首页 > 最新文献

2021 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Improving the performance of Machine Learning Algorithms for TOR detection 改进机器学习算法在TOR检测中的性能
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333989
Adityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, D. Vishwakarma
The Onion Router (TOR) networks provide anonymity, in terms of identity and location, to the Internet users by encrypting traffic multiple times along the path and routing it via an overlay network of servers. Although TOR was initially developed as a medium to maintain users’ privacy, cyber criminals and hackers take advantage of this anonymity, and as a result, many illegal activities are carried out using TOR networks. With the ever-changing landscape of Internet services, traditional traffic analysis methods are not efficient for analyzing encrypted traffic and there is a need for alternative methods for analyzing TOR traffic. In this paper, we develop a machine learning model to identify whether a given network traffic is TOR or nonTOR. We use the ISCX2016 TOR-nonTOR dataset to train our model and perform random oversampling and random undersampling to remove data imbalance. Furthermore, to improve the efficiency of our classifiers, we use k-fold cross-validation and Grid Search algorithms for hyperparameter tuning. Results show that we achieve more than 90% accuracy with random sampling and hyperparameter tuning methods.
洋葱路由器(TOR)网络在身份和位置方面为互联网用户提供匿名性,方法是沿着路径对流量进行多次加密,并通过覆盖的服务器网络进行路由。虽然TOR最初是作为维护用户隐私的媒介而开发的,但网络犯罪分子和黑客利用了这种匿名性,因此,许多非法活动都是利用TOR网络进行的。随着互联网服务环境的不断变化,传统的流量分析方法对加密流量的分析效率低下,需要替代的方法来分析TOR流量。在本文中,我们开发了一个机器学习模型来识别给定的网络流量是TOR还是nonTOR。我们使用ISCX2016 TOR-nonTOR数据集来训练我们的模型,并进行随机过采样和随机欠采样来消除数据不平衡。此外,为了提高分类器的效率,我们使用k-fold交叉验证和网格搜索算法进行超参数调优。结果表明,采用随机采样和超参数整定的方法可以达到90%以上的精度。
{"title":"Improving the performance of Machine Learning Algorithms for TOR detection","authors":"Adityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, D. Vishwakarma","doi":"10.1109/ICOIN50884.2021.9333989","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333989","url":null,"abstract":"The Onion Router (TOR) networks provide anonymity, in terms of identity and location, to the Internet users by encrypting traffic multiple times along the path and routing it via an overlay network of servers. Although TOR was initially developed as a medium to maintain users’ privacy, cyber criminals and hackers take advantage of this anonymity, and as a result, many illegal activities are carried out using TOR networks. With the ever-changing landscape of Internet services, traditional traffic analysis methods are not efficient for analyzing encrypted traffic and there is a need for alternative methods for analyzing TOR traffic. In this paper, we develop a machine learning model to identify whether a given network traffic is TOR or nonTOR. We use the ISCX2016 TOR-nonTOR dataset to train our model and perform random oversampling and random undersampling to remove data imbalance. Furthermore, to improve the efficiency of our classifiers, we use k-fold cross-validation and Grid Search algorithms for hyperparameter tuning. Results show that we achieve more than 90% accuracy with random sampling and hyperparameter tuning methods.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"15 1","pages":"439-444"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87771704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GRGE: Detection of Gliomas Using Radiomics, GA Features and Extremely Randomized Trees GRGE:利用放射组学、遗传特征和极度随机树检测胶质瘤
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334021
Rahul Kumar, Ankur Gupta, Harkirat Singh Arora, B. Raman
Gliomas originates in glial cells and recognized as one of the most malignant and dangerous brain tumors and categories into two major classes i.e., High Grade Glioma (HGG) and Low Grade Glioma (LGG). Out of both, HGG tumors are more aggressive. Classification of grade of glioma is a crucial task for deciding the treatment therapy and estimating survival period of patient. In this work, a computational approach based on Radiomics and machine learning algorithms, namely GRGE, is proposed to discriminate between HGG and LGG. The approach, GRGE, has performed better than several state-of-art methods proposed in the literature for glioma classification.
