首页 > 最新文献

2018 International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
The Overview of Smart City Convergence Service Platform 智慧城市融合服务平台概述
Eunjin Ko, Mikyong Han
Smart City service is one of hot and main issues in 4th industrial revolution. Someone says that Smart City service is not different with Ubiquitous city (U-city) Service which is mentioned over 20 years. Due to uprising 5G mobile network technologies, the Smart City service is upcoming in recent with tremendous raw data in real-time. In this paper, we say the Smart City service trend and focus on the structure of Smart City Convergence Service Platform in the aspect of multimedia raw data management. Additionally, this paper describes the connection of several uprising services, i.e. auto-driving service, smart industry service and so on.
智慧城市服务是第四次工业革命的热点和主要问题之一。有人说,智慧城市服务与20多年来被提及的泛在城市(U-city)服务没有什么不同。随着5G移动网络技术的兴起,拥有大量实时原始数据的智慧城市服务即将到来。本文阐述了智慧城市服务的发展趋势,并从多媒体原始数据管理的角度对智慧城市融合服务平台的结构进行了探讨。此外,本文还描述了自动驾驶服务、智能工业服务等多个起义服务的连接。
{"title":"The Overview of Smart City Convergence Service Platform","authors":"Eunjin Ko, Mikyong Han","doi":"10.1109/ICTC.2018.8539381","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539381","url":null,"abstract":"Smart City service is one of hot and main issues in 4th industrial revolution. Someone says that Smart City service is not different with Ubiquitous city (U-city) Service which is mentioned over 20 years. Due to uprising 5G mobile network technologies, the Smart City service is upcoming in recent with tremendous raw data in real-time. In this paper, we say the Smart City service trend and focus on the structure of Smart City Convergence Service Platform in the aspect of multimedia raw data management. Additionally, this paper describes the connection of several uprising services, i.e. auto-driving service, smart industry service and so on.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Money Laundering in the Bitcoin Network: Perspective of Mixing Services 比特币网络中的洗钱:混合服务的视角
Junwoo Seo, Mookyu Park, Haengrok Oh, Kyungho Lee
Various crimes using Bitcoin are highlighted. Among various crimes using Bitcoin, this paper suggests a method to detect money laundering focusing on mixing service that provides Money Laundering. This is part of the anti-money-laundering (AML) strategy, which can determine whether the mixer service is used in certain transactions by using transaction sample data using mixer. Money laundering using Bitcoin is often used to avoid fund tracking in the underground world and analyzing it is essential in situational awareness of fund tracking.
使用比特币的各种犯罪被突出。在使用比特币的各种犯罪中,本文提出了一种以提供洗钱的混合服务为重点的洗钱检测方法。这是反洗钱(AML)策略的一部分,它可以通过使用mixer的事务样本数据来确定在某些事务中是否使用了mixer服务。利用比特币洗钱通常是为了避免地下世界的资金跟踪,对其进行分析是资金跟踪态势感知的必要条件。
{"title":"Money Laundering in the Bitcoin Network: Perspective of Mixing Services","authors":"Junwoo Seo, Mookyu Park, Haengrok Oh, Kyungho Lee","doi":"10.1109/ICTC.2018.8539548","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539548","url":null,"abstract":"Various crimes using Bitcoin are highlighted. Among various crimes using Bitcoin, this paper suggests a method to detect money laundering focusing on mixing service that provides Money Laundering. This is part of the anti-money-laundering (AML) strategy, which can determine whether the mixer service is used in certain transactions by using transaction sample data using mixer. Money laundering using Bitcoin is often used to avoid fund tracking in the underground world and analyzing it is essential in situational awareness of fund tracking.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance Analysis of CNI (Container Networking Interface) based Container Network 基于容器网络的CNI (Container Networking Interface)性能分析
Youngki Park, Hyunsik Yang, Younghan Kim
The increasing significance of lightweight cloud infrastructure for microservices cannot be overstated. This has led many researchers to propose container based virtualized computing services. Specifically, for networks, Container Networking Interface technologies are proposed to connect heterogeneous network services between virtual-machine based clouds and containers. In order to improve network performance of cloud systems, a comparison with detailed design and performance verification of network configuration using CNI technologies is required. In this paper, centering on various CNI technologies, we designed network architectures with OpenStack cloud platform and Kubernetes container management environment, and subsequently measured network performance for each design. The results of the evaluation are useful to provide guidelines for containerized cloud system deployment.
