16th International Conference on Advanced Communication Technology最新文献

筛选
英文 中文
Time synchronization method of network testing system by standard wave 基于标准波的网络测试系统时间同步方法
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779136
Jongkuk Lee, Youn-seo Jeong, Ki-dong Nam
{"title":"Time synchronization method of network testing system by standard wave","authors":"Jongkuk Lee, Youn-seo Jeong, Ki-dong Nam","doi":"10.1109/ICACT.2014.6779136","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779136","url":null,"abstract":"The time synchronization is very important for network testing that is at a long distance. For time synchronization, two different network testing apparatuses uses a network time protocol (NTP) or a geographic position system (GPS). For using GPS with less timing error, an expensive GPS antenna needs to be installed outside the door. NTP is through the network. The network itself causes a time delay and the error in the time delay of the network occurs. So, NTP has not been used to measure a high speed network. This paper has been made in an effort to provide a network testing system using a Standard Wave to facilitate time synchronization with at least two network testing apparatuses, and an operating method thereof. The Standard Wave has extremely little time error. It helps to perform accurate testing.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"31 1","pages":"1136-1139"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75621211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The solution of denial of service attack on ordered broadcast Intent 基于有序广播意图的拒绝服务攻击解决方案
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778989
Ji-Soo Oh, Min-Woo Park, Tai M. Chung
{"title":"The solution of denial of service attack on ordered broadcast Intent","authors":"Ji-Soo Oh, Min-Woo Park, Tai M. Chung","doi":"10.1109/ICACT.2014.6778989","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778989","url":null,"abstract":"The Android's message passing system provides late run-time binding between components in the same or different applications, and it promotes inter-application collaboration. However, the message passing mechanism has also numerous vulnerabilities, so that Android applications can be exposed to attacks from malicious applications. Denial of service (DoS) attack on ordered broadcasts is a typical attack that exploits vulnerabilities of message passing. A malicious application which launches the attack intercepts broadcast messages by setting itself high priority, and then aborts it to prevent other benign applications from receiving it. In this paper, we propose a security framework for detecting DoS attacks on ordered broadcasts. We insert our framework into Android platform, and then the framework inspects receivers of broadcast messages. If the framework detects any threats, it issues warning to user. Finally, we provides scenario about our framework and discuss future directions.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"397-400"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73199678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Road side unit assisted stochastic multi-hop broadcast scheme for instant emergency message propagation 基于路旁单元辅助的随机多跳广播方案的即时应急信息传播
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2015.7224909
Xing Fan, Bo Yang, R. Yamamoto, Y. Tanaka
{"title":"Road side unit assisted stochastic multi-hop broadcast scheme for instant emergency message propagation","authors":"Xing Fan, Bo Yang, R. Yamamoto, Y. Tanaka","doi":"10.1109/ICACT.2015.7224909","DOIUrl":"https://doi.org/10.1109/ICACT.2015.7224909","url":null,"abstract":"VANET (Vehicular ad hoc Network) is a special kind of ad hoc wireless network where every single node is a vehicle moving in a relatively high velocity, which leads to exclusive challenges like rapid changing topologies, safety and privacy concerns. In this specific network, the propagation of emergency messages could be critical to save human lives and property. Many researchers have proposed routing or broadcast protocols to solve the problems in VANET. The objective of this paper is to propose a broadcast scheme in VANET that is not likely to cause broadcast storm problem with a reasonable delay and high delivery rate. Since VANET is an attack-prone network and any kind of malicious behaviour in VANET might cause serious loss or even death in reality, we should also refrain from using beacons to exchange privacy-sensitive information in V2V (Vehicle to Vehicle). In this paper, a multi-hop broadcast scheme that makes use of RSU and V2I (Vehicle to Infrastructure) communication is proposed. The simulation result shows that the proposed scheme outperforms static stochastic broadcast scheme in terms of delivery rate. Comparing to flooding, we offer a better delay and less network usage.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"46 1","pages":"103-108"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72823561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Simple and feasible dynamic bandwidth and polling allocation for XGPON 简单可行的XGPON动态带宽和轮询分配
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779186
M. Han
{"title":"Simple and feasible dynamic bandwidth and polling allocation for XGPON","authors":"M. Han","doi":"10.1109/ICACT.2014.6779186","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779186","url":null,"abstract":"In this paper, we propose a simple and feasible dynamic bandwidth allocation (SFDBA) algorithm in order to utilize the unallocated bandwidth and to achieve the implementation feasibility. SFDBA is based on an immediate allocation with colorless grant (IACG) algorithm but SFDBA uses only a single available byte counter and a single down counter for multiple queues of a same service class. Since multiple queues share the same available byte counter, the unallocated bandwidth of a queue can be utilized by another queues. For better service fairness, SFDBA changes the starting queue of scheduling in a round-robin manner. Using simulations, we show that SFDBA is superior to existing methods in mean delay, frame delay variance and frame loss rate.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"43 1","pages":"298-304"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Asymmetric RTS/CTS in ad hoc Wireless LAN 无线局域网中的非对称RTS/CTS
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779025
A. Matoba, M. Hanada, Ho-Gun Moon, M. Kim
{"title":"Asymmetric RTS/CTS in ad hoc Wireless LAN","authors":"A. Matoba, M. Hanada, Ho-Gun Moon, M. Kim","doi":"10.1109/ICACT.2014.6779025","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779025","url":null,"abstract":"A wireless network node with the Omni antenna tends to cause problems called \"Hidden Node\" and \"Exposed Node\". RTS/CTS mechanism has been introduced to mitigate Hidden Node and most of existing researches assume that RTS and CTS are sent at the same data rate. In this paper we have intentionally allocate different transmission rate to RTS and CTS in order to mitigate effect of Exposed Node. The simulation result showed that the proposed method achieved higher throughput.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"26 1","pages":"575-578"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74179684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel distance estimation algorithm of two-hop neighbor in wireless sensor networks 无线传感器网络中新的两跳邻居距离估计算法
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778985
S. Choi, Joongsoo Ma
