首页 > 最新文献

2022 13th International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
Energy-Efficient Aerial-RIS Deployment for 6G 面向6G的高能效空中ris部署
Hong-Bae Jeon, C. Chae
In this paper, we propose a novel wireless backhaul architecture, mounted on an aerial platform, and enabled by an active reconfigurable intelligent surface (RIS). We assume that an immediate traffic increase occurs in urban area, and to serve the ground users therein authorities rapidly deploy unmanned-aerial-vehicle base-stations (UAV-BSs). We efficiently optimize the phase and the 3D placement of aerial active RIS, which leads to an increase of energy-efficiency under guaranteeing the reliable link quality. We verify the performance of the proposed algorithm via extensive numerical evaluations.
在本文中,我们提出了一种新的无线回程架构,该架构安装在空中平台上,并由主动可重构智能表面(RIS)实现。我们假设城市地区的交通流量立即增加,当局迅速部署无人机基站(UAV-BSs)以服务于其中的地面用户。我们有效地优化了空中有源RIS的相位和三维布局,在保证可靠链路质量的前提下提高了能效。我们通过广泛的数值评估来验证所提出算法的性能。
{"title":"Energy-Efficient Aerial-RIS Deployment for 6G","authors":"Hong-Bae Jeon, C. Chae","doi":"10.1109/ICTC55196.2022.9952379","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952379","url":null,"abstract":"In this paper, we propose a novel wireless backhaul architecture, mounted on an aerial platform, and enabled by an active reconfigurable intelligent surface (RIS). We assume that an immediate traffic increase occurs in urban area, and to serve the ground users therein authorities rapidly deploy unmanned-aerial-vehicle base-stations (UAV-BSs). We efficiently optimize the phase and the 3D placement of aerial active RIS, which leads to an increase of energy-efficiency under guaranteeing the reliable link quality. We verify the performance of the proposed algorithm via extensive numerical evaluations.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Flooring Material Classification Using Acoustic Signal from COTS Mobile Devices 基于COTS移动设备声信号的地板材料分类研究
Junghoon Ha, Seunghoon Lee, Jinkyu Lee
Amongst densely populated areas such as New York, Hong Kong, Seoul and etc., apartments and condominiums grew to be the most commonly used type of housing units. Throughout the years we have witnessed many issues within the residents living in such units suffer from apartment noise. Lousy neighbors are not the only cause of such problems but the way houses were built, more specifically type and thickness of the flooring materials, determines the amount of noise transfer from one household to the other. In this paper, we show feasibility of classifying flooring materials using COTS (Commercial Off-The-Shelf) mobile devices. We exert each flooring materials propagating synthetic chirps in various ways. Our approach makes it possible to distinguish three types of target flooring materials (wood, polystyrene and concrete) and can also give similar results when the target materials are piled on top of one another. To this end we i) design an acoustic signal which effectively differentiates each target flooring materials, ii) gather sound samples propagated from the target materials, and iii) provide a classification methodology using methods such as SVM and KNN. Finally, we discuss the necessities to achieve the final goal of identifying flooring materials and their thickness.
