16th International Conference on Advanced Communication Technology最新文献

筛选
英文 中文
Survey on LEACH-based security protocols 基于leach的安全协议综述
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778970
T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee
{"title":"Survey on LEACH-based security protocols","authors":"T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee","doi":"10.1109/ICACT.2014.6778970","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778970","url":null,"abstract":"Energy efficiency is one of the major concerns in designing protocols for WSNs. One of the energy-efficient communication protocols for this network is LEACH that works on cluster-based homogeneous WSNs. Though LEACH is energy-efficient but it does not take security into account. Because WSNs are usually deployed in remote and hostile areas, security becomes a concern in designing a protocol. In this paper we present our security analysis of five security protocols that have been proposed to strengthen LEACH protocols. Those protocols are SLEACH, SecLEACH, SC-LEACH, Armor LEACH and MS-LEACH.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"27 1","pages":"304-309"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85426301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Method and utility for recovering code algorithms of telecommunication devices for vulnerability search 一种用于漏洞搜索的电信设备代码算法的恢复方法和实用程序
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778943
M. Buinevich, K. Izrailov
{"title":"Method and utility for recovering code algorithms of telecommunication devices for vulnerability search","authors":"M. Buinevich, K. Izrailov","doi":"10.1109/ICACT.2014.6778943","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778943","url":null,"abstract":"The article describes a method for searching vulnerabilities in machine code based on the analysis of its algorithmized representation obtained with the help of an utility being a part of the method. Vulnerability search falls within the field of telecommunication devices. Phase-by-phase description of the method is discussed, as well as the software architecture of the utility and their limitations in terms of application and preliminary effectiveness estimate results. A forecast is given as to developing the method and the utility in the near future.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"48 1","pages":"172-176"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80858617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Brain Machine Interface for wrist movement using Robotic Arm 脑机接口的手腕运动使用机械臂
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779014
Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan
{"title":"Brain Machine Interface for wrist movement using Robotic Arm","authors":"Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan","doi":"10.1109/ICACT.2014.6779014","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779014","url":null,"abstract":"Brain Machine Interface (BMI) has made it possible for the disabled people to communicate with the external machine using their own senses. In the field of BMI, the invasive techniques have been widely used. This paper deals with the study of features of Electroencephalography (EEG), a non invasive technique that has been used for classifying two classes of movements, namely Extension and Flexion. Classification of movements is done on the basis of energy, entropy, skewness, kurtosis and their various combinations. The maximum accuracy of 91.93% has been obtained using discrete cosine transformation of energy and entropy. Finally the detected wrist movement is implemented on a mechanical Robotic Arm using ARDUINO UNO and MATLAB.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"5 1","pages":"518-522"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88237186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach of automatic music genre classification based on timbrai texture and rhythmic content features 一种基于音色织体和节奏内容特征的音乐类型自动分类方法
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778929
B. K. Baniya, D. Ghimire, Joonwhoan Lee
{"title":"A novel approach of automatic music genre classification based on timbrai texture and rhythmic content features","authors":"B. K. Baniya, D. Ghimire, Joonwhoan Lee","doi":"10.1109/ICACT.2014.6778929","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778929","url":null,"abstract":"Music genre classification is an essential component for the music information retrieval system. There are two important components to be considered for better genre classification, which are audio feature extraction and classifier. This paper incorporates two different kinds of features for genre classification, timbrai texture and rhythmic content features. Timbrai texture contains the Mel-frequency Cepstral Coefficient (MFCC) with other several spectral features. Before choosing a timbrai feature we explore which feature plays an insignificant role on genre discrimination. This facilitates the reduction of feature dimension. For the timbrai features up to the 4-th order central moments and the covariance components of mutual features are considered to improve the overall classification result. For the rhythmic content the features extracted from beat histogram are selected. In the paper Extreme Learning Machine (ELM) with bagging is used as the classifier for classifying the genres. Based on the proposed feature sets and classifier, experiment is performed with well-known datasets: GTZAN with ten different music genres. The proposed method acquires better classification accuracy compared to the existing methodologies.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"32 1","pages":"96-102"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78211211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Bit error rate analysis for V-BLAST/STBC using interference cancellation techniques 利用干扰抵消技术分析V-BLAST/STBC的误码率
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778940
C. Kotchasarn
{"title":"Bit error rate analysis for V-BLAST/STBC using interference cancellation techniques","authors":"C. Kotchasarn","doi":"10.1109/ICACT.2014.6778940","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778940","url":null,"abstract":"Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication systems, which promising the both increased capacity and link level reliability. In this paper, we proposed the interference cancellation techniques for V-BLAST/STBC architecture, which integrates Alamouti space-time block code (STBC) layer together with vertical Bell-laboratories (V-BLAST) layer. In this work, we employ four transmit and three receive antennas over frequency flat Rayleigh fading channel. This paper presents signal detectors for V-BLAST/STBC with minimum mean square error (MMSE), zero forcing (ZF), parallel interference cancellation (PIC) and successive interference cancellation-zero forcing with binary phase shift keying (BPSK). Simulation results show the bit error rate performance degradation and the computational complexity of the joint optimal detection is better than the other detection technique.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"50 1","pages":"157-161"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91530655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, deployment and use of HTTP-based botnet (HBB) testbed 基于http的僵尸网络(HBB)测试平台的设计、部署和使用
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779162
Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar
