Pitchaya Boontra, Tanairat Mata, Arif Dataesatu, K. Mori, P. Boonsrimuang
{"title":"A PAPR Reduction for FBMC-OQAM Signals using ABC-OPTS Scheme","authors":"Pitchaya Boontra, Tanairat Mata, Arif Dataesatu, K. Mori, P. Boonsrimuang","doi":"10.23919/ICACT.2019.8702051","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702051","url":null,"abstract":"Partial Transmit Sequence (PTS) scheme has been applied to the OFDM signal for solving the high PAPR problem which can achieve better PAPR performance. However, because of the structure of the FBMC-OQAM signal which is different from the OFDM signal, the PTS scheme is not suitable for the FBMC-OQAM signal. For this reason, this paper considers the PAPR reduction for FBMC-OQAM signal. This paper proposes an overlapped PTS (OPTS) with Artificial Bee Colony (ABC) algorithm. The silent features are to improve the PAPR by modifying the PTS scheme as OPTS scheme and less computational complexity in the PAPR optimization process by using the ABC algorithm. The PAPR reduction effectiveness of the proposed method has been confirmed by the simulation results in the paper.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PDSI-based Static Route Online Configuration Method for QualNet Simulator","authors":"Huibo Li, Peng Gong, Yu Liu, Guoli Li, Dan Shan","doi":"10.23919/ICACT.2019.8702004","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702004","url":null,"abstract":"Network simulation has been widely utilized to test the rationality and reliability of the network protocols and models before practical implementation. Among the testing and experiments, data transmission based on the static routing protocol is inevitable and a huge repetitive works of static routing pre-setting are needed, especially for the case of large scale networks. In this paper, together with programmable dynamic simulation interface (PDSI), a static route online configuration method for QualNet simulator has been proposed, which allows users to configure static routes through the graphical interface (GUI) during the simulation process. After receiving the online configuration messages, QualNet will parse them, and then update the routing tables according to the time labels as well as the routing parameters. Experiment results demonstrate that the proposed approach is effective and the static routes can be successfully added and removed during the simulations.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jihyun Seo, J. Sa, Younchang Choi, Yongwha Chung, Daihee Park, Hakjae Kim
{"title":"A YOLO-based Separation of Touching-Pigs for Smart Pig Farm Applications","authors":"Jihyun Seo, J. Sa, Younchang Choi, Yongwha Chung, Daihee Park, Hakjae Kim","doi":"10.23919/ICACT.2019.8701968","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701968","url":null,"abstract":"For specific livestock such as pigs in a pigsty, many surveillance applications have been reported to consider their health for efficient livestock management. For pig surveillance applications, separating touching-pigs in real-time is an important issue for a final goal of 24-hour tracking of individual pigs. Although convolutional neural network (CNN)-based instance segmentation techniques can be applied to this separation problem, their collective performance of accuracy-time may not satisfy the required performance. In this study, we improve the collective performance of accuracy-time by combining the fastest CNN-based object detection technique (i.e., You Only Look Once, YOLO) with image processing techniques. We first apply image processing techniques to detect touching-pigs by using both infrared and depth information acquired from an Intel RealSense camera, then apply YOLO to separate the touching-pigs. Especially, in using YOLO as an object detector, we consider the target object as the boundary region of the touching-pigs, rather than the individual pigs of the touching-pigs. Finally, we apply image processing techniques to determine the final boundary line from the YOLO output. Our experimental results show that this method is effective to separate touching-pigs in terms of the collective performance of accuracy-time, compared to the recently reported CNN-based instance segmentation technique.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kenzhina, I. Kalysh, Ikechi Augustine Ukaegbu, Sivanand K. Nunna
{"title":"Virtual Power Plant in Industry 4.0: The Strategic Planning of Emerging Virtual Power Plant in Kazakhstan","authors":"M. Kenzhina, I. Kalysh, Ikechi Augustine Ukaegbu, Sivanand K. Nunna","doi":"10.23919/ICACT.2019.8701989","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701989","url":null,"abstract":"Today, in the era of Industry 4.0 with total automation of the cloud data bus and domestic energy production the concept of the Virtual Power Plant (VPP) is entering global power sector to facilitate the integration and management of distributed power units relying on real-time communication and uniform control. The motivation behind VPP is to solve a problem of variable profile and uncertainty of power generated by DG units that is found to be challenging when building reliable DG-aided power plant. This paper aims to propose the potential location for the VPP in Kazakhstan and to recommend roadmap planning for its realization based on the results and estimates conducted in the scope of simulations. It was revealed that there is promising possibility to locate VPP on the territory of South Kazakhstan, Jambyl and Almaty regions due to concentration of high capacity renewable energy plants and efficient operation of Energy Management System (EMS) revealed from the simulation results. Emergence of the VPP may contribute to further development of the renewable power grid provided financial aid to facilitate technologies and to promote the prosumer status of households is attracted.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing WannaCry Ransomware Considering the Weapons and Exploits","authors":"Da-Yu Kao, Shou-Ching Hsiao, R. Tso","doi":"10.23919/ICACT.2019.8702049","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702049","url":null,"abstract":"As ransomware has increased in popularity, its creators are using our fears to their advantage. The rapid proliferation of ransomware attacks indicates the growing tendency of ransomware-as-a-service (RaaS) and the integration of hacking weapons. This paper presents the analysis of the infamous WannaCry ransomware, which is one of the most propagated and damaging malware in 2017. The anatomy of ransomware attacks is discussed to understand the multi-phased execution of WannaCry, including the deployment, installation, destruction, and command-and-control. The chain of WannaCry’s execution comprises several hacking weapon components. WannaCry not only embeds the binary in the resource section for multi-phased execution, but also implements a strong encrypting algorithm and a key structure. A reverse engineering analysis of each component, along with the network analysis of WannaCry’s exploits offers an insight into the inner design of WannaCry. The observations of this research contribute to recent security systems and future defense strategies.