在纽约、香港、首尔等人口密集地区,公寓和共管公寓已成为最常用的住宅类型。多年来,我们目睹了居住在这些单位的居民遭受公寓噪音的许多问题。讨厌的邻居并不是造成这些问题的唯一原因,房屋的建造方式,更具体地说,地板材料的类型和厚度,决定了从一个家庭到另一个家庭的噪音传输量。在本文中,我们展示了使用COTS(商用现货)移动设备对地板材料进行分类的可行性。我们使每种地板材料以各种方式传播合成啁啾。我们的方法可以区分三种类型的目标地板材料(木材,聚苯乙烯和混凝土),并且当目标材料堆叠在一起时也可以得到类似的结果。为此,我们i)设计了一种能够有效区分每种目标地板材料的声信号,ii)收集从目标材料传播的声音样本,iii)使用SVM和KNN等方法提供了一种分类方法。最后,讨论了确定地板材料及其厚度的最终目标的必要性。
{"title":"Towards Flooring Material Classification Using Acoustic Signal from COTS Mobile Devices","authors":"Junghoon Ha, Seunghoon Lee, Jinkyu Lee","doi":"10.1109/ICTC55196.2022.9952597","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952597","url":null,"abstract":"Amongst densely populated areas such as New York, Hong Kong, Seoul and etc., apartments and condominiums grew to be the most commonly used type of housing units. Throughout the years we have witnessed many issues within the residents living in such units suffer from apartment noise. Lousy neighbors are not the only cause of such problems but the way houses were built, more specifically type and thickness of the flooring materials, determines the amount of noise transfer from one household to the other. In this paper, we show feasibility of classifying flooring materials using COTS (Commercial Off-The-Shelf) mobile devices. We exert each flooring materials propagating synthetic chirps in various ways. Our approach makes it possible to distinguish three types of target flooring materials (wood, polystyrene and concrete) and can also give similar results when the target materials are piled on top of one another. To this end we i) design an acoustic signal which effectively differentiates each target flooring materials, ii) gather sound samples propagated from the target materials, and iii) provide a classification methodology using methods such as SVM and KNN. Finally, we discuss the necessities to achieve the final goal of identifying flooring materials and their thickness.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133789882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Mask Wearing Recognition System for Big Data Video Streaming 面向大数据视频流的口罩佩戴识别系统
Van-Phuc-Le, Thuy-Ngoc Bui, Thanh-Truc Nguyen, Cao-Tien Do, Trong-Hop Do, Arooj Masood, Sungrae Cho
With the outbreak of the covid-19 pandemic in recent years, Video Stream Analytics technology quickly became a hot topic of discussion across technology forums. As it has appeared, in the pandemic situation in recent years, the use of masks when interacting with the community is a must, that's why the research works on mask identification today and more. receiving more and more attention. Understanding the situation, the team conducted facial recognition analysis inside the video to determine if the people appearing in the video were wearing masks. to then apply the trained model into practice. After a period of research, the team has also successfully built a mask recognition system that can generate images and can display the results as real-time video. Especially, the model is trained successful using systemml machine learning system. This is considered a positive result with real-time masked face recognition analysis.
近年来,随着新冠肺炎疫情的爆发,视频流分析技术迅速成为各科技论坛讨论的热点。正如近年来的大流行情况所显示的那样,在与社区互动时必须使用口罩,这就是为什么今天的口罩识别研究工作以及更多。受到越来越多的关注。了解情况后,该团队在视频中进行了面部识别分析,以确定视频中出现的人是否戴着口罩。然后将训练好的模型应用到实践中。经过一段时间的研究,该团队还成功构建了一个可以生成图像并将结果显示为实时视频的面具识别系统。特别地,使用systemml机器学习系统对模型进行了成功的训练。这被认为是实时蒙面人脸识别分析的积极结果。
{"title":"Face Mask Wearing Recognition System for Big Data Video Streaming","authors":"Van-Phuc-Le, Thuy-Ngoc Bui, Thanh-Truc Nguyen, Cao-Tien Do, Trong-Hop Do, Arooj Masood, Sungrae Cho","doi":"10.1109/ICTC55196.2022.9952941","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952941","url":null,"abstract":"With the outbreak of the covid-19 pandemic in recent years, Video Stream Analytics technology quickly became a hot topic of discussion across technology forums. As it has appeared, in the pandemic situation in recent years, the use of masks when interacting with the community is a must, that's why the research works on mask identification today and more. receiving more and more attention. Understanding the situation, the team conducted facial recognition analysis inside the video to determine if the people appearing in the video were wearing masks. to then apply the trained model into practice. After a period of research, the team has also successfully built a mask recognition system that can generate images and can display the results as real-time video. Especially, the model is trained successful using systemml machine learning system. This is considered a positive result with real-time masked face recognition analysis.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The transformation from Pandemic to Endemic of Covid-19: Spatio-temporal Analysis of Citizen Mobility in Asia Countries Covid-19从大流行到地方性的转变:亚洲国家公民流动的时空分析
Sanjaya Samuel Ady, Suyoto
Covid-19 began in 2019 until now in 2022. It is still taking place in various countries, including Asia. It is necessary to lock down or limit citizens' activities to prevent the virus's spread. The imposition of lockdowns for several countries causes the mobility of citizens to be modified in many sectors. However, with vaccination in stages starting in 2021, people will become more resistant to the risk of being exposed to or dying from Covid-19. The process of transforming the return of activity before the pandemic needs to be observed, especially how countries' readiness, especially in Asia, to accept Covid-19 as endemic. The data used in this study are data on Covid-19 cases and Vaccinations by WHO (World Health Organization) and also Mobility Data from Google. This data will be used to conduct observations and Spatio-temporal analysis to see the development of cases, vaccinations, and mobility of citizens for various sectors. This research will include several stages of study, such as descriptive statistics, correlation analysis, and the last is trend analysis. The results of this study for countries in Asia are 21.87% have mobility above the baseline since 2021. Next, 46.87% of countries in Asia have mobility, with an increasing trend in 2022. Only 18.75% of countries in Asia have stable mobility. Below the baseline, there are also about 12.5% of countries in Asia that are around the baseline. In general, countries in Asia have an excellent response to the imposition of an endemic status for Covid-19.
