首页 > 最新文献

2021 International Conference on Information Networking (ICOIN)最新文献

英文 中文
A Study on the Cluster-wise Regression Model for Bead Width in the Automatic GMA Welding 自动GMA焊接焊缝宽度的聚类回归模型研究
Pub Date : 2023-01-01 DOI: 10.1109/ICOIN56518.2023.10049016
Bo-Ram Lee, Won-Bin Oh, Hak-Hyoung Kim, Yeongdo Jeong, Jae Seung Yoon, Ill-Soo Kim
{"title":"A Study on the Cluster-wise Regression Model for Bead Width in the Automatic GMA Welding","authors":"Bo-Ram Lee, Won-Bin Oh, Hak-Hyoung Kim, Yeongdo Jeong, Jae Seung Yoon, Ill-Soo Kim","doi":"10.1109/ICOIN56518.2023.10049016","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049016","url":null,"abstract":"","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"114 1","pages":"686-691"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79224971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GDFed: Dynamic Federated Learning for Heterogenous Device Using Graph Neural Network 基于图神经网络的异构设备动态联邦学习
Pub Date : 2023-01-01 DOI: 10.1109/ICOIN56518.2023.10048926
J. Yoon, Sun Moo Kang, Seong-Bae Park, C. Hong
{"title":"GDFed: Dynamic Federated Learning for Heterogenous Device Using Graph Neural Network","authors":"J. Yoon, Sun Moo Kang, Seong-Bae Park, C. Hong","doi":"10.1109/ICOIN56518.2023.10048926","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048926","url":null,"abstract":"","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"148 1","pages":"683-685"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80082482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Prediction of Hourly Energy Consumption Based on Long Short-Term Memory Neural Network 基于长短期记忆神经网络的小时能耗分析与预测
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333968
Rubina Akter, Jae-Min Lee, Dong-Seong Kim
Due to the advancements of electricity dependent machinery, the excessive growth of power consumption has increased exponentially. Therefore, analysis and prediction of the energy consumption system will offer the future demand for electricity consumption and improve the power distribution system. On account of several challenges of existing energy consumption prediction models that are limiting to predict the actual energy consumption properly. Thus, to conquer the energy prediction method, this paper analyzes fourteen years of energy consumption data collected on an hourly basis, an open source dataset from kaggle. Moreover, the paper initiates a Long Short Term Memory (LSTM) based approach to predict the energy consumption based on the actual dataset. The empirical results demonstrate that the proposed LSTM architecture can efficiently enhance the prediction accuracy of energy consumption.
由于依赖电力的机械的进步,电力消耗的过度增长呈指数级增长。因此,对能源消耗系统进行分析和预测,可以为未来的用电量需求提供依据,改善配电系统。鉴于现有的能源消耗预测模型存在一些问题,这些问题限制了对实际能源消耗的正确预测。因此,为了克服能源预测方法,本文分析了来自kaggle的开源数据集,以小时为单位收集的14年的能源消耗数据。此外,本文还提出了一种基于长短期记忆(LSTM)的基于实际数据集的能耗预测方法。实证结果表明,所提出的LSTM架构能够有效提高能耗预测的精度。
{"title":"Analysis and Prediction of Hourly Energy Consumption Based on Long Short-Term Memory Neural Network","authors":"Rubina Akter, Jae-Min Lee, Dong-Seong Kim","doi":"10.1109/ICOIN50884.2021.9333968","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333968","url":null,"abstract":"Due to the advancements of electricity dependent machinery, the excessive growth of power consumption has increased exponentially. Therefore, analysis and prediction of the energy consumption system will offer the future demand for electricity consumption and improve the power distribution system. On account of several challenges of existing energy consumption prediction models that are limiting to predict the actual energy consumption properly. Thus, to conquer the energy prediction method, this paper analyzes fourteen years of energy consumption data collected on an hourly basis, an open source dataset from kaggle. Moreover, the paper initiates a Long Short Term Memory (LSTM) based approach to predict the energy consumption based on the actual dataset. The empirical results demonstrate that the proposed LSTM architecture can efficiently enhance the prediction accuracy of energy consumption.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"136 1","pages":"732-734"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78193389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Harmful Animals Detection System Utilizing Cooperative Actuation of Multiple Sensing Devices 利用多传感装置协同驱动的有害动物检测系统
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333928
Daichi Ozaki, Hiroshi Yamamoto, E. Utsunomiya, K. Yoshihara