胶质瘤起源于神经胶质细胞,是公认的恶性和危险程度最高的脑肿瘤之一,分为高级别胶质瘤(High Grade Glioma, HGG)和低级别胶质瘤(Low Grade Glioma, LGG)两大类。两者中,HGG肿瘤更具侵袭性。胶质瘤分级是决定治疗方案和估计患者生存期的重要任务。在这项工作中,提出了一种基于放射组学和机器学习算法的计算方法,即GRGE,来区分HGG和LGG。该方法,GRGE,比文献中提出的几种最先进的胶质瘤分类方法表现得更好。
{"title":"GRGE: Detection of Gliomas Using Radiomics, GA Features and Extremely Randomized Trees","authors":"Rahul Kumar, Ankur Gupta, Harkirat Singh Arora, B. Raman","doi":"10.1109/ICOIN50884.2021.9334021","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334021","url":null,"abstract":"Gliomas originates in glial cells and recognized as one of the most malignant and dangerous brain tumors and categories into two major classes i.e., High Grade Glioma (HGG) and Low Grade Glioma (LGG). Out of both, HGG tumors are more aggressive. Classification of grade of glioma is a crucial task for deciding the treatment therapy and estimating survival period of patient. In this work, a computational approach based on Radiomics and machine learning algorithms, namely GRGE, is proposed to discriminate between HGG and LGG. The approach, GRGE, has performed better than several state-of-art methods proposed in the literature for glioma classification.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"20 1","pages":"379-384"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84445942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Let’s Attest! Multi-modal Certificate Exchange for the Web of Trust 让我们证明!用于信任网络的多模态证书交换
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333877
Tobias Mueller
On the Internet, trust is difficult to obtain. With the rise of the possibility of obtaining gratis x509 certificates in an automated fashion, the use of TLS for establishing secure connections has significantly increased. However, other use cases, such as end-to-end encrypted messaging, do not yet have an easy method of managing trust in the public keys. This is particularly true for personal communication where two people want to securely exchange messages. While centralised solutions, such as Signal, exist, decentralised and federated protocols lack a way of conveniently and securely exchanging personal certificates.This paper presents a protocol and an implementation for certifying OpenPGP certificates. By offering multiple means of data transport protocols, it achieves robust and resilient certificate exchange between an attestee, the party whose key certificate is to be certified, and an attestor, the party who will express trust in the certificate once seen. The data can be transferred either via the Internet or via proximity-based technologies, i.e. Bluetooth or link-local networking. The former presents a challenge when the parties interested in exchanging certificates are not physically close, because an attacker may tamper with the connection. Our evaluation shows that a passive attacker learns nothing except the publicly visible metadata, e.g. the timings of the transfer while an active attacker can either have success with a very low probability or be detected by the user.