新冠肺炎始于2019年,直到现在是2022年。它仍在包括亚洲在内的许多国家发生。有必要封锁或限制公民活动,防止病毒传播。几个国家实行封锁导致许多部门的公民流动受到限制。然而,随着从2021年开始分阶段接种疫苗,人们将更能抵御暴露于Covid-19或死于Covid-19的风险。需要观察在大流行之前恢复活动的过程,特别是各国,特别是亚洲国家,接受Covid-19为流行病的准备程度。本研究使用的数据是世卫组织关于Covid-19病例和疫苗接种的数据,以及谷歌的移动数据。这些数据将用于进行观察和时空分析,以了解各个部门的病例发展、疫苗接种和公民流动情况。本研究将包括几个研究阶段,如描述性统计,相关分析,最后是趋势分析。本研究对亚洲国家的结果是,自2021年以来,21.87%的流动性高于基线。其次,46.87%的亚洲国家具有流动性,到2022年将呈上升趋势。只有18.75%的亚洲国家具有稳定的流动性。低于基线的亚洲国家约有12.5%处于基线附近。总的来说,亚洲国家对Covid-19的地方性地位做出了出色的反应。
{"title":"The transformation from Pandemic to Endemic of Covid-19: Spatio-temporal Analysis of Citizen Mobility in Asia Countries","authors":"Sanjaya Samuel Ady, Suyoto","doi":"10.1109/ICTC55196.2022.9952506","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952506","url":null,"abstract":"Covid-19 began in 2019 until now in 2022. It is still taking place in various countries, including Asia. It is necessary to lock down or limit citizens' activities to prevent the virus's spread. The imposition of lockdowns for several countries causes the mobility of citizens to be modified in many sectors. However, with vaccination in stages starting in 2021, people will become more resistant to the risk of being exposed to or dying from Covid-19. The process of transforming the return of activity before the pandemic needs to be observed, especially how countries' readiness, especially in Asia, to accept Covid-19 as endemic. The data used in this study are data on Covid-19 cases and Vaccinations by WHO (World Health Organization) and also Mobility Data from Google. This data will be used to conduct observations and Spatio-temporal analysis to see the development of cases, vaccinations, and mobility of citizens for various sectors. This research will include several stages of study, such as descriptive statistics, correlation analysis, and the last is trend analysis. The results of this study for countries in Asia are 21.87% have mobility above the baseline since 2021. Next, 46.87% of countries in Asia have mobility, with an increasing trend in 2022. Only 18.75% of countries in Asia have stable mobility. Below the baseline, there are also about 12.5% of countries in Asia that are around the baseline. In general, countries in Asia have an excellent response to the imposition of an endemic status for Covid-19.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things 轻量级区块链助力军事物联网防无人机非法访问
Mohtasin Golam, Rubina Akter, Esmot Ara Tuli, Dong‐Seong Kim, Jae-Min Lee
Unmanned aerial vehicles (UAVs) offer important strategic advantages in the Internet of Military Things (IoMT). On the other hand, the use of the UAV by an untrusted party may threaten security and perhaps endanger the vital operation of the IoMT network. The IoMT network additionally faces significant challenges from data falsification and manipulation through unauthorised access. For the purpose of addressing these challenges, this research presents a blockchain-based architecture and user authentication mechanism for the purpose of identifying and keeping track of unauthorized UAVs in the IoMT network. Blockchain technology not only stores data on the central control server but also forbids unauthorized access, data manipulation, and illegal intrusions. Additionally, a unique consensus model for UAV communication has been created. By streamlining the resource-constrained mining process, the created consensus can improve the efficiency of blockchain transactions between UAVs.
