首页 > 最新文献

2021 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Reliable and Delay Tolerant Transmission Protocols for LPWAN IoT Sensors LPWAN物联网传感器的可靠和容忍延迟传输协议
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333934
Cheng-Che Huang, Yu-Cheng Chien, Jia-Cheng Zhang, N. Huang
A lightweight protocol stack is designed using layered approach and is versatile enough to be transplanted onto several LPWAN technologies. The design is implemented on the top of NB-IoT protocols in our experiments. Data aggregation and delay tolerance are expected to help IoT devices to improve data reliability. The proposed algorithm, Data Reselection Algorithm, retains all timelines of collected data in limited storage space. Finally, to validate the performance, related experiments conducted with the MCU nRF52832 are also done in this paper.
轻量级协议栈是使用分层方法设计的,并且具有足够的通用性,可以移植到几种LPWAN技术上。在我们的实验中,该设计是在NB-IoT协议之上实现的。数据聚合和延迟容忍有望帮助物联网设备提高数据可靠性。提出的数据重选算法在有限的存储空间中保留收集数据的所有时间线。最后,为了验证其性能,本文还利用单片机nRF52832进行了相关实验。
{"title":"Reliable and Delay Tolerant Transmission Protocols for LPWAN IoT Sensors","authors":"Cheng-Che Huang, Yu-Cheng Chien, Jia-Cheng Zhang, N. Huang","doi":"10.1109/ICOIN50884.2021.9333934","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333934","url":null,"abstract":"A lightweight protocol stack is designed using layered approach and is versatile enough to be transplanted onto several LPWAN technologies. The design is implemented on the top of NB-IoT protocols in our experiments. Data aggregation and delay tolerance are expected to help IoT devices to improve data reliability. The proposed algorithm, Data Reselection Algorithm, retains all timelines of collected data in limited storage space. Finally, to validate the performance, related experiments conducted with the MCU nRF52832 are also done in this paper.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"77 1","pages":"553-558"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73650200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Evaluation of NVM-aware File Systems on Intel Optane DC Persistent Memory Modules 基于Intel Optane DC持久内存模块的nvm感知文件系统的实证评估
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333911
Guangyu Zhu, Jaehyun Han, Sangjin Lee, Yongseok Son
Cloud computing arouses the need for large-scale data processing which in turn promises vigorous developments on distributed file systems. The performance of the underlying storage nodes determines the performance of the overall system. Emerging byte-addressable Non-volatile memories (NVM) are promising techniques that can greatly improve storage performance. Researchers have already investigated NVM or NVMaware file systems to take advantage of the characteristics of NVM. However, previous researchers usually perform the studies based on simulations or emulations. In this paper, we provide an empirical evaluation of NVM-aware file systems on the first commercially available byte-addressable NVM (i.e., the Intel Optane DC Persistent Memory Module (DCPMM)) We first evaluate the performance of Ext4, XFS, F2FS, Ext4-DAX, XFSDAX, and NOVA file systems on DCPMM, Optane SSD, and NVMe SSD. Then we compare them in terms of throughput and different access patterns. Second, we observe how remote NUMA node access and device mapper striping affect the performance of DCPMM. We anticipate that the experimental results and performance analysis will provide the implications on various memory and storage systems.