In recent years, there have been several incidents of crop damage and injury caused by harmful animals in various areas of Japan each year, amounting to about 15.8 billion yen in 2018. In order to reduce the damage, a number of existing studies have been conducted on camera-based systems. However, this existing system requires that the sensing devices should always be running, which makes it inappropriate for installation in mountainous areas where electronic power is difficult to be supplied to the system. Therefore, in this research, we propose a new harmful animals detection system that can detect not only the approaching of animals to the traps and the fences but also their species and postures by combining various sensing technologies (i.e., beacon sensing, laser radar, and depth camera). The beacon sensing attempts to detect the passage of moving objects by analyzing changes in received signal strength caused by reflection, diffraction, and absorption of radio wave beacons by the object. After detecting the passage of the moving object, a small computer is activated to measure one-dimensional distance to the target object using a laser radar. The time-series data of the measured distance is analyzed by the machine learning technology to estimate the type of the moving object (e.g., human, animal). If the moving object is judged as a harmful animal, the small computer activates the depth camera to acquire two-dimensional distance data of the target animal. The acquired distance data is analyzed by the machine learning technology to estimate the posture of the harmful animal. As explained above, by gradually activating the sensors with higher power consumption, the proposed system achieves power-saving.
近年来,日本各地每年都发生多起因有害动物造成的农作物破坏和伤害事件,2018年的损失约为158亿日元。为了减少这种损害,已经对基于摄像机的系统进行了一些现有的研究。但是,现有的系统要求传感装置始终处于运行状态,这使得它不适合安装在难以向系统提供电子电源的山区。因此,在本研究中,我们提出了一种新的有害动物检测系统,该系统结合各种传感技术(如信标传感、激光雷达和深度相机),不仅可以检测动物接近陷阱和围栏,还可以检测动物的种类和姿势。信标传感试图通过分析物体对无线电波信标的反射、衍射和吸收引起的接收信号强度的变化来检测移动物体的通过。探测到移动物体经过后,启动一台小型计算机,利用激光雷达测量到目标物体的一维距离。通过机器学习技术对测量距离的时间序列数据进行分析,估计运动对象的类型(如人、动物)。如果判断运动物体为有害动物,则小型计算机激活深度摄像机获取目标动物的二维距离数据。利用机器学习技术对获取的距离数据进行分析,估计出有害动物的姿态。如上所述,通过逐步激活功耗较高的传感器,本系统实现了节能。
{"title":"Harmful Animals Detection System Utilizing Cooperative Actuation of Multiple Sensing Devices","authors":"Daichi Ozaki, Hiroshi Yamamoto, E. Utsunomiya, K. Yoshihara","doi":"10.1109/ICOIN50884.2021.9333928","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333928","url":null,"abstract":"In recent years, there have been several incidents of crop damage and injury caused by harmful animals in various areas of Japan each year, amounting to about 15.8 billion yen in 2018. In order to reduce the damage, a number of existing studies have been conducted on camera-based systems. However, this existing system requires that the sensing devices should always be running, which makes it inappropriate for installation in mountainous areas where electronic power is difficult to be supplied to the system. Therefore, in this research, we propose a new harmful animals detection system that can detect not only the approaching of animals to the traps and the fences but also their species and postures by combining various sensing technologies (i.e., beacon sensing, laser radar, and depth camera). The beacon sensing attempts to detect the passage of moving objects by analyzing changes in received signal strength caused by reflection, diffraction, and absorption of radio wave beacons by the object. After detecting the passage of the moving object, a small computer is activated to measure one-dimensional distance to the target object using a laser radar. The time-series data of the measured distance is analyzed by the machine learning technology to estimate the type of the moving object (e.g., human, animal). If the moving object is judged as a harmful animal, the small computer activates the depth camera to acquire two-dimensional distance data of the target animal. The acquired distance data is analyzed by the machine learning technology to estimate the posture of the harmful animal. As explained above, by gradually activating the sensors with higher power consumption, the proposed system achieves power-saving.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"808-813"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75045679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficiency Comparison of Ad-hoc Routings in a Shadowing Environment for Smart IoT 智能物联网阴影环境下Ad-hoc路由的能效比较
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333990
Yuta Kuwahara, Naoki Aihara, S. Yamazaki, K. Ohuchi, H. Mizuno
With the progress of internet of things (IoT), devices with a wireless ad-hoc function are being increasingly used. For future wireless communication systems, the use of millimeter waves, which are strongly affected by shadowing, is considered. We focus on energy-efficiency [bits/J] that combines throughput and energy consumption, which is expected to be important in future wireless communication systems, to realize smart IoT in a shadowing environment. In this paper, we compare the effects of two parameters, including shadowing deviation values, on energy-efficiency in three dimensions for both AODV and OLSR protocols in a shadowing environment using network simulator, ns3.
