2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
DNSNA: DNS name autoconfiguration for Internet of Things devices DNSNA:物联网设备的DNS名称自动配置
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-07-07 DOI: 10.1109/ICACT.2016.7423412
Sejun Lee, J. Jeong, Jungsoo Park
{"title":"DNSNA: DNS name autoconfiguration for Internet of Things devices","authors":"Sejun Lee, J. Jeong, Jungsoo Park","doi":"10.1109/ICACT.2016.7423412","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423412","url":null,"abstract":"This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's category and model in IPv6-based IoT environments. This DNS name lets user easily identify each IoT device for monitoring and remote-controlling in IoT environments. In the procedure to generate and register an IoT device's DNS name, the standard protocols of Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through an authoritative DNS server, it generates less traffic than Multicast DNS (mDNS), which is a legacy DNS application for the DNS name service in IoT environments. Thus, the proposed scheme is more appropriate in global IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenario, such as smart road and smart home. The results of the simulation prove that our proposal outperforms the legacy scheme in terms of energy consumption.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Supply and demand management system based on consumption pattern analysis and tariff for cost minimization 基于消费模式分析和费用最小化的供需管理系统
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423508
Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi
{"title":"Supply and demand management system based on consumption pattern analysis and tariff for cost minimization","authors":"Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi","doi":"10.1109/ICACT.2016.7423508","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423508","url":null,"abstract":"In this paper, we propose a supply and demand management system based on information on the power consumption pattern analysis and the tariff for HEMS(Home Energy Management System) of KEPCO(Korea Electric Power COrporation) for cost minimization. The scheduler of a supply and demand management system decides the curtailment level for the dropped appliances based on information about the predicted power consumption amount, the predicted renewable energy generation amount, and the tariff. We get the effect of the cost minimization on power consumption for home area user using constraints to decide the optimal curtailment level.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
APEM: Automatic paraphrase evaluation using morphological analysis for the Korean language 使用词形分析对韩国语进行自动释义评价
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423597
S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo
{"title":"APEM: Automatic paraphrase evaluation using morphological analysis for the Korean language","authors":"S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo","doi":"10.1109/ICACT.2016.7423597","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423597","url":null,"abstract":"Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technology since correctly paraphrased sentences can be used as alternative input sentences in the retrieval process. In this paper, we suggest an automatic paraphrase evaluation method using morphological analysis (APEM), which is suitable for the Korean language. Using APEM and its variations, we present preliminary results on how our automatic evaluation scores compare to the existing method of bilingual evaluation understudy (BLEU).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122250722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reverse engineering approach of obfuscated array 混淆阵列的逆向工程方法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423318
W. Ding, ZhiMin Gu
{"title":"A reverse engineering approach of obfuscated array","authors":"W. Ding, ZhiMin Gu","doi":"10.1109/ICACT.2016.7423318","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423318","url":null,"abstract":"Recently, research community has advanced in type reconstruction technology for reverse engineering. However, emerging with obfuscated technology, data type reconstruction grows more and more difficult, and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, it's essential to develop a novel approach to reverse engineering obfuscated array type based on refined CFG. We take split array for example and analyze feature in CFG and take advantage of compiler algorithm to identify obfuscated array.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of cloud computing attacks and countermeasures 云计算攻击及对策分析
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423296
Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said
{"title":"Analysis of cloud computing attacks and countermeasures","authors":"Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said","doi":"10.1109/ICACT.2016.7423296","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423296","url":null,"abstract":"Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Characterizing the running patterns of moving target defense mechanisms 运动目标防御机制运行模式的表征
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423324
Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang
{"title":"Characterizing the running patterns of moving target defense mechanisms","authors":"Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang","doi":"10.1109/ICACT.2016.7423324","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423324","url":null,"abstract":"Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simulating demography — Dynamics of fertility using a multi agent model 模拟人口统计学。使用多主体模型的生育动态
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423559
Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn
