Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539381
Eunjin Ko, Mikyong Han
Smart City service is one of hot and main issues in 4th industrial revolution. Someone says that Smart City service is not different with Ubiquitous city (U-city) Service which is mentioned over 20 years. Due to uprising 5G mobile network technologies, the Smart City service is upcoming in recent with tremendous raw data in real-time. In this paper, we say the Smart City service trend and focus on the structure of Smart City Convergence Service Platform in the aspect of multimedia raw data management. Additionally, this paper describes the connection of several uprising services, i.e. auto-driving service, smart industry service and so on.
{"title":"The Overview of Smart City Convergence Service Platform","authors":"Eunjin Ko, Mikyong Han","doi":"10.1109/ICTC.2018.8539381","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539381","url":null,"abstract":"Smart City service is one of hot and main issues in 4th industrial revolution. Someone says that Smart City service is not different with Ubiquitous city (U-city) Service which is mentioned over 20 years. Due to uprising 5G mobile network technologies, the Smart City service is upcoming in recent with tremendous raw data in real-time. In this paper, we say the Smart City service trend and focus on the structure of Smart City Convergence Service Platform in the aspect of multimedia raw data management. Additionally, this paper describes the connection of several uprising services, i.e. auto-driving service, smart industry service and so on.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539548
Junwoo Seo, Mookyu Park, Haengrok Oh, Kyungho Lee
Various crimes using Bitcoin are highlighted. Among various crimes using Bitcoin, this paper suggests a method to detect money laundering focusing on mixing service that provides Money Laundering. This is part of the anti-money-laundering (AML) strategy, which can determine whether the mixer service is used in certain transactions by using transaction sample data using mixer. Money laundering using Bitcoin is often used to avoid fund tracking in the underground world and analyzing it is essential in situational awareness of fund tracking.
{"title":"Money Laundering in the Bitcoin Network: Perspective of Mixing Services","authors":"Junwoo Seo, Mookyu Park, Haengrok Oh, Kyungho Lee","doi":"10.1109/ICTC.2018.8539548","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539548","url":null,"abstract":"Various crimes using Bitcoin are highlighted. Among various crimes using Bitcoin, this paper suggests a method to detect money laundering focusing on mixing service that provides Money Laundering. This is part of the anti-money-laundering (AML) strategy, which can determine whether the mixer service is used in certain transactions by using transaction sample data using mixer. Money laundering using Bitcoin is often used to avoid fund tracking in the underground world and analyzing it is essential in situational awareness of fund tracking.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539382
Youngki Park, Hyunsik Yang, Younghan Kim
The increasing significance of lightweight cloud infrastructure for microservices cannot be overstated. This has led many researchers to propose container based virtualized computing services. Specifically, for networks, Container Networking Interface technologies are proposed to connect heterogeneous network services between virtual-machine based clouds and containers. In order to improve network performance of cloud systems, a comparison with detailed design and performance verification of network configuration using CNI technologies is required. In this paper, centering on various CNI technologies, we designed network architectures with OpenStack cloud platform and Kubernetes container management environment, and subsequently measured network performance for each design. The results of the evaluation are useful to provide guidelines for containerized cloud system deployment.
{"title":"Performance Analysis of CNI (Container Networking Interface) based Container Network","authors":"Youngki Park, Hyunsik Yang, Younghan Kim","doi":"10.1109/ICTC.2018.8539382","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539382","url":null,"abstract":"The increasing significance of lightweight cloud infrastructure for microservices cannot be overstated. This has led many researchers to propose container based virtualized computing services. Specifically, for networks, Container Networking Interface technologies are proposed to connect heterogeneous network services between virtual-machine based clouds and containers. In order to improve network performance of cloud systems, a comparison with detailed design and performance verification of network configuration using CNI technologies is required. In this paper, centering on various CNI technologies, we designed network architectures with OpenStack cloud platform and Kubernetes container management environment, and subsequently measured network performance for each design. The results of the evaluation are useful to provide guidelines for containerized cloud system deployment.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539440
Sabina Umirzakova, T. Whangbo
This paper present the early symptoms of stroke detection using face features. To achieve that, in this paper calculated wrinkles on forehead area, eye moving, mouth drooping, cheek line detection. Experimental results show that proposed stroke detection method achieved good results in this field.