随着物联网(IoT)的发展,具有无线自组织功能的设备被越来越多地使用。对于未来的无线通信系统,考虑使用受阴影强烈影响的毫米波。我们专注于结合吞吐量和能耗的能源效率[bits/J],这在未来的无线通信系统中很重要,可以在阴影环境中实现智能物联网。在本文中,我们使用网络模拟器ns3,比较了包括阴影偏差值在内的两个参数在阴影环境下对AODV和OLSR协议的三维能效的影响。
{"title":"Energy-Efficiency Comparison of Ad-hoc Routings in a Shadowing Environment for Smart IoT","authors":"Yuta Kuwahara, Naoki Aihara, S. Yamazaki, K. Ohuchi, H. Mizuno","doi":"10.1109/ICOIN50884.2021.9333990","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333990","url":null,"abstract":"With the progress of internet of things (IoT), devices with a wireless ad-hoc function are being increasingly used. For future wireless communication systems, the use of millimeter waves, which are strongly affected by shadowing, is considered. We focus on energy-efficiency [bits/J] that combines throughput and energy consumption, which is expected to be important in future wireless communication systems, to realize smart IoT in a shadowing environment. In this paper, we compare the effects of two parameters, including shadowing deviation values, on energy-efficiency in three dimensions for both AODV and OLSR protocols in a shadowing environment using network simulator, ns3.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"801-804"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81904163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Caching Performance of Named Data Networking with NDNS 基于NDNS的命名数据网络缓存性能研究
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333907
Seshariana Rahma Melati, L. V. Yovita, Ratna Mayasari
Named Data Networking, a future internet network architecture design that can change the network’s perspective from previously host-centric to data-centric. It can reduce the network load, especially on the server part, and can provide advantages in multicast cases or re-sending of content data to users due to transmission errors. In NDN, interest messages are sent to the router, and if they are not immediately found, they will continue to be forwarded, resulting in a large load. NDNS or a DNS-Like Name Service for NDN is needed to know exactly where the content is to improve system performance. NDNS is a database that provides information about the zone location of the data contained in the network. In this study, a simulation was conducted to test the NDNS mechanism on the NDN network to support caching on the NDN network by testing various topologies with changes in the size of the content store and the number of nodes used. NDNS is outperform compared to NDN without NDNS for cache hit ratio and load parameters.
