{"title":"Load balancing algorithm based on estimating finish time of services in cloud computing","authors":"Nguyen Khac Chien, N. H. Son, H. D. Loc","doi":"10.1109/ICACT.2016.7423339","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423339","url":null,"abstract":"Cloud computing is an emerging trend in the field of Information Technology and includes a large of distributed resources. The main goal of cloud computing service providers is to provide resources to workloads efficiently. Load balancing is an important technique for the goal. The technique is responsible for optimizing resource utilization, maximizing throughput, minimizing response time, and avoiding overloading of any single resources. So far, many load balancing algorithms have been proposed but their performance has to be still desired. In this paper, we propose a novel load balancing algorithm that is based on the method of estimating the end of service time. The simulation results show that our proposed algorithm improves response time and processing time.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial benefit analysis of macro-femto network structures based on TCO approach","authors":"W. W. Gu, K. Yamori, Y. Tanaka","doi":"10.1109/ICACT.2016.7423580","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423580","url":null,"abstract":"Mobile Network Operators (MNO) are nowadays facing an exponential growth in their network traffic, as more and more customers are having access to affordable new technologies using smarter and data-based equipments. As new strategies have to be developed and implemented in order to meet those demands in a cost efficient way, the offloading one, with using an alternative network to the macrocell cell network, has been under ongoing discussions and studies. More specifically, the femtocell offloading alternative has been pointed out as a potential cost effective solution regarding many advantageous specificities related to this technology like the the small size and ease of installation, making it easier to deploy than the macro one. In this paper, we will assess the relative costs benefits resulting from deploying the femtocell network, using the Total Cost of Ownership (TCO) as an economical method to have more accurate and up-to-date results regarding those potential benefits. Cost analysis will be performed based on our base case scenario, and discussions on possible future extensions of this work are presented.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy management framework for smart factory based on context-awareness","authors":"Hyunjeong Lee, Sangkeun Yoo, Yong-Woon Kim","doi":"10.1109/ICACT.2016.7423519","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423519","url":null,"abstract":"In this paper, an energy management framework for smart factory is illustrated based on context-awareness. The smart factory is composed of the three layers, and IoT sensors are deployed in the smart factories and used to collect many kinds of data including personnel, equipment, and environment. The first layer, the data collection and control layer, collects and sends environmental and control data to the second layer. And, the second layer, energy management based on context-awareness layer, analyses the data and infers the context from them. Finally, the energy service layer provides energy management services to users through monitoring and controlling the status of energy consumption. Using the proposed scheme, users can monitor their energy consumption, and control their utilities and equipment to avoid energy leakage.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and optimization of AODV for Internet connectivity","authors":"Bingying Cai, Huimei Lu, Yong Xiang, Weitao Wang, Jingbang Wu, Rui Gao","doi":"10.1109/ICACT.2016.7423450","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423450","url":null,"abstract":"The popular method for MANET to access the Internet is choosing some gateways through which MANET can act as a subnet of the Internet. In these solutions, gateways will be the bottleneck of the whole network. Meanwhile, gateway selection and handoff are also the problems. Since aforesaid problems, a new protocol was implemented on embedded devices based on iAODV, and route optimization and link failure repair were proposed and implemented for a further step. The interconnected protocol introduced interconnected node (ICN) and wired node (WDN), and was compatible with multiple network interfaces. To access the Internet, the interconnected protocol routed ICN, WDN and WLNwireless node as peers. Experimental results show that in the presence of ICNs and WDNs, the new protocol has higher overall network bandwidth and better data transfer stability than AODV. When the network topology changes frequently, it tries to find a better path by route optimization, and detect or repair the link broken timely by link failure repair. In traditional MANET in which all nodes are wireless, the interconnected protocol has a similar performance to AODV.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted conflict-aware channel assignment in 802.11-based mesh networks","authors":"Chang-Jo Lee, Donghoon Shin, Sunghee Choi","doi":"10.1109/ICACT.2016.7423399","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423399","url":null,"abstract":"The hidden terminal problem, exposed terminal problem and co-channel interference problem are three main factors that limit the performance of wireless mesh networks. The network throughput can be increased by using multi-radio multichannel technology through using different channels to avoid the collisions. In this paper, we provide a channel assignment scheme considering interference, hidden/exposed terminal problem all together. For this scheme, we first propose a weighted conflict model in multi-channel multi-radio wireless mesh networks and define a Max list-Cut problem on the weighted conflict graph. We present an approximation algorithm for the Max list-Cut problem to solve the channel assignment problem. Our simulation results show that the proposed channel assignment scheme achieves high network performance in various topologies.