2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Enhanced quantum multi-signature protocol based on controlled teleportation 基于受控隐形传态的增强型量子多重签名协议
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423537
Minghui Zhang, Huifang Li, Zhaoqiang Xia
{"title":"Enhanced quantum multi-signature protocol based on controlled teleportation","authors":"Minghui Zhang, Huifang Li, Zhaoqiang Xia","doi":"10.1109/ICACT.2016.7423537","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423537","url":null,"abstract":"The multi-user quantum signature protocol makes the message can be signed by more than one signatory. In this paper, we put forward an enhanced quantum multi-signature scheme based on Bell states and the controlled quantum teleportation. Compared to the previous multi-signature schemes, our protocol can offer higher security guaranteed by the fundamental laws of physics. While ensuring the nice security of the protocol we also pay attention to keeping its efficiency. Moreover, the scheme is more feasible with the present-day technique.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance study of LTE experimental testbed using OpenAirInterface 基于OpenAirInterface的LTE实验试验台性能研究
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423493
Chun Yeow Yeoh, M. Mokhtar, A. Rahman, A. Samingan
{"title":"Performance study of LTE experimental testbed using OpenAirInterface","authors":"Chun Yeow Yeoh, M. Mokhtar, A. Rahman, A. Samingan","doi":"10.1109/ICACT.2016.7423493","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423493","url":null,"abstract":"The next generation, 5G wireless access, is going to support a wide range of new applications and use cases, with the capabilities including very high achievable data rate, very low latency, ultra-high reliability and the possibility to handle extreme device densities. To avoid the costly deployment, operation and maintenance of future mobile network, Radio Access Network (RAN) virtualization or Cloud RAN is the answer to the problem. The idea is to move the baseband processing to the data center and run the RAN L1, L2 and L3 protocol layers using the commodity hardware, such as high-performance general purpose processors. An open source software-based LTE implementation, such as OpenAirInterface (OAI), is definitely accelerating the RAN cloudization and also realizing the possibility of low cost LTE network deployment in the future. In this paper, we describe the OAI LTE implementation emphasizing on the user plane data flow. We have successfully emulated over-the-air transmission for 1 UE and 1 eNB LTE network supporting both FDD Band 5 and TDD Band 38. We have also performed a thorough profiling of OAI, in terms of execution time, on the user plane data flow. Our results could be served as the reference for future optimization by open source community.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Differentiated assignment of extrinsic information in iterated decoding of fixed weight codewords 定权码字迭代译码中外部信息的差异化赋值
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423620
Wonsun Bong, Y. C. Kim
{"title":"Differentiated assignment of extrinsic information in iterated decoding of fixed weight codewords","authors":"Wonsun Bong, Y. C. Kim","doi":"10.1109/ICACT.2016.7423620","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423620","url":null,"abstract":"Constant amplitude multi-code (CAMC) CDMA has the same structure as a recursively generated single parity check product code. A top-level codeword of CAMC is recursively constructed from lower-level codewords. In the iterative decoding of CAMC, log likelihood ratio (LLR), a priori information and extrinsic information (EI) of a codeword is a weighted sum of LLR values of associated codewords from which it is despread or into which it is spread. In this paper, we show that differentiated assignment of EI in the computation of LLR can improve the performance of bit error correction. The weights of CAMC codewords are fixed at two fixed values. We let EI converge fast to saturation value when a codeword has the correct weight. The proposed method achieved performance improvement of 0.1 ~ 0.3 dB in Eb/No over the regular iterated decoding of CAMC. When compared with despreading ON/OFF control, a gain of about 0. 1 dB is achieved, which is meaningful near the Shannon capacity limit.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AAaS: Area approaching and spray-and-wait routing scheme for DTN in Android AAaS: Android DTN的区域逼近和喷雾等待路由方案
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423451
Weitao Wang, Huimei Lu, Yong Xiang, Bingying Cai, Jingbang Wu, Rui Gao
{"title":"AAaS: Area approaching and spray-and-wait routing scheme for DTN in Android","authors":"Weitao Wang, Huimei Lu, Yong Xiang, Bingying Cai, Jingbang Wu, Rui Gao","doi":"10.1109/ICACT.2016.7423451","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423451","url":null,"abstract":"Most of the existing DTN routing algorithms have been studied in the simulation environment. They are not sufficiently used to the historical location and historical neighbor's information. So AAaS (Area Approaching and Spray-and-Wait) routing algorithm is proposed, which considers the practicability of the algorithm and the rules of the node's movement and the law of the meeting. AAaS divides the map into areas by the administrative area, public places and areas the DTN nodes clustered with historical GPS position. Each area maintenance the frequency vectors of different time scales and the frequency vectors of the historical encountered neighbor. AAaS forwards the bundles by these frequency vectors in the bundle lifetime, select the appropriate next hop, more efficient use of the limited bandwidth of encountered nodes in DTN network. Finally, the prototype of AAaS routing algorithm is implemented in Android based on Bytewalla. The experimental results prove that, even in the case of the buffer is not limited, the AAaS is more efficient than Epidemic in the use of the limited bandwidth between encountered nodes.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of cyber security policy in industrial control system using data diodes 基于数据二极管的工业控制系统网络安全策略研究
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423374
Boo-Sun Jeon, Jungchan Na
{"title":"A study of cyber security policy in industrial control system using data diodes","authors":"Boo-Sun Jeon, Jungchan Na","doi":"10.1109/ICACT.2016.7423374","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423374","url":null,"abstract":"The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer network to receive data directly from a less secure source while prohibiting the transmission of data in the opposite direction. In this paper, we describe data diode applied into industrial control system, after reviewing the commercial product, we address the various ways to apply a data diode in ICS and future works.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A caching mechanism for FAT file system in low-performance embedded system 低性能嵌入式系统中FAT文件系统的缓存机制