云计算引起了对大规模数据处理的需求,这反过来又保证了分布式文件系统的蓬勃发展。底层存储节点的性能决定着整个系统的性能。新兴的字节可寻址非易失性存储器(NVM)是一种很有前途的技术,可以极大地提高存储性能。研究人员已经研究了NVM或NVMaware文件系统,以利用NVM的特性。然而,以前的研究人员通常是基于模拟或仿真来进行研究的。在本文中,我们在第一个商业可用的字节可寻址NVM(即Intel Optane DC Persistent Memory Module (DCPMM))上对NVM感知文件系统进行了实证评估。我们首先在DCPMM、Optane SSD和NVMe SSD上评估了Ext4、XFS、F2FS、Ext4- dax、XFSDAX和NOVA文件系统的性能。然后比较它们的吞吐量和不同的访问模式。其次,我们观察了远程NUMA节点访问和设备映射器条带化如何影响DCPMM的性能。我们预计实验结果和性能分析将为各种内存和存储系统提供启示。
{"title":"An Empirical Evaluation of NVM-aware File Systems on Intel Optane DC Persistent Memory Modules","authors":"Guangyu Zhu, Jaehyun Han, Sangjin Lee, Yongseok Son","doi":"10.1109/ICOIN50884.2021.9333911","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333911","url":null,"abstract":"Cloud computing arouses the need for large-scale data processing which in turn promises vigorous developments on distributed file systems. The performance of the underlying storage nodes determines the performance of the overall system. Emerging byte-addressable Non-volatile memories (NVM) are promising techniques that can greatly improve storage performance. Researchers have already investigated NVM or NVMaware file systems to take advantage of the characteristics of NVM. However, previous researchers usually perform the studies based on simulations or emulations. In this paper, we provide an empirical evaluation of NVM-aware file systems on the first commercially available byte-addressable NVM (i.e., the Intel Optane DC Persistent Memory Module (DCPMM)) We first evaluate the performance of Ext4, XFS, F2FS, Ext4-DAX, XFSDAX, and NOVA file systems on DCPMM, Optane SSD, and NVMe SSD. Then we compare them in terms of throughput and different access patterns. Second, we observe how remote NUMA node access and device mapper striping affect the performance of DCPMM. We anticipate that the experimental results and performance analysis will provide the implications on various memory and storage systems.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"40 1","pages":"559-564"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77534522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Driver Selection Algorithm for Controlling Multiple Vehicles in Remote Driving 远程驾驶中多车控制的高效驾驶员选择算法
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333930
S. Zulqarnain, Sanghwan Lee
Recently, some researchers consider remote driving as an augmentation of autonomous driving as level four autonomy in which the driver can rest while driving is not likely to be achieved in a near future. Besides functioning as an augmentation to autonomous driving, we consider remote driving as a major component to transform the current transportation system in a more fundamental way. Basically, all the vehicles in an area can be controlled by some remote controllers or drivers so that transportation can be performed in a more efficient way. For example, if a remote controller decides all the routes of the vehicles, the road capacity can be efficiently used so that the vehicles can arrive at the destinations faster. Fuel efficiency can also be achieved by creating a platoon with the vehicles having similar routes. However, one of the biggest challenges in remote driving is the communication latency between the remote driver and the vehicle. Thus, the remote drivers should be within a certain latency limit to avoid any type of safety problem. Actually, in our past work, we have introduced an algorithm called Longest Advance First (LAF) to select the locations of remote drivers for a single vehicle in a single journey. LAF can achieve an optimal selection of drivers in terms of the number of drivers. In this paper, we consider a remote driving framework where multiple vehicles are controlled by remote drivers at the same time. Applying LAF to each route may not be optimal for multiple routes. Thus, we propose a heuristic algorithm that can select locations of remote driving facilities in which remote drivers drive vehicles for multiple routes. Through simulations, we show that the proposed algorithm shows much better performance than applying LAF multiple times.
最近,一些研究人员认为,远程驾驶是自动驾驶的增强版,因为驾驶员在驾驶时可以休息的第4级自动驾驶在短期内很难实现。除了作为自动驾驶的增强功能外,我们认为远程驾驶是从更根本的方式改变当前交通系统的主要组成部分。基本上,一个地区的所有车辆都可以由一些遥控器或司机控制,这样运输就可以以更有效的方式进行。例如,如果一个遥控器决定所有车辆的路线,可以有效地利用道路容量,使车辆更快地到达目的地。燃油效率也可以通过创建具有相似路线的车辆排来实现。然而,远程驾驶面临的最大挑战之一是远程驾驶员与车辆之间的通信延迟。因此,远程驱动程序应该在一定的延迟限制内,以避免任何类型的安全问题。实际上,在我们过去的工作中,我们已经引入了一种称为最长提前优先(LAF)的算法,用于在一次行程中为一辆车选择远程驾驶员的位置。LAF可以在驱动器数量方面实现驱动器的最优选择。在本文中,我们考虑了一个远程驾驶框架,其中多辆车由远程驾驶员同时控制。对于多条路由,对每条路由应用LAF可能不是最优的。因此,我们提出了一种启发式算法,可以选择远程驾驶设施的位置,其中远程驾驶员驾驶车辆行驶多条路线。仿真结果表明,该算法比多次应用LAF具有更好的性能。
{"title":"An Efficient Driver Selection Algorithm for Controlling Multiple Vehicles in Remote Driving","authors":"S. Zulqarnain, Sanghwan Lee","doi":"10.1109/ICOIN50884.2021.9333930","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333930","url":null,"abstract":"Recently, some researchers consider remote driving as an augmentation of autonomous driving as level four autonomy in which the driver can rest while driving is not likely to be achieved in a near future. Besides functioning as an augmentation to autonomous driving, we consider remote driving as a major component to transform the current transportation system in a more fundamental way. Basically, all the vehicles in an area can be controlled by some remote controllers or drivers so that transportation can be performed in a more efficient way. For example, if a remote controller decides all the routes of the vehicles, the road capacity can be efficiently used so that the vehicles can arrive