首页 > 最新文献

2022 13th International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
Efficient Extreme Motion Planning by Learning from Experience 从经验中学习有效的极限运动规划
Kyungjae Lee
In this paper, we propose the segment-based roadmap (SRM) method for extreme motion planning. Unlike existing roadmap-based approaches, each vertex in the SRM contains a sequence of configurations. This segment-based motion planning can effectively handle the narrow passage problem caused by stability constraints in a high dimensional space. The SRM is generated from trajectory examples and trajectory optimization. We extract motion segments from the trajectory examples. The extracted motion segments and its connection is stored in vertex set and edge set, respectively. Furthermore, a trajectory optimization method is used to increase the con-nectivity of the SRM. In particular, a Gaussian random path (GRP) is used to initialize the trajectory optimization problem and shown to be more effective in terms of final cost as well as the running time. In simulation study, the average final cost using the GRP initialization shows 96.7% improvements compared to the initialization with linear interpolation which is often used in practice. In experiment study, we conducted experiments on NAO in order to verify the proposed motion planner using the SRM.
本文提出了一种基于分段的极限运动规划方法(SRM)。与现有的基于路线图的方法不同,SRM中的每个顶点都包含一系列配置。这种基于分段的运动规划可以有效地解决高维空间中由于稳定性约束导致的狭窄通道问题。SRM是通过轨迹示例和轨迹优化生成的。我们从轨迹示例中提取运动段。提取的运动段及其连接分别存储在顶点集和边缘集中。在此基础上,采用轨迹优化方法提高了SRM的连通性。特别地,使用高斯随机路径(GRP)来初始化轨迹优化问题,并证明了在最终成本和运行时间方面更有效。在仿真研究中,与实践中常用的线性插值初始化相比,使用GRP初始化的平均最终成本提高了96.7%。在实验研究中,我们使用SRM对NAO进行了实验,以验证所提出的运动规划器。
{"title":"Efficient Extreme Motion Planning by Learning from Experience","authors":"Kyungjae Lee","doi":"10.1109/ICTC55196.2022.9952449","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952449","url":null,"abstract":"In this paper, we propose the segment-based roadmap (SRM) method for extreme motion planning. Unlike existing roadmap-based approaches, each vertex in the SRM contains a sequence of configurations. This segment-based motion planning can effectively handle the narrow passage problem caused by stability constraints in a high dimensional space. The SRM is generated from trajectory examples and trajectory optimization. We extract motion segments from the trajectory examples. The extracted motion segments and its connection is stored in vertex set and edge set, respectively. Furthermore, a trajectory optimization method is used to increase the con-nectivity of the SRM. In particular, a Gaussian random path (GRP) is used to initialize the trajectory optimization problem and shown to be more effective in terms of final cost as well as the running time. In simulation study, the average final cost using the GRP initialization shows 96.7% improvements compared to the initialization with linear interpolation which is often used in practice. In experiment study, we conducted experiments on NAO in order to verify the proposed motion planner using the SRM.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121452468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crisis analysis on blockchain-based decentralized learning in wireless networks 基于区块链的无线网络去中心化学习的危机分析
J. Lee, Gyungmin Kim, Yonggang Kim
The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.
为了在无线网络中获得更好的性能,节点可以根据学习结果进行数据训练并做出决策。但是,为了保证隐私保护服务,学习模型参数在节点之间交换,而不是在每个节点上交换原始的原始数据。虽然利用区块链进行验证可以实现分布式的信息交换,但是在无线信道中仍然存在干扰攻击的问题。干扰者可能会中断作为矿工的正常节点的交易请求或试图破坏信息。本文的分析结果表明,由具有干扰能力的攻击者发起的阻塞将成为主流。通过数值结果表明,在无线网络中,即使攻击者的算力总和小于51%,具有干扰能力的攻击者对正常矿工的攻击也极有可能成功。
{"title":"Crisis analysis on blockchain-based decentralized learning in wireless networks","authors":"J. Lee, Gyungmin Kim, Yonggang Kim","doi":"10.1109/ICTC55196.2022.9952554","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952554","url":null,"abstract":"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation 手部姿势估计的监督vs.自监督预训练模型
Gyusang Cho, Chan-Hyun Youn
Fully-supervised learning and self-supervised learning are two standard learning frameworks for training visual representations. While the superiority and inferiority of the two frameworks are not obscured when pre-training is performed, this paper aims to compare the transferability performance for the hand posture estimation task. We conduct the experiment on a supervised pre-trained model and 5 self-supervised pre-trained models. To this end, we conclude that self-supervised pre-trained models do not necessarily outperform their supervised pre-trained counterparts, while self-supervised pre-trained models lead to faster convergence of the neural network.
