2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Load balancing algorithm based on estimating finish time of services in cloud computing 云计算中基于服务完成时间估计的负载均衡算法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423339
Nguyen Khac Chien, N. H. Son, H. D. Loc
{"title":"Load balancing algorithm based on estimating finish time of services in cloud computing","authors":"Nguyen Khac Chien, N. H. Son, H. D. Loc","doi":"10.1109/ICACT.2016.7423339","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423339","url":null,"abstract":"Cloud computing is an emerging trend in the field of Information Technology and includes a large of distributed resources. The main goal of cloud computing service providers is to provide resources to workloads efficiently. Load balancing is an important technique for the goal. The technique is responsible for optimizing resource utilization, maximizing throughput, minimizing response time, and avoiding overloading of any single resources. So far, many load balancing algorithms have been proposed but their performance has to be still desired. In this paper, we propose a novel load balancing algorithm that is based on the method of estimating the end of service time. The simulation results show that our proposed algorithm improves response time and processing time.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Financial benefit analysis of macro-femto network structures based on TCO approach 基于TCO方法的宏观femto网络结构经济效益分析
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423580
W. W. Gu, K. Yamori, Y. Tanaka
{"title":"Financial benefit analysis of macro-femto network structures based on TCO approach","authors":"W. W. Gu, K. Yamori, Y. Tanaka","doi":"10.1109/ICACT.2016.7423580","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423580","url":null,"abstract":"Mobile Network Operators (MNO) are nowadays facing an exponential growth in their network traffic, as more and more customers are having access to affordable new technologies using smarter and data-based equipments. As new strategies have to be developed and implemented in order to meet those demands in a cost efficient way, the offloading one, with using an alternative network to the macrocell cell network, has been under ongoing discussions and studies. More specifically, the femtocell offloading alternative has been pointed out as a potential cost effective solution regarding many advantageous specificities related to this technology like the the small size and ease of installation, making it easier to deploy than the macro one. In this paper, we will assess the relative costs benefits resulting from deploying the femtocell network, using the Total Cost of Ownership (TCO) as an economical method to have more accurate and up-to-date results regarding those potential benefits. Cost analysis will be performed based on our base case scenario, and discussions on possible future extensions of this work are presented.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An energy management framework for smart factory based on context-awareness 基于环境感知的智能工厂能源管理框架
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423519
Hyunjeong Lee, Sangkeun Yoo, Yong-Woon Kim
{"title":"An energy management framework for smart factory based on context-awareness","authors":"Hyunjeong Lee, Sangkeun Yoo, Yong-Woon Kim","doi":"10.1109/ICACT.2016.7423519","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423519","url":null,"abstract":"In this paper, an energy management framework for smart factory is illustrated based on context-awareness. The smart factory is composed of the three layers, and IoT sensors are deployed in the smart factories and used to collect many kinds of data including personnel, equipment, and environment. The first layer, the data collection and control layer, collects and sends environmental and control data to the second layer. And, the second layer, energy management based on context-awareness layer, analyses the data and infers the context from them. Finally, the energy service layer provides energy management services to users through monitoring and controlling the status of energy consumption. Using the proposed scheme, users can monitor their energy consumption, and control their utilities and equipment to avoid energy leakage.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Implementation and optimization of AODV for Internet connectivity 面向互联网连接的AODV实现与优化
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423450
Bingying Cai, Huimei Lu, Yong Xiang, Weitao Wang, Jingbang Wu, Rui Gao
{"title":"Implementation and optimization of AODV for Internet connectivity","authors":"Bingying Cai, Huimei Lu, Yong Xiang, Weitao Wang, Jingbang Wu, Rui Gao","doi":"10.1109/ICACT.2016.7423450","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423450","url":null,"abstract":"The popular method for MANET to access the Internet is choosing some gateways through which MANET can act as a subnet of the Internet. In these solutions, gateways will be the bottleneck of the whole network. Meanwhile, gateway selection and handoff are also the problems. Since aforesaid problems, a new protocol was implemented on embedded devices based on iAODV, and route optimization and link failure repair were proposed and implemented for a further step. The interconnected protocol introduced interconnected node (ICN) and wired node (WDN), and was compatible with multiple network interfaces. To access the Internet, the interconnected protocol routed ICN, WDN and WLNwireless node as peers. Experimental results show that in the presence of ICNs and WDNs, the new protocol has higher overall network bandwidth and better data transfer stability than AODV. When the network topology changes frequently, it tries to find a better path by route optimization, and detect or repair the link broken timely by link failure repair. In traditional MANET in which all nodes are wireless, the interconnected protocol has a similar performance to AODV.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weighted conflict-aware channel assignment in 802.11-based mesh networks 基于802.11的网状网络中加权冲突感知信道分配
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423399
Chang-Jo Lee, Donghoon Shin, Sunghee Choi
{"title":"Weighted conflict-aware channel assignment in 802.11-based mesh networks","authors":"Chang-Jo Lee, Donghoon Shin, Sunghee Choi","doi":"10.1109/ICACT.2016.7423399","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423399","url":null,"abstract":"The hidden terminal problem, exposed terminal problem and co-channel interference problem are three main factors that limit the performance of wireless mesh networks. The network throughput can be increased by using multi-radio multichannel technology through using different channels to avoid the collisions. In this paper, we provide a channel assignment scheme considering interference, hidden/exposed terminal problem all together. For this scheme, we first propose a weighted conflict model in multi-channel multi-radio wireless mesh networks and define a Max list-Cut problem on the weighted conflict graph. We present an approximation algorithm for the Max list-Cut problem to solve the channel assignment problem. Our simulation results show that the proposed channel assignment scheme achieves high network performance in various topologies.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A distributed architecture for rule engine to deal with big data 一种分布式的规则引擎架构,用于处理大数据