at the destinations faster. Fuel efficiency can also be achieved by creating a platoon with the vehicles having similar routes. However, one of the biggest challenges in remote driving is the communication latency between the remote driver and the vehicle. Thus, the remote drivers should be within a certain latency limit to avoid any type of safety problem. Actually, in our past work, we have introduced an algorithm called Longest Advance First (LAF) to select the locations of remote drivers for a single vehicle in a single journey. LAF can achieve an optimal selection of drivers in terms of the number of drivers. In this paper, we consider a remote driving framework where multiple vehicles are controlled by remote drivers at the same time. Applying LAF to each route may not be optimal for multiple routes. Thus, we propose a heuristic algorithm that can select locations of remote driving facilities in which remote drivers drive vehicles for multiple routes. Through simulations, we show that the proposed algorithm shows much better performance than applying LAF multiple times.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"209 1","pages":"20-23"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80566576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Algorithm for Detection of False Data Injection Attack in Power System 电力系统假数据注入攻击检测的机器学习算法
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333913
Ajit Kumar, N. Saxena, B. Choi
Electric grids are becoming smart due to the integration of Information and Communication Technology (ICT) with the traditional grid. However, it can also attract various kinds of Cyber-attacks to the grid infrastructure. The False Data Injection Attack (FDIA) is one of the lethal and most occurring attacks possible in both the physical and cyber part of the smart grid. This paper proposed an approach by applying machine learning algorithms to detect FDIAs in the power system. Several feature selection techniques are explored to investigate the most suitable features to achieve high accuracy. Various machine learning algorithms are tested to follow the most suitable method for building a detection system against such attacks. Also, the dataset has a skewed distribution between the two classes, and hence data imbalance issue is addressed during the experiments. Moreover, because the response time is critical in a smart grid, each experiment is also evaluated in terms of time complexity.
由于信息通信技术(ICT)与传统电网的融合,电网正在变得智能化。然而,它也可以吸引各种网络攻击的电网基础设施。虚假数据注入攻击(FDIA)是智能电网物理部分和网络部分最常见的致命攻击之一。本文提出了一种利用机器学习算法检测电力系统中干扰信号的方法。探讨了几种特征选择技术,以寻找最合适的特征,以达到较高的精度。测试了各种机器学习算法,以遵循最合适的方法来构建针对此类攻击的检测系统。此外,数据集在两类之间具有倾斜分布,因此在实验期间解决了数据不平衡问题。此外,由于响应时间在智能电网中至关重要,因此每个实验也会根据时间复杂性进行评估。
{"title":"Machine Learning Algorithm for Detection of False Data Injection Attack in Power System","authors":"Ajit Kumar, N. Saxena, B. Choi","doi":"10.1109/ICOIN50884.2021.9333913","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333913","url":null,"abstract":"Electric grids are becoming smart due to the integration of Information and Communication Technology (ICT) with the traditional grid. However, it can also attract various kinds of Cyber-attacks to the grid infrastructure. The False Data Injection Attack (FDIA) is one of the lethal and most occurring attacks possible in both the physical and cyber part of the smart grid. This paper proposed an approach by applying machine learning algorithms to detect FDIAs in the power system. Several feature selection techniques are explored to investigate the most suitable features to achieve high accuracy. Various machine learning algorithms are tested to follow the most suitable method for building a detection system against such attacks. Also, the dataset has a skewed distribution between the two classes, and hence data imbalance issue is addressed during the experiments. Moreover, because the response time is critical in a smart grid, each experiment is also evaluated in terms of time complexity.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"385-390"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88170969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Real-Time Recommendation System for Online Broadcasting Advertisement 网络广播广告实时推荐系统
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333921
Chaeeun Jeong, Seongju Kang, K. Chung
In online broadcasting, users are exposed to advertisements for various items. Traditional advertising systems do not satisfy the expectations of various users because they provide advertisements without considering the characteristics of individuals. Personalized advertisement services can be provided by introducing recommendation algorithms that take account of users’ context and history. However, since the existing recommendation system is based on users’ consumption history, it does not quickly reflect the users’ interests that change according to items appearing in the content. In addition, when the user’s history is sparse, the performance of the recommendation system is degraded. In this paper, we propose a recommendation system for online broadcasting advertisements. The proposed system calculates the similarity between users based on the user’s region of interest (ROI). The user’s preference for the item is predicted by comparing the rating history of similar users. To reduce the time for calculating the similarity between users, a tree-structured user profile model is introduced. Finally, we conduct experiments to evaluate the performance of the proposed advertisement recommendation system.
