Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, T. Han, K. Kwak
{"title":"Outage performance analysis of IHDAF cooperative based communication system","authors":"Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, T. Han, K. Kwak","doi":"10.23919/ICACT.2018.8323693","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323693","url":null,"abstract":"In this paper, we propose an incremental hybrid decode-amplify-forward (IHDAF) cooperative scheme based free space optical (FSO) communication system to resist the performance degradation caused by path loss, atmospheric turbulence, and pointing errors. The IHDAF cooperative FSO system can choose direct transmission, decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols flexibly according to the instantaneous channel state information (CSI) and signal-to-noise ratio (SNR). The outage probability analysis of the IHDAF cooperative FSO system is also presented in the weak turbulence channel with pointing errors. Numerical results show that the proposed IHDAF cooperative FSO system improves the system performance compared with the other conventional cooperative FSO systems. Moreover, we also study the effects of the power allocation and the relay position on the system performance of the proposed IHDAF cooperative FSO system.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Na Wang, Yingge Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang
{"title":"An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test system","authors":"Na Wang, Yingge Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang","doi":"10.23919/ICACT.2018.8323667","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323667","url":null,"abstract":"Nowadays, RFID (Radio Frequency Identification) technology is widely used in logistics management, tolling system as well as authorization management. But either the performance of reader or tag is the largest influence factor in RFID systems compared with other components, so this paper mainly works on how to calculate tag phase and amplitude by signal with CFO that have an obvious influence on signal. This paper propose, an algorithm reducing influence CFO and carrier frequency drift have based on RFID protocol conformance test system and RFID signal analysis system. We find the change of signal with statistical idea and piecewise linear fitting to solve CFO. The difficulty is how to pinpoint location where rate of change changes and locate the start and end of signal. We use rate of change of tag phase and tag amplitude to separate tag signal to correct it, and we use cluster to get center points of signal to calculate tag phase. This algorithm has been used in our system. In this paper, we finished segmentation of signal and analysis of signal. To separate tag signal and reader signal more accurately, we filter signal firstly and then use state transition model. We calculate the value of carrier roughly with simple cluster firstly. Then we start work with state transition model. Finally, we get right location of reader signal and tag signal. And we introduce how to get the phase and amplitude of 18000-6C tag signal and 18000-6B tag signal. We analysis the influence on 18000-6c signal and 18000-6B that CFO and frequency drift have, and propose algorithms for different protocol. We get that 18000-6b IQ signals approximately periodic, but period is a little fluctuate. We use statistical idea to find the period accurately and use fitting curve to fit the change of phase. We get that tag-phase of 18000-6C signal increased linearly in a symbol. So with 18000-6c signal, we adopt piecewise linear fitting not linear regression in a whole of tag signal. After we modify the phase and then we get the correct tag amplitude and tag phase.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QAT: Evaluation of a dedicated hardware accelerator for high performance web service","authors":"Shuai Xue, Liu Yao, Zhangkai Wang","doi":"10.23919/ICACT.2018.8323723","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323723","url":null,"abstract":"Security is increasingly becoming a vital necessity for web service. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that are used to provide confidentiality and data integrity between two applications. SSL/TLS has been widely integrated into web service applications. However, the heavy overhead that is brought by frequent encryption and decryption operations in SSL/TLS has terribly burden the CPU. To address this issue, various vendors and researchers focused on developing new alternatives, such as GPU-based and FPGA-based accelerators. Unfortunately, expensive development cost and time cost seriously restrict their deployment in web servers. In this paper, we present and evaluate an emerging dedicated hardware accelerator named Quick Assist Technology(QAT). We analyse and explain the QAT's asynchronous working mode and how it cooperates with OpenSSL and Nginx server. The experimental results show that the dedicated hardware accelerator can speed up the number of connections by 10x comparing to the traditional software ways.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim
{"title":"Video scene title generation based on explicit and implicit relations among caption words","authors":"Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim","doi":"10.23919/ICACT.2018.8323835","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323835","url":null,"abstract":"Titles of videos are the most important aspect to provide various services. Recently, scene based or video fragments based services have been launched. Since videos in such services are often automatically generated by segmenting a video, these contents cannot have their own titles. As a result, titles of the video fragments are annotated by human hands. To reduce the cost for manual annotation of video titles, this paper proposes a novel method to generate titles of videos by selecting informative sentences from closed captions. The proposed method utilizes explicit and implicit relations among words occurred in closed captions by constructing a stochastic matrix. And then, the proposed method picks important words up based on their weights estimated with TextRank. A title is generated by selecting a sentence with important words from closed captions. Experimental results shows several cases with well-known Korean TV programs.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless identifying system based on nano-tags","authors":"Mikhail Blinnikov, R. Pirmagomedov","doi":"10.23919/ICACT.2018.8323909","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323909","url":null,"abstract":"Currently quite a lot of attention is paid to research in the field of Nano Communications. The use of nanomachines leads to improvement of existing applications. Example of such applications is wireless identifying system based on nano-tags. This article considers system that identifying items using passive nano-tags (harvesting energy from external electromagnetic waves). The article also considers the use THz band to transmit data and the numerical estimation of communication channel characteristics for the first “window of transparency”.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teerawut Banchuen, Kiattikun Kawila, K. Rojviboonchai
