首页 > 最新文献

2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
DNSNA: DNS name autoconfiguration for Internet of Things devices DNSNA:物联网设备的DNS名称自动配置
Pub Date : 2016-07-07 DOI: 10.1109/ICACT.2016.7423412
Sejun Lee, J. Jeong, Jungsoo Park
This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's category and model in IPv6-based IoT environments. This DNS name lets user easily identify each IoT device for monitoring and remote-controlling in IoT environments. In the procedure to generate and register an IoT device's DNS name, the standard protocols of Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through an authoritative DNS server, it generates less traffic than Multicast DNS (mDNS), which is a legacy DNS application for the DNS name service in IoT environments. Thus, the proposed scheme is more appropriate in global IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenario, such as smart road and smart home. The results of the simulation prove that our proposal outperforms the legacy scheme in terms of energy consumption.
本文提出了一种DNS名称自动配置方法(简称DNSNA),不仅适用于全局DNS名称,也适用于物联网设备的本地DNS名称。由于物联网环境中存在大量设备,手动配置物联网设备的DNS (Domain Name System)名称效率不高。通过该方案,在基于ipv6的物联网环境中,物联网设备的DNS名称可以根据设备的类别和型号自动配置。此DNS名称可让用户轻松识别IoT环境中用于监控和远程控制的每个IoT设备。在物联网设备的DNS名称生成和注册过程中,使用的是IETF (Internet Engineering Task Force)的标准协议。由于所提出的方案通过权威DNS服务器将物联网设备的DNS名称解析为单播IPv6地址,因此它比多播DNS (mDNS)产生的流量更少,mDNS是物联网环境中用于DNS名称服务的传统DNS应用程序。因此,该方案比mDNS更适合于全球物联网网络。本文阐述了所提出方案的设计思路及其服务场景,如智能道路、智能家居等。仿真结果证明,我们的方案在能耗方面优于传统方案。
{"title":"DNSNA: DNS name autoconfiguration for Internet of Things devices","authors":"Sejun Lee, J. Jeong, Jungsoo Park","doi":"10.1109/ICACT.2016.7423412","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423412","url":null,"abstract":"This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's category and model in IPv6-based IoT environments. This DNS name lets user easily identify each IoT device for monitoring and remote-controlling in IoT environments. In the procedure to generate and register an IoT device's DNS name, the standard protocols of Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through an authoritative DNS server, it generates less traffic than Multicast DNS (mDNS), which is a legacy DNS application for the DNS name service in IoT environments. Thus, the proposed scheme is more appropriate in global IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenario, such as smart road and smart home. The results of the simulation prove that our proposal outperforms the legacy scheme in terms of energy consumption.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Supply and demand management system based on consumption pattern analysis and tariff for cost minimization 基于消费模式分析和费用最小化的供需管理系统
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423508
Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi
In this paper, we propose a supply and demand management system based on information on the power consumption pattern analysis and the tariff for HEMS(Home Energy Management System) of KEPCO(Korea Electric Power COrporation) for cost minimization. The scheduler of a supply and demand management system decides the curtailment level for the dropped appliances based on information about the predicted power consumption amount, the predicted renewable energy generation amount, and the tariff. We get the effect of the cost minimization on power consumption for home area user using constraints to decide the optimal curtailment level.
本文提出了一种基于韩国电力公司家庭能源管理系统(HEMS)用电模式分析和电价信息的供需管理系统,以实现成本最小化。供需管理系统的调度程序根据预测的耗电量、预测的可再生能源发电量和电价等信息,决定被弃电设备的弃电水平。利用约束条件确定最优弃风水平,得到成本最小化对家庭区域用户用电量的影响。
{"title":"Supply and demand management system based on consumption pattern analysis and tariff for cost minimization","authors":"Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi","doi":"10.1109/ICACT.2016.7423508","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423508","url":null,"abstract":"In this paper, we propose a supply and demand management system based on information on the power consumption pattern analysis and the tariff for HEMS(Home Energy Management System) of KEPCO(Korea Electric Power COrporation) for cost minimization. The scheduler of a supply and demand management system decides the curtailment level for the dropped appliances based on information about the predicted power consumption amount, the predicted renewable energy generation amount, and the tariff. We get the effect of the cost minimization on power consumption for home area user using constraints to decide the optimal curtailment level.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
APEM: Automatic paraphrase evaluation using morphological analysis for the Korean language 使用词形分析对韩国语进行自动释义评价
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423597
S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo
Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technology since correctly paraphrased sentences can be used as alternative input sentences in the retrieval process. In this paper, we suggest an automatic paraphrase evaluation method using morphological analysis (APEM), which is suitable for the Korean language. Using APEM and its variations, we present preliminary results on how our automatic evaluation scores compare to the existing method of bilingual evaluation understudy (BLEU).