在互联网上,信任是很难获得的。随着以自动化方式获得免费x509证书的可能性的增加,使用TLS建立安全连接的情况显著增加。但是,其他用例(例如端到端加密消息传递)还没有一种简单的方法来管理公钥中的信任。当两个人想要安全地交换消息时,这一点尤其适用于个人通信。虽然集中式解决方案(如Signal)已经存在,但分散和联合协议缺乏一种方便、安全地交换个人证书的方法。本文提出了一种OpenPGP证书认证协议及其实现。通过提供多种数据传输协议,它实现了被认证方(其密钥证书要被认证的一方)和被认证方(一旦看到证书就表示信任的一方)之间的健壮和有弹性的证书交换。数据既可以通过互联网传输,也可以通过基于距离的技术(即蓝牙或链路本地网络)传输。当对交换证书感兴趣的各方在物理上并不接近时,前者会带来挑战,因为攻击者可能会篡改连接。我们的评估表明,被动攻击者除了公开可见的元数据之外什么都不知道,例如传输的时间,而主动攻击者要么以非常低的概率成功,要么被用户检测到。
{"title":"Let’s Attest! Multi-modal Certificate Exchange for the Web of Trust","authors":"Tobias Mueller","doi":"10.1109/ICOIN50884.2021.9333877","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333877","url":null,"abstract":"On the Internet, trust is difficult to obtain. With the rise of the possibility of obtaining gratis x509 certificates in an automated fashion, the use of TLS for establishing secure connections has significantly increased. However, other use cases, such as end-to-end encrypted messaging, do not yet have an easy method of managing trust in the public keys. This is particularly true for personal communication where two people want to securely exchange messages. While centralised solutions, such as Signal, exist, decentralised and federated protocols lack a way of conveniently and securely exchanging personal certificates.This paper presents a protocol and an implementation for certifying OpenPGP certificates. By offering multiple means of data transport protocols, it achieves robust and resilient certificate exchange between an attestee, the party whose key certificate is to be certified, and an attestor, the party who will express trust in the certificate once seen. The data can be transferred either via the Internet or via proximity-based technologies, i.e. Bluetooth or link-local networking. The former presents a challenge when the parties interested in exchanging certificates are not physically close, because an attacker may tamper with the connection. Our evaluation shows that a passive attacker learns nothing except the publicly visible metadata, e.g. the timings of the transfer while an active attacker can either have success with a very low probability or be detected by the user.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"20 1","pages":"758-763"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87669339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobility-Aware Optimal Task Offloading in Distributed Edge Computing 分布式边缘计算中移动性感知的最优任务卸载
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334008
Youbin Jeon, Hosung Baek, Sangheon Pack
To cope with limited capabilities of mobile devices, task offloading in distributed edge computing (DEC) environments is perceived as a promising solution. However, the mobility of devices makes the task offloading a more challenging issue. In this paper, we investigate mobility-awareness for optimal task offloading in DEC environments. To this end, we formulate an optimization problem to minimize the response time of offloaded tasks. Simulation results demonstrate that the mobility-aware task offloading scheme can reduce the response time by 14% $sim 21$% compared with the conventional task offloading schemes without any mobility-awareness.
为了应对移动设备有限的能力,分布式边缘计算(DEC)环境中的任务卸载被认为是一个很有前途的解决方案。然而,设备的移动性使得任务卸载成为一个更具挑战性的问题。在本文中,我们研究了移动感知在DEC环境下的最优任务卸载。为此,我们制定了一个优化问题,以最小化卸载任务的响应时间。仿真结果表明,与无机动性感知的传统任务卸载方案相比,机动性感知任务卸载方案的响应时间缩短了14% ~ 21%。
{"title":"Mobility-Aware Optimal Task Offloading in Distributed Edge Computing","authors":"Youbin Jeon, Hosung Baek, Sangheon Pack","doi":"10.1109/ICOIN50884.2021.9334008","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334008","url":null,"abstract":"To cope with limited capabilities of mobile devices, task offloading in distributed edge computing (DEC) environments is perceived as a promising solution. However, the mobility of devices makes the task offloading a more challenging issue. In this paper, we investigate mobility-awareness for optimal task offloading in DEC environments. To this end, we formulate an optimization problem to minimize the response time of offloaded tasks. Simulation results demonstrate that the mobility-aware task offloading scheme can reduce the response time by 14% $sim 21$% compared with the conventional task offloading schemes without any mobility-awareness.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"60 1","pages":"65-68"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83592095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint Latency and Reliability-Aware Controller Placement 关节延迟和可靠性感知控制器布局
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333864
Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual
In network architectures based on Software Defined Networking (SDN) the control plane (control logic) is separated from the network data plane (forwarding plane) while traditional network routers combine both. Software Defined networks facilitates a centralized networking system where a logical controller manages the global view of the network. In this paper, we first propose a new metric on the controller placement problem (CPP) that simultaneously considers the communication latency and communication reliability both between switches and controllers and between controllers. Reliability is considered for single-link failure. We model the problem of determining the optimal controller placement to provide low latencies in the control plane traffic. The objective of this study is to minimize the average accumulated latency by jointly taking into account the latency between controller to switches and inter-controller while optimizing their placement for achieving an optimal balance simultaneously. The optimization problem is formulated as a mixed-integer linear programming (MILP) model under the constraints of latency and reliability. We evaluated the performance of our proposed metric by using the Internet2 OS3E network topology. Different from previous work, we focus on the control traffic exchanged among controllers to synchronize their shared data structure. Results demonstrate that the proposed method is promising.