全监督学习和自监督学习是训练视觉表征的两种标准学习框架。在进行预训练时,两种框架的优劣并没有被掩盖,本文的目的是比较手部姿态估计任务的可转移性性能。我们在一个监督预训练模型和5个自监督预训练模型上进行实验。为此,我们得出结论,自监督预训练模型并不一定优于其监督预训练模型,而自监督预训练模型导致神经网络更快的收敛。
{"title":"Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation","authors":"Gyusang Cho, Chan-Hyun Youn","doi":"10.1109/ICTC55196.2022.9953011","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9953011","url":null,"abstract":"Fully-supervised learning and self-supervised learning are two standard learning frameworks for training visual representations. While the superiority and inferiority of the two frameworks are not obscured when pre-training is performed, this paper aims to compare the transferability performance for the hand posture estimation task. We conduct the experiment on a supervised pre-trained model and 5 self-supervised pre-trained models. To this end, we conclude that self-supervised pre-trained models do not necessarily outperform their supervised pre-trained counterparts, while self-supervised pre-trained models lead to faster convergence of the neural network.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OneVisionNFP - Design and Implementation of Agile Private/Public 5G/B5G Network Federation Platform OneVisionNFP——敏捷私有/公共5G/B5G网络联合平台的设计与实现
M. Park, Yoonwan Ma, T. Choi
In the 5G and Beyond Era there are interesting trends on requirements for Federated Distributed Open Platforms (DOPs) for Cross-Industry Sectors End-to-End (E2E) Services Innovation and Delivery Agility. The DOPs should be formed by way of Federations of ICT Network Facilities and other Types of Assets or Facilities that are owned by various sectors (including public sector ICT infrastructures, enterprise/private ICT infrastructures, government owned infrastructures, Research Institutes, and other Stakeholders). Such a Concept of Cross-Industry End-to- End Services Innovation and Delivery Agility in the 5G & Beyond Era and the associated Ecosystem that would emerge DO NOT EXIST yet. This paper proposes an architecture to enable cross-industry DOP network federation and our proof of concept implementation, OneVisionNFP•
在5G及以后的时代,跨行业部门端到端(E2E)服务创新和交付敏捷性对联邦分布式开放平台(DOPs)的需求出现了有趣的趋势。DOPs应通过信息和通信技术网络设施和其他类型的资产或设施(包括公共部门信息和通信技术基础设施、企业/私人信息和通信技术基础设施、政府拥有的基础设施、研究机构和其他利益相关者)的联合会来形成。在5G及以后时代,这种跨行业端到端服务创新和交付敏捷性的概念及其相关的生态系统尚不存在。本文提出了一个架构,以实现跨行业DOP网络联合和我们的概念验证实现,OneVisionNFP•
{"title":"OneVisionNFP - Design and Implementation of Agile Private/Public 5G/B5G Network Federation Platform","authors":"M. Park, Yoonwan Ma, T. Choi","doi":"10.1109/ICTC55196.2022.9952420","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952420","url":null,"abstract":"In the 5G and Beyond Era there are interesting trends on requirements for Federated Distributed Open Platforms (DOPs) for Cross-Industry Sectors End-to-End (E2E) Services Innovation and Delivery Agility. The DOPs should be formed by way of Federations of ICT Network Facilities and other Types of Assets or Facilities that are owned by various sectors (including public sector ICT infrastructures, enterprise/private ICT infrastructures, government owned infrastructures, Research Institutes, and other Stakeholders). Such a Concept of Cross-Industry End-to- End Services Innovation and Delivery Agility in the 5G & Beyond Era and the associated Ecosystem that would emerge DO NOT EXIST yet. This paper proposes an architecture to enable cross-industry DOP network federation and our proof of concept implementation, OneVisionNFP•","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AB-XLNet: Named Entity Recognition Tool for Health Information Technology Standardization 卫生信息技术标准化命名实体识别工具AB-XLNet
Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee
We conducted a study to identify drug-related information on non-standardized on non-standardized discharge summaries using a pre-trained BERT-based model. After tokenizing the dataset, it was identified with the IOB tagging schema and trained on the training data with the Random Insert technique through the pre-trained BERT. As a result, the F1-score of AB-XLNet was improved by 3% compared to XLNet, and ADE and Form, which could not be extracted from XLNet, were extracted. Future research will focus on presenting a generalized model using large amounts of data from multiple institutions.