{"title":"Design, deployment and use of HTTP-based botnet (HBB) testbed","authors":"Esraa Alomari, S. Manickam, B. Gupta, Parminder Singh, Mohammed Anbar","doi":"10.1109/ICACT.2014.6779162","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779162","url":null,"abstract":"Botnet is one of the most widespread and serious malware which occur frequently in today's cyber attacks. A botnet is a group of Internet-connected computer programs communicating with other similar programs in order to perform various attacks. HTTP-based botnet is most dangerous botnet among all the different botnets available today. In botnets detection, in particularly, behavioural-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. Most of the datasets in the botnet field are from local environment and cannot be used in the large scale due to privacy problems and do not reflect common trends, and also lack some statistical features. To the best of our knowledge, there is not any benchmark dataset available which is infected by HTTP-based botnet (HBB) for performing Distributed Denial of Service (DDoS) attacks against Web servers by using HTTP-GET flooding method. In addition, there is no Web access log infected by botnet is available for researchers. Therefore, in this paper, a complete test-bed will be illustrated in order to implement a real time HTTP-based botnet for performing variety of DDoS attacks against Web servers by using HTTP-GET flooding method. In addition to this, Web access log with http bot traces are also generated. These real time datasets and Web access logs can be useful to study the behaviour of HTTP-based botnet as well as to evaluate different solutions proposed to detect HTTP-based botnet by various researchers.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"17 1","pages":"1265-1269"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73460739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Centrality-based network coding node selection mechanism for improving network throughput 基于中心性的网络编码节点选择机制,提高网络吞吐量
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779083
Tae-hwa Kim, Hyungwoo Choi, Hong-shik Park
{"title":"Centrality-based network coding node selection mechanism for improving network throughput","authors":"Tae-hwa Kim, Hyungwoo Choi, Hong-shik Park","doi":"10.1109/ICACT.2014.6779083","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779083","url":null,"abstract":"The problem of minimizing the number of coding nodes is caused by network coding overhead and is proved to be NP-hard. To resolve this issue, this paper proposes Centrality-based Network Coding Node Selection (CNCNS) that is the heuristic and distributed mechanism to minimize the number of network coding (NC) nodes without compromising the achievable network throughput. CNCNS iteratively analyses the node centrality and selects NC node in the specific area. Since CNCNS operates with distributed manner, it can dynamically adapt the network status with approximately minimizing network coding nodes. Especially, CNCNS adjusts the network performance of network throughput and reliability using control indicator. Simulation results show that the well selected network coding nodes can improve the network throughput and almost close to throughput performance of a system where all network nodes operate network coding.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"864-867"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90400234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The integrated management method of slow varying ISL's for MEO satellite network MEO卫星网络慢变ISL综合管理方法
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779092
L. Jing, Ye Gang-qiang, Zhang Tian-jiao, Yu Pei-jun
{"title":"The integrated management method of slow varying ISL's for MEO satellite network","authors":"L. Jing, Ye Gang-qiang, Zhang Tian-jiao, Yu Pei-jun","doi":"10.1109/ICACT.2014.6779092","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779092","url":null,"abstract":"In the paper, the constellation composed of MEO (Medium Earth Orbit) satellite is put as a researching scenario, the relative measurement and data transmission task which are finished by slow changing ISLs are put as a researching object, the integrated management of relative measurement and data transmission task inside the satellite network is put as a studying objective. Firstly, the characteristic of relative measurement and data transmission task is analyzed, and the ISLs constrained conditions are researched for both of them. Then, the topology structure of satellite network is designed according to the characteristic of slow changing ISLs and taking account into the specified requirement of measurement and data transmission task Thirdly, in order to realize integrated management of measurement and data transmission task the routing strategy is designed according to the topology structure of satellite network Finally, the researching results will be validated through the example. The technical reference will be provided by the researching results for the fields of space internet application, space based TT&C (Tracking, Telemetry and Control) and satellite communication in the future.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"20 1","pages":"907-911"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90441455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of narrow band signal interference caused by CFO on OFDM system for proximity-based direct communication 基于邻近直接通信的OFDM系统窄带CFO信号干扰的影响
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778973
Seokki Kim, Sungcheol Chang
{"title":"Effect of narrow band signal interference caused by CFO on OFDM system for proximity-based direct communication","authors":"Seokki Kim, Sungcheol Chang","doi":"10.1109/ICACT.2014.6778973","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778973","url":null,"abstract":"Proximity-based direct communication is the technology that devices in the near distance can use the radio resource efficiently by operating distributedly without control of BS or AP. Many technologies are proposed for proximity-based direct communication and taking the operation in unlicensed band into account. Thus, coexistence techniques are needed for coexistence with different kind of devices which operate in unlicensed band such as Wireless LAN. A blocking signal transmission scheme to avoid contention with other devices by transmitting narrow band signal is proposed as one of the coexistence schemes for coexistence with different kind of devices. In this work, we present analysis of the effect of narrow band interference such as blocking signal caused by CFO on OFDM system for proximity-based direct communication and validate the theoretical results by means of computer simulation.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"8 4 1","pages":"318-323"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78390090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RRM strategy based on throughput and fairness in LTE-A relay system 基于吞吐量和公平性的LTE-A中继系统RRM策略
16th International Conference on Advanced Communication Technology Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779121
Jintao Du, Jihong Zhao
{"title":"RRM strategy based on throughput and fairness in LTE-A relay system","authors":"Jintao Du, Jihong Zhao","doi":"10.1109/ICACT.2014.6779121","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779121","url":null,"abstract":"Relay has been one of the most promising techniques towards LTE-A system, which improves cell coverage and throughput in cell edge. For the balance between system throughput and user fairness of LTE-A system with relay, this paper proposes user SINR dispersion degree as the main parameter for resource allocation, significantly improved the fairness of the center users and edge users. Simulation results show that the proposed Balanced Aim allocation algorithm which combined throughput, user fairness and game theory makes the system resource allocation more efficient, improving the overall performance of the system.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"22 1","pages":"1059-1064"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76726340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信