{"title":"An SDN framework for video conference in inter-domain network","authors":"Teerawut Banchuen, Kiattikun Kawila, K. Rojviboonchai","doi":"10.23919/ICACT.2018.8323847","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323847","url":null,"abstract":"Video conference is the most popular application which is required high quality of service (QoS) such as delay and jitter. Several existing mechanisms for enhancing were proposed in the traditional network not only at the application side as video clients but also at the network core as network routers. Although, these mechanisms can provide a good quality of service, they require a lot of maintenance cost. In addition, the static routing with the shortest-path fashion at the network gateways is not enough to provide a high quality of service for video/audio data transferring due to the affectation of background traffic. Software Defined Network (SDN) is an emerging network architecture that allows a network operator to manage their network environment by programmable centralized control. This not only reduces the cost of maintenance but also increase the performance of networking. In this paper, we proposed an SDN framework for video conference in inter-domain network. The framework used the Packet Pair technique to consider the characteristics of bandwidth and end-to-end delay between two video conference clients. A transferring path and network gateway inside-domain are set up based on this information without a requirement of a routing modification of outside-domains. The evaluation results from Mininet emulator and OF@TEIN testbed show that our framework outperforms the traditional networking significantly in terms of QoS metrics.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical traffic generation methods for urban traffic simulation","authors":"Hye-Su Song, Okgee Min","doi":"10.23919/ICACT.2018.8323711","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323711","url":null,"abstract":"The urban traffic analysis is an important issue in government strategies, and there are diverse researches to address urban traffic states including congestion states. In this paper, we focus on the traffic simulation technology of various methods to analyse urban traffic states. Especially, traffic demand estimation and generation is one of key functions for simulation results to reflect real urban traffic states well. Thus, we propose the traffic demand estimation process for urban traffic simulation using trip estimation model based on L1 regularized regression model and learning the trip estimation model with trajectory data in this paper. Also, we apply the traffic demand estimation process to a case of Gangdong-gu, Seoul. Finally, we show the estimation results and simulation results by the SALT Traffic Simulator based on SUMO (Simulation of Urban MObility), so that the estimated trips are similar to real traffic patterns and the simulation results from estimated trips is within about 10% errors coverage.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper","authors":"Tran Dinh Hieu, Tran Trung Duy, S. Choi","doi":"10.23919/ICACT.2018.8323741","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323741","url":null,"abstract":"This paper proposes a path-selection protocol to enhance outage performance for harvest-to-transmit (HT) multi-hop cooperative cognitive radio networks. In the proposed protocol, one of available paths between a secondary source and a secondary destination is chosen to send the source data to the destination. The source and relays on the selected path must harvest energy from the radio frequency (RF) signals of ambient beacons for the data transmission. Under the presence of a primary user (PU) and a secondary eavesdropper (E), these transmitting nodes also have to adjust their transmit power to satisfy an interference constraint given by PU as well as to against eavesdropping attacks from E. For performance evaluation, we derive exact and asymptotic closed-form expressions of end-to-end outage probability (OP) for the proposed scheme over Rayleigh fading channel. Monte Carlo simulations are then performed to validate the theoretical derivations.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim
{"title":"IoT security vulnerability: A case study of a Web camera","authors":"Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim","doi":"10.23919/ICACT.2018.8323685","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323685","url":null,"abstract":"The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PCA-based method for IoT network traffic anomaly detection","authors":"Dang-Hai Hoang, H. Nguyen","doi":"10.23919/ICACT.2018.8323765","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323765","url":null,"abstract":"Network operators need effective tools to quickly detect anomalies in traffic data for identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT (Internet of Things) networks is becoming a challenge task due to limited network resources and performance. Comprehensive detection methods are no longer effective for IoT networks, calling for developing lightweight solutions. Methods using Principal Component Analysis (PCA) is an attractive approach due to complexity reduction. Anomaly detection techniques based on PCA received a lot of attention in the past. However, there are remaining issues by applying PCA such as the choice of principal components for complexity reduction. This paper investigates PCA techniques used in previous typical research works and proposes a new general formula for distance calculation and a new detection method based on PCA for IoT networks. The paper investigates formula parameters using several experiments. Results indicated that our new method is suitable for quick detection of network traffic anomalies with lower complexity.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}