我们进行了一项研究,使用预训练的基于bert的模型来识别非标准化和非标准化出院总结的药物相关信息。在对数据集进行标记后,使用IOB标记模式对其进行识别,并通过预训练的BERT使用随机插入技术对训练数据进行训练。结果,AB-XLNet的f1评分较XLNet提高了3%,并提取了无法从XLNet中提取的ADE和Form。未来的研究将集中在使用来自多个机构的大量数据提出一个广义模型。
{"title":"AB-XLNet: Named Entity Recognition Tool for Health Information Technology Standardization","authors":"Kyoungsu Oh, Min Kang, SeoHyun Oh, Do-hyoung Kim, Seokhwan Kang, Youngho Lee","doi":"10.1109/ICTC55196.2022.9952819","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952819","url":null,"abstract":"We conducted a study to identify drug-related information on non-standardized on non-standardized discharge summaries using a pre-trained BERT-based model. After tokenizing the dataset, it was identified with the IOB tagging schema and trained on the training data with the Random Insert technique through the pre-trained BERT. As a result, the F1-score of AB-XLNet was improved by 3% compared to XLNet, and ADE and Form, which could not be extracted from XLNet, were extracted. Future research will focus on presenting a generalized model using large amounts of data from multiple institutions.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework to Combat COVID19 like Pandemic in Future 未来抗击covid - 19大流行的框架
Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa
This paper outlines a framework to prevent the COVID19 like pandemics for visitors to buildings or sites that receive many visitors. The proposed system is used to detect visitors who have not worn a facemask, or visitors with high body temperature, communicate daily visitor data to the security officer, sound an alarm to notify the officer, and screen the visitors with the results of the measurements. Also, the proposed solution uses deep learning and computer vision techniques to detect the facemask. Further, a testbed is designed based on an Arduino microcontroller connected to a PC for collecting, processing, and storing the data. Furthermore, the proposed system used a contactless infrared temperature sensor to avoid any chance to transfer the COVID-like disease to normal visitors. Finally, we tested the system by passing many subjects with and without face masks and high temperatures. The accuracy of the system shows that the system accurately detects each subject with and without a face mask and with high temperatures.
本文概述了一个框架,以防止covid - 19像大流行的建筑物或接待许多游客的网站的游客。该系统用于检测未戴口罩的访客或体温较高的访客,将每日访客数据传达给保安人员,发出警报通知保安人员,并根据测量结果对访客进行筛选。此外,提出的解决方案使用深度学习和计算机视觉技术来检测面罩。此外,还设计了一个基于Arduino微控制器的测试平台,用于采集、处理和存储数据。此外,该系统还使用了非接触式红外温度传感器,以避免将冠状病毒传染给普通游客的机会。最后,我们对系统进行了测试,通过了许多戴口罩和不戴口罩和高温的受试者。系统的准确性表明,该系统可以准确地检测到每个受试者是否戴口罩以及高温。
{"title":"A Framework to Combat COVID19 like Pandemic in Future","authors":"Murad Khan, Teef S. Alenezi, Shouq S. Alenezi, Sara S. Alenezi, Albandari A Alenezi, Basil Alothman, C. Joumaa","doi":"10.1109/ICTC55196.2022.9952927","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952927","url":null,"abstract":"This paper outlines a framework to prevent the COVID19 like pandemics for visitors to buildings or sites that receive many visitors. The proposed system is used to detect visitors who have not worn a facemask, or visitors with high body temperature, communicate daily visitor data to the security officer, sound an alarm to notify the officer, and screen the visitors with the results of the measurements. Also, the proposed solution uses deep learning and computer vision techniques to detect the facemask. Further, a testbed is designed based on an Arduino microcontroller connected to a PC for collecting, processing, and storing the data. Furthermore, the proposed system used a contactless infrared temperature sensor to avoid any chance to transfer the COVID-like disease to normal visitors. Finally, we tested the system by passing many subjects with and without face masks and high temperatures. The accuracy of the system shows that the system accurately detects each subject with and without a face mask and with high temperatures.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Lock-free Binary Search Tree 无锁二叉搜索树研究综述
Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son
Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques significantly reduce the performance of BST. Locking techniques block or spin the threads that has not obtained the lock until the thread that has obtained the lock completes its job. Thus, to improve the performance of BST, efficient concurrent programming technique should be applied, such as lock-free technique. In this paper, we conduct a comparison of existing lock-free/non-blocking BST methods. We analyze operations and evaluate the strengths and weaknesses of each schemes.
