{"title":"Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system","authors":"O. Wojuola","doi":"10.23919/ICACT.2018.8323913","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323913","url":null,"abstract":"Spread-spectrum system is a well-researched topic in literature. However, the system loading capacity with respect to its spreading codes is not well known. In this paper, a technique for determining the loading capacity is developed by the author. The concept of cross-correlation index is first introduced for the codes. Using this concept, a technique for predicting the system loading capacity is then developed for a set of Gold codes. This work involves the proposal of a mathematical model for the cross-correlation index, and the use of the same for the prediction of the loading capacity and system bit-error-rate performance. The model was tested for various set of Gold codes. Results for a set of 255-chip Gold codes are presented here. The results show that the codes have the capacity to support a maximum of about 15 users, above which bit-error-rate increases rapidly, ultimately resulting in emergence of error floor. The point at which the cross-correlation index equals to auto-correlation index marks the turning point around which the system performance revolves.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TSSA: A two step scheduling algorithm for the event-driven clusters","authors":"Yu Chen, Mingming Sun","doi":"10.23919/ICACT.2018.8323689","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323689","url":null,"abstract":"The event-driven programming model has been proposed to efficiently process iterative applications and incremental applications. In clusters based the event-driven model, applications are structured as a series of short triggers, each of which will be invoked when associate events are trigged. And framework assigns a newly submitted trigger to a node where the relevant datasets set. Unfortunately it may lead to load imbalance because associate events may occur by chance. Numerous triggers in a node may be simultaneously invoked but other nodes have no triggers running. To the end, we provide TSSA, a new two steps event-driven for the event-driven clusters to maximize improve the utilization of node resources. Our results indicate TSSA performs well, and minimizes total execution time of applications.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development trend of insider anomaly detection system","authors":"Minkyu Kim, Kihwan Kim, Hoonjae Lee","doi":"10.23919/ICACT.2018.8323761","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323761","url":null,"abstract":"Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods to detect people's abnormal behaviour. This paper surveys trends and forecasts of the intrusion detection techniques by categorizing into basic software and machine learning technique.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General labelled data generator framework for network machine learning","authors":"Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han","doi":"10.23919/ICACT.2018.8323669","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323669","url":null,"abstract":"Artificial Intelligence (AI) technology has made remarkable achievements in various fields. Especially, deep learning technology that is the representative technology of AI, showed high accuracy in speech recognition, image recognition, pattern recognition, natural language processing and translation. In addition, there are many interesting research results such as art, literature and music that cannot be distinguished whether it was made by human or AI. In the field of networks, attempts to solve problems that have not been able to be solved or complex problems using AI have started to become a global trend. However, there is a lack of data sets to apply machine learning to the network and it is difficult to know network problem to solve. So far, there have been a lot of efforts to study network machine learning, but there are few studies to make a necessary dataset. In this paper, we introduce basic network machine learning technology and propose a method to easily generate data for network machine learning. Based on the data generation framework proposed in this paper, the results of automatic generation of labelled data and the results of learning and inferencing from the corresponding dataset are also provided.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"5 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang
{"title":"PAPR reduction in FBMC-OQAM signals with half complexity of trellis-based SLM","authors":"Panya Jirajaracheep, Sunisa Sanpan, Pornpawit Boonsrimuang, P. Boonsrimuang","doi":"10.23919/ICACT.2018.8323623","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323623","url":null,"abstract":"The filter Bank Multicarrier (FBMC) modulation with offset-QAM (OQAM) has attracted attention as a major candidate for future wireless communication systems which has several advantages. A disadvantage of FBMC-OQAM is high peak-to-average power ratio (PAPR). To overcome this problem, the trellis-based SLM technique is employed and achieved a much better PAPR reduction performance. However, The Trellis-based algorithm has also the intrinsic disadvantage of high computational complexity, to decreasing the complexity will make the system more desirable. This paper proposes the half-complexity algorithm for trellis-based SLM scheme which achieves lower computational complexity when compared to trellis-based SLM scheme with small degradation of PAPR reduction performance. From various simulation results, the proposed algorithm shows less computational complexity about 50% compared to the trellis-based algorithm with similar PAPR reduction performance.