{"title":"STUDY ON DETECT STROKE SYMPTOMS USING FACE FEATURES","authors":"Sabina Umirzakova, T. Whangbo","doi":"10.1109/ICTC.2018.8539440","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539440","url":null,"abstract":"This paper present the early symptoms of stroke detection using face features. To achieve that, in this paper calculated wrinkles on forehead area, eye moving, mouth drooping, cheek line detection. Experimental results show that proposed stroke detection method achieved good results in this field.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539550
M. Samonte, L. Vea, Randall Mark C. San Jose, Arden John V. Lagoy, Charles Eugene P. Manlapid, Antonio Martyn P. Perez
In this study, the researchers have modeled an affect detector based on the mouse movements that they have gathered while the respondents, as casual or core gamers, are playing the role-playing game. After being able to gather and prepare the data with the help of several software and tools, features such as the number of mouse clicks and distance moved were extracted and developed a models through the classifiers: Decision Tree, Random Forest, and J48. Given the parameters and features included, the chosen model was used to create a prototype. The prototype developed can be of use to game developers in game testing by giving them the ability to monitor the emotions of their end-users. This will then correspond to valuable data to apply for game design improvement.
{"title":"An Affect Detector Model For Gamers on a Role-Playing Game Through Mouse Movements","authors":"M. Samonte, L. Vea, Randall Mark C. San Jose, Arden John V. Lagoy, Charles Eugene P. Manlapid, Antonio Martyn P. Perez","doi":"10.1109/ICTC.2018.8539550","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539550","url":null,"abstract":"In this study, the researchers have modeled an affect detector based on the mouse movements that they have gathered while the respondents, as casual or core gamers, are playing the role-playing game. After being able to gather and prepare the data with the help of several software and tools, features such as the number of mouse clicks and distance moved were extracted and developed a models through the classifiers: Decision Tree, Random Forest, and J48. Given the parameters and features included, the chosen model was used to create a prototype. The prototype developed can be of use to game developers in game testing by giving them the ability to monitor the emotions of their end-users. This will then correspond to valuable data to apply for game design improvement.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133174929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539426
Ho-chul Shin, Jae-Y. Lee
In this study, we have developed abstracted pedestrian behavior representation and classification method for pedestrian video surveillance system. An effective intelligent surveillance system can be constructed if the high-resolution surveillance image information is efficiently summarized. The motion of the pedestrian is represented by a multi-layer grid map using a detector and a tracker. A normal pattern and anomalous pattern database were constructed and classified using the CNN classifier. With the abstracted pedestrian data and CNN network, the abnormal situation can be detected up to recall 92.0%, precision 99.9%.
{"title":"Pedestrian Video Data Abstraction and Classification for Surveillance System","authors":"Ho-chul Shin, Jae-Y. Lee","doi":"10.1109/ICTC.2018.8539426","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539426","url":null,"abstract":"In this study, we have developed abstracted pedestrian behavior representation and classification method for pedestrian video surveillance system. An effective intelligent surveillance system can be constructed if the high-resolution surveillance image information is efficiently summarized. The motion of the pedestrian is represented by a multi-layer grid map using a detector and a tracker. A normal pattern and anomalous pattern database were constructed and classified using the CNN classifier. With the abstracted pedestrian data and CNN network, the abnormal situation can be detected up to recall 92.0%, precision 99.9%.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539515
Bongho Lee, Kyutae Yang, Sung-Ik Park, H. Kim, Soonchoul Kim
In ATSC 3.0 capable of mobile services, the functionality of service following is required when the user moves around the shadow area or travels to the adjacent broadcast network. This paper proposes a scheme of ATSC 3.0 service following by the definition of service following description format and the delivery and consumption behavior. With this proposed scheme, the user is able to continue the tuned service with keeping his eyes on the road wherever he enters the low signal strength area or travels to the edge of the broadcast zone.
{"title":"A Study on the ATSC 3.0 Service Following","authors":"Bongho Lee, Kyutae Yang, Sung-Ik Park, H. Kim, Soonchoul Kim","doi":"10.1109/ICTC.2018.8539515","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539515","url":null,"abstract":"In ATSC 3.0 capable of mobile services, the functionality of service following is required when the user moves around the shadow area or travels to the adjacent broadcast network. This paper proposes a scheme of ATSC 3.0 service following by the definition of service following description format and the delivery and consumption behavior. With this proposed scheme, the user is able to continue the tuned service with keeping his eyes on the road wherever he enters the low signal strength area or travels to the edge of the broadcast zone.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539499
C. Jeong, Mooseop Kim, Hyung-Cheol Shin
Pedestrian counting in videos is an active computer vision research topic that has wide ranging application. Existing pedestrian counting methods predominantly use features extracted from the foreground following subtraction of the background. However, accurately locating the foreground in real environments is difficult, and background subtraction is computationally expensive. The keypoint approach, which counts pedestrians without background subtraction, is limited owing to lack of sufficient features and no consideration for stationary pedestrians. This letter proposes an accurate keypoint-based pedestrian counting method. As no single keypoint detector can yield optimal counting results under all conditions, such as image resolution, frame rate, and illumination, we combine complementary keypoint detectors to enrich the features and thereby enhance pedestrian counting results. In addition, the proposed method considers stationary pedestrians by analyzing static keypoints information. Information loss during vector quantization is also reduced by applying soft assignment during feature extraction. The results of experiments conducted on public databases indicate that the proposed method outperforms the state-of-the-art methods on realistic outdoor and indoor public datasets.