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423487
Siyuan Zhu, Hai Huang, Lei Zhang
{"title":"A distributed architecture for rule engine to deal with big data","authors":"Siyuan Zhu, Hai Huang, Lei Zhang","doi":"10.1109/ICACT.2016.7423487","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423487","url":null,"abstract":"Rule engine, which acknowledges facts and draws conclusions by repeatedly matching facts with rules, is a good way of knowledge representation and inference. However, because of its low computational efficiency and the limitation of single machine's capacity, it cannot deal well with big data. As traditional MapReduce architecture can only address this problem in certain conditions, we have made some improvements and therefore proposed a distributed implementation of the rule engine using MapReduce-based architecture. It is designed to deal with a large amount of data in a parallel and distributed way by using a computing cluster that consists of multiple machines, on which certain part of the Rete algorithm would be operated. In the phase of splitting rules and the Rete-net, Apriori algorithm is also improved and adopted so as to gain a better system performance. This paper not only describes details of the design and its implementation, but also shows its high performance through several experiments.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126107799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rapid detection of stego images based on identifiable features 基于可识别特征的隐写图像快速检测
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/icact.2016.7423605
Weiwei Pang, Xiangyang Luo, Jie Ren, Chunfang Yang, Fenlin Liu
{"title":"Rapid detection of stego images based on identifiable features","authors":"Weiwei Pang, Xiangyang Luo, Jie Ren, Chunfang Yang, Fenlin Liu","doi":"10.1109/icact.2016.7423605","DOIUrl":"https://doi.org/10.1109/icact.2016.7423605","url":null,"abstract":"An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on identifiable features is proposed, where the identifiable features are specific character sequences left in stego images by steganography tools. The stego and cover images are distinguished according to whether the identifiable features are found in the detected images. Meanwhile, for the case of that multiple identifiable features appeared on the same location of an image, the AC (Aho-Corasick) multi-features matching algorithm is applied to improve the detection speed. In experiments, the detection method is used to detect eight steganography tools such as Invisible Secrets, E-Show, BMP Secrets and so on. The results show that the proposed steganalysis method can achieve a nearly perfect detection precision, and the detection speed can be improved significantly comparing with traditional methods (matching bytes one by one).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction to a network forensics system for cyber incidents analysis 介绍一种用于网络事件分析的网络取证系统
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423270
Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim
{"title":"Introduction to a network forensics system for cyber incidents analysis","authors":"Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim","doi":"10.1109/ICACT.2016.7423270","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423270","url":null,"abstract":"Recently, sophisticated attacks are increased against specific business companies, organizations and various facilities and the attackers are trying to remove attack traces such as system logs and related information on the victim systems. Therefore, it is getting more difficult to collect the information for attack analysis. In order to overcome this situations, companies and organizations have started to collect the network traffic as secondary information for attack analysis. However, most of them are focusing on gathering the network packets. But one of the most important parts is to extract the useful information for attack analysis from the collected data. In this paper, we suggest a network forensics system, Cyber Blackbox, which is focused on the traffic analysis.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A method for co-existing heterogeneous IoT environments based on compressive sensing 一种基于压缩感知的共存异构物联网环境方法
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423330
Hyungkeuk Lee, Seng-Kyoun Jo, Namkyung Lee, Hyun-Woo Lee
{"title":"A method for co-existing heterogeneous IoT environments based on compressive sensing","authors":"Hyungkeuk Lee, Seng-Kyoun Jo, Namkyung Lee, Hyun-Woo Lee","doi":"10.1109/ICACT.2016.7423330","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423330","url":null,"abstract":"Compressive Sensing (CS) is a stable and robust technique that allows for the sub-sampling of data at a given data rate: `compressive sampling' or `compressive sensing' at rates smaller than the Nyquist sampling rate. It makes it possible to create standalone and net-centric applications with fewer resources required in Internet of Things (IoT). CS-based signal and information acquisition/compression paradigm combines the nonlinear reconstruction algorithm and random sampling on a sparse basis that provides a promising approach to compress signal and data in information systems. In this paper, we investigates how CS can provide new insights into coexisting heterogeneous IoT environments. First, we briefly introduce the CS theory with respect to the sampling through providing a compressed sampling process with low computation costs. Then, a CS-based framework is proposed for IoT, in which the hub nodes measure, transmit, and store the sampled data into the fusion center. Then, an efficient cluster-sparse reconstruction algorithm is proposed for in-network compression aiming at more accurate data reconstruction and lower energy efficiency. Therefore, compression should be performed locally at each Access Point (AP) and reconstruction is executed jointly to consider dependencies in the acquired data by the final fusion center.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Emergency alerting system for supporting power-efficient set-top boxes 支持高能效机顶盒的紧急警报系统
2016 18th International Conference on Advanced Communication Technology (ICACT) Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423514
Sang-Gu Jeong, Hyunho Park, Yong-Tae Lee
{"title":"Emergency alerting system for supporting power-efficient set-top boxes","authors":"Sang-Gu Jeong, Hyunho Park, Yong-Tae Lee","doi":"10.1109/ICACT.2016.7423514","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423514","url":null,"abstract":"In recent days, previous studies have proposed power-efficient set-top boxes that can receive only magic packets for wake on LAN (WoL) technology in standby state where the set-top boxes do not receive broadcast services. However, current emergency alerting system cannot support the power-efficient set-top boxes in standby state because the set-top boxes cannot receive emergency alert messages from the emergency alerting system. In this paper, we propose emergency alerting system that activates the power-efficient set-top boxes in standby state by using WoL technology and thus enables the set-top boxes in standby state to receive emergency alert messages. The proposed emergency alerting system will contribute wide deployment of the power-efficient set-top boxes and huge reduction of national power consumptions.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信