2019 21st International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
SVM and Decision Stumps Based Hybrid AdaBoost Classification Algorithm for Cognitive Radios 基于SVM和决策树桩的认知无线电混合AdaBoost分类算法
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702007
Siji Chen, Bin Shen, Xin Wang, Hebiao Wu
{"title":"SVM and Decision Stumps Based Hybrid AdaBoost Classification Algorithm for Cognitive Radios","authors":"Siji Chen, Bin Shen, Xin Wang, Hebiao Wu","doi":"10.23919/ICACT.2019.8702007","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702007","url":null,"abstract":"In this paper machine learning techniques based cooperative spectrum sensing (CSS) algorithms are investigated for cognitive radio networks (CRN). A novel support vector machine (SVM) and decision stumps based AdaBoost classification algorithm is proposed for pattern classification of the primary user’s behavior in the network. Conventionally, Ad-aBoost algorithm combines multiple sub-classifiers and produces a strong weight based on their own weights in classification. Taking into account the fact that SVM and decision stump serve as relatively strong and week classifiers respectively, the proposed algorithm employs SVM as the first-stage classifier and decision stump as the second-stage classifiers to eventually determine the class that the spectrum energy vector belongs to. It is verified in simulations that the proposed algorithm is capable of achieving higher detection probability than the conventional machine learning algorithms.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125138151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High Precision Industrial Wireless LAN System with Asynchronous Communication 高精度工业无线局域网异步通信系统
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701902
T. T. T. Nguyen, Makoto Tsurita, K. Sakamoto, Y. Nagao, M. Kurosaki, H. Ochi
{"title":"High Precision Industrial Wireless LAN System with Asynchronous Communication","authors":"T. T. T. Nguyen, Makoto Tsurita, K. Sakamoto, Y. Nagao, M. Kurosaki, H. Ochi","doi":"10.23919/ICACT.2019.8701902","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701902","url":null,"abstract":"In this paper, we propose an industrial Wireless Local Area Network (iWLAN) system compatible with asynchronous communication for industrial robots (iRBs) control in factory automation (FA) environments. The design of our media access control layer is synchronous multi-user round-robin transmission protocol. Low overhead Packet Division Multiple Access (PDMA) scheme is utilized for Multi-user Downlink transmission up to 80 MHz, while Frequency Division Multiple Access (FDMA) is employed for the uplink transmission. The system is developed based on a fast and deterministic communication featuring the synchronous multi-user system. In general, the iRBs are not only controlled by synchronous communication but also by asynchronous communication via this iWLAN system. In this paper, we present the Field-programmable gate array (FPGA) implementation are carried out to confirm that our iWLAN system by asynchronous communication can control up to four motors. Based on the result of FPGA implementation, the time synchronization of the proposed system in high accuracy from 40 to 100 ns is also captured by an oscilloscope.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125223444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Artificial Intelligence Hybrid Learning Architecture for Malware Families Classification 恶意软件分类的人工智能混合学习体系结构
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701899
Yan-Ju Chen, Wen-Han Kuo, Sung-Yun Tsai, Jiann-Liang Chen, Yu-Hung Chen, Wei-Zhao Xu
{"title":"Artificial Intelligence Hybrid Learning Architecture for Malware Families Classification","authors":"Yan-Ju Chen, Wen-Han Kuo, Sung-Yun Tsai, Jiann-Liang Chen, Yu-Hung Chen, Wei-Zhao Xu","doi":"10.23919/ICACT.2019.8701899","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701899","url":null,"abstract":"In recent years, the rise of the Internet of Things has led to a gradual expansion of internet services, but most people ignore the importance of information security. This study investigates the characteristics of the malicious traffic that is generated during the operation of malware, and classifies malware into families without using SSL/TLS decryption. In this work, the features of traffic include the total numbers of packets and bits, sending time, packet size, delivery intervals, and others. All of features that are obtained by extracted of traffic flows are integrated into a complex set and a model that can identify the type of malware is trained by machine learning and deep learning. This work solves the problem of imbalanced data in traffic flows using a traffic analysis mechanism and developing a multi-layer network analysis structure that improves the stability and reliability of the proposed training model, to ensure cyber security.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment 性能评价:AODV/WiFi MANET环境下阻断扩展环搜索的两种洪水消除方法
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702034
Kwi-Yil Gwak, Sangwook Park, Joo-Seok Song
