This book constitutes the refereed proceedings of the 6th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2020, held in Hanoi, Vietnam, in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 26 full papers were selected from 59 submissions and are organized thematically in tracks on telecommunications systems and networks; hardware, software and application designs; information processing and data analysis; industrial networks and intelligent systems; security and privacy.
Author(s): Nguyen-Son Vo , Van-Phuc Hoang
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 334
Publisher: Springer
Year: 2020
Language: English
Pages: 338
City: Cham
Preface
Organization
Contents
Telecommunications Systems and Networks
Intelligent Channel Utilization Discovery in Drone to Drone Networks for Smart Cities
1 Introduction
2 Network Architecture
3 System Model
3.1 Searching and Finding Sub-layer
3.2 Functional Sub-layer
4 Simulation Environment
5 Performance Evaluation
6 Conclusions
References
Downlink Resource Sharing and Multi-tier Caching Selection Maximized Multicast Video Delivery Capacity in 5G Ultra-Dense Networks
1 Introduction
2 System Model
3 System Formulations
3.1 Wireless Channel
3.2 Capacity at RUs
3.3 SINR at SUs
4 DRS-MCS Optimization Problem and Solution
5 Performance Evaluation
6 Conclusion
References
Performance Analysis of Relay Selection on Cooperative Uplink NOMA Network with Wireless Power Transfer
1 Introduction
2 Network and Channel Models
2.1 Power Transfer Phase
2.2 Information Transmission Phase
2.3 Relay Phase
3 Performance Analysis
4 Nummerical Results and Disscussion
5 Conclusion
References
Convolutional Neural Network-Based DOA Estimation Using Non-uniform Linear Array for Multipath Channels
1 Introduction
2 Signal Model and Dataset Generation
2.1 Signal Model of Antenna Array
2.2 Dataset Generation
3 CNN-Based DOA Estimation Model
4 Experiment Result and Discussion
4.1 DOA-ConvNet with Different Filter Size
4.2 DOA-ConvNet with Different Number of Filters
4.3 DOA-ConvNet with Different Conv-Blocks
4.4 Comparison of DOA-ConvNet with Other Existing CNN Models
5 Conclusion
References
An UAV and Distributed STBC for Wireless Relay Networks in Search and Rescue Operations
1 Introduction
2 Distributed STBC Cooperative Diversity System
3 Proposed Method
4 Performance Evaluation
4.1 Simulation Conditions
4.2 Simulation Results
5 Conclusion
References
Hardware, Software, and Application Designs
Resolution-Improvement of Confocal Fluorescence Microscopy via Two Different Point Spread Functions
1 Introduction
2 Methodology
3 Simulation and Experimental Results
4 Conclusion
References
Estimations of Matching Layers Effects on Lens Antenna Characteristics
1 Introduction
2 Theoretical Matching Layers and Antenna Modeling
2.1 Theoretical Matching Layers
2.2 Antenna Modeling
2.3 Simulation Parameters
3 Simulation Results
3.1 Power Reflection Coefficients
3.2 Radiation Patterns
3.3 Side-Lobe Levels
3.4 The Lens Thickness
3.5 Electric Field Distributions
4 Conclusion
References
A 3-Stacked GaN HEMT Power Amplifier with Independently Biased Technique
1 Introduction
2 Descriptions of the Proposed Amplifier
2.1 3-Stacked GaN HEMT MMIC Chip
2.2 Power Amplifier
3 Performance Evaluation
3.1 Vd1 Variation
3.2 Vd2 variation
4 Experiment
4.1 PA Prototype
4.2 Experimental Setup
4.3 Measured Results
5 Conclusion
References
Feasibility and Design Trade-Offs of Neural Network Accelerators Implemented on Reconfigurable Hardware
1 Introduction
2 Background
