2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Fault localization in NFV framework NFV框架中的故障定位
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423388
B. Lee, B. Lee
{"title":"Fault localization in NFV framework","authors":"B. Lee, B. Lee","doi":"10.1109/ICACT.2016.7423388","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423388","url":null,"abstract":"Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization environment, it has greater impact on disability virtual resources, when the physical devices had a fault. In this paper, when physical faults occurred in the NFV Framework, or logical failure occurs on a specific logical device, we will present a structure for Fault Localization method to ensure the continuity of service in NFVI.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Spectral efficiency evaluation for non-orthogonal multiple access in Rayleigh fading 瑞利衰落条件下非正交多址频谱效率评价
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423543
P. Sedtheetorn, T. Chulajata
{"title":"Spectral efficiency evaluation for non-orthogonal multiple access in Rayleigh fading","authors":"P. Sedtheetorn, T. Chulajata","doi":"10.1109/ICACT.2016.7423543","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423543","url":null,"abstract":"This paper presents original analysis on the downlink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to our accurate evaluation technique, a closed-form expression of NOMA spectral efficiency is proposed. With the closed form, the exact average of NOMA spectral efficiency can be achieved at different system parameters. Moreover, this closed form can be used to evaluate other orthogonal multiple access (OMA) techniques such as orthogonal frequency division multiple access (OFDMA).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An algorithm for home energy management using environmental conditions 一种基于环境条件的家庭能源管理算法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423505
Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi
{"title":"An algorithm for home energy management using environmental conditions","authors":"Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi","doi":"10.1109/ICACT.2016.7423505","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423505","url":null,"abstract":"Resent study of load management minimizes for electricity bill and peak load, but does not consider convenience about human experience. Just focused on saving energy management of the electricity price can't consider residential customers convenience. In this paper, we propose optimal load control strategy for human convenience as well as to minimize the electricity price. The strategy is to use some of the indoor environmental parameters, reflecting the various forms of patterns of energy management system, which controls the load within a range that can maintain human convenience.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radio access model for universal service 通用服务的无线电接入模型
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423459
Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot
{"title":"Radio access model for universal service","authors":"Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot","doi":"10.1109/ICACT.2016.7423459","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423459","url":null,"abstract":"This paper proposes a mathematical model as a decision tool for the choice of radio access solutions adapted to a geographical region through universal access. It integrates the formalism related to engineering radio network access in general as well as financial constraints imposed by the access and universal service funds. Services considered are voice and data services. This approach has helped to derive a general expression set for radio technologies. The coverage and capacity deployment strategy has also been combined to clarify the optimal implementation based on financial constraints. A case study on the Ouaddai region in Chad accompanied by simulations curves for wireless technologies as Wi-Fi, WiMAX and CDMA for example has shown the efficiency of such approach.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124244032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A smart home control system based on context and human speech 基于上下文和人类语音的智能家居控制系统
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423314
Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong
{"title":"A smart home control system based on context and human speech","authors":"Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/ICACT.2016.7423314","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423314","url":null,"abstract":"Traditionally, home appliances are controlled by switches or remote controllers manually. In order to control the appliances, a user have to be near the switches or carry remote controllers all the time. To alleviate this inconvenience, this paper proposes a control system for home appliances using human speech and context information. We present an architecture of the control system and a process to control home appliances composed of three steps: speech detection, speech recognition, and command execution. To validate our system, we show two useful case studies by testing it at POSTECH smart home and UPnP-OSGi simulator.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Method for providing reliable peer activity report for managed P2P communications 为管理的P2P通信提供可靠的对等活动报告的方法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423435
Wook Hyun, Juyoung Park
{"title":"Method for providing reliable peer activity report for managed P2P communications","authors":"Wook Hyun, Juyoung Park","doi":"10.1109/ICACT.2016.7423435","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423435","url":null,"abstract":"In P2P-based contents distribution, an overlay network is constructed by peers that reside in user domain not service provider domain, and each peer shares data with each other. Due to the unmanageability characteristics of P2P networking, it tends to lead to inefficiency due to ignorance of underlying network in spite of its advantages and unfairness caused by absence of incentives to contributing peers. In order to solve several issues regarding P2P networking and making use of its advantages compared to existing server-client model, ITU-T Q.9/11 is developing a series of MP2P (Managed P2P communications) standards. In order to figure out the status of overlay network and gathering activities information of peers, it aggregates the information from peers that may not be trusted due to the possibility of forgery. It is important to assure the integrity and non-forgery of reports from peers. In this paper, we propose a method for gathering reliable peer activity report by use of digital signatures.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128341243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for network traffic anomaly detection 网络流量异常检测模型