名为数据网络,一种未来的互联网网络架构设计,可以将网络的视角从以前的以主机为中心转变为以数据为中心。它可以减少网络负载,特别是服务器部分的负载,并且可以在多播情况下或由于传输错误而将内容数据重新发送给用户时提供优势。在NDN中,感兴趣的消息被发送到路由器,如果没有立即找到,就会继续转发,造成很大的负载。需要NDNS或类似于dns的NDN名称服务来准确地知道内容的位置,以提高系统性能。NDNS是一个数据库,提供有关网络中包含的数据的区域位置信息。在本研究中,通过测试各种拓扑,改变内容存储的大小和使用的节点数量,模拟测试NDN网络上的NDNS机制,以支持NDN网络上的缓存。在缓存命中率和负载参数方面,NDNS优于不带NDNS的NDN。
{"title":"Caching Performance of Named Data Networking with NDNS","authors":"Seshariana Rahma Melati, L. V. Yovita, Ratna Mayasari","doi":"10.1109/ICOIN50884.2021.9333907","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333907","url":null,"abstract":"Named Data Networking, a future internet network architecture design that can change the network’s perspective from previously host-centric to data-centric. It can reduce the network load, especially on the server part, and can provide advantages in multicast cases or re-sending of content data to users due to transmission errors. In NDN, interest messages are sent to the router, and if they are not immediately found, they will continue to be forwarded, resulting in a large load. NDNS or a DNS-Like Name Service for NDN is needed to know exactly where the content is to improve system performance. NDNS is a database that provides information about the zone location of the data contained in the network. In this study, a simulation was conducted to test the NDNS mechanism on the NDN network to support caching on the NDN network by testing various topologies with changes in the size of the content store and the number of nodes used. NDNS is outperform compared to NDN without NDNS for cache hit ratio and load parameters.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"261-266"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84334976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Metric-Based Learning for Nearest-Neighbor Few-Shot Image Classification 基于度量的最近邻少拍图像分类
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333850
Min Jun Lee, Jungmin So
Few-shot learning task, which aims to recognize a new class with insufficient data, is an inevitable issue to be solved in image classification. Among recent work, Metalearning is commonly used to Figure out few-shot learning task. Here we tackle a recent method that uses the nearest-neighbor algorithm when recognizing few-shot images and to this end, propose a metric-based approach for nearest-neighbor few-shot classification. We train a convolutional neural network with miniImageNet applying three types of loss, triplet loss, crossentropy loss, and combination of triplet loss and cross-entropy loss. In evaluation, three configurations exist according to feature transformation technique which are unnormalized features, L2-normalized features, and centered L2-norma1ized features. For 1-shot 5-way task, the triplet loss model attains the uppermost accuracy among all three configurations and for 5-shot 5-way task, the identical model reaches the foremost accuracy in unnormalized features configuration.
Few-shot学习任务是图像分类中不可避免要解决的问题,其目的是在数据不足的情况下识别一个新的类。在最近的研究中,元学习被广泛用于求解少量的学习任务。在这里,我们解决了最近的一种方法,该方法在识别少量图像时使用最近邻算法,并为此提出了一种基于度量的最近邻少量图像分类方法。我们使用miniImageNet训练卷积神经网络,使用三种类型的损失,三重损失,交叉熵损失,以及三重损失和交叉熵损失的组合。在评价中,根据特征变换技术,存在非归一化特征、l2归一化特征和l2归一化中心特征三种构型。对于1发5向任务,三组损失模型在三种配置中准确率最高;对于5发5向任务,同一模型在非归一化特征配置中准确率最高。
{"title":"Metric-Based Learning for Nearest-Neighbor Few-Shot Image Classification","authors":"Min Jun Lee, Jungmin So","doi":"10.1109/ICOIN50884.2021.9333850","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333850","url":null,"abstract":"Few-shot learning task, which aims to recognize a new class with insufficient data, is an inevitable issue to be solved in image classification. Among recent work, Metalearning is commonly used to Figure out few-shot learning task. Here we tackle a recent method that uses the nearest-neighbor algorithm when recognizing few-shot images and to this end, propose a metric-based approach for nearest-neighbor few-shot classification. We train a convolutional neural network with miniImageNet applying three types of loss, triplet loss, crossentropy loss, and combination of triplet loss and cross-entropy loss. In evaluation, three configurations exist according to feature transformation technique which are unnormalized features, L2-normalized features, and centered L2-norma1ized features. For 1-shot 5-way task, the triplet loss model attains the uppermost accuracy among all three configurations and for 5-shot 5-way task, the identical model reaches the foremost accuracy in unnormalized features configuration.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"20 1","pages":"460-464"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81246750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-Vehicle Passenger Detection Using FMCW Radar 基于FMCW雷达的车载乘客检测
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334014
Heemang Song, Youngkeun Yoo, Hyun-Chool Shin
In this paper, we suggest features for passenger detection inside the vehicle using frequency modulated continuous wave (FMCW) radar. In radar time-frequency spectrum, the magnitude variation of a person is caused by the physiological movements such as breathing and heartbeat. To quantify the physiological movements, the power of respiratory frequency band (0.1–0.4 Hz) and heartbeat frequency band (0.8–1.7 Hz) is used. We experimentally compare the proposed features under presence and absence of a person using FMCW radar signal acquired inside the vehicle.