轻量级云基础设施对微服务的重要性与日俱增,这一点怎么强调都不为过。这导致许多研究人员提出了基于容器的虚拟化计算服务。具体来说,对于网络,提出了容器网络接口技术来连接基于虚拟机的云与容器之间的异构网络服务。为了提高云系统的网络性能,需要与使用CNI技术的网络配置的详细设计和性能验证进行比较。本文围绕各种CNI技术,设计了基于OpenStack云平台和Kubernetes容器管理环境的网络架构,并对每种设计的网络性能进行了测试。评估结果有助于为容器化云系统部署提供指导。
{"title":"Performance Analysis of CNI (Container Networking Interface) based Container Network","authors":"Youngki Park, Hyunsik Yang, Younghan Kim","doi":"10.1109/ICTC.2018.8539382","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539382","url":null,"abstract":"The increasing significance of lightweight cloud infrastructure for microservices cannot be overstated. This has led many researchers to propose container based virtualized computing services. Specifically, for networks, Container Networking Interface technologies are proposed to connect heterogeneous network services between virtual-machine based clouds and containers. In order to improve network performance of cloud systems, a comparison with detailed design and performance verification of network configuration using CNI technologies is required. In this paper, centering on various CNI technologies, we designed network architectures with OpenStack cloud platform and Kubernetes container management environment, and subsequently measured network performance for each design. The results of the evaluation are useful to provide guidelines for containerized cloud system deployment.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
STUDY ON DETECT STROKE SYMPTOMS USING FACE FEATURES 利用面部特征检测脑卒中症状的研究
Sabina Umirzakova, T. Whangbo
This paper present the early symptoms of stroke detection using face features. To achieve that, in this paper calculated wrinkles on forehead area, eye moving, mouth drooping, cheek line detection. Experimental results show that proposed stroke detection method achieved good results in this field.
本文介绍了利用面部特征检测脑卒中的早期症状。为了实现这一目标,本文计算了前额皱纹面积、眼球运动、嘴角下垂、脸颊线条检测。实验结果表明,该方法在该领域取得了良好的效果。
{"title":"STUDY ON DETECT STROKE SYMPTOMS USING FACE FEATURES","authors":"Sabina Umirzakova, T. Whangbo","doi":"10.1109/ICTC.2018.8539440","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539440","url":null,"abstract":"This paper present the early symptoms of stroke detection using face features. To achieve that, in this paper calculated wrinkles on forehead area, eye moving, mouth drooping, cheek line detection. Experimental results show that proposed stroke detection method achieved good results in this field.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Affect Detector Model For Gamers on a Role-Playing Game Through Mouse Movements 基于鼠标移动的角色扮演游戏玩家情感检测器模型
M. Samonte, L. Vea, Randall Mark C. San Jose, Arden John V. Lagoy, Charles Eugene P. Manlapid, Antonio Martyn P. Perez
In this study, the researchers have modeled an affect detector based on the mouse movements that they have gathered while the respondents, as casual or core gamers, are playing the role-playing game. After being able to gather and prepare the data with the help of several software and tools, features such as the number of mouse clicks and distance moved were extracted and developed a models through the classifiers: Decision Tree, Random Forest, and J48. Given the parameters and features included, the chosen model was used to create a prototype. The prototype developed can be of use to game developers in game testing by giving them the ability to monitor the emotions of their end-users. This will then correspond to valuable data to apply for game design improvement.