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423586
Nguyễn Hà Dương, Hoang Dang Hai
{"title":"A model for network traffic anomaly detection","authors":"Nguyễn Hà Dương, Hoang Dang Hai","doi":"10.1109/ICACT.2016.7423586","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423586","url":null,"abstract":"Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance and principal component analysis for network traffic anomaly detection. We also experiment clustering technique with suitable features to remove noise in training data along with some enhanced detection technique. With the approach of combining anomaly detection and signature-based detection system, we believe the quality of normal dataset will greatly improve.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ASC: Improving spark driver performance with automatic spark checkpoint ASC:提高火花驱动性能与自动火花检查点
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423490
Weirong Zhu, Hao-peng Chen, Fei Hu
{"title":"ASC: Improving spark driver performance with automatic spark checkpoint","authors":"Weirong Zhu, Hao-peng Chen, Fei Hu","doi":"10.1109/ICACT.2016.7423490","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423490","url":null,"abstract":"Many great big data processing platforms, for example Hadoop Map Reduce, are keeping improving large-scale data processing performance which make big data processing focus of IT industry. Among them Spark has become increasingly popular big data processing framework since it was presented in 2010 first time. Spark use RDD for its data abstraction, targeting at the multiple iteration large-scale data processing with reuse of data, the in-memory feature of RDD make Spark faster than many other non-in-memory big data processing platform. However in-memory feature also bring the volatile problem, a failure or a missing RDD will cause Spark to recompute all the missing RDD on the lineage. And a long lineage will also increasing the time cost and memory usage of Driver analysing the lineage. A checkpoint will cut off the lineage and save the data which is required in the coming computing, the frequency to make a checkpoint and the RDDs which are selected to save will significantly influence the performance. In this paper, we are presenting an automatic checkpoint algorithm on Spark to help solve the long lineage problem with less influence on the performance. The automatic checkpoint will select the necessary RDD to save and bring an acceptable overhead and improve the time performance for multiple iteration.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A performance analysis of MAC and PHY layers in IEEE 802.11ac wireless network IEEE 802.11ac无线网络中MAC层和物理层的性能分析
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423258
G. Khan, R. González, Eun-Chan Park
{"title":"A performance analysis of MAC and PHY layers in IEEE 802.11ac wireless network","authors":"G. Khan, R. González, Eun-Chan Park","doi":"10.1109/ICACT.2016.7423258","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423258","url":null,"abstract":"This paper gives an insight into IEEE 802.11ac by analysing its performance in terms of system throughput taking into consideration the key features of MAC and PHY layers. Throughput at MAC layer is calculated from transmission probability, contention window and transmission stage. Likewise, the new critical attributes of 802.11ac PHY (i.e. modulation and coding schemes, spatial streams, and channel bandwidth) are used to determine the throughput. To this end, a theoretical model is developed followed by simulation analysis. The results compare theoretical and simulation findings for different set of parameters. Furthermore, important trends and tradeoffs are identified between system throughput and (MAC + PHY) features as a function of number of contending stations and payload size.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust and fast device discovery in OFDMA-based cellular networks for disaster environment 灾害环境下基于ofdma的蜂窝网络鲁棒快速设备发现
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423447
Seung Beom Seo, Jae Young Kim, W. Jeon
{"title":"Robust and fast device discovery in OFDMA-based cellular networks for disaster environment","authors":"Seung Beom Seo, Jae Young Kim, W. Jeon","doi":"10.1109/ICACT.2016.7423447","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423447","url":null,"abstract":"Device-to-device (D2D) communication is a salient function of public safety networks for enabling communications, even in a disaster environment where the communication infrastructures are fully or partially destroyed. In order that devices directly communicate, they must first find and identify each other. Especially, in a disaster environment where wireless channel conditions may be very poor, discovery should be robust and fast for quick resume of the blocked communications again. In this paper, considering frequency selective fading which may lead to missing devices even though they exist, we propose a device discovery scheme using a simple physical layer waveform called signature. Typically, in a signature-based discovery under OFDMA-based system, a device advertises its presence by selecting a discovery channel and energizing subcarriers in the channel for a while (one subcarrier at a time). In the proposed scheme, we design discovery channels having well dispersed subcarriers to tolerate the frequency selectivity. By simulation, it is shown that not only successful discovery ratio of the proposed scheme is improved, but also our scheme is more frequency selective fading tolerant in comparison with other approaches.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信