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of PingPong-128 Countermeasure against Power Analysis Attack","authors":"Young Jin Kang, Ki-Hwan Kim, H. Lee","doi":"10.23919/ICACT.2019.8702026","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702026","url":null,"abstract":"Typical power analysis attack countermeasures include the ability to inject defensive logic during the hardware gate design phase, or to add additional hardware logic or software coding depending on how the cryptographic module is configured. For example, the Hardware-based high speed cryptographic module via FPGA can be protected with a gate array logic, and the firmware cryptographic module via the microprocessor module will allow you to implement defence technology with software coding. In this paper, Using Scrambler to propose a secure PingPong-128 crypto algorithm for power analysis attacks.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fabrication of 53 Gb/s Optical Transceiver over 40-km transmission with PAM4 modulation","authors":"Sang-Moon Shin, Hong-Beom Kim, Jae-Woo Kim","doi":"10.23919/ICACT.2019.8701945","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701945","url":null,"abstract":"In this paper, we present a QSFP28 optical transceiver to transmit 53 Gb/s PAM-4 modulated signal over 40-km SMF(Single Mode Fiber) by applying EML TOSA and low cost PIN-PD ROSA combination. The Tx OMA power is 7.5 dBm at room temperature and the OMA receiver sensitivity is measured of −12.6 dBm. Fabricated transceiver reaches up to 55-km SMF with power consumption of less than 3.5W.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126787924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Create a Network Slice? - A 5G Core Network Perspective","authors":"Wangbong Lee, Taeheum Na, Jeongyun Kim","doi":"10.23919/ICACT.2019.8701936","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701936","url":null,"abstract":"Initially, the 5G system architecture is required with very diverse and extreme requirements. These requirements related with four main mega trends. Those are the explosion of date traffic, the rapid increase of number of devices, the increase of cloud’s dependency, and the advent of new various mobile converged services. Mobile business stake holders define three categories of services and their characteristics such as eMBB (enhanced Mobile Broadband), mMTC (massive Machine Type Communications) and URLLC (Ultra-Reliable and Low Latency Communications). To support these services, KPIs (Key Performance Index) such as user experience data rate, peak data rate, mobility, latency, connection density, energy efficiency, spectrum efficiency, and traffic volume density are elicited. With these KPIs and service scenarios, 3gpp working groups has been studied requirements, standards, and use cases for the 5G system. To support these 5G’s requirements, a network slicing technology is required. Network Slicing provides multiple logical networks on top of a partially shared network infrastructure. Each instance of a network slice represents an independent end-to-end network that allows deployment of different architectural flavours in parallel slices. This paper proposes an architecture for the network slicing in 5G communication system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byeongnam Yoon, Dinh-Lam Pham, Pham Hai Son, Pham Thanh Dat, Do Van Thien, V. Vu, Hong-Quan Do, Nang-Toan Do
{"title":"A Study on EA based IT Governance","authors":"Byeongnam Yoon, Dinh-Lam Pham, Pham Hai Son, Pham Thanh Dat, Do Van Thien, V. Vu, Hong-Quan Do, Nang-Toan Do","doi":"10.23919/ICACT.2019.8701962","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701962","url":null,"abstract":"In this paper, we propose the Enterprise Architecture (EA) based IT governance. Because of huge size of government organizations, and complexity and many various kinds of tasks, services, and businesses, the architectural design work method for their information systems is too complicated to understand. Thus, so many misunderstandings and problems occur naturally like interoperability problem, duplicate development, waste time and budget, security, etc. To solve this problem, we raise up the EA based IT governance, and probe it systematically. we show down the clear concept definition of EA perspectives of all stakeholders involving digital Government, and EA views of performance architecture, business architecture, application architecture, data architecture, technology infrastructure, and security architecture together with analysing EA Functionality, EA framework, reference models of leading countries EA deployment strategy, EA development work method, artifacts of EA development, and IT governance.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabit Shaiholla, A. Bekov, Ikechi Augustine Ukaegbu
{"title":"Industry 4.0: Redefining Manufacturing in Kazakhstan","authors":"Sabit Shaiholla, A. Bekov, Ikechi Augustine Ukaegbu","doi":"10.23919/ICACT.2019.8701937","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701937","url":null,"abstract":"The paper analyzes and compares the level of implementation of Industry 4.0 associated technologies in Europe and Kazakhstan. Additionally, possible model of development of manufacturing and implementation of Industry 4.0 technologies in Kazakhstan manufacturing is proposed. The main aim of this project is to define current state of industrial progress in manufacturing in Kazakhstan and compare it with European model. Underlying objective is to propose the model to implement Industry 4.0 in manufacturing in Kazakhstan. As a result, it has been shown that about 80% of manufacturing enterprise in Kazakhstan is on the level of industry 2.0, 17% of the enterprise is on the transitional state between Industry 2.0 and Industry 3.0 and only 3% of all the enterprise is on the level of Industry 3.0. On the other side it can be stated that Europe and particularly Germany shows adequate progress of implementation of Industry 4.0 associated technologies in manufacturing process. Moreover, there are good examples of companies implementing Industry 4.0 associated technologies in manufacturing in Europe shown. So, this paper shows that there is a significant gap in manufacturing process technologies between European and Kazakhstan model, therefore before considering application of European model to Kazakhstan manufacturing process some actions to improve state of manufacturing process in Kazakhstan should be taken.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130333894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}