{"title":"Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment","authors":"Kwi-Yil Gwak, Sangwook Park, Joo-Seok Song","doi":"10.23919/ICACT.2019.8702034","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702034","url":null,"abstract":"Blocking Expanding Ring Search(BERS) is the modified scheme of TTL-sequence based ERS(TTL-ERS) to increase the energy efficiency by adding a little latency and decreasing the number of route request packet(RREQ)s which are flooded into network to query the path during the route discovery process for the reactive routing protocol of Mobile Ad-hoc Network (MANET). Until recently, several variants of BERS have been proposed, and all of them use ‘chase’ packet to stop or cancel the flooding of the RREQ for fulfilled route request. In this paper, we modelled these main variants of BERS, classifying them into Source node Initiated Chase Packet (SICP) type and Reply node Initiated Chase Packet (RICP) type, and analyzed the performance of each scheme installed in AODV protocol over WiFi MANET environment by the NS-3 simulator. The results of this paper show undiscovered aspect, different from the results of mathematical and analytical studies or the results of network simulation performed on the low node density network: the performance value of the BERS series deteriorates dramatically after node density of the network comes high. It means that broadcasting of chase packet as well as broadcasting of RREQ is a large burden on the dense node WiFi network. Notably, this phenomenon is more distinct in the SICP type model (BERS, BERS*, BERS+), and it even leads to greater overhead than TTL-ERS in case of very high node density network. On the other hand, the RICP type models (tBERS, tBERS*, tBERS+), which are improved to start flooding cancellation earlier than SICP, exhibit greater performance improvement than expected in case of higher node density. These results show that, in the BERS series models, flooding cancellation by the broadcasting packet can be another factor of the broadcasting storm, and that the earlier the flooding cancellation, the greater the performance improvement effect than theoretical prediction in the high node density WiFi MANET.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High-Speed Data Transmission with Beam-Steering using Silicon Optical Phased Array 基于硅光相控阵的波束导向高速数据传输
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701956
H. Rhee, Minchul Kim, Jong-Bum You, HyoDerk Park
{"title":"High-Speed Data Transmission with Beam-Steering using Silicon Optical Phased Array","authors":"H. Rhee, Minchul Kim, Jong-Bum You, HyoDerk Park","doi":"10.23919/ICACT.2019.8701956","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701956","url":null,"abstract":"Optical wireless data transmission is an emerging complementary technology compared to the radio frequency transmission in specific fields. Silicon based solid-state optical phased array (OPA) has a large advantage on the entire system size, low power consumption and high speed operation. The designed radiator of OPA has 16 channels of grating array with each grating having 20μm length and etch depth of 70nm. Grating array radiator has 2μm pitch achieving ±22.7° beam steering angle. Radiator’s output beam has a beam divergence angle of 4° and 6° for each longitudinal and vertical direction. With the designed OPA, we have demonstrated a 5Gbps data transmission in a free-space range of 30cm. Eye diagram was achieved at center and full steered beam position by phase shifting. The extinction ratio of the transmitted eye-diagram was about 7dB verifying that OPA is a promising technology for high-speed wireless data transmission.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116014486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensitive Network Architecture Algorithm based on LED Optical Wireless Communication 基于LED光无线通信的敏感网络架构算法
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702013
Tae-Gyu Lee
{"title":"Sensitive Network Architecture Algorithm based on LED Optical Wireless Communication","authors":"Tae-Gyu Lee","doi":"10.23919/ICACT.2019.8702013","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702013","url":null,"abstract":"Today LEDs are continuously expanding in accordance with domestic and overseas energy policies, and related visible light communication technologies are attracting attention. This study constructs a sensing communication mode together with a unidirectional communication mode and a bidirectional communication mode of LEDs. In particular, the sensing communication mode proposes a design that dynamically configures the sensing module to optimize the communication performance and quality according to the external environmental variables of the optical wireless communication. The performance evaluation environment is a room where indoor fluorescent light and outdoor natural light illuminate. Therefore, we describe the sensitive design and future research directions of indoor LED based wireless visible light communication system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of radio propagation models for LTE network on the sky train 天车上LTE网络无线电传播模型的比较分析
