2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authentication 基于Android的高级考勤系统采用无线网络融合生物识别指纹认证
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323701
H. Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman
{"title":"Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authentication","authors":"H. Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman","doi":"10.23919/ICACT.2018.8323701","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323701","url":null,"abstract":"In this digital era, different organizations have started taking attendance using biometric fingerprint authentication. This will keep the track of employee's attendance but the question arises if the employee is fully present at his/her workplace after giving attendance. In this modern era of digitalization, it is seen that after giving attendance a huge number of employees escape away from their workplace and do their personal job in the office time. This paper focuses on a smart attendance system where an android device will be used as a smart ID card. A mobile application is developed in Java to ensure the attendance of an individual employee using bio-metric fingerprint authentication. In addition, the entire working place will be a Wi-Fi zone. So, the connection or disconnection of the android device (Smart ID card) to the router will determine whether an employee is present in the working place or not. A counter will be there into the system to count the total amount of time an employee spends in the working place.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Protocols and use cases for media independent management in SDN-based wireless access networks 基于sdn的无线接入网络中媒体独立管理的协议和用例
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323745
Hyeong-Ho Lee, Yun Chul Choi, B. Ahn, J. Choi
{"title":"Protocols and use cases for media independent management in SDN-based wireless access networks","authors":"Hyeong-Ho Lee, Yun Chul Choi, B. Ahn, J. Choi","doi":"10.23919/ICACT.2018.8323745","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323745","url":null,"abstract":"This paper presents protocol messages, signalling procedures, and use cases for Media Independent Management (MIM) in Software-Defined Networking (SDN)-based wireless access networks. MIM control framework allows to control and to acquire information in a media independent way through a generic interface between higher layers and existing media-specific link layers. Focusing on tightly-coupled integration between SDN and MIM control planes, this paper describes signalling architecture, protocol messages, high-level signalling procedures for resource management and seamless handover, and three use cases of MIM in SDN-based heterogeneous wireless access networks.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low-complexity practical energy saving algorithm for real dense wireless scenario 面向真实密集无线场景的低复杂度实用节能算法
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323917
Fei Ding, Ye Wang, E. Tong, Zhiwen Pan, Xiao-hu You
{"title":"A low-complexity practical energy saving algorithm for real dense wireless scenario","authors":"Fei Ding, Ye Wang, E. Tong, Zhiwen Pan, Xiao-hu You","doi":"10.23919/ICACT.2018.8323917","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323917","url":null,"abstract":"In this paper, a low-complexity practical energy saving algorithm by switching off/on some eNBs in a real dense urban scenario considering historical and real-time eNB load is proposed. First, eNBs are ranked according to their loads in an ascending order and the first eNB in the list with load decreasing and smaller than a low threshold is pre-selected as target switching off cell. Then, the effect of the target switching off eNB on neighbour eNBs is evaluated. The target eNB switches-off while the load of neighbour eNBs after the eNB switches off is smaller than another threshold. Since estimation of the additional load on the neighbour eNBs due to the switch-off eNB is of high complexity, a fast estimation algorithm considering the whole eNB load by a traffic load conversion coefficient is proposed. The traffic load conversion coefficient declines slowly with the increasing of site traffic load. Third, the switching-off eNB can be switched on by the active eNBs in a distributed way. Based on the load changes in a week period of the eNB, the cumulative probability distribution of normalized load is analyzed, and then the threshold value of the eNB in different periods is evaluated. The energy saving ratio is obviously related with the interval between the switched on or off threshold values and the complexity of the algorithm is significantly reduced. Simulation results show that the proposed energy saving scheme can save up to 24% energy consumption and with low system complexity.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT module 商用现成NB-IoT模块电池寿命实验评估
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323703
Chun Yeow Yeoh, A. Man, Q. Ashraf, A. Samingan
{"title":"Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT module","authors":"Chun Yeow Yeoh, A. Man, Q. Ashraf, A. Samingan","doi":"10.23919/ICACT.2018.8323703","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323703","url":null,"abstract":"Low Power Wide Area (LPWA) connectivity, a wireless wide area technology that is characterized for interconnecting devices with low bandwidth connectivity and focusing on range and power efficiency, is seen as one of the fastest-growing components of Internet-of-Things (IoT). The LPWA connectivity is used to serve a diverse range of vertical applications, including agriculture, consumer, industrial, logistic, smart building, smart city and utilities. 3GPP has defined the maiden Narrowband IoT (NB-IoT) specification in Release 13 (Rel-13) to accommodate the LPWA demand. Several major cellular operators, such as China Mobile, Deutsch Telekom and Vodafone, have announced their NB-IoT trials or commercial network in year 2017. In Telekom Malaysia, we have setup a NB-IoT trial network for End-to-End (E2E) integration study. Our experimental assessment showed that the battery lifetime target for NB-IoT devices as stated by 3GPP utilizing latest-to-date Commercial Off-The-Shelf (COTS) NB-IoT modules is yet to be realized. Finally, several recommendations on how to optimize the battery lifetime while designing firmware for NB-IoT device are also provided.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131276331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Proposal of value-added service based on real-time automatic content recognition 基于实时自动内容识别的增值业务方案
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323839
Donghwan Shin, Jonguk Choi