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed architecture for rule engine to deal with big data","authors":"Siyuan Zhu, Hai Huang, Lei Zhang","doi":"10.1109/ICACT.2016.7423487","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423487","url":null,"abstract":"Rule engine, which acknowledges facts and draws conclusions by repeatedly matching facts with rules, is a good way of knowledge representation and inference. However, because of its low computational efficiency and the limitation of single machine's capacity, it cannot deal well with big data. As traditional MapReduce architecture can only address this problem in certain conditions, we have made some improvements and therefore proposed a distributed implementation of the rule engine using MapReduce-based architecture. It is designed to deal with a large amount of data in a parallel and distributed way by using a computing cluster that consists of multiple machines, on which certain part of the Rete algorithm would be operated. In the phase of splitting rules and the Rete-net, Apriori algorithm is also improved and adopted so as to gain a better system performance. This paper not only describes details of the design and its implementation, but also shows its high performance through several experiments.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126107799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weiwei Pang, Xiangyang Luo, Jie Ren, Chunfang Yang, Fenlin Liu
{"title":"Rapid detection of stego images based on identifiable features","authors":"Weiwei Pang, Xiangyang Luo, Jie Ren, Chunfang Yang, Fenlin Liu","doi":"10.1109/icact.2016.7423605","DOIUrl":"https://doi.org/10.1109/icact.2016.7423605","url":null,"abstract":"An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on identifiable features is proposed, where the identifiable features are specific character sequences left in stego images by steganography tools. The stego and cover images are distinguished according to whether the identifiable features are found in the detected images. Meanwhile, for the case of that multiple identifiable features appeared on the same location of an image, the AC (Aho-Corasick) multi-features matching algorithm is applied to improve the detection speed. In experiments, the detection method is used to detect eight steganography tools such as Invisible Secrets, E-Show, BMP Secrets and so on. The results show that the proposed steganalysis method can achieve a nearly perfect detection precision, and the detection speed can be improved significantly comparing with traditional methods (matching bytes one by one).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim
{"title":"Introduction to a network forensics system for cyber incidents analysis","authors":"Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim","doi":"10.1109/ICACT.2016.7423270","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423270","url":null,"abstract":"Recently, sophisticated attacks are increased against specific business companies, organizations and various facilities and the attackers are trying to remove attack traces such as system logs and related information on the victim systems. Therefore, it is getting more difficult to collect the information for attack analysis. In order to overcome this situations, companies and organizations have started to collect the network traffic as secondary information for attack analysis. However, most of them are focusing on gathering the network packets. But one of the most important parts is to extract the useful information for attack analysis from the collected data. In this paper, we suggest a network forensics system, Cyber Blackbox, which is focused on the traffic analysis.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyungkeuk Lee, Seng-Kyoun Jo, Namkyung Lee, Hyun-Woo Lee
{"title":"A method for co-existing heterogeneous IoT environments based on compressive sensing","authors":"Hyungkeuk Lee, Seng-Kyoun Jo, Namkyung Lee, Hyun-Woo Lee","doi":"10.1109/ICACT.2016.7423330","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423330","url":null,"abstract":"Compressive Sensing (CS) is a stable and robust technique that allows for the sub-sampling of data at a given data rate: `compressive sampling' or `compressive sensing' at rates smaller than the Nyquist sampling rate. It makes it possible to create standalone and net-centric applications with fewer resources required in Internet of Things (IoT). CS-based signal and information acquisition/compression paradigm combines the nonlinear reconstruction algorithm and random sampling on a sparse basis that provides a promising approach to compress signal and data in information systems. In this paper, we investigates how CS can provide new insights into coexisting heterogeneous IoT environments. First, we briefly introduce the CS theory with respect to the sampling through providing a compressed sampling process with low computation costs. Then, a CS-based framework is proposed for IoT, in which the hub nodes measure, transmit, and store the sampled data into the fusion center. Then, an efficient cluster-sparse reconstruction algorithm is proposed for in-network compression aiming at more accurate data reconstruction and lower energy efficiency. Therefore, compression should be performed locally at each Access Point (AP) and reconstruction is executed jointly to consider dependencies in the acquired data by the final fusion center.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency alerting system for supporting power-efficient set-top boxes","authors":"Sang-Gu Jeong, Hyunho Park, Yong-Tae Lee","doi":"10.1109/ICACT.2016.7423514","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423514","url":null,"abstract":"In recent days, previous studies have proposed power-efficient set-top boxes that can receive only magic packets for wake on LAN (WoL) technology in standby state where the set-top boxes do not receive broadcast services. However, current emergency alerting system cannot support the power-efficient set-top boxes in standby state because the set-top boxes cannot receive emergency alert messages from the emergency alerting system. In this paper, we propose emergency alerting system that activates the power-efficient set-top boxes in standby state by using WoL technology and thus enables the set-top boxes in standby state to receive emergency alert messages. The proposed emergency alerting system will contribute wide deployment of the power-efficient set-top boxes and huge reduction of national power consumptions.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}