{"title":"Design of a 2.4 GHz high-performance mixer with current bleeding topology","authors":"W. Lee, K. Tsang","doi":"10.23919/ICACT.2018.8323659","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323659","url":null,"abstract":"The important characteristics of a mixer including high conversion gain, low noise, high dynamic range, low third-order intermodulation distortion and low unwanted leakage signals between ports have reconsidered. A double balanced Gilbert-cell with a class-A amplifier bleeding mixer (DBGC CAAB mixer) is designed and implemented. The voltage gain of 14 dB at class-A amplifier is used to magnifier the local oscillator (LO) signal. Current of class-A amplifier is injected into the Gibert mixer as a bleeding current to improve the performance of the trans-conductor stage. The DBGC CAAB mixer achieves a conversion gain of 17.5 dB at −14 dBm LO power, and the noise figure is suppressed from 45 dB to 10.7 dB. It is important to stress that the new configuration has a third-order intermodulation (HP3) at −9 dBm which is considered to be insignificant. The DBGC CAAB mixer is implemented by using 0.18-μm RFCMOS technology and operates at the 2.4 GHz ISM application with 10 MHz intermediate frequency. The power consumption is 12 mA at 1.5 V supply voltage.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi
{"title":"The real-time session inspection method using heartbeat signal","authors":"Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi","doi":"10.23919/ICACT.2018.8323721","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323721","url":null,"abstract":"In this paper, we present how to store the session information from the Heartbeat signal, which is generated at regular intervals during the network session, in real packet analysis tools. Since the existing session information retrieval method checks the session information at the end of the session, information cannot be confirmed in the case of an active session. To verify the information of the active session, this paper utilizes the heartbeat signal generated by the session every certain period. By analyzing active session information, it is possible to analyze information about flows and packets in a session in real time.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"76 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang
{"title":"Channel measurements and characterizations for automobile factory environments","authors":"Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang","doi":"10.23919/ICACT.2018.8323707","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323707","url":null,"abstract":"There is tremendous hype around the Internet of Things, and particularly in the industrial realm (the industrial Internet of Things, IIoT), where many expect to find the biggest opportunity in the near term. The IIoT is also an important application in the fifth generation of wireless communications. In this paper, the channel propagations are investigated based on the realistic measurement data in an automobile factory. The path loss model is extracted using Least Square (LS) method, and the K factor is also parameterized. Meanwhile, the time delay (root mean squared delay) and the amount of multipath component (MPC)s are investigated and compared with typical propagation results. These results are beneficial and informative when designing wireless networks for IIoT.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi
{"title":"Protecting end-device from replay attack on LoRaWAN","authors":"WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi","doi":"10.23919/ICACT.2018.8323683","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323683","url":null,"abstract":"In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G framework based on multi-level edge computing with D2D enabled communication","authors":"Abdelhamied A. Ateya, A. Muthanna, A. Koucheryavy","doi":"10.23919/ICACT.2018.8323811","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323811","url":null,"abstract":"There is no doubt that the release of the fifth generation of the mobile cellular system (5G) becomes a great demand year by year, especially with the massive increase of heterogeneous Wireless devices. The 5G network will be a platform for wide variety of industries. Designing of 5G cellular system faces various challenges related to the capacity and traffic. One way to solve these challenges is to employ device-to-device (D2D) communication and mobile edge computing (MEC). Employing these technologies offload the core network and increase the capacity of the system. In this work, we propose a frame work for the 5G cellular system based on D2D communication and multi-level cloud units employed at the edge of the cellular network. The system employs four levels of cloud units with various hardware capabilities. The D2D communication is used as the communication technology in the first level of clouds. Employing D2D together with multi-level edge cloud units achieves varies benefits to the system as the system level simulation provides.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133675619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang
{"title":"Study on multi-network traffic modeling in distribution communication network access service","authors":"Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang","doi":"10.23919/ICACT.2018.8323895","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323895","url":null,"abstract":"Network traffic model is the basis for network performance analysis, dynamic allocation of network bandwidth and network planning and construction. A good traffic model and prediction method is great significance for the design of a new generation of network protocols, network management and diagnosis, design of high performance routers, load balancers Network hardware equipment and improving the quality of the network services. With the construction of energy smart grid, especially in the distribution network is particularly evident. Increasing the variety of electrical equipment, which make distribution and communication network structure more complex and changeable, including a variety of communication systems, more Equipment, a larger scale and communication traffic characteristics. It can cause a great impact on the backbone network capacity. Considering the reliability and security of the power grid, this paper analyzes the characteristics of conventional traffic model based on the traffic characteristics of the distribution network and establishes a multi-convergence traffic prediction model to be used in the distribution network to improve the accuracy of network traffic prediction. Provide a reliable theoretical basis.