在本文中,我们提出了使用调频连续波(FMCW)雷达检测车内乘客的特征。在雷达时频谱中,人的幅度变化是由呼吸、心跳等生理运动引起的。为了量化生理运动,使用呼吸频带(0.1-0.4 Hz)和心跳频带(0.8-1.7 Hz)的功率。我们通过实验比较了车辆内部获取的FMCW雷达信号在人的存在和缺席情况下提出的特征。
{"title":"In-Vehicle Passenger Detection Using FMCW Radar","authors":"Heemang Song, Youngkeun Yoo, Hyun-Chool Shin","doi":"10.1109/ICOIN50884.2021.9334014","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334014","url":null,"abstract":"In this paper, we suggest features for passenger detection inside the vehicle using frequency modulated continuous wave (FMCW) radar. In radar time-frequency spectrum, the magnitude variation of a person is caused by the physiological movements such as breathing and heartbeat. To quantify the physiological movements, the power of respiratory frequency band (0.1–0.4 Hz) and heartbeat frequency band (0.8–1.7 Hz) is used. We experimentally compare the proposed features under presence and absence of a person using FMCW radar signal acquired inside the vehicle.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"644-647"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84602184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Design of Caching Threshold of Caching Strategy CDO for ICN ICN缓存策略CDO的缓存阈值设计
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333943
Kota Tohno, Ryo Nakamura, N. Kamiyama
In recent years, Information-Centric Networking (ICN) which mainly focuses on the transferred data rather than the sending and receiving hosts has attracted attention. To realize ICN as a future Internet architecture, it is required that ICN is robust against network failures such as a disaster and errors of network equipments. In our previous work, we proposed a caching strategy called CDO (Caching based on Distance to Originals), which achieves the high content availability at network failure in ICN. In the CDO, a router caches a content only when the hop distance between the origin of the content and itself is greater than or equal to a given caching threshold. However, in our previous work, we focused on only maximizing the AMDC (Average Maximum hop Distance to Caching copies) which leads to the content availability at the network failure, and did not sufficiently consider the cache hit ratio, i.e., the probability that the requested content is returned from one of routers. Therefore, in this paper, we study how to design the caching threshold of the CDO, which aimed at achieving the high AMDC and the high cache hit ratio using the CDO. Especially, we consider the optimal design method of caching threshold using a weighted sum and the design method of caching threshold for each content. As a result of investigating the effectiveness of the two types of the design methods through experiments, we show that the cache hit ratio can be significantly improved while maintaining the high AMDC by appropriately designing the caching threshold of the CDO.
近年来,信息中心网络(Information-Centric Networking, ICN)引起了人们的关注,它主要关注传输的数据而不是发送和接收主机。为了使ICN成为未来的互联网架构,要求ICN对网络故障(如网络设备的灾难和错误)具有鲁棒性。在我们之前的工作中,我们提出了一种名为CDO (caching based on Distance to Originals)的缓存策略,实现了ICN在网络故障时的高内容可用性。在CDO中,只有当内容源与路由器之间的跳距大于或等于给定的缓存阈值时,路由器才会缓存内容。然而,在我们之前的工作中,我们只关注最大化导致网络故障时内容可用性的AMDC(到缓存副本的平均最大跳距离),而没有充分考虑缓存命中率,即请求的内容从其中一个路由器返回的概率。因此,本文研究了如何设计CDO的缓存阈值,旨在利用CDO实现高AMDC和高缓存命中率。特别地,我们考虑了基于加权和的缓存阈值优化设计方法和针对每个内容的缓存阈值设计方法。通过实验考察了两种设计方法的有效性,结果表明,通过合理设计CDO的缓存阈值,可以在保持较高AMDC的同时显著提高缓存命中率。
{"title":"On Design of Caching Threshold of Caching Strategy CDO for ICN","authors":"Kota Tohno, Ryo Nakamura, N. Kamiyama","doi":"10.1109/ICOIN50884.2021.9333943","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333943","url":null,"abstract":"In recent years, Information-Centric Networking (ICN) which mainly focuses on the transferred data rather than the sending and receiving hosts has attracted attention. To realize ICN as a future Internet architecture, it is required that ICN is robust against network failures such as a disaster and errors of network equipments. In our previous work, we proposed a caching strategy called CDO (Caching based on Distance to Originals), which achieves the high content availability at network failure in ICN. In the CDO, a router caches a content only when the hop distance between the origin of the content and itself is greater than or equal to a given caching threshold. However, in our previous work, we focused on only maximizing the AMDC (Average Maximum hop Distance to Caching copies) which leads