在基于软件定义网络(SDN)的网络体系结构中,控制平面(控制逻辑)与网络数据平面(转发平面)是分离的,而传统的网络路由器将两者结合在一起。软件定义网络促进了集中式网络系统,其中逻辑控制器管理网络的全局视图。在本文中,我们首先提出了一个新的度量控制器放置问题(CPP),它同时考虑了交换机与控制器之间以及控制器与控制器之间的通信延迟和通信可靠性。考虑单链路故障的可靠性。我们建立了确定最优控制器位置以在控制平面流量中提供低延迟的问题的模型。本研究的目标是通过联合考虑控制器到交换机之间的延迟和控制器间的延迟,同时优化它们的放置以达到最优平衡,从而最小化平均累积延迟。将优化问题表述为考虑时延和可靠性约束的混合整数线性规划(MILP)模型。我们通过使用internet2os3e网络拓扑来评估我们提出的指标的性能。与以往的工作不同,我们关注控制器之间交换的控制流量,以同步它们的共享数据结构。结果表明,该方法是可行的。
{"title":"Joint Latency and Reliability-Aware Controller Placement","authors":"Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual","doi":"10.1109/ICOIN50884.2021.9333864","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333864","url":null,"abstract":"In network architectures based on Software Defined Networking (SDN) the control plane (control logic) is separated from the network data plane (forwarding plane) while traditional network routers combine both. Software Defined networks facilitates a centralized networking system where a logical controller manages the global view of the network. In this paper, we first propose a new metric on the controller placement problem (CPP) that simultaneously considers the communication latency and communication reliability both between switches and controllers and between controllers. Reliability is considered for single-link failure. We model the problem of determining the optimal controller placement to provide low latencies in the control plane traffic. The objective of this study is to minimize the average accumulated latency by jointly taking into account the latency between controller to switches and inter-controller while optimizing their placement for achieving an optimal balance simultaneously. The optimization problem is formulated as a mixed-integer linear programming (MILP) model under the constraints of latency and reliability. We evaluated the performance of our proposed metric by using the Internet2 OS3E network topology. Different from previous work, we focus on the control traffic exchanged among controllers to synchronize their shared data structure. Results demonstrate that the proposed method is promising.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"73 2 1","pages":"197-202"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83622105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Convolutional Neural Network for Resource-Efficient Image Classification: A Quantum Random Access Memory (QRAM) Approach 面向资源高效图像分类的量子卷积神经网络:量子随机存取存储器(QRAM)方法
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333906
Seunghyeok Oh, Jaeho Choi, Jong-Kook Kim, Joongheon Kim
Convolutional Neural Network (CNN) is a breakthrough learning model that shows outstanding performance in computer vision and deep learning applications. However, it is a relatively burdened model in terms of learning speed and resource usage compared to other learning models when the learning scale becomes large. Quantum Convolutional Neural Network (QCNN) is a novel model as a potential solution using quantum computers to handle this problem. Quantum computers with a limited number of usable qubits needs a resource-efficient method to process large-scale data at once. In addition, Quantum Random Access Memory (QRAM) can store the large data to qubits logarithmically using superposition and entanglement. The QRAM algorithm can design a new QCNN model that can efficiently process in massive data. This paper proposes a more resource and depth efficient model for larger-sized input data and the number of output channels using the QRAM algorithm and efficiently extracting features.