2.1 Neural Network
2.2 Convolutional Neural Network
3 Performance Evaluation of Neural Network-Based Classifier on a Software Tool
3.1 Software Platform
3.2 Analysis of the Recognition Accuracy
3.3 Analysis of the Number Format
4 Design of Neural Network Accelerator on FPGA
4.1 Design of Processing Units
4.2 Design of Data Buffer
4.3 Hardware Utilization and Processing Latency
5 Performance Evaluation of Neural Network Accelerator on FPGA
5.1 Experimental Setup
5.2 Experimental Results of Neural Network Accelerator on FPGA
6 Conclusion
References
Information Processing and Data Analysis
Adaptive Essential Matrix Based Stereo Visual Odometry with Joint Forward-Backward Translation Estimation
1 Introduction
2 Feature Extraction
3 Proposed Pose Estimation
3.1 Rotation Estimation
3.2 Translation Estimation
4 Experimental Results
5 Conclusion and Furture Work
References
A Modified Localization Technique for Pinpointing a Gunshot Event Using Acoustic Signals
1 Introduction
2 Signal Simulation
3 Methodology
3.1 Event Detection
3.2 Source Localization
4 Experimental Results
5 Conclusions
References
Table Structure Recognition in Scanned Images Using a Clustering Method
1 Introduction
2 Methods
2.1 Noise Removal
2.2 Text Detection
2.3 Row Detection
2.4 Column Detection
2.5 Cell Reconstruction
3 Evaluation Results
3.1 Performance Evaluation of CluSTi
3.2 Comparison of CluSTi and Other Methods
4 Conclusion
References
Distributed Watermarking for Cross-Domain of Semantic Large Image Database
1 Introduction
1.1 Overview
1.2 Our Contributions
1.3 Roadmap
2 Preliminary
2.1 Discrete Cosine Transform
2.2 Singular Value Decomposition
2.3 Semantic Large Image Dataset
2.4 Distributed Watermark
3 Our Proposed Method
3.1 Shadows Construction Process
3.2 Video Embedding Method
3.3 Video Extraction Method
3.4 Watermark Revealing Process
4 Experimental Results and Analysis
4.1 Experimental Environment
4.2 Imperceptibility Measure
4.3 Robustness Measure
5 Conclusions
References
Depth Image Reconstruction Using Low Rank and Total Variation Representations
1 Introduction
2 Depth Sparse Imaging Model
2.1 Depth Image Acquisition
2.2 Depth Estimation with Sparse Representation
3 LR-TV Depth Reconstruction
3.1 LR-TV Problem Formulation
3.2 ADMM-Based Algorithm
4 Experimental Results
4.1 Experimental Setup
4.2 Evaluation and Analysis of LR-TV Model
4.3 Comparison with Other Imaging Approaches
5 Conclusion
References
Deep Learning Based Hyperspectral Images Analysis for Shrimp Contaminated Detection
1 Introduction
2 Related Works
3 System Model
4 Data Preprocessing
4.1 Hyperspectral Data Visualization
4.2 DNN for Classification
5 Experiments and Results
5.1 DNN Setup and Metrics
5.2 Results and Discussion
6 Conclusion
References
A Predictive System for IoTs Reconfiguration Based on TensorFlow Framework
1 Introduction
2 Related Work
2.1 IoTs Reconfiguration Framework
2.2 Time-Series Sensor Data Prediction Algorithms
3 Development of IRPS
3.1 Methodology
3.2 Design and Implementation of IRPS
4 Case Study
4.1 Smart Room
4.2 Smart Hydroponic Cultivation
5 Conclusion
References
Industrial Networks and Intelligent Systems
An Optimal Eigenvalue-Based Decomposition Approach for Estimating Forest Parameters Over Forest Mountain Areas
1 Introduction
2 Basic Scattering Mechanisms in Forest Mountain Areas for PolInSAR and Simplified Neumann Volume Scattering Model
2.1 The PolInSAR Covariance Matrix
2.2 Volume Scattering Mechanism and Simplified Neumann Scattering Model