二叉搜索树是一种搜索速度快、易于添加、删除元素的数据结构。由于这些优点,二叉搜索树(BST)是当今常用的数据结构之一。然而,大多数二叉搜索树方案使用锁定技术来支持多线程的多访问以实现同步。不幸的是,这种锁定技术显著降低了BST的性能。锁定技术阻塞或旋转尚未获得锁的线程,直到获得锁的线程完成其工作。因此,为了提高BST的性能,必须采用高效的并发编程技术,如无锁技术。在本文中,我们对现有的无锁/无阻塞BST方法进行了比较。我们分析操作和评估每个方案的优缺点。
{"title":"A Survey on Lock-free Binary Search Tree","authors":"Sangjin Lee, Seokjoo Cho, K. Pham, Sunggon Kim, Yongseok Son","doi":"10.1109/ICTC55196.2022.9952812","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952812","url":null,"abstract":"Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques significantly reduce the performance of BST. Locking techniques block or spin the threads that has not obtained the lock until the thread that has obtained the lock completes its job. Thus, to improve the performance of BST, efficient concurrent programming technique should be applied, such as lock-free technique. In this paper, we conduct a comparison of existing lock-free/non-blocking BST methods. We analyze operations and evaluate the strengths and weaknesses of each schemes.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Vehicular Communication Methods 车载通信方法综述
Jaehwan Lee, Woongsoo Na
Recently, interest in vehicular applications has increased such as autonomous driving and vehicle platooning. The importance of supporting driving safety is becoming more prominent. In order to provide driving safety, the vehicle to vehicle (V2V) communication standard stipulates that a vehicle safety message is periodically broadcasted to nearby vehicles every 100 ms. However, as the number of vehicles on the road increases, communication channels become easily congested, making it difficult to transmit and receive safety messages thereby increase the risk of traffic accidents. In order to address the problem, various V2V communication methods that improve the existing channel contention method have been proposed. In this paper, we introduce and analyze the communication methods for vehicular communications.
最近,人们对自动驾驶和车辆队列等车辆应用的兴趣越来越大。辅助驾驶安全的重要性日益凸显。为了保证行车安全,车辆对车辆(V2V)通信标准规定,每隔100毫秒向附近车辆定期广播一次车辆安全信息。然而,随着道路上车辆数量的增加,通信渠道很容易拥挤,使得安全信息的传输和接收变得困难,从而增加了交通事故的风险。为了解决这个问题,人们提出了各种改进现有信道争用方法的V2V通信方法。本文介绍并分析了车载通信的通信方式。
{"title":"A Survey on Vehicular Communication Methods","authors":"Jaehwan Lee, Woongsoo Na","doi":"10.1109/ICTC55196.2022.9952866","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952866","url":null,"abstract":"Recently, interest in vehicular applications has increased such as autonomous driving and vehicle platooning. The importance of supporting driving safety is becoming more prominent. In order to provide driving safety, the vehicle to vehicle (V2V) communication standard stipulates that a vehicle safety message is periodically broadcasted to nearby vehicles every 100 ms. However, as the number of vehicles on the road increases, communication channels become easily congested, making it difficult to transmit and receive safety messages thereby increase the risk of traffic accidents. In order to address the problem, various V2V communication methods that improve the existing channel contention method have been proposed. In this paper, we introduce and analyze the communication methods for vehicular communications.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Placement, Beamwidth, and Power Allocation in the UAV-Enabled Network 无人机支持网络中布局、波束宽度和功率分配的联合优化
Jong Won, Do-Yup Kim, Jang-Won Lee
In this paper, we consider an unmanned aerial vehicle (UAV)-enabled network in which a UAV equipped with a directional antenna relays data from a ground base station (GBS) to ground users (GUs). Under this system, we study a problem minimizing the weighted sum power consumption of the GBS and the UAV by jointly optimizing the location of the UAV, beamwidth of the directional antenna, and power allocation. To solve the problem, we develop a simple heuristic algorithm, and verify its effectiveness through simulation results.