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423563
Jeaho Hwang, K. Won
{"title":"A caching mechanism for FAT file system in low-performance embedded system","authors":"Jeaho Hwang, K. Won","doi":"10.1109/ICACT.2016.7423563","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423563","url":null,"abstract":"FAT file system is one of the most common file systems on various targets and operating systems. However, it has a performance issue on sequential writing to low-bandwidth storage due to reading FAT area and directory entries. In this paper, we design and implement an efficient FAT caching mechanism for sequential writing to low-bandwidth. The mechanism consists two parts: metadata cache and whole FAT read-ahead cache. As a result, we show 20x improvement for sequential writing to low bandwidth storage with our caching mechanism.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Table based KNN for categorizing words 基于表的KNN分类词
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423523
T. Jo
{"title":"Table based KNN for categorizing words","authors":"T. Jo","doi":"10.1109/ICACT.2016.7423523","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423523","url":null,"abstract":"In this research, we propose the table based KNN as the approach to the text categorization. In previous works, we discovered that encoding texts into tables improved the performance in the text categorization, so in this research, become to consider the possibility of encoding words into tables as well as texts. In this research, we encode words into tables where entries are texts and their weights, and apply the table based version of the KNN to the task of word categorization. As the benefits from this research, we expect the better performance and more stability than the traditional version of the KNN, by doing so. Therefore, the goal of this research is to provide the improved approach to the word categorization task.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method of logically time synchronization for safety-critical distributed system 安全关键型分布式系统的逻辑时间同步方法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423390
Jeman Park, Taeho Kim
{"title":"A method of logically time synchronization for safety-critical distributed system","authors":"Jeman Park, Taeho Kim","doi":"10.1109/ICACT.2016.7423390","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423390","url":null,"abstract":"Legacy real-time and embedded systems have been small scale and standalone. However, recently they are increasingly being connected to create large-scale distributed system. Such distributed embedded system is realized in automotive, medical, and manufacturing automation. Also, there are many researches about software platform for large-scale distributed system. Verification of the application is required in SW platform for safety-critical distributed system. However, the verification complexity increases in practice as several factors such as delay, jitter and error. An equivalent synchronized execution of distributed tasks are required in distributed realtime system. Our method is based on the PALS (Physically Asynchronous Logically Synchronous) which is a complexity-reducing architectural pattern for distributed real-time systems. It allows developers to design, verify and implement a logically synchronous implementation of real-time distributed applications. In this paper, we introduce a logical time synchronization for reducing complexity between distributed nodes in distributed embedded system. It make verification and development of distributed software easier. It is helpful to develop distributed embedded system which requires safety and reliability. This paper is useful for application programmer or system manager who wants to establish distributed embedded system which requires safety and reliability.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file EnCase取证技术用于解密速记算法在PowerPoint文件中的应用
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423533
Hyunho Kim, N. Bruce, Suhyun Park, Hoonjae Lee
{"title":"EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file","authors":"Hyunho Kim, N. Bruce, Suhyun Park, Hoonjae Lee","doi":"10.1109/ICACT.2016.7423533","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423533","url":null,"abstract":"The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Among others techniques of message hiding, stenography is one them but more suspicious as no one cannot see the secret message. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. In this paper, we propose a new technique to find a hidden message by analysing the in PowerPoint file using EnCase Transcript. The result analysis shows that Steganography technique had hidden a certain number of message which are invisible to naked eye.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social simulation: The need of data-driven agent-based modelling approach 社会模拟:基于数据驱动的智能体建模方法的需求
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423571
M. Sajjad, Karandeep Singh, Euihyun Paik, Chang-Won Ahn
{"title":"Social simulation: The need of data-driven agent-based modelling approach","authors":"M. Sajjad, Karandeep Singh, Euihyun Paik, Chang-Won Ahn","doi":"10.1109/ICACT.2016.7423571","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423571","url":null,"abstract":"Agent-based modeling and simulation (ABMS) has attracted social scientists and demographers in the field of social simulation. Due to large number of computer simulation technologies, ABMS approaches have been proposed with majority applications. ABMS composed of heterogeneous interacting agents, with several features which turn them into a significantly attractive modeling approach to simulate complex social systems. In this paper, first we explore the underlying social theories for ABMS, its simulation and modeling techniques, and computational frameworks. Second, our paper concentrate on the potential need of ABM techniques in the context of social simulation. An alternative ABM approach that is getting popularity is to inject data into agent-based simulation. To validate our model, we compare our results with actual-data. Our results closely matched with actual-data results in the case of mean-age at the demographic transition of first childbirth. Our work encourage ABM modelers to promote this trend while designing their models. Further, our paper is an attempt to merge the microsimulation approach into the agent-based simulation through injecting data into ABM approach.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信