Miyoung Huh, Wook Hyun, Sung Hei Kim, Shin-Gak Kang
{"title":"Design of disaster alerting functionality for digital signage service","authors":"Miyoung Huh, Wook Hyun, Sung Hei Kim, Shin-Gak Kang","doi":"10.1109/ICACT.2014.6779035","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779035","url":null,"abstract":"It is very important sevice to provide disaster alerting function via digital signage. In this paper, we describe the design of functionality to provide disaster alert event produced from the disaster alert agency to the digital signage terminal through the digital signage server.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82267994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast channel estimation techniques for LTE downlink systems based on fast linear Toeplitz system solver","authors":"Abdelhakim Khlifi, R. Bouallègue","doi":"10.1109/ICACT.2014.6779023","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779023","url":null,"abstract":"LTE is defined as the 4G generation network providing high data rates. Channel estimation is important in the wireless system conception. Classical LMMSE channel estimation techniques require O(N3) floating operations and O(N2) memory locations (N is the size of the channel autocorrelation). In this paper, we propose fast channel estimation techniques for LTE based on fast solver for linear Toeplitz system with reconstructible Cauchy-like structure. Proposed fast algorithms require only O(N2) floating operations and O(N) memory locations. Performances of proposed fast algorithms are verified via Monte-Carlo MATLAB simulations.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79730669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of construction stability test system using small unmanned aerial vehicle based on image processing","authors":"Sung-suk Choi, E. Kim","doi":"10.1109/ICACT.2014.6779171","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779171","url":null,"abstract":"Stability test of high-rise buildings must be achieved periodically for the buildings' maintenance, but there are many problems that it is dangerous for inspector to make a personal test, it needs much time and cost, and accurate diagnosis is difficult. This paper proposes a monitoring system for construction stability test based on image processing to analyze and process data from sensors in the vehicle to inspect internal and exterior crack and deformation of constructions by using unmanned aerial vehicle. The system loads various sensors such as temperature sensor, humidity sensor, smoke sensor, illuminance sensor, CO2 sensor, ultrasonic sensor, and infrared thermal imaging sensor and can achieve stability inspection. So, It can reduce inspection time and building's maintenance cost.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89832155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arttapol Reangsuntea, Pornpawit Boonsrimuang, P. Reangsuntea, P. Boonsrimuang, Hideo Kobayashi
{"title":"A low-complexity PS based radix IFFT method for PAPR reduction in OFDM systems","authors":"Arttapol Reangsuntea, Pornpawit Boonsrimuang, P. Reangsuntea, P. Boonsrimuang, Hideo Kobayashi","doi":"10.1109/ICACT.2014.6778963","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778963","url":null,"abstract":"We have proposed one of the distortion-less PAPR reduction methods which employs the Permutation Sequence (PS) in the frequency domain with embedded side information. However, the proposed PS method has high computation complexity. To improve the computation complexity for the previous proposed PS method, this paper proposes a low-complexity PS method which can keep the better peak-to-average power ratio (PAPR). In the proposed PS method, the signals at the middle stages of an N-point radix IFFT using decimation in frequency (DIF) is considered for PS processing. This paper shows that the proposed method has a lower multiplicative complexity than conventional PS method with keeping the PAPR reduction performance. The proposed method is called PS based radix IFFT, where DIF-IFFT is assigned through different stages of the IFFT transform. This proposed method can reduce the multiplicative complexity relatively with keeping the similar PAPR reduction to other methods such as C-PTS and C-PS. The proposed method also can reduce the side information as compared with the C-PTS. This paper presents the various computer simulation results to verify the effectiveness of proposed method.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90324476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bit error rate analysis for V-BLAST/STBC using interference cancellation techniques","authors":"C. Kotchasarn","doi":"10.1109/ICACT.2014.6778940","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778940","url":null,"abstract":"Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication systems, which promising the both increased capacity and link level reliability. In this paper, we proposed the interference cancellation techniques for V-BLAST/STBC architecture, which integrates Alamouti space-time block code (STBC) layer together with vertical Bell-laboratories (V-BLAST) layer. In this work, we employ four transmit and three receive antennas over frequency flat Rayleigh fading channel. This paper presents signal detectors for V-BLAST/STBC with minimum mean square error (MMSE), zero forcing (ZF), parallel interference cancellation (PIC) and successive interference cancellation-zero forcing with binary phase shift keying (BPSK). Simulation results show the bit error rate performance degradation and the computational complexity of the joint optimal detection is better than the other detection technique.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91530655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method and utility for recovering code algorithms of telecommunication devices for vulnerability search","authors":"M. Buinevich, K. Izrailov","doi":"10.1109/ICACT.2014.6778943","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778943","url":null,"abstract":"The article describes a method for searching vulnerabilities in machine code based on the analysis of its algorithmized representation obtained with the help of an utility being a part of the method. Vulnerability search falls within the field of telecommunication devices. Phase-by-phase description of the method is discussed, as well as the software architecture of the utility and their limitations in terms of application and preliminary effectiveness estimate results. A forecast is given as to developing the method and the utility in the near future.