2010 International Conference on Information and Communication Technology Convergence (ICTC)最新文献

筛选
英文 中文
Paprika greenhouse management system for ubiquitous agriculture 辣椒大棚管理系统用于无处不在的农业
Jeong-Hwan Hwang, H. Yoe
{"title":"Paprika greenhouse management system for ubiquitous agriculture","authors":"Jeong-Hwan Hwang, H. Yoe","doi":"10.1109/ICTC.2010.5674751","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674751","url":null,"abstract":"This paper proposes the ‘Paprika greenhouse management system’ based on wireless sensor network technology, which will establish the ubiquitous agricultural environment and improve the productivity of farmers. The proposed ‘Paprika greenhouse management system’ has WSN environmental sensors and CCTVs at inside/outside of paprika greenhouse. These devices collect the growth-environment related information of paprika. The system collects and monitors the environmental information and video information of paprika greenhouse. In addition to the remote-control and monitoring of the greenhouse facilities, this system realizes the most optimum paprika growth environment based on the growth environmental data accumulated for a long time.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling autonomous military robots using hybrid system framework 基于混合系统框架的自主军用机器人建模
Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park
{"title":"Modeling autonomous military robots using hybrid system framework","authors":"Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674805","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674805","url":null,"abstract":"The autonomous military robot system is a complex hybrid system which is difficult to represent by ordinary modeling frameworks due to its continuous behaviors. In this paper, we present a case study to formally model this system using CHARON that is a hierarchical modeling framework for hybrid systems. To precisely capture all the behaviors of the military robot system, we propose several extensions for the CHARON framework.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource allocation and blocking analysis for mobile TV service over WiMAX network WiMAX网络上移动电视业务的资源分配与阻塞分析
Seung‐Eun Hong, W. Lee
{"title":"Resource allocation and blocking analysis for mobile TV service over WiMAX network","authors":"Seung‐Eun Hong, W. Lee","doi":"10.1109/ICTC.2010.5674717","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674717","url":null,"abstract":"Mobile WiMAX is emerging as one of the most promising systems for 4th generation mobile wireless networks where mobile TV services are foreseen to be proliferated. These applications are bandwidth hogs which cause a challenging capacity problem. To address this challenge, a novel mobile TV services over WiMAX network, called wireless switched digital video (WSDV), is proposed in this paper. Unlike with the conventional broadcast or unicast schemes, we use a hybrid approach that exploits adaptive modulation and coding (AMC) gain in unicast scheme and at the same time accommodates arbitrary many users watching the same channel like broadcast method, which enables to increase wireless capacity for mobile TV service. In addition, we present a WiMAX design tool, based on an analytical model, maximizing WiMAX capacity and study the influence of the most important traffic and system parameters. The analytical model can capture the details on WiMAX resource allocation and consider the popularity of the mobile TV contents from user, which provides an accurate estimate of the amount of bandwidth for WiMAX TV service and also enables a designer to optimally select the number of channels via WSDV schemes while meeting a desired level of blocking probability. Finally, we also demonstrate that the optimized scheme outperforms the conventional schemes in terms of blocking probability, and address the bandwidth sharing effect with other data services.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks 基于无线局域网的自组织网络中移动机器之间的会话密钥交换和相互认证方案
Hyosun Roh, Souhwan Jung
{"title":"Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks","authors":"Hyosun Roh, Souhwan Jung","doi":"10.1109/ICTC.2010.5674797","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674797","url":null,"abstract":"This paper proposes a secure session key exchange and mutual authentication scheme between mobile machines in WLAN-based ad hoc networks. One of the main security challenges for secure machine to machine communication is to accomplish a simple and efficient session key exchange and mutual authentication. The main idea of this paper is that non-interactive session key exchange uses the mobile machine's ID and mutual authentication without communication with an authentication server whenever a data transmission occurs between the mobile machines. The proposed scheme is secure against man-in-the-middle attack, impersonation attack, and modification attack.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data Transport Block structure design in CPS Middleware Subsystem CPS中间件子系统中的数据传输块结构设计
Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park
{"title":"Data Transport Block structure design in CPS Middleware Subsystem","authors":"Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674808","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674808","url":null,"abstract":"The DMW(Data-Centric Middleware) in CPS to support for high reliable and Autonomous Controlling Software is the platform that distributes a Publish/Subscribe based real-time data and supply a different QoS(Quality of Service). This paper deals with the DTB(Data Transport Block) in DMW that is to supply high reliable and QoS.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks 无线传感器网络中检测选择性转发攻击的检查点节点数控制方法
Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park
{"title":"Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks","authors":"Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674760","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674760","url":null,"abstract":"Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment 利用ZigBee网络进行大规模有源RFID部署的基于多跳的采集
Hyuntae Cho, Sanghyun Son, Yunju Baek
{"title":"Multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment","authors":"Hyuntae Cho, Sanghyun Son, Yunju Baek","doi":"10.1109/ICTC.2010.5674693","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674693","url":null,"abstract":"RFID (Radio Frequency Identification) is an automatic identification technology where information is carried by radio waves. The active type of RFID focuses on a long communication range while the passive type focuses on a low cost for a number of dense deployments. Nevertheless, the active type cannot be applied to a large-scale area due to its limited radio communication. This paper proposes a multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment. The proposed method uses a collection agent on ZigBee networks to extend the coverage of the RFID reader and collect RFID tags outside its communication range. This paper also includes an experiment and a performance evaluation. To evaluate the performance of the proposed method, we implemented an RFID system, which complies with a standard of 433MHz active RFIDs based on ISO/IEC 18000-71.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Diameter-based AAA architecture to support small AAA client 基于直径的AAA架构,支持小型AAA客户端
Man Yup Lee, Tai-Myung Chung
{"title":"Diameter-based AAA architecture to support small AAA client","authors":"Man Yup Lee, Tai-Myung Chung","doi":"10.1109/ICTC.2010.5674775","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674775","url":null,"abstract":"The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at the transport, the diameter-based AAA server will have a limit on the number of clients if the interworking of small clients increases. Consequently, the performance will reach its peak and therefore the extension or enlargement of server will be required. This paper proposes an efficient interworking method between diameter-based clients, agent and server upon study of AAA mechanism.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtualized programmable platform: Accommodating multiple, heterogeneous architectures in a single infrastructure 虚拟化可编程平台:在单个基础设施中容纳多个异构体系结构
M. Shin, Hyoungjun Kim
{"title":"Virtualized programmable platform: Accommodating multiple, heterogeneous architectures in a single infrastructure","authors":"M. Shin, Hyoungjun Kim","doi":"10.1109/ICTC.2010.5674787","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674787","url":null,"abstract":"Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about alternatives. It is necessary to support a variety of the new different architectures to accommodate the heterogeneity of Future Internet. In the paper, we discuss new challenges on virtualized programmable platform and discuss a new way forward for accommodating the multiple, heterogeneous architectures in a single infrastructure.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The design of communication infrastructures for smart DAS and AMI 智能DAS和AMI通信基础设施设计
Nogil Myoung, Younghyun Kim, Sang-Yeom Lee
{"title":"The design of communication infrastructures for smart DAS and AMI","authors":"Nogil Myoung, Younghyun Kim, Sang-Yeom Lee","doi":"10.1109/ICTC.2010.5674796","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674796","url":null,"abstract":"Information and communication technologies (ICT) play a pivotal role in SmartGrid. However, the current ICT infrastructures do not fully support real-time, secure and reliable communications and do not accommodate requirements of new SmartGrid services. According to that, power utilities do their best to construct upgraded communication networks for SmartGrid. The intent of this paper is to introduce KEPCO's field area network (FAN) architecture and research for smart distribution automation system (DAS) and advanced metering infrastructure (AMI).","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信