卷积神经网络(CNN)是一种突破性的学习模型,在计算机视觉和深度学习应用中表现出色。但是,当学习规模变大时,与其他学习模型相比,它在学习速度和资源使用方面是一个相对负担较大的模型。量子卷积神经网络(QCNN)是利用量子计算机解决这一问题的一种新模型。可用量子比特数量有限的量子计算机需要一种资源高效的方法来一次处理大规模数据。此外,量子随机存取存储器(QRAM)可以利用叠加和纠缠将大数据以对数方式存储到量子位。QRAM算法可以设计一种新的QCNN模型,可以有效地处理海量数据。本文利用QRAM算法和高效的特征提取方法,针对输入数据量大、输出通道数多的情况,提出了一种资源效率更高、深度效率更高的模型。
{"title":"Quantum Convolutional Neural Network for Resource-Efficient Image Classification: A Quantum Random Access Memory (QRAM) Approach","authors":"Seunghyeok Oh, Jaeho Choi, Jong-Kook Kim, Joongheon Kim","doi":"10.1109/ICOIN50884.2021.9333906","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333906","url":null,"abstract":"Convolutional Neural Network (CNN) is a breakthrough learning model that shows outstanding performance in computer vision and deep learning applications. However, it is a relatively burdened model in terms of learning speed and resource usage compared to other learning models when the learning scale becomes large. Quantum Convolutional Neural Network (QCNN) is a novel model as a potential solution using quantum computers to handle this problem. Quantum computers with a limited number of usable qubits needs a resource-efficient method to process large-scale data at once. In addition, Quantum Random Access Memory (QRAM) can store the large data to qubits logarithmically using superposition and entanglement. The QRAM algorithm can design a new QCNN model that can efficiently process in massive data. This paper proposes a more resource and depth efficient model for larger-sized input data and the number of output channels using the QRAM algorithm and efficiently extracting features.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"147 1","pages":"50-52"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91448407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data Processing 面向大数据处理的基础设施协同多无人机深度强化能源交易学习
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333895
Soyi Jung, Won Joon Yun, Joongheon Kim, Jae-Hyun Kim
This paper proposes a cooperative multi-agent deep reinforcement learning (MADRL) algorithm for energy trading among multiple unmanned aerial vehicles (UAVs) in order to perform big-data processing in a distributed manner. In order to realize UAV-based aerial surveillance or mobile cellular services, seamless and robust wireless charging mechanisms are required for delivering energy sources from charging infrastructure (i.e., charging towers) to UAVs for the consistent operations of the UAVs in the sky. For actively and intelligently managing the charging towers, MADRL-based energy management system (EMS) is proposed and designed for energy trading among the energy storage systems those are equipped with charging towers. If the required energy for charging UAVs is not enough, the purchasing energy from utility company is desired which takes high consts. The main purpose of MADRL-based EMS learning is for minimizing purchasing energy from outside utility company for minimizing operational costs. Our data-intensive performance evaluation verifies that our proposed framework achieves desired performance.
提出了一种多智能体深度强化学习(MADRL)算法,用于多无人机间的能源交易,以分布式方式进行大数据处理。为了实现基于无人机的空中监视或移动蜂窝服务,需要无缝和强大的无线充电机制,将充电基础设施(即充电塔)的能量传输给无人机,以保证无人机在空中的一致运行。为实现对充电塔的主动智能管理,提出并设计了基于madrl的储能系统能量管理系统(EMS),用于安装充电塔的储能系统之间的能量交易。如果无人机充电所需的能量不足,则需要从公用事业公司购买能量,这需要较高的成本。基于madrl的EMS学习的主要目的是最小化从外部公用事业公司购买能源,从而最小化运营成本。我们的数据密集型性能评估验证了我们提出的框架达到了期望的性能。
{"title":"Infrastructure-Assisted Cooperative Multi-UAV Deep Reinforcement Energy Trading Learning for Big-Data Processing","authors":"Soyi Jung, Won Joon Yun, Joongheon Kim, Jae-Hyun Kim","doi":"10.1109/ICOIN50884.2021.9333895","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333895","url":null,"abstract":"This paper proposes a cooperative multi-agent deep reinforcement learning (MADRL) algorithm for energy trading among multiple unmanned aerial vehicles (UAVs) in order to perform big-data processing in a distributed manner. In order to realize UAV-based aerial surveillance or mobile cellular services, seamless and robust wireless charging mechanisms are required for delivering energy sources from charging infrastructure (i.e., charging towers) to UAVs for the consistent operations of the UAVs in the sky. For actively and intelligently managing the charging towers, MADRL-based energy management system (EMS) is proposed and designed for energy trading among the energy storage systems those are equipped with charging towers. If the required energy for charging UAVs is not enough, the purchasing energy from utility company is desired which takes high consts. The main purpose of MADRL-based EMS learning is for minimizing purchasing energy from outside utility company for minimizing operational costs. Our data-intensive performance evaluation verifies that our proposed framework achieves desired performance.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"99 1","pages":"159-162"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79486441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Study of CNN-Based Human Behavior Recognition with Channel State Information 基于信道状态信息的cnn人类行为识别研究
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333879
K. Hwang, Sang-Chul Kim
In this paper, we studied a model that can distinguish several different human behaviors. We trained data [1] using the Convolutional Neural Network algorithm. The suggested model showed 94.597% accuracy in distinguishing seven different human activities.