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80858617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performances analysis of Algebraic Space Time Code under correlated and uncorrelated channels","authors":"Inès Ben Hassine, R. Bouallègue","doi":"10.1109/ICACT.2014.6779181","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779181","url":null,"abstract":"With their very Algebraic-construction based on Quaternionic algebra, Algebraic Space Time Codes (ASTC), called the Golden codes, have a full rate, full diversity and non-vanishing constant minimum determinant for increasing spectral efficiency. They have also uniform average transmitted energy per antenna and good shaping, readily lend themselves to high data rate situations. In this paper, we first analyze the performances of the ASTC codes in correlated Rayleigh channel. We consider a coherent demodulator using different decoding schemes and we analyze the Bit Error Rate (BER). In order to increase the spectral efficiency and to maximize the coding gain, ASTC have been proposed for MIMO flat fading channels. To deal with the frequency selectivity, we use the OFDM modulation. So we analyze the performances of an ASTC-MIMO-OFDM system in terms of BER. Finally, we investigate the impact of spatial correlation on the ASTC code design in terms of BER and capacity.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80330816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gain and bandwidth improvements for distributed Raman amplifier in UW-WDM communication systems","authors":"F. Mustafa, A. Khalaf, F. A. Elgeldawy","doi":"10.1109/ICACT.2014.6779190","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779190","url":null,"abstract":"Fiber Raman amplifiers in ultra wideband wavelength division multiplexing (UW-WDM) systems have recently received much more attention because of their greatly extended bandwidth and distributed amplification with the installed fiber as gain medium. It has been shown that the bandwidth of the amplifier can be further increased and gain spectrum can be tailored by using pumping with multiple wavelengths. In this paper, the distributed multi-pumping Raman amplifier has been studied and analyzed by testing two designed model of amplifier to obtain the gain of maximum flatness and bandwidth. Also we have investigated the effects of many parameters on the gain and bandwidth of Raman amplifier such as: pumping wavelength, offset wavelength, the relative refractive index difference and the number and location of the cascaded units used in the amplifier model design. The models is analyzed where six and eight Raman pumping of special pumping power and pumping wavelengths are lunched in the forward direction where each model is analyzed by two different way. The gain is computed over the spectral optical wavelengths (1.45μm ≤ λ signal ≤ 1.65μm). The differential gain of each unit of the amplifier is obtained according to the straight line-exponential model of a small maximum constant gain of 7.4×10-14 m/W over an optical wavelength interval of 16 nm.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78367399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconstruction of data type in obfuscated binary programs","authors":"W. Ding, ZhiMin Gu, Feng Gao","doi":"10.1109/ICACT.2014.6778988","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778988","url":null,"abstract":"Recently, research community has advanced in type reconstruction technology for reverse engineering, but emerging with obfuscate technology, data type reconstruction is difficult and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, we present a novel approach for automatic establish data type inference rules and reconstruct type from obfuscated binary programs using machine learning algorithm.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79447654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A confident email system based on a new correspondence model","authors":"Laurent Cailleux, A. Bouabdallah, J. Bonnin","doi":"10.1109/ICACT.2014.6779010","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779010","url":null,"abstract":"Despite all the current controversies, the success of the email service is still valid. The ease of use of its various features contributed to its widespread adoption. In general, the email system provides for all its users the same set of features controlled by a single monolithic policy. Such solutions are efficient but limited because they grant no place for the concept of usage which denotes a user's intention of communication: private, professional, administrative, official, military. The ability to efficiently send emails from mobile devices creates new interesting opportunities. We argue that the context (location, time, device, operating system, access network...) of the email sender appears as a new dimension we have to take into account to complete the picture. Context is clearly orthogonal to usage because a same usage may require different features depending of the context. It is clear that there is no global policy meeting requirements of all possible usages and contexts. To address this problem, we propose to define a correspondence model which for a given usage and context allows to derive a correspondence type encapsulating the exact set of required features. With this model, it becomes possible to define an advanced email system which may cope with multiple policies instead of a single monolithic one. By allowing a user to select the exact policy coping with her needs, we argue that our approach reduces the risk-taking allowing the email system to slide from a trusted one to a confident one.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78145755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}