无人机在军事物联网(IoMT)中具有重要的战略优势。另一方面,不受信任的一方使用无人机可能会威胁安全并且可能危及IoMT网络的重要操作。此外,IoMT网络还面临着未经授权访问的数据伪造和操纵的重大挑战。为了应对这些挑战,本研究提出了一种基于区块链的架构和用户身份验证机制,用于识别和跟踪IoMT网络中未经授权的无人机。区块链技术不仅将数据存储在中央控制服务器上,还禁止未经授权的访问、数据操纵和非法入侵。此外,还建立了一种独特的无人机通信共识模型。通过简化资源受限的挖掘过程,所创建的共识可以提高无人机之间区块链交易的效率。
{"title":"Lightweight Blockchain Assisted Unauthorized UAV Access Prevention in the Internet of Military Things","authors":"Mohtasin Golam, Rubina Akter, Esmot Ara Tuli, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9953024","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9953024","url":null,"abstract":"Unmanned aerial vehicles (UAVs) offer important strategic advantages in the Internet of Military Things (IoMT). On the other hand, the use of the UAV by an untrusted party may threaten security and perhaps endanger the vital operation of the IoMT network. The IoMT network additionally faces significant challenges from data falsification and manipulation through unauthorised access. For the purpose of addressing these challenges, this research presents a blockchain-based architecture and user authentication mechanism for the purpose of identifying and keeping track of unauthorized UAVs in the IoMT network. Blockchain technology not only stores data on the central control server but also forbids unauthorized access, data manipulation, and illegal intrusions. Additionally, a unique consensus model for UAV communication has been created. By streamlining the resource-constrained mining process, the created consensus can improve the efficiency of blockchain transactions between UAVs.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Differential Equation of the Quantization based Optimization 基于量化的随机微分方程优化
Jinwuk Seok, Chang-Sik Cho
We propose a stochastic differential equation for a quantization-based optimization algorithm. A fundamental differential equation describes the state transition by an algorithm to analyze the dynamics of an optimization algorithm. According to the White Noise Hypothesis of quantization error with dense and uniform distribution, we can regard the quantization error as an identically independent distribution(i.i.d.) white noise. It leads that we can obtain a stochastic equation about the quantization-based optimization algorithm to analyze the global dynamics. Numerical experiments show that the proposed algorithm involves better performance than the conventional optimization algorithm, such as simulated annealing.
我们提出了一个基于量化的优化算法的随机微分方程。一个基本的微分方程描述了一种算法的状态转移,以分析一种优化算法的动力学。根据量化误差密集均匀分布的白噪声假设,我们可以把量化误差看作是一种同独立分布的白噪声。这使得我们可以得到基于量化的优化算法的随机方程来分析全局动力学。数值实验表明,该算法比传统的优化算法(如模拟退火算法)具有更好的性能。
{"title":"Stochastic Differential Equation of the Quantization based Optimization","authors":"Jinwuk Seok, Chang-Sik Cho","doi":"10.1109/ICTC55196.2022.9952667","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952667","url":null,"abstract":"We propose a stochastic differential equation for a quantization-based optimization algorithm. A fundamental differential equation describes the state transition by an algorithm to analyze the dynamics of an optimization algorithm. According to the White Noise Hypothesis of quantization error with dense and uniform distribution, we can regard the quantization error as an identically independent distribution(i.i.d.) white noise. It leads that we can obtain a stochastic equation about the quantization-based optimization algorithm to analyze the global dynamics. Numerical experiments show that the proposed algorithm involves better performance than the conventional optimization algorithm, such as simulated annealing.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124420574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Data Processing Framework for Things with time-series and spatial features 具有时间序列和空间特征的事物实时数据处理框架
Won Gi Choi, Sohyeon Kim, Jeehyeong Kim, Minhwan Song, Sangshin Lee
According to the interest in digital transformation, the requirements for data processing to handle real-world data in real-time steadily raised. Though the efforts for standardization to achieve interoperability among IoT ecosystems have emerged and the opportunity for digital transformation is provided, it is still difficult for service applications to handle the digital values from sensors only based on a resource model optimized for device management. We proposed a user-friendly real-time processing framework that supports oneM2M IoT resources transformation to effectively provide data of time and spatial characteristics to the services. We also suggested two types of demo applications to verify usability.