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced LTE network deployment methodology: A case study for Dakar region","authors":"Antoine Gnansounou, S. Ouya, Raimy Abd. Toure","doi":"10.23919/ICACT.2018.8323819","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323819","url":null,"abstract":"This work describes the dimensioning process of LTE access network for an ISP, its models, methods and the tool used to dimension the network. LTE is a system with larger bandwidths (up to 20 MHz), low latency and Packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink. Radio access technology for LTE is OFDM (Orthogonal frequency division multiplexing) that provides higher spectral efficiency and more robustness against mulitpath and fading, as compared to CDMA (Code division multiple access). In order to offer the operators increased flexibility in network deployment, the LTE system supports bandwidth scalability and both FDD and TDD duplexing methods. The main objectives of our research was the identification of LTE features relevant for the dimensioning, to define the basic models for Access Network Dimensioning to estimate Coverage needs of the infrastructure, the Network Element Count Estimation and the Capacity Evaluation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of digital optical D flip flop based on photonic micro-ring resonator","authors":"Law Foo Kui, M. R. Uddin","doi":"10.23919/ICACT.2018.8323855","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323855","url":null,"abstract":"In this paper, we demonstrated an optical D-type flip-flop based on the electro optic switching effect of silicon microring resonator. The operation of the flip flop has been verified by simulation using a clock signal of 10 Gbps and data signal of 1 Gbps. The results of the proposed flip-flop have been presented by the timing diagrams.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS","authors":"Nishat I. Mowla, Inshil Doh, K. Chae","doi":"10.23919/ICACT.2018.8323645","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323645","url":null,"abstract":"Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. Simultaneously various spoofing approaches have also been developed over time, which are capable of failing traditional biometric detection systems. Image synthesis with play-doh, gelatin, ecoflex etc. are some of the ways used in spoofing bio-identifiable property. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. This is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. Therefore, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-identifiable modality spoofing. Our proposal is verified on real dataset, LiveDet 2015, with a focus on fingerprint modality spoofing detection that can be used for authentication in Medical Cyber Physical Systems (MCPS).","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The dynamic analysis of WannaCry ransomware","authors":"Da-Yu Kao, Shou-Ching Hsiao","doi":"10.23919/ICACT.2018.8323679","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323679","url":null,"abstract":"The global ransomware cyberattacks cripples the national hospital system across the United Kingdom, and causes waves of appointments and operations to be cancelled. Similar attacking methods have come to sweep over the world. Such trend of highprofile cyberattack sheds the lights on rapid defence through the malware information sharing platform. A complete malware analysis process is quite a time-consuming campaign. The dynamic analysis of WannaCry ransomware explores behavioural indicators and extracts important IOCs (Indicators of Compromise). Utilizing Yara tool to create customized patterns is useful for malware information sharing mechanism. Also, such mechanism help reduce time and human resource spent on detecting or finding similar malware families. We aim to generate effective cyber threat intelligence by formulating collected IOCs into structured formations. The positive effects show on immediate defensive response to security breaches, and meanwhile the integrated information security protection is consolidated.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam
{"title":"Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink","authors":"Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam","doi":"10.23919/ICACT.2018.8323665","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323665","url":null,"abstract":"The issues related to energy consumption and prolonging the lifetime of wireless sensor networks(WSNs) have been studied. The deployment of a transceiver station in a WSN is a major concern. Supposing the base stations are static (fixed), however they are capable of moving in some situations to collect data from sensor nodes. In order to achieve higher energy efficiency results, the mobility of the base station to increase the lifetime of the WSN is considered in this article. We propose a strategy that combines moving sinks by fixed-path sink with fuzzy clustering algorithm that results the proposed algorithm has better performance in terms of network life, stability and packet delivery compared to Leach, Cluster Head Election mechanism using Fuzzy logic (CHEF) in performance evaluation through simulation software MATLAB.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"55 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}