{"title":"Simulating demography — Dynamics of fertility using a multi agent model","authors":"Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn","doi":"10.1109/ICACT.2016.7423559","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423559","url":null,"abstract":"Many countries of the world have seen fertility rate declines. Sincere efforts have been made by the governments to change this trend. But still, countries like Korea & Japan are facing the problem of fertility rates well below the replacement fertility rates. Modeling and simulation offer a good way of understanding the dynamics of population. Of late, agent based modeling (ABM) has gained quite a lot of popularity in the field of simulation. We propose an actual population data fed agent based model whereby the agents in the simulation would take as input the actual census data and simulate the population fertility dynamics. Fertility rates are the main measures of population change. We will try and understand how fertility evolves by taking into various factors such as age, income, expenditure, social benefits; from the micro to macro level. The decisions of the agents, such as to get married and then have certain number of children, would be based on these factors. The fertility is predicted by accessing number of children a couple would have in the child bearing age. We hope to analyze and understand the effect of factors such as social benefits by this model.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-configuration and smart binding control on IOT applications 物联网应用的自配置和智能绑定控制
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423282
Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin
{"title":"Self-configuration and smart binding control on IOT applications","authors":"Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin","doi":"10.1109/ICACT.2016.7423282","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423282","url":null,"abstract":"The rapid development of wireless communication technology facilitates the realization of the Internet of Things (IOT). Self-configuration and smart connection system have become relative important issue in accordance with extensive applications of IOT, and the energy saving concepts. Therefore, this work presents the integration of `Self-configuration and Wisdom Connection System' with Wireless Sensor Networks (WSN), IOT and ZigBee technology, to actualize self-configuration based on a received signal strength indicator Received Signal Strength Indicator (RSSI), lighting auto-configuration area, regional allocation, and sub-areas. The proposed `Self-configuration and Wisdom Connection System' automatically configures different lightings to the same position within in the range -3dBm when the RSSI value varies only slightly. The system is configured to the same lighting site within the experimental environment when the sub-area range set -3dBm. This study presents a significant contribution to new configuration of objects in IOT, context awareness control, and optimization of network control platform.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel multi-carrier waveform with high spectral efficiency: Semi-orthogonal frequency division multiplexing 一种新的高频谱效率的多载波波形:半正交频分复用
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423299
Fan Yang, Xin Wang
{"title":"A novel multi-carrier waveform with high spectral efficiency: Semi-orthogonal frequency division multiplexing","authors":"Fan Yang, Xin Wang","doi":"10.1109/ICACT.2016.7423299","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423299","url":null,"abstract":"In this paper, semi-orthogonal frequency multiplexing (SOFDM) is proposed, which has doubled spectral efficiency over OFDM by halving the subcarrier spacing. SOFDM is orthogonal in real field but non-orthogonal in complex field. To cancel the inter carrier interference caused by non-orthogonality, linear equalization algorithms are introduced based on inter carrier cross-correlation matrix. However SOFDM still suffer a performance loss due to the white noise power amplification effect of linear equalization. To further improve the performance, by use of the special property of inter carrier cross-correlation matrix, complementary SOFDM is provided, which is orthogonal in both real and complex field. It has identical spectral efficiency with OFDM but obtain a diversity gain in fading channel. And a HARQ-style flexible complementary SOFDM is introduced, which can obtain not only performance gain but also spectral efficiency gain.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Doppler mitigation for high-speed rail communications 高速铁路通信的高效多普勒减缓
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423499
B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee
{"title":"Efficient Doppler mitigation for high-speed rail communications","authors":"B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee","doi":"10.1109/ICACT.2016.7423499","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423499","url":null,"abstract":"Since the high-speed rail (HSR) communications are suffering from the huge Doppler shift, an efficient Doppler mitigation method is proposed in this paper. The proposed method mainly concerns about the mitigation of Doppler shift in OFDM based systems, especially for the case of employing mmWave with very high mobility. The proposed method can be used for both downlink and uplink of the system and it is quite robust to the time-varying mobility. Furthermore, the pilot-aided channel estimation for Doppler compensation is not necessary in most of the cases, which indicates the pilot density in time-domain can be reduced. Simulation results show that by using the proposed method, the residual Doppler shift can be compressed to 0 Hz with the probability of 90%.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115063961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信