在这项研究中,研究人员根据受访者(休闲或硬核玩家)在玩角色扮演游戏时收集到的鼠标运动,建立了一个情感探测器模型。在几个软件和工具的帮助下能够收集和准备数据后,通过决策树、随机森林和J48分类器提取鼠标点击次数和移动距离等特征并开发模型。给定所包含的参数和特征,所选择的模型被用来创建原型。开发的原型可以帮助游戏开发者在游戏测试中监测终端用户的情绪。这将对应于应用于游戏设计改进的有价值的数据。
{"title":"An Affect Detector Model For Gamers on a Role-Playing Game Through Mouse Movements","authors":"M. Samonte, L. Vea, Randall Mark C. San Jose, Arden John V. Lagoy, Charles Eugene P. Manlapid, Antonio Martyn P. Perez","doi":"10.1109/ICTC.2018.8539550","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539550","url":null,"abstract":"In this study, the researchers have modeled an affect detector based on the mouse movements that they have gathered while the respondents, as casual or core gamers, are playing the role-playing game. After being able to gather and prepare the data with the help of several software and tools, features such as the number of mouse clicks and distance moved were extracted and developed a models through the classifiers: Decision Tree, Random Forest, and J48. Given the parameters and features included, the chosen model was used to create a prototype. The prototype developed can be of use to game developers in game testing by giving them the ability to monitor the emotions of their end-users. This will then correspond to valuable data to apply for game design improvement.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133174929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pedestrian Video Data Abstraction and Classification for Surveillance System 行人视频数据的提取与分类
Ho-chul Shin, Jae-Y. Lee
In this study, we have developed abstracted pedestrian behavior representation and classification method for pedestrian video surveillance system. An effective intelligent surveillance system can be constructed if the high-resolution surveillance image information is efficiently summarized. The motion of the pedestrian is represented by a multi-layer grid map using a detector and a tracker. A normal pattern and anomalous pattern database were constructed and classified using the CNN classifier. With the abstracted pedestrian data and CNN network, the abnormal situation can be detected up to recall 92.0%, precision 99.9%.
在本研究中,我们开发了行人视频监控系统的抽象行人行为表示和分类方法。对高分辨率的监控图像信息进行有效的汇总,才能构建有效的智能监控系统。行人的运动由多层网格图表示,其中使用检测器和跟踪器。构建了正常模式和异常模式数据库,并使用CNN分类器进行了分类。利用提取的行人数据和CNN网络,检测异常情况的召回率高达92.0%,准确率高达99.9%。
{"title":"Pedestrian Video Data Abstraction and Classification for Surveillance System","authors":"Ho-chul Shin, Jae-Y. Lee","doi":"10.1109/ICTC.2018.8539426","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539426","url":null,"abstract":"In this study, we have developed abstracted pedestrian behavior representation and classification method for pedestrian video surveillance system. An effective intelligent surveillance system can be constructed if the high-resolution surveillance image information is efficiently summarized. The motion of the pedestrian is represented by a multi-layer grid map using a detector and a tracker. A normal pattern and anomalous pattern database were constructed and classified using the CNN classifier. With the abstracted pedestrian data and CNN network, the abnormal situation can be detected up to recall 92.0%, precision 99.9%.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on the ATSC 3.0 Service Following ATSC 3.0服务跟踪研究
Bongho Lee, Kyutae Yang, Sung-Ik Park, H. Kim, Soonchoul Kim
In ATSC 3.0 capable of mobile services, the functionality of service following is required when the user moves around the shadow area or travels to the adjacent broadcast network. This paper proposes a scheme of ATSC 3.0 service following by the definition of service following description format and the delivery and consumption behavior. With this proposed scheme, the user is able to continue the tuned service with keeping his eyes on the road wherever he enters the low signal strength area or travels to the edge of the broadcast zone.