随着人们对数字化转型的兴趣日益浓厚,对实时处理现实世界数据的要求不断提高。尽管为实现物联网生态系统之间的互操作性而进行的标准化工作已经出现,并提供了数字化转型的机会,但仅基于针对设备管理优化的资源模型,服务应用程序仍然难以处理来自传感器的数字价值。提出了一种支持oneM2M物联网资源转换的用户友好型实时处理框架,有效地为业务提供具有时间和空间特征的数据。我们还建议使用两种类型的演示应用程序来验证可用性。
{"title":"Real-Time Data Processing Framework for Things with time-series and spatial features","authors":"Won Gi Choi, Sohyeon Kim, Jeehyeong Kim, Minhwan Song, Sangshin Lee","doi":"10.1109/ICTC55196.2022.9952888","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952888","url":null,"abstract":"According to the interest in digital transformation, the requirements for data processing to handle real-world data in real-time steadily raised. Though the efforts for standardization to achieve interoperability among IoT ecosystems have emerged and the opportunity for digital transformation is provided, it is still difficult for service applications to handle the digital values from sensors only based on a resource model optimized for device management. We proposed a user-friendly real-time processing framework that supports oneM2M IoT resources transformation to effectively provide data of time and spatial characteristics to the services. We also suggested two types of demo applications to verify usability.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114491341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm 基于随机森林算法的无人机网络边缘智能入侵检测框架
Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee
The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.
网络中无人机群(也称为无人机(UAV))的同步可归因于它们的高机动性和机动性能力,使它们可用于时间关键型操作,如安全监视、灾害管理和搜索和救援操作。然而,这些飞行机器人的资源约束限制了它们的功能。同样,忽视该网络的安全状态会极大地促进入侵者的攻击,从而阻碍该网络的使命。在本研究中,利用移动边缘计算(MEC)技术和基于异常的入侵检测方案,利用嵌入在专用无人机-MEC服务器中的优化随机森林(RCSV)模型来遏制这些挑战。通过皮尔逊相关系数(PCC)和随机搜索交叉验证技术,可以选择突出特征和超参数来建模优化的攻击预测器。此外,使用由复杂网络攻击类型组成的入侵检测数据集(CICIDS2017数据集)对所提出的模型进行了训练和评估。仿真结果表明,该模型对网络中不同攻击的检测和分类准确率为99.87%,准确率为99.32%,召回率为98.81%,F1-score为99.06%,优于其他优化的机器学习模型和以往研究中使用的一些现有模型。
{"title":"Cyber Edge Intelligent Intrusion Detection Framework For UAV Network Based on Random Forest Algorithm","authors":"Vivian Ukamaka Ihekoronye, S. Ajakwe, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1109/ICTC55196.2022.9952400","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952400","url":null,"abstract":"The synchronization of swarms of drones (also known as unmanned aerial vehicles (UAV)) in a network can be attributed to their high mobility and maneuverability capabilities, making them deployable for time-critical operations such as security surveillance, disaster management, and search and rescue operations. However, the resource constraints of these flying robots are limitations to their functionalities. Likewise, the neglect of the security status of this network significantly promotes attacks by invaders, thus, thwarting the mission of this network. In this study, mobile edge computing (MEC) technology and anomaly-based intrusion detection scheme are leveraged to curb these challenges using an optimized Random Forest (RCSV) model embedded in dedicated UAV-MEC servers. The selection of prominent features and hyperparameters for modeling an optimized attack predictor is enabled by Pearson correlation coefficient (PCC) and randomized search cross-validation techniques. Also, the training and evaluation of the proposed model were achieved using intrusion detection data set (CICIDS2017 data set) comprised of complex network attack types. The simulation results obtained by the model in the detection and classification of the different attacks in the network (accuracy = 99.87%, precision = 99.32%, recall = 98.81 % and F1-score = 99.06%) shows its superiority over other optimized machine learning models and some existing models utilized in previous research.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Changes in Communication Networks and Computing for Intelligent IoT Services from Cloud to Edge 从云到边缘的智能物联网服务的通信网络和计算变化
Yeunwoong Kyung, Haneul Ko
Initially, users use internet of things (IoT) services to remotely monitor or control things through the internet. However, according to the development of IoT technologies, there have been various IoT services which require some strict requirements such as real-time response or high computing processing. In addition, the intelligent computing for the services has been needed in these days. To cover these services, the communication networks and computing paradigms have been changed. Conventionally, IoT services have been usually supported in the cloud. Then, the edge cloud or computing has been considered for the real-time response. Finally, the computing in the device by itself such as a tiny machine learning concept has been recently introduced. Therefore, this paper reviews the changes in communications networks and computing paradigms from the cloud to the edge and device computing for the intelligent IoT services.
