for the optimal connection between REG and ESS. And we show the element technology of a design and value evaluation tool with measured past yearly PV data. Finally we explain the element technology of a design and value evaluation tool without measured past yearly PV data.
{"title":"Development of a Design and Value Evaluation Tool for the Optimal Connection between Renewable Energy Generation and Energy Storage System","authors":"Jong Won Kim, Chang-Sik Choi, Wan-ki Park","doi":"10.1109/ICTC.2018.8539699","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539699","url":null,"abstract":"Many countries have increased Renewable Energy Generation (REG) to reduce greenhouse gas emissions. The more we install REG, the more we damage the reliability of electric distribution system and the stability of grid. We need to analyze the effect of REG on grid for the optimal connection between REG and Energy Storage System (ESS), need to research the reliability index and the flexibility index of the optimal connection between REG and ESS to maximize the reliability of electric distribution system and the stability of grid, and need to develop a design and value evaluation tool that can contribute to the stability of grid. In this paper, we describe the operational process of a design and value evaluation tool for the optimal connection between REG and ESS, and explain our design and value evaluation tool for the optimal connection between REG and ESS. And we show the element technology of a design and value evaluation tool with measured past yearly PV data. Finally we explain the element technology of a design and value evaluation tool without measured past yearly PV data.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129617297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}