在本文中,我们考虑了一个无人机(UAV)支持的网络,其中配备定向天线的无人机将数据从地面基站(GBS)中继到地面用户(GUs)。在该系统下,通过联合优化无人机的位置、定向天线的波束宽度和功率分配,研究了最小化GBS和无人机加权总功耗的问题。为了解决这一问题,我们开发了一种简单的启发式算法,并通过仿真结果验证了其有效性。
{"title":"Joint Optimization of Placement, Beamwidth, and Power Allocation in the UAV-Enabled Network","authors":"Jong Won, Do-Yup Kim, Jang-Won Lee","doi":"10.1109/ICTC55196.2022.9952708","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952708","url":null,"abstract":"In this paper, we consider an unmanned aerial vehicle (UAV)-enabled network in which a UAV equipped with a directional antenna relays data from a ground base station (GBS) to ground users (GUs). Under this system, we study a problem minimizing the weighted sum power consumption of the GBS and the UAV by jointly optimizing the location of the UAV, beamwidth of the directional antenna, and power allocation. To solve the problem, we develop a simple heuristic algorithm, and verify its effectiveness through simulation results.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elastic Network Cache Control Using Deep Reinforcement Learning 基于深度强化学习的弹性网络缓存控制
Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon
Thanks to the development of virtualization technology, content service providers can flexibly lease virtualized resources from infrastructure service providers when they deploy the cache nodes in edge networks. As a result, they have two orthogonal objectives: to maximize the caching utility on the one hand and minimize the cost of leasing the cache storage on the other hand. This paper presents a caching algorithm using deep reinforcement learning (DRL) that controls the caching policy with the content time-to-live (TTL) values and elastically adjusts the cache size according to a dynamically changing environment to maximize the utility-minus-cost objective. We show that, under non-stationary traffic scenarios, our DRL-based approach outperforms the conventional algorithms known to be optimal under stationary traffic scenarios.
随着虚拟化技术的发展,内容服务提供商在边缘网络中部署缓存节点时,可以灵活地向基础设施服务提供商租用虚拟化资源。因此,它们有两个相互正交的目标:一方面最大化缓存效用,另一方面最小化租用缓存存储的成本。本文提出了一种使用深度强化学习(DRL)的缓存算法,该算法通过内容生存时间(TTL)值控制缓存策略,并根据动态变化的环境弹性调整缓存大小,以最大化效用-成本目标。我们表明,在非平稳交通场景下,我们基于drl的方法优于已知的在平稳交通场景下最优的传统算法。
{"title":"Elastic Network Cache Control Using Deep Reinforcement Learning","authors":"Chunglae Cho, Seungjae Shin, H. Jeon, Seunghyun Yoon","doi":"10.1109/ICTC55196.2022.9952648","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952648","url":null,"abstract":"Thanks to the development of virtualization technology, content service providers can flexibly lease virtualized resources from infrastructure service providers when they deploy the cache nodes in edge networks. As a result, they have two orthogonal objectives: to maximize the caching utility on the one hand and minimize the cost of leasing the cache storage on the other hand. This paper presents a caching algorithm using deep reinforcement learning (DRL) that controls the caching policy with the content time-to-live (TTL) values and elastically adjusts the cache size according to a dynamically changing environment to maximize the utility-minus-cost objective. We show that, under non-stationary traffic scenarios, our DRL-based approach outperforms the conventional algorithms known to be optimal under stationary traffic scenarios.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1