在支持移动业务的ATSC 3.0中,当用户在阴影区域周围移动或移动到邻近的广播网络时,需要具有跟随业务的功能。本文提出了一种ATSC 3.0服务遵循方案,定义了服务遵循描述格式以及服务的交付和消费行为。在此方案下,用户无论进入低信号强度区域或走到广播区的边缘,都可以继续收看调谐后的服务。
{"title":"A Study on the ATSC 3.0 Service Following","authors":"Bongho Lee, Kyutae Yang, Sung-Ik Park, H. Kim, Soonchoul Kim","doi":"10.1109/ICTC.2018.8539515","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539515","url":null,"abstract":"In ATSC 3.0 capable of mobile services, the functionality of service following is required when the user moves around the shadow area or travels to the adjacent broadcast network. This paper proposes a scheme of ATSC 3.0 service following by the definition of service following description format and the delivery and consumption behavior. With this proposed scheme, the user is able to continue the tuned service with keeping his eyes on the road wherever he enters the low signal strength area or travels to the edge of the broadcast zone.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Soft assignment and multiple keypoint analysis-based pedestrian counting method 基于软分配和多关键点分析的行人计数方法
C. Jeong, Mooseop Kim, Hyung-Cheol Shin
Pedestrian counting in videos is an active computer vision research topic that has wide ranging application. Existing pedestrian counting methods predominantly use features extracted from the foreground following subtraction of the background. However, accurately locating the foreground in real environments is difficult, and background subtraction is computationally expensive. The keypoint approach, which counts pedestrians without background subtraction, is limited owing to lack of sufficient features and no consideration for stationary pedestrians. This letter proposes an accurate keypoint-based pedestrian counting method. As no single keypoint detector can yield optimal counting results under all conditions, such as image resolution, frame rate, and illumination, we combine complementary keypoint detectors to enrich the features and thereby enhance pedestrian counting results. In addition, the proposed method considers stationary pedestrians by analyzing static keypoints information. Information loss during vector quantization is also reduced by applying soft assignment during feature extraction. The results of experiments conducted on public databases indicate that the proposed method outperforms the state-of-the-art methods on realistic outdoor and indoor public datasets.
视频中的行人计数是一个活跃的计算机视觉研究课题,具有广泛的应用前景。现有的行人计数方法主要使用从前景中提取的特征,然后减去背景。然而,在真实环境中准确定位前景是困难的,并且背景减法的计算成本很高。关键点法在没有背景减法的情况下对行人进行计数,由于缺乏足够的特征,并且没有考虑静止的行人,因此受到限制。本文提出了一种精确的基于关键点的行人计数方法。由于单一关键点检测器无法在图像分辨率、帧率和光照等所有条件下都产生最佳的计数结果,因此我们结合互补关键点检测器来丰富特征,从而增强行人计数结果。此外,该方法通过分析静态关键点信息来考虑静止行人。通过在特征提取过程中应用软赋值,减少了矢量量化过程中的信息丢失。在公共数据库上进行的实验结果表明,该方法在室外和室内公共数据集上的性能优于当前最先进的方法。
{"title":"Soft assignment and multiple keypoint analysis-based pedestrian counting method","authors":"C. Jeong, Mooseop Kim, Hyung-Cheol Shin","doi":"10.1109/ICTC.2018.8539499","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539499","url":null,"abstract":"Pedestrian counting in videos is an active computer vision research topic that has wide ranging application. Existing pedestrian counting methods predominantly use features extracted from the foreground following subtraction of the background. However, accurately locating the foreground in real environments is difficult, and background subtraction is computationally expensive. The keypoint approach, which counts pedestrians without background subtraction, is limited owing to lack of sufficient features and no consideration for stationary pedestrians. This letter proposes an accurate keypoint-based pedestrian counting method. As no single keypoint detector can yield optimal counting results under all conditions, such as image resolution, frame rate, and illumination, we combine complementary keypoint detectors to enrich the features and thereby enhance pedestrian counting results. In addition, the proposed method considers stationary pedestrians by analyzing static keypoints information. Information loss during vector quantization is also reduced by applying soft assignment during feature extraction. The results of experiments conducted on public databases indicate that the proposed method outperforms the state-of-the-art methods on realistic outdoor and indoor public datasets.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coexistence of 5G system with Fixed satellite service Earth station in the 3.8GHz Band 5G系统与3.8GHz频段固定卫星业务地面站共存
H. Son, Youngjun Chong
The fifth generation (5G) wireless systems is new technology for high data rate to use in the millimeter-wave band or below 6 GHz band. It is necessary to look for more candidate frequency bands for 5G because of increasing traffic demands. This paper provides a study of the co-channel interference analysis from 5G system to fixed satellite service(FSS) downlink in the 3.8 GHz band. We suggest the appropriate sharing condition between 5G and the FSS earth station(ES) to protect FSS ES from interference due to the 5G BSs simultaneous transmission. Our study can be applied to plan 5G deployment without interference to other system.