最初,用户使用物联网(IoT)服务通过互联网远程监控或控制事物。然而,随着物联网技术的发展,出现了各种各样的物联网服务,这些服务对实时响应或高计算处理等要求非常严格。此外,服务的智能计算在这些天已经被需要。为了覆盖这些服务,通信网络和计算范式已经发生了变化。传统上,物联网服务通常在云中得到支持。然后,考虑了边缘云或计算的实时响应。最后,最近引入了设备本身的计算,例如微型机器学习概念。因此,本文回顾了从云到边缘的通信网络和计算范式的变化以及智能物联网服务的设备计算。
{"title":"Changes in Communication Networks and Computing for Intelligent IoT Services from Cloud to Edge","authors":"Yeunwoong Kyung, Haneul Ko","doi":"10.1109/ICTC55196.2022.9952986","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952986","url":null,"abstract":"Initially, users use internet of things (IoT) services to remotely monitor or control things through the internet. However, according to the development of IoT technologies, there have been various IoT services which require some strict requirements such as real-time response or high computing processing. In addition, the intelligent computing for the services has been needed in these days. To cover these services, the communication networks and computing paradigms have been changed. Conventionally, IoT services have been usually supported in the cloud. Then, the edge cloud or computing has been considered for the real-time response. Finally, the computing in the device by itself such as a tiny machine learning concept has been recently introduced. Therefore, this paper reviews the changes in communications networks and computing paradigms from the cloud to the edge and device computing for the intelligent IoT services.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing DNN inference latency using DRL 使用DRL减少DNN推理延迟
Suhwan Kim, Sehun Jung, Hyang-Won Lee
With the development of artificial intelligence (AI) technology, many applications are providing AI services. The key part of these AI services is the Deep Neural Networks(DNNs) requiring a lot of computation. However, it is usually time-consuming to provide an inference process on end devices that lack resources. Because of these limitations, distributed computing, which can perform large amounts of calculations using the processing power of various computers connected to the Internet, is emerging. We develop how to efficiently distribute DNN inference jobs in distributed computing environments and quickly process large amounts of DNN computations. In this paper, we will introduce the learning method and the results of the Deep Reinforcement Learning(DRL) model to reduce end-to-end latency by observing the state of the distributed computing environment and scheduling the DNN job using DRL.
随着人工智能(AI)技术的发展,许多应用程序都在提供AI服务。这些人工智能服务的关键部分是需要大量计算的深度神经网络(dnn)。然而,在缺乏资源的终端设备上提供推理过程通常非常耗时。由于这些限制,分布式计算正在兴起,这种计算可以利用连接到Internet的各种计算机的处理能力来执行大量的计算。我们研究了如何在分布式计算环境中高效地分配DNN推理任务,并快速处理大量DNN计算。在本文中,我们将介绍深度强化学习(DRL)模型的学习方法和结果,通过观察分布式计算环境的状态和使用DRL调度DNN作业来减少端到端延迟。
{"title":"Reducing DNN inference latency using DRL","authors":"Suhwan Kim, Sehun Jung, Hyang-Won Lee","doi":"10.1109/ICTC55196.2022.9952987","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952987","url":null,"abstract":"With the development of artificial intelligence (AI) technology, many applications are providing AI services. The key part of these AI services is the Deep Neural Networks(DNNs) requiring a lot of computation. However, it is usually time-consuming to provide an inference process on end devices that lack resources. Because of these limitations, distributed computing, which can perform large amounts of calculations using the processing power of various computers connected to the Internet, is emerging. We develop how to efficiently distribute DNN inference jobs in distributed computing environments and quickly process large amounts of DNN computations. In this paper, we will introduce the learning method and the results of the Deep Reinforcement Learning(DRL) model to reduce end-to-end latency by observing the state of the distributed computing environment and scheduling the DNN job using DRL.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1