{"title":"Proposal of value-added service based on real-time automatic content recognition","authors":"Donghwan Shin, Jonguk Choi","doi":"10.23919/ICACT.2018.8323839","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323839","url":null,"abstract":"ACR (Automatic Contents Recognition) technology is a technology for automatically recognizing contents, and mainly recognizes contents using audio signal processing technology. The reason why ACR technology is necessary is to recognize the content currently being broadcast and provide an additional service suitable for it. Because of this necessity, internationally, ACR technology is selected as a standard in ATSC 3.0. In Korea, IBB (Integrated Broadcast and Broadband) service is included as domestic UHD broadcasting technology standard. In this paper, we describe the standard progress of ACR technology as domestic IBB standard and discuss why ACR technology is needed in actual broadcasting environment and future development direction. In particular, there is a limitation that the standardized part can only be provided by UHD TV. UHD TV Terrestrial broadcasting started in May 2017 based on ATSC 3.0 for the first time in the world. However, considering the domestic situation that more than 90% of users watch using set-top boxes, the number of households receiving UHD broadcasting directly is expected to be less than 10%. In addition, UHD broadcasting can only use UHD TV purchased in 2017 to use additional information service using ACR technology. DTV broadcasting will continue until UHD 100% broadcasting will be available by 2027 because the average TV replacement cycle is about 10 years on average. Accordingly, the time to replace the TV with UHD TV is expected to take more than 10 years. In this paper, the technology and direction to solve these problems are proposed.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Exploit-Kit behaviors via machine learning approach 基于机器学习方法的Exploit-Kit行为分类
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323797
Sukritta Harnmetta, S. Ngamsuriyaroj
{"title":"Classification of Exploit-Kit behaviors via machine learning approach","authors":"Sukritta Harnmetta, S. Ngamsuriyaroj","doi":"10.23919/ICACT.2018.8323797","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323797","url":null,"abstract":"An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparative study on preprocessing methods for object tracking in sports events 体育赛事目标跟踪预处理方法的比较研究
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323793
S. Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim
{"title":"A comparative study on preprocessing methods for object tracking in sports events","authors":"S. Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim","doi":"10.23919/ICACT.2018.8323793","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323793","url":null,"abstract":"Due to the development of machine learning, interest in automatic recognition of objects in videos is increasing. In the sports field, there is a growing demand for a technology for automatically recognizing and tracking various objects in a sports game video. However, it is very difficult to recognize and track an object without proper preprocessing due to its small size and large sports field. In this paper, we compare background substraction and edge detection, which are typical preprocessing methods for automatic recognition and tracking of objects in sports images, and analyze advantages and disadvantages of each method.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networks 实现公平的蜂窝边缘性能:OFDMA网络中的低复杂度干扰协调
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323625
Sunghyun Kim, H. Jwa, J. Moon, J. Na
{"title":"Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networks","authors":"Sunghyun Kim, H. Jwa, J. Moon, J. Na","doi":"10.23919/ICACT.2018.8323625","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323625","url":null,"abstract":"We propose a low-complexity downlink interference coordination algorithm in OFDMA networks. The algorithm aims to achieve high proportional fairness among cell-edge users, as the effects of inter-cell interference are most noticeable in cell-edge areas where users are interfered by signals from neighbor base-stations. We demonstrate that the performance of our algorithm is greater than that of a decentralized algorithm which aims at interference randomization. Our algorithm consists of two stages. In the first stage, it constructs a bipartite graph that describes which set of base-stations imposes significant interference on each cell-edge user. In the second stage, exploiting the structure of the constructed graph, it solves an optimization problem to attain high proportional fairness.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132721113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shot category detection based on object detection using convolutional neural networks 基于卷积神经网络的镜头类别检测
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323637
Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim
{"title":"Shot category detection based on object detection using convolutional neural networks","authors":"Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim","doi":"10.23919/ICACT.2018.8323637","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323637","url":null,"abstract":"Shot category detection is a method that extracts classified shots which comprised of several sequenced frames. These are based on object detection, which relates feature extraction of image processing. Shot category detection is helpful to utilize the neural network. Neural networks are widely generalized to our society. Artificial neural networks applied in many kinds of researches and developments, which provide convenient technologies for fundamental knowledge of deep learning. In terms of artificial neural networks, we introduce shot category detection based on object detection using convolutional neural networks (CNN). This paper also proves that CNN is efficient for supervised learning.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proposed solution for improving the reliability of HSS data by integrating a queue manager 提出了通过集成队列管理器来提高HSS数据可靠性的解决方案
2018 20th International Conference on Advanced Communication Technology (ICACT) Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323883
Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, S. Ouya, Kéba Gueye
{"title":"Proposed solution for improving the reliability of HSS data by integrating a queue manager","authors":"Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, S. Ouya, Kéba Gueye","doi":"10.23919/ICACT.2018.8323883","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323883","url":null,"abstract":"This paper propose a solution for improving the reliability of IMS HSS data by integrating a queue manager. It will interact between the I-CSCF, S-CSCF and HSS entities so that when transferring or downloading the user's profile, the HSS entity is operating normally, notifying the user that it is registered.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"76 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信