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702031
Arif Dataesatu, Pornpawit Boonsrimuang, K. Mori, P. Boonsrimuang
{"title":"Comparative analysis of radio propagation models for LTE network on the sky train","authors":"Arif Dataesatu, Pornpawit Boonsrimuang, K. Mori, P. Boonsrimuang","doi":"10.23919/ICACT.2019.8702031","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702031","url":null,"abstract":"The usage of smartphones and computer for the data communications have become a more integrated part of everyday life for a large majority of the population. One important mode of transportation is the sky train, and users increasingly expect to be able to communicate satisfyingly while traveling on the train: MRT (Mass Rapid Transit Authority of Thailand). However, the radio conditions inside a train are very complex. A possibly large number of users that use at the same time, moving at high speed and a special environment on elevated guideways (height 20 m) are created big challenges for the data communication in LTE network. The accuracy of the path loss model is a very important tool to design the coverage areas and improve the performance in LTE network. This paper that studies and improve the accuracy of the path loss model, which use to design the coverage area of the LTE network under the sky train environment. Normally the radio propagation models under the urban area are designed on the ground approximately 1-3 meters in height but are not suitable for the user in the sky train, which is 20 meters high. we propose the Ericsson urban model in the special environment as sky train by the new values for a0 from 36.2 to 47.2 and a1 from 30.2 to 14.2. The proposed new coefficient for Ericsson urban model shows the most accurate path loss under the sky train with the urban area. The filed measurement is used by the smartphone-based measurement for low cost and practical usage.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Invites Session 邀请会话
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/icact.2019.8701888
{"title":"Invites Session","authors":"","doi":"10.23919/icact.2019.8701888","DOIUrl":"https://doi.org/10.23919/icact.2019.8701888","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Governance of Digital Forensic Investigation in Law Enforcement Agencies 执法机构对数字法医调查的治理
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701995
Da-Yu Kao, Ni-Chen Wu, Fuching Tsai
{"title":"The Governance of Digital Forensic Investigation in Law Enforcement Agencies","authors":"Da-Yu Kao, Ni-Chen Wu, Fuching Tsai","doi":"10.23919/ICACT.2019.8701995","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701995","url":null,"abstract":"The volume of data for cybercrime investigation keeps growing at unprecedented rates and creating a quandary for law enforcement agencies. This brings a great challenge for law enforcement agencies. It requires the sincere examination of all available data volumes at crime scene or in lab to present digital evidence in a court of law. In order to maintain the integrity and validity of digital evidence, investigators must establish a process model that can provide a quick response at scene. This paper illustrates the novel TEAR-phase application of THOR dimensions to digital forensics. It facilitates the efficiency and effectiveness of constructing a clear investigation.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127181572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey 乌兹别克斯坦共和国移动银行的安全挑战和问题:一项最新调查
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701952
A. Abdullaev, M. Al-Absi, A. Al-Absi, M. Sain, Young-Sil Lee, H. Lee
{"title":"Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey","authors":"A. Abdullaev, M. Al-Absi, A. Al-Absi, M. Sain, Young-Sil Lee, H. Lee","doi":"10.23919/ICACT.2019.8701952","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701952","url":null,"abstract":"A mobile phone is a device that widespread technology that turns into a part of every person in the information era. Mobile banking is a framework that permits clients of a monetary organization to direct various budgetary exchanges through a cell phone, for example, a cell phone or personal digital assistant. For today, online banking is one of the modern tools, which allow banks to increase their profitability and increase their profitability client base. Recently, In Uzbekistan, a mobile banking service represents on a large scale and has become one of the latest services approached by commercial banks in Uzbekistan. Nowadays, Mobile banking is a subset of Mobile-services in Uzbekistan where all or almost of banks provide Internet banking service uses SSL encryption of data transmitted from the user's computer to the bank system and vice versa. Security measure allows users to exclude a previously common type of fraud. The main objective of this work is to classify and analyze the Security issues and challenges in Mobile banking in Uzbekistan.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信