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient partitioner for distributed OLTP DBMS","authors":"Wenkang Chen","doi":"10.23919/ICACT.2018.8323697","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323697","url":null,"abstract":"Distributed online transaction processing (OLTP) database management systems (DBMS) are characterized with ACID properties, that is atomicity, consistency, isolation, durability. However, these OLTP DBMSs that handle massive data schema, need to be scalable that cannot give up strong transactional and consistency requirements. The large-scale schemas are deployed on distributed server and each server's memory is limited, in that case, how this system partition is the key factor to affect its performance. In this paper, we present a partition approach, that applies to general schema and taking care of load balancing and distributed transaction rates. Our method achieve this by periodically update the partition plan and migration hot data among the servers. OLTP workload are modeled as a graph and using a graph partition algorithm to partition set of data into same server that are often co-accessed by one transaction. To evaluate our method, our framework Assort is integrated into a distributed, main-memory DBMS and shows that it can partition schema in OLTP DBMS and enable the system to outperformance traditional method 3–4x throughput.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare
{"title":"Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses","authors":"Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare","doi":"10.23919/ICACT.2018.8323867","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323867","url":null,"abstract":"There is little data on the Iranian nurses' level of satisfaction with Hospital Information System implementation in university hospitals. The aims of this study were:1) To determine the reliability and validity of factors which can affect the successful implementation of Hospital Information System for nursing staff 2) and use them to propose a new implementation success model.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123504506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee
{"title":"Obstacles effects on signal attenuation in line of sight for different environments in V2V communication","authors":"M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee","doi":"10.23919/ICACT.2018.8323629","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323629","url":null,"abstract":"In Vanet, Secure and Smart Intelligent Transport System (SSITS) support both safety and non-safety applications in terms of throughput and collision performance. In vehicle to vehicle (V2V) communication, the network should provide a good throughput and should reduce collision. To provide an efficient throughput for V2V communication under different environments (such as City, Highway, and Rural), a good radio propagation model is required in order to support the real-time implementation. The existing radio propagation path loss models for V2V network adopt mean additional attenuation sophisticated obstacle fading model such as Nakagami, Log normal and so on. These models do not consider the effects of the vehicle in modeling LOS among transmitter and receiver and also do not consider evaluation under different environments. The presence of Line of sight (LOS) component (such as reflection or diffraction) requires the amplification of signal or power. Due to this, here we present an efficient radio propagation path loss model considering the obstacle in LOS (vehicle) under different environmental conditions in the presence of LOS. The experiments are conducted to evaluate the performance of the proposed model in terms of throughput and collision considering a varied number of vehicles under City, Highway and rural environments. The result shows that the proposed model is efficient considering varied density.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123771737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic analysis of network packets from penetration test toolkits","authors":"Da-Yu Kao, Yu-Siang Wang, Fuching Tsai, Chien-Hung Chen","doi":"10.23919/ICACT.2018.8323757","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323757","url":null,"abstract":"Cyber-attacks are likely to continue to increase in size and frequency. As attackers get smarter than before, so do efforts made to protect against unwanted data theft. The purpose of this paper is to look for unusual patterns by repeatable experiments among the constant buzz of network packets that make up PT activities. The utilization of different PT toolkits, like Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner, and Path Analyzer Pro, facilitates cyber-attackers to bring down online system. It is capable of discerning network traffic on the vast streams of network information available through the connected machines from the following three phases: data collection, data reduction, and data analysis. Network forensics can aid in detecting attack behavior. This paper accommodates real-time evidence collection as a network feature against attackers. The identification of unusual patterns in network packets has been put to use in the ongoing battle to stay one step ahead of malicious hackers, who could be anyone from disgruntled customers to nation states. This approach can be easily deployed and should be applicable to any type of network-based assessment.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"59 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124277530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}