在网络广播中,用户会看到各种各样的广告。传统的广告系统在提供广告时没有考虑到个人的特点,不能满足各种用户的期望。通过引入考虑用户背景和历史的推荐算法,可以提供个性化的广告服务。然而,由于现有的推荐系统是基于用户的消费历史,它不能快速反映用户的兴趣,因为用户的兴趣会随着内容中出现的物品而变化。此外,当用户的历史记录稀疏时,推荐系统的性能会下降。本文提出了一种针对网络广播广告的推荐系统。该系统基于用户的兴趣区域(ROI)计算用户之间的相似度。通过比较相似用户的评分历史,预测用户对该物品的偏好。为了减少计算用户间相似度的时间,引入了树形结构的用户轮廓模型。最后,我们通过实验来评估所提出的广告推荐系统的性能。
{"title":"Real-Time Recommendation System for Online Broadcasting Advertisement","authors":"Chaeeun Jeong, Seongju Kang, K. Chung","doi":"10.1109/ICOIN50884.2021.9333921","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333921","url":null,"abstract":"In online broadcasting, users are exposed to advertisements for various items. Traditional advertising systems do not satisfy the expectations of various users because they provide advertisements without considering the characteristics of individuals. Personalized advertisement services can be provided by introducing recommendation algorithms that take account of users’ context and history. However, since the existing recommendation system is based on users’ consumption history, it does not quickly reflect the users’ interests that change according to items appearing in the content. In addition, when the user’s history is sparse, the performance of the recommendation system is degraded. In this paper, we propose a recommendation system for online broadcasting advertisements. The proposed system calculates the similarity between users based on the user’s region of interest (ROI). The user’s preference for the item is predicted by comparing the rating history of similar users. To reduce the time for calculating the similarity between users, a tree-structured user profile model is introduced. Finally, we conduct experiments to evaluate the performance of the proposed advertisement recommendation system.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"8 1","pages":"413-416"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87383982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Vulnerability Analysis of DID Document’s Updating Process in the Decentralized Identifier Systems 分散标识系统中DID文档更新过程的漏洞分析
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334011
Min-Hyung Rhie, Kyung-Hoon Kim, Dongyeop Hwang, Ki-Hyung Kim
In this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process.
在本文中,我们分析了当非分散标识符(DID)所有者的第三方有权修改DID文档时可能发生的漏洞。DID是一种允许个人拥有数据主权的技术。DID文档包含用于验证DID所有者的信息。DID控制器有权修改DID文档。该权限正在标准化,以便第三方和DID所有者都可以持有该权限。这是一个违背DID所有者意愿更改DID文件的问题。为了帮助所有者更有力地维护他们的主权,我们提出了一种方法,让DID所有者使用策略、历史记录和服务来验证DID文档更新过程。
{"title":"Vulnerability Analysis of DID Document’s Updating Process in the Decentralized Identifier Systems","authors":"Min-Hyung Rhie, Kyung-Hoon Kim, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICOIN50884.2021.9334011","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334011","url":null,"abstract":"In this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"99 1","pages":"517-520"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85900321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Traffic Scheduling Mechanism for Industrial Wireless Network Accessing IPv6 Internet 工业无线网络接入IPv6互联网的流量调度机制
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333936
Min Wei, Xueqin Xiang, Cheng Li
With the rapid development of the industrial internet, more wireless networks are connected to the industrial network. Heterogeneous interconnection makes the industrial network flat, allowing the control flow, data flow, best effort flow and other flows in the network coexist in the same network. The scheduling problem in the network becomes a difficult problem. In order to solve the data scheduling problem after the flattening of the network in the factory, while satisfying the real-time and reliable transmission of industrial data, this paper proposes a traffic scheduling mechanism for industrial wireless network accessing IPv6 internet. A test system is implemented and the results show that the proposed scheduling mechanism may optimize network performance and improve network link utilization.