{"title":"Novel distance estimation algorithm of two-hop neighbor in wireless sensor networks","authors":"S. Choi, Joongsoo Ma","doi":"10.1109/ICACT.2014.6778985","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778985","url":null,"abstract":"In case of wireless networks which does not contain a localization system, Euclidean distance between two nodes those are out of carrier sensing range each other cannot be measured with ranging techniques such as RSSI, ToA, and TDoA since they are not able to communicate directly. To deal with this issue, range-free schemes like a hop-count based approach and a connectivity based approach were used. These methods, however, are decreased in accuracy at low node density networks, so it is hard to apply to other wireless network except the densely deployed sensor networks. In this paper, we present a novel distance estimation method. When two nodes are in 2-hop neighbor relation, our method can estimate a distance using ranging information of their overlapped neighbors and connectivity information. Simulation results show that the proposed method outperforms hop count based and connectivity based distance estimation methods.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"6 1","pages":"378-381"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79078954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A semantic-based approach for representing successful graduate predictive rules 用于表示成功的毕业预测规则的基于语义的方法
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778953
Noppamas Pukkhem
{"title":"A semantic-based approach for representing successful graduate predictive rules","authors":"Noppamas Pukkhem","doi":"10.1109/ICACT.2014.6778953","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778953","url":null,"abstract":"This paper seeks to identify the factors of university students in major of Computer Science at Thaksin University, Thailand that predicts successful completion of the bachelor's degree. Decision tree C4.5/J48, ID3 and ADTree algorithm, the classification algorithms in data mining which are commonly used in many areas can also be implemented to generate the classification rules. In our experiment with 128 training records, we found an overall accuracy of C4.5/J48 algorithm was 90.625%, ID3 algorithm and ADTree were 96.875%. Moreover, we extend the classification rule by applying a semantic-based approach for creating a classification tree ontology. The ontology represent about the classification rules that used to enable machines to interpret and identify learner factors in process of prediction. We also explain how ontological representation plays a role in classifying students to predictive target class. The inference layer of classification tree ontology is based on SWRL (Semantic Web Rule Language), making a clarify separation of the program component and connected explicit modules. One of the major advantages of the proposed approach is that identifying success factors will give students an awareness of essential features for successful completion of their graduate studies.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"60 1","pages":"222-227"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81993233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple regression analysis of IEEE 802.16j relay network throughput IEEE 802.16j中继网络吞吐量的多元回归分析
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778998
Kohei Higo, G. Hasegawa, Y. Taniguchi, H. Nakano, Morito Matsuoka
{"title":"Multiple regression analysis of IEEE 802.16j relay network throughput","authors":"Kohei Higo, G. Hasegawa, Y. Taniguchi, H. Nakano, Morito Matsuoka","doi":"10.1109/ICACT.2014.6778998","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778998","url":null,"abstract":"In IEEE 802.16J relay networks, time division multiple access (TDMA) is adopted for sharing wireless network resources while avoiding radio wave interference. Time slot assignment determines the degree of spatial reuse of wireless network resources and radio interference strength, which affects network performance. The relay network performance is also influenced by various factors, such as background noise level, path loss exponent, density of relay nodes, and transmission signal strength. In this paper, we present the results of multiple regression analysis of IEEE 802.16J relay network throughput. We first summarize the network environment parameters that affect the throughput of relay networks and conduct extensive simulation experiments with various sets of parameter values. From the simulation results, we investigate the relative effect of parameters on throughput performance by multiple regression analysis. The analysis results show that background noise level and path loss exponent are the key parameters for determining relay network throughput. We also obtain a regression equation to estimate the throughput with enough accuracy.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"437-441"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82183879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discovering personal places from location traces 从位置痕迹中发现个人地点
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779055
Muhammad Umair, Wan Seok Kim, Byoung Chul Choi, S. Jung
{"title":"Discovering personal places from location traces","authors":"Muhammad Umair, Wan Seok Kim, Byoung Chul Choi, S. Jung","doi":"10.1109/ICACT.2014.6779055","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779055","url":null,"abstract":"Sensing and computational capabilities in smartphones are enabling attractive new applications in the area of location aware systems. Location aware devices can accurately compute their physical location in the form of latitude and longitude. However places contain much more valuable information to user rather than coordinates. A place is important to a user's personal daily life and carries socially important meanings to a user such as a place where one studies, works, eats, lives etc. GPS enabled devices like smartphones and tablets use location as a context in applications to share their current location. A GPS log of a moving object contains time stamped latitude and longitude information. The discovery of a user's places is a key challenge and involves mapping of GPS data log to meaningful personally important places. In this paper, we propose an algorithm that extracts a user's personally important places from location traces, and evaluate the algorithm with real user's data.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"29 1","pages":"709-713"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84671175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Skin detection for adult image identification 成人图像识别中的皮肤检测
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779041
Jung-Jae Yu, S. Han
{"title":"Skin detection for adult image identification","authors":"Jung-Jae Yu, S. Han","doi":"10.1109/ICACT.2014.6779041","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779041","url":null,"abstract":"This work is aimed at the estimation of the skin region in pornographic images to identify and block the pornographic contents. We propose a novel method to estimate the skin region using simple operation in HSV color space and additional postprocessing to reduce the noise effects. Our method does not require any pre-process such as object detection. It is fast and its result is good enough to be used for fitlering out the clear non-objectionable images before main identification process. So the proposed method can be used as pre-processing for more accurate poronographic image identification process.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"645-648"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90897332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信