第五代(5G)无线系统是在毫米波频段或6ghz以下频段使用高数据速率的新技术。由于流量需求的增加,有必要为5G寻找更多的候选频段。本文研究了3.8 GHz频段从5G系统到固定卫星业务(FSS)下行链路的同信道干扰分析。我们建议5G和FSS地面站(ES)之间适当的共享条件,以保护FSS地面站免受5G BSs同步传输的干扰。我们的研究可以应用于规划5G部署,而不会干扰其他系统。
{"title":"Coexistence of 5G system with Fixed satellite service Earth station in the 3.8GHz Band","authors":"H. Son, Youngjun Chong","doi":"10.1109/ICTC.2018.8539462","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539462","url":null,"abstract":"The fifth generation (5G) wireless systems is new technology for high data rate to use in the millimeter-wave band or below 6 GHz band. It is necessary to look for more candidate frequency bands for 5G because of increasing traffic demands. This paper provides a study of the co-channel interference analysis from 5G system to fixed satellite service(FSS) downlink in the 3.8 GHz band. We suggest the appropriate sharing condition between 5G and the FSS earth station(ES) to protect FSS ES from interference due to the 5G BSs simultaneous transmission. Our study can be applied to plan 5G deployment without interference to other system.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133487310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Multiple Hash Routing Scheme for Fast Data Retrieval in ICN 一种用于ICN快速数据检索的多哈希路由方案
Heeyoung Jung, Sunme Kim
Compared to legacy TCP/IP networking, a notable feature of ICN is to utilize in-network storages. ICN architectures basically adopt on-path caching mechanism. However, the benefits of on-path caching are limited because the caching is bounded to ICN nodes on the request path. To overcome the limitation of on-path caching mechanism, various types of off-path caching mechanism have been proposed. This paper proposes a novel off-path caching mechanism for fast data retrieval. The proposed off-path mechanism is named as GHR which stands for a Geographic information based Hash Routing for ICN. The basic approach of GHR is to directly hash data name into geographic value to determine the closest data storage.
与传统的TCP/IP网络相比,ICN的一个显著特点是利用了网络内存储。ICN架构基本上采用路径上缓存机制。然而,路径上缓存的好处是有限的,因为缓存被限制到请求路径上的ICN节点。为了克服路径上缓存机制的局限性,人们提出了各种类型的路径外缓存机制。本文提出了一种新的离路缓存机制,用于快速数据检索。提出的离路机制被命名为GHR,它代表基于地理信息的ICN哈希路由。GHR的基本方法是直接将数据名称散列成地理值,以确定最近的数据存储。
{"title":"A Multiple Hash Routing Scheme for Fast Data Retrieval in ICN","authors":"Heeyoung Jung, Sunme Kim","doi":"10.1109/ICTC.2018.8539379","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539379","url":null,"abstract":"Compared to legacy TCP/IP networking, a notable feature of ICN is to utilize in-network storages. ICN architectures basically adopt on-path caching mechanism. However, the benefits of on-path caching are limited because the caching is bounded to ICN nodes on the request path. To overcome the limitation of on-path caching mechanism, various types of off-path caching mechanism have been proposed. This paper proposes a novel off-path caching mechanism for fast data retrieval. The proposed off-path mechanism is named as GHR which stands for a Geographic information based Hash Routing for ICN. The basic approach of GHR is to directly hash data name into geographic value to determine the closest data storage.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1