随着工业互联网的快速发展,越来越多的无线网络接入工业网络。异构互联使工业网络扁平化,允许网络中的控制流、数据流、最佳努力流等流在同一网络中共存。网络中的调度问题成为一个难题。为了解决工厂网络扁平化后的数据调度问题,在满足工业数据实时、可靠传输的前提下,提出了一种工业无线网络接入IPv6互联网的流量调度机制。测试结果表明,所提出的调度机制可以优化网络性能,提高网络链路利用率。
{"title":"A Traffic Scheduling Mechanism for Industrial Wireless Network Accessing IPv6 Internet","authors":"Min Wei, Xueqin Xiang, Cheng Li","doi":"10.1109/ICOIN50884.2021.9333936","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333936","url":null,"abstract":"With the rapid development of the industrial internet, more wireless networks are connected to the industrial network. Heterogeneous interconnection makes the industrial network flat, allowing the control flow, data flow, best effort flow and other flows in the network coexist in the same network. The scheduling problem in the network becomes a difficult problem. In order to solve the data scheduling problem after the flattening of the network in the factory, while satisfying the real-time and reliable transmission of industrial data, this paper proposes a traffic scheduling mechanism for industrial wireless network accessing IPv6 internet. A test system is implemented and the results show that the proposed scheduling mechanism may optimize network performance and improve network link utilization.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"764-769"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85237353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments 移动NDN环境中基于邻近的内容查找的有效性
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333948
A. Suwannasa, M. Broadbent, A. Mauthe
In Named Data Networking (NDN), consumer mobility is supported by letting a consumer re-transmit an Interest packet to re-request a lost content object through a new NDN Access Router (NAR). The object is often replicated at a previous NAR, located close to the new NAR, and can be retrieved from there rather than the origin server. Replicas can also be found from other nodes in the vicinity or nearby vicinities depending on the replica density, inter alia. These replicas can be a better source for the mobile consumer than the best placed NAR. In this paper, we further develop a vicinity-based scheme leveraging content finding in mobile NDN environments that fit the characteristic of the mentioned communication model. We examine the scheme in comparison to the default best route strategy of NDN. The results demonstrate that the scheme provides significant performance gains with acceptable overhead costs in a mobile scenario.
在命名数据网络(NDN)中,通过让消费者通过新的NDN接入路由器(NAR)重新传输兴趣包来重新请求丢失的内容对象,从而支持消费者移动性。对象通常在靠近新NAR的前一个NAR上复制,并且可以从那里而不是从原始服务器检索。副本也可以从附近或附近的其他节点中找到,具体取决于副本密度等。对于移动消费者来说,这些复制品可能是比最佳位置的NAR更好的来源。在本文中,我们进一步开发了一种基于附近的方案,利用移动NDN环境中的内容查找,该方案符合上述通信模型的特征。我们将该方案与NDN的默认最佳路由策略进行比较。结果表明,该方案在移动场景中以可接受的开销成本提供了显著的性能提升。
{"title":"Effectiveness of Vicinity-based Content Finding in Mobile NDN Environments","authors":"A. Suwannasa, M. Broadbent, A. Mauthe","doi":"10.1109/ICOIN50884.2021.9333948","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333948","url":null,"abstract":"In Named Data Networking (NDN), consumer mobility is supported by letting a consumer re-transmit an Interest packet to re-request a lost content object through a new NDN Access Router (NAR). The object is often replicated at a previous NAR, located close to the new NAR, and can be retrieved from there rather than the origin server. Replicas can also be found from other nodes in the vicinity or nearby vicinities depending on the replica density, inter alia. These replicas can be a better source for the mobile consumer than the best placed NAR. In this paper, we further develop a vicinity-based scheme leveraging content finding in mobile NDN environments that fit the characteristic of the mentioned communication model. We examine the scheme in comparison to the default best route strategy of NDN. The results demonstrate that the scheme provides significant performance gains with acceptable overhead costs in a mobile scenario.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"2 1","pages":"343-348"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86938186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proper Cost Hamiltonian Design for Combinatorial Optimization Problems: A Boolean Function Approach 组合优化问题的适当代价哈密顿设计:布尔函数方法
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333931
Jaeho Choi, Seunghyeok Oh, Soohyun Park, Jong-Kook Kim, Joongheon Kim
Advanced researches on the variational quantum algorithms are actively conducted. In particular, the quantum approximate optimization algorithm (QAOA) is one of the promising variational quantum algorithms and can be applied to various graph-based problems, and is a promising algorithm that shows good performance even in small quantum computers. As is widely known, QAOA obtains the approximate solution via the expectation value of the cost Hamiltonian on the parameterized state. Therefore, in addition to finding the optimal parameters, the proper design of the cost Hamiltonian is important. This paper designs the cost function of the combinatorial optimization problem via Boolean function and maps it to the proper cost Hamiltonian. The proposed cost Hamiltonian design method is applied to the maximum independent set (MIS) and minimum dominating set (MDS) problems.