2.3 Ground and Double-Bounce Scattering Model for Sloped Terrain
3 The Optimal Eigenvalue-Based Decomposition of PolInSAR Data
4 Applied Data Set and Experimental Results
5 Conclusion
References
An Improved Forest Height Inversion Method Using Dual-Polarization PolInSAR Data
1 Introduction
2 Methodology
2.1 The Complex Interferometry Coherence Coefficient of the Dual-Polarization PolInSAR System
2.2 Estimating Ground Phase Based on the Mean Coherence Set Theory
2.3 Estimating Forest Parameters by the Polarimetric Channel Comprehensive Search Method
3 Experimental Result
4 Conclusion
References
An Attempt to Perform TCP ACK Storm Based DoS Attack on Virtual and Docker Network
1 Introduction
1.1 Overview
1.2 Our Contributions
1.3 Roadmap
2 Related Works
2.1 Transmission Control Protocol - TCP
2.2 Vmware Workstationch19refspsvmware
2.3 Dockerch19refspsdocker
2.4 Network and Port Address Translationch19refspsnatpat
2.5 Original ACK-Storm DoS Attack
2.6 ACK-Storm DoS Attack Using FIN-ACK Packet
3 Experiment in VMware Workstation
3.1 Experiment Original ACK-Storm DoS Attack
3.2 Experiment ACK-Storm DoS Attack Using FIN-ACK Packet
4 Experiment in Docker
4.1 Experiment Original ACK-Storm DoS Attack
4.2 Experiment ACK-Storm DoS Attack Using FIN-ACK Packet
4.3 Experiment ACK-Storm DoS Attack Using FIN-ACK Packet and Fake Retransmitted ACK Packets from Attacker
5 Discussion
5.1 Feasibility
5.2 Countermeasures
5.3 Ethical Considerations
6 Conclusions
References
Identification of Chicken Diseases Using VGGNet and ResNet Models
1 Introduction
2 The Proposed Methodology
2.1 ResNet Model
2.2 VGGNet
3 Experimental Setup
3.1 Data Collection
3.2 Implementation
4 Results
5 Conclusions
References
Design and Evaluation of the Grid-Connected Solar Power System at the Stage of DC BUS with Optimization of Modulation Frequency for Performance Improvement
1 Introduction
2 Structure of Power Blocks in the System
2.1 Boost DC/DC Block
2.2 Single-Phase SVPWM Inverter
3 Maximum Power Sticking Control Algorithm
4 Setting Up Simulation Model
4.1 Solar Panel Model
4.2 DC/DC Power Converter Model
4.3 Rectifier Stage
4.4 Two-Level Single-Phase Inverter Model
4.5 LCL Filter Model
4.6 Controller
5 Simulation Results
5.1 Simulation of PV Panel Properties
5.2 Simulation of System Characteristics
6 Conclusion
References
Security and Privacy
An Efficient Side Channel Attack Technique with Improved Correlation Power Analysis
1 Introduction
2 Original CPA and Related Works
2.1 Original CPA
2.2 Related Works
3 Proposed CPA Technique
4 Experimental Results
5 Conclusion and Future Work
References
An Optimal Packet Assignment Algorithm for Multi-level Network Intrusion Detection Systems
1 Introduction
2 Network Model
3 Problem Formulation
4 An Optimal Packet Assignment Algorithm
5 Performance Evaluation
5.1 Experimental Setup
5.2 Performance Comparison of Processing Nodes
5.3 Evaluation of the Proposed Packet Assignment Algorithm
6 Conclusion
References
Privacy-Preserving for Web Hosting
1 Introduction
2 Models and Privacy Requirements
2.1 Models
2.2 Privacy Requirements
3 Proposed Protocol
4 Experiment Results
5 Conclusions
References
A Novel Secure Protocol for Mobile Edge Computing Network Applied Downlink NOMA
1 Introduction
2 System Model
3 Performance Analysis
4 Numerical Results and Discussion
4.1 Impact of Average Transmit SNR and the Length of Task 1
4.2 Impact of Transmit Power Allocation Ratio and the Length of Task 1
4.3 Comparison to Conventional NOMA Scheme
5 Conclusion
References
Author Index