{"title":"Soft assignment and multiple keypoint analysis-based pedestrian counting method","authors":"C. Jeong, Mooseop Kim, Hyung-Cheol Shin","doi":"10.1109/ICTC.2018.8539499","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539499","url":null,"abstract":"Pedestrian counting in videos is an active computer vision research topic that has wide ranging application. Existing pedestrian counting methods predominantly use features extracted from the foreground following subtraction of the background. However, accurately locating the foreground in real environments is difficult, and background subtraction is computationally expensive. The keypoint approach, which counts pedestrians without background subtraction, is limited owing to lack of sufficient features and no consideration for stationary pedestrians. This letter proposes an accurate keypoint-based pedestrian counting method. As no single keypoint detector can yield optimal counting results under all conditions, such as image resolution, frame rate, and illumination, we combine complementary keypoint detectors to enrich the features and thereby enhance pedestrian counting results. In addition, the proposed method considers stationary pedestrians by analyzing static keypoints information. Information loss during vector quantization is also reduced by applying soft assignment during feature extraction. The results of experiments conducted on public databases indicate that the proposed method outperforms the state-of-the-art methods on realistic outdoor and indoor public datasets.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539462
H. Son, Youngjun Chong
The fifth generation (5G) wireless systems is new technology for high data rate to use in the millimeter-wave band or below 6 GHz band. It is necessary to look for more candidate frequency bands for 5G because of increasing traffic demands. This paper provides a study of the co-channel interference analysis from 5G system to fixed satellite service(FSS) downlink in the 3.8 GHz band. We suggest the appropriate sharing condition between 5G and the FSS earth station(ES) to protect FSS ES from interference due to the 5G BSs simultaneous transmission. Our study can be applied to plan 5G deployment without interference to other system.
{"title":"Coexistence of 5G system with Fixed satellite service Earth station in the 3.8GHz Band","authors":"H. Son, Youngjun Chong","doi":"10.1109/ICTC.2018.8539462","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539462","url":null,"abstract":"The fifth generation (5G) wireless systems is new technology for high data rate to use in the millimeter-wave band or below 6 GHz band. It is necessary to look for more candidate frequency bands for 5G because of increasing traffic demands. This paper provides a study of the co-channel interference analysis from 5G system to fixed satellite service(FSS) downlink in the 3.8 GHz band. We suggest the appropriate sharing condition between 5G and the FSS earth station(ES) to protect FSS ES from interference due to the 5G BSs simultaneous transmission. Our study can be applied to plan 5G deployment without interference to other system.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133487310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICTC.2018.8539379
Heeyoung Jung, Sunme Kim
Compared to legacy TCP/IP networking, a notable feature of ICN is to utilize in-network storages. ICN architectures basically adopt on-path caching mechanism. However, the benefits of on-path caching are limited because the caching is bounded to ICN nodes on the request path. To overcome the limitation of on-path caching mechanism, various types of off-path caching mechanism have been proposed. This paper proposes a novel off-path caching mechanism for fast data retrieval. The proposed off-path mechanism is named as GHR which stands for a Geographic information based Hash Routing for ICN. The basic approach of GHR is to directly hash data name into geographic value to determine the closest data storage.
{"title":"A Multiple Hash Routing Scheme for Fast Data Retrieval in ICN","authors":"Heeyoung Jung, Sunme Kim","doi":"10.1109/ICTC.2018.8539379","DOIUrl":"https://doi.org/10.1109/ICTC.2018.8539379","url":null,"abstract":"Compared to legacy TCP/IP networking, a notable feature of ICN is to utilize in-network storages. ICN architectures basically adopt on-path caching mechanism. However, the benefits of on-path caching are limited because the caching is bounded to ICN nodes on the request path. To overcome the limitation of on-path caching mechanism, various types of off-path caching mechanism have been proposed. This paper proposes a novel off-path caching mechanism for fast data retrieval. The proposed off-path mechanism is named as GHR which stands for a Geographic information based Hash Routing for ICN. The basic approach of GHR is to directly hash data name into geographic value to determine the closest data storage.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}