积极开展变分量子算法的前沿研究。特别是量子近似优化算法(QAOA)是一种很有前途的变分量子算法,可以应用于各种基于图的问题,即使在小型量子计算机上也表现出良好的性能。众所周知,QAOA是通过参数化状态上的代价哈密顿量的期望值得到近似解的。因此,除了寻找最优参数外,合理设计成本哈密顿量也很重要。本文通过布尔函数来设计组合优化问题的代价函数,并将其映射到合适的代价哈密顿量上。将所提出的代价哈密顿设计方法应用于最大独立集(MIS)和最小支配集(MDS)问题。
{"title":"Proper Cost Hamiltonian Design for Combinatorial Optimization Problems: A Boolean Function Approach","authors":"Jaeho Choi, Seunghyeok Oh, Soohyun Park, Jong-Kook Kim, Joongheon Kim","doi":"10.1109/ICOIN50884.2021.9333931","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333931","url":null,"abstract":"Advanced researches on the variational quantum algorithms are actively conducted. In particular, the quantum approximate optimization algorithm (QAOA) is one of the promising variational quantum algorithms and can be applied to various graph-based problems, and is a promising algorithm that shows good performance even in small quantum computers. As is widely known, QAOA obtains the approximate solution via the expectation value of the cost Hamiltonian on the parameterized state. Therefore, in addition to finding the optimal parameters, the proper design of the cost Hamiltonian is important. This paper designs the cost function of the combinatorial optimization problem via Boolean function and maps it to the proper cost Hamiltonian. The proposed cost Hamiltonian design method is applied to the maximum independent set (MIS) and minimum dominating set (MDS) problems.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"469-472"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91190521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auction-based Deep Learning Computation Offloading for Truthful Edge Computing: A Myerson Auction Approach 基于拍卖的真实边缘计算深度学习计算卸载:Myerson拍卖方法
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334016
Haemin Lee, Soohyun Park, Junghyun Kim, Joongheon Kim
This paper proposes an edge computing model that processes machine learning code offloading based on auction mechanisms. The code offloading is required to carry out training that is processed difficult for mobile devices with limited computing resources. In this system, mobile devices compete for using computing resource units by submitting their bids based on code complexity and data size. We use the Myerson auction model which uses the truthful second-price auction as a baseline, to maximize the seller’s revenue while meeting several desirable properties, i.e., individual rationality and incentive compatibility. The simulation results showed that our Myerson auction method overall improved the seller’s revenue while satisfying the above characteristics.
本文提出了一种基于拍卖机制处理机器学习代码卸载的边缘计算模型。代码卸载需要进行训练,这对于计算资源有限的移动设备来说是难以处理的。在这个系统中,移动设备通过提交基于代码复杂性和数据大小的投标来竞争使用计算资源单元。我们使用Myerson拍卖模型,该模型以真实的第二价格拍卖为基准,以最大化卖方的收入,同时满足几个理想的属性,即个人理性和激励兼容性。仿真结果表明,我们的迈尔森拍卖方法在满足上述特点的同时,总体上提高了卖方的收益。
{"title":"Auction-based Deep Learning Computation Offloading for Truthful Edge Computing: A Myerson Auction Approach","authors":"Haemin Lee, Soohyun Park, Junghyun Kim, Joongheon Kim","doi":"10.1109/ICOIN50884.2021.9334016","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334016","url":null,"abstract":"This paper proposes an edge computing model that processes machine learning code offloading based on auction mechanisms. The code offloading is required to carry out training that is processed difficult for mobile devices with limited computing resources. In this system, mobile devices compete for using computing resource units by submitting their bids based on code complexity and data size. We use the Myerson auction model which uses the truthful second-price auction as a baseline, to maximize the seller’s revenue while meeting several desirable properties, i.e., individual rationality and incentive compatibility. The simulation results showed that our Myerson auction method overall improved the seller’s revenue while satisfying the above characteristics.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"457-459"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91216658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1