在本文中,我们研究了一个可以区分几种不同人类行为的模型。我们使用卷积神经网络算法训练数据[1]。该模型在区分七种不同的人类活动方面准确率为94.597%。
{"title":"A Study of CNN-Based Human Behavior Recognition with Channel State Information","authors":"K. Hwang, Sang-Chul Kim","doi":"10.1109/ICOIN50884.2021.9333879","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333879","url":null,"abstract":"In this paper, we studied a model that can distinguish several different human behaviors. We trained data [1] using the Convolutional Neural Network algorithm. The suggested model showed 94.597% accuracy in distinguishing seven different human activities.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"300 1","pages":"749-751"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79694952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Impact of ARQ on the Distortion Performance of Underwater Acoustic Mobile Networks ARQ对水声移动网络失真性能的影响
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333994
A. Stefanov
The paper considers the route distortion for underwater acoustic mobile networks consisting of autonomous underwater vehicles (AUV’s). The AUV’s transmit the information along a multihop route through the network. The simple stop and wait automatic repeat request (ARQ) protocol is implemented on a hop-by-hop basis. The mobility model is direction persistent. Each AUV-to-AUV channel experiences frequency dependent path loss, Ricean fading and interference. Numerical examples are presented to demonstrate the impact of ARQ on the average route distortion.
研究了由自主水下航行器组成的水声移动网络的路由畸变问题。AUV通过网络沿多跳路由传输信息。简单的停止和等待自动重复请求(ARQ)协议是在逐跳基础上实现的。移动性模型是方向持续性的。每个auv到auv信道都会经历频率相关的路径损耗、Ricean衰落和干扰。通过数值算例说明了ARQ对平均路由失真的影响。
{"title":"Impact of ARQ on the Distortion Performance of Underwater Acoustic Mobile Networks","authors":"A. Stefanov","doi":"10.1109/ICOIN50884.2021.9333994","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333994","url":null,"abstract":"The paper considers the route distortion for underwater acoustic mobile networks consisting of autonomous underwater vehicles (AUV’s). The AUV’s transmit the information along a multihop route through the network. The simple stop and wait automatic repeat request (ARQ) protocol is implemented on a hop-by-hop basis. The mobility model is direction persistent. Each AUV-to-AUV channel experiences frequency dependent path loss, Ricean fading and interference. Numerical examples are presented to demonstrate the impact of ARQ on the average route distortion.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"102 1","pages":"429-431"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76688670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICOIN 2021 Front Matter ico2021前沿问题
Pub Date : 2021-01-13 DOI: 10.1109/icoin50884.2021.9333887
{"title":"ICOIN 2021 Front Matter","authors":"","doi":"10.1109/icoin50884.2021.9333887","DOIUrl":"https://doi.org/10.1109/icoin50884.2021.9333887","url":null,"abstract":"","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79399566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1