to the content availability at the network failure, and did not sufficiently consider the cache hit ratio, i.e., the probability that the requested content is returned from one of routers. Therefore, in this paper, we study how to design the caching threshold of the CDO, which aimed at achieving the high AMDC and the high cache hit ratio using the CDO. Especially, we consider the optimal design method of caching threshold using a weighted sum and the design method of caching threshold for each content. As a result of investigating the effectiveness of the two types of the design methods through experiments, we show that the cache hit ratio can be significantly improved while maintaining the high AMDC by appropriately designing the caching threshold of the CDO.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"110 1","pages":"615-620"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87746261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP 使用MQTT版本5和LDAP的物联网(IoT)设备的安全确证协议
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333910
N. Vithanage, Sangeeth S. Hetti Thanthrige, Malsha C. K. Paththini Kapuge, Tharindu H. Malwenna, C. Liyanapathirana, J. Wijekoon
The world is now shifting from Industry 4.0 to Industry 5.0 enabling the automation of the human livelihood by using Internet of Things (IoT). IoT can be attributed as a network that connects many sensor devices to collect data to provide automated smart environments. However, with a huge number of connected devices already deployed worldwide and organizations resorting to IoT development services more frequently because IoT security issues remain a matter of concern. One of the main identified reasons is IoT devices possess limited memory capacity, energy, processing which cause difficulties to run complex security algorithms, hindering the security services such as privacy and authentication, although those are crucial factors of IoT services. Hence, the adoption of adequate security and authentication techniques are necessary for a broad IoT deployment. To this end, this study proposes an authentication platform to improve the security and efficiency of data transmission between the IoT devices using LDAP and MQTT technologies. The implementation complies with IEEE 1451 standardization to uplift the MQTT with the help of LDAP features and GZip compression.
世界正在从工业4.0转向工业5.0,通过物联网(IoT)实现人类生活的自动化。物联网可以被视为连接许多传感器设备以收集数据以提供自动化智能环境的网络。然而,随着全球范围内已经部署了大量的连接设备,并且由于物联网安全问题仍然是一个值得关注的问题,组织更频繁地诉诸物联网开发服务。其中一个主要原因是物联网设备具有有限的内存容量,能量,处理能力,导致难以运行复杂的安全算法,阻碍了隐私和身份验证等安全服务,尽管这些是物联网服务的关键因素。因此,采用足够的安全和身份验证技术对于广泛的物联网部署是必要的。为此,本研究提出了一个认证平台,利用LDAP和MQTT技术提高物联网设备之间数据传输的安全性和效率。该实现符合IEEE 1451标准,通过LDAP特性和GZip压缩来提升MQTT。
{"title":"A Secure Corroboration Protocol for Internet of Things (IoT) Devices Using MQTT Version 5 and LDAP","authors":"N. Vithanage, Sangeeth S. Hetti Thanthrige, Malsha C. K. Paththini Kapuge, Tharindu H. Malwenna, C. Liyanapathirana, J. Wijekoon","doi":"10.1109/ICOIN50884.2021.9333910","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333910","url":null,"abstract":"The world is now shifting from Industry 4.0 to Industry 5.0 enabling the automation of the human livelihood by using Internet of Things (IoT). IoT can be attributed as a network that connects many sensor devices to collect data to provide automated smart environments. However, with a huge number of connected devices already deployed worldwide and organizations resorting to IoT development services more frequently because IoT security issues remain a matter of concern. One of the main identified reasons is IoT devices possess limited memory capacity, energy, processing which cause difficulties to run complex security algorithms, hindering the security services such as privacy and authentication, although those are crucial factors of IoT services. Hence, the adoption of adequate security and authentication techniques are necessary for a broad IoT deployment. To this end, this study proposes an authentication platform to improve the security and efficiency of data transmission between the IoT devices using LDAP and MQTT technologies. The implementation complies with IEEE 1451 standardization to uplift the MQTT with the help of LDAP features and GZip compression.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"837-841"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88426442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1