释义评估用于确定两个输入句子是否具有相同的意思。自动分析释义评价技术在信息检索技术领域具有潜在的应用价值,因为正确释义的句子可以作为信息检索过程中的备选输入句子。本文提出了一种适用于朝鲜语的词形分析(APEM)自动释义评价方法。使用APEM及其变体,我们对我们的自动评估分数与现有的双语评估替补(BLEU)方法进行了初步比较。
{"title":"APEM: Automatic paraphrase evaluation using morphological analysis for the Korean language","authors":"S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo","doi":"10.1109/ICACT.2016.7423597","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423597","url":null,"abstract":"Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technology since correctly paraphrased sentences can be used as alternative input sentences in the retrieval process. In this paper, we suggest an automatic paraphrase evaluation method using morphological analysis (APEM), which is suitable for the Korean language. Using APEM and its variations, we present preliminary results on how our automatic evaluation scores compare to the existing method of bilingual evaluation understudy (BLEU).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122250722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reverse engineering approach of obfuscated array 混淆阵列的逆向工程方法
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423318
W. Ding, ZhiMin Gu
Recently, research community has advanced in type reconstruction technology for reverse engineering. However, emerging with obfuscated technology, data type reconstruction grows more and more difficult, and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, it's essential to develop a novel approach to reverse engineering obfuscated array type based on refined CFG. We take split array for example and analyze feature in CFG and take advantage of compiler algorithm to identify obfuscated array.
近年来,研究界在逆向工程类型重构技术方面取得了很大进展。然而,随着模糊化技术的出现,数据类型重构变得越来越困难,并且模糊化后的代码更容易被攻击者或黑客监控和分析。因此,开发一种基于精细CFG的模糊阵列类型逆向工程的新方法是必要的。以分裂阵列为例,分析了CFG中的特征,并利用编译算法对混淆阵列进行了识别。
{"title":"A reverse engineering approach of obfuscated array","authors":"W. Ding, ZhiMin Gu","doi":"10.1109/ICACT.2016.7423318","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423318","url":null,"abstract":"Recently, research community has advanced in type reconstruction technology for reverse engineering. However, emerging with obfuscated technology, data type reconstruction grows more and more difficult, and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, it's essential to develop a novel approach to reverse engineering obfuscated array type based on refined CFG. We take split array for example and analyze feature in CFG and take advantage of compiler algorithm to identify obfuscated array.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of cloud computing attacks and countermeasures 云计算攻击及对策分析
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423296
Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said
Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.
业务企业正在通过将调整资源的能力重新分配给IT专家,以满足业务波动的需求,从而在提高可管理性和减少维护的情况下,竞相启动和运行应用程序。这可以通过利用云计算模型来实现,该模型的特点是“随用随付”模型。该模型提供了存储、方便和按需访问可配置计算资源共享池的解决方案。与任何新技术一样,云计算受到安全威胁和漏洞的影响,包括网络威胁、信息威胁和底层基础设施威胁。在本文中,我们提出了一个框架,通过该框架进行渗透测试,以突出私有云计算基础设施中可能存在的漏洞,模拟攻击以利用已发现的漏洞,如拒绝服务(DoS)和人在云中的攻击,应用对策来防止此类攻击,然后举例说明推荐的最佳实践保护机制,这将有助于云计算安全。
{"title":"Analysis of cloud computing attacks and countermeasures","authors":"Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said","doi":"10.1109/ICACT.2016.7423296","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423296","url":null,"abstract":"Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Characterizing the running patterns of moving target defense mechanisms 运动目标防御机制运行模式的表征
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423324
Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.
移动目标防御(MTD)作为一个改变游戏规则的主题被提出,以增加攻击的工作量和目标系统的安全性。已经提出了许多MTD机制。通常,这些机制遵循一些基本的运行模式,这些模式决定了它们的功能。本文系统地介绍了关于MTD机制的三种主要思潮,并对相关著作进行了分类。然后,我们确定并定义了这些MTD机制所表现出的三种基本运行模式。然后,我们使用五种MTD机制,它们属于三个思想流派,作为案例来确认所提出的模式。这项工作可以帮助该领域的新手更好、更容易地理解MTD的运行行为,并通过提供对运行模式的洞察,为开发人员设计新的MTD系统提供指导。
{"title":"Characterizing the running patterns of moving target defense mechanisms","authors":"Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang","doi":"10.1109/ICACT.2016.7423324","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423324","url":null,"abstract":"Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simulating demography — Dynamics of fertility using a multi agent model 模拟人口统计学。使用多主体模型的生育动态
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423559
Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn
Many countries of the world have seen fertility rate declines. Sincere efforts have been made by the governments to change this trend. But still, countries like Korea & Japan are facing the problem of fertility rates well below the replacement fertility rates. Modeling and simulation offer a good way of understanding the dynamics of population. Of late, agent based modeling (ABM) has gained quite a lot of popularity in the field of simulation. We propose an actual population data fed agent based model whereby the agents in the simulation would take as input the actual census data and simulate the population fertility dynamics. Fertility rates are the main measures of population change. We will try and understand how fertility evolves by taking into various factors such as age, income, expenditure, social benefits; from the micro to macro level. The decisions of the agents, such as to get married and then have certain number of children, would be based on these factors. The fertility is predicted by accessing number of children a couple would have in the child bearing age. We hope to analyze and understand the effect of factors such as social benefits by this model.
世界上许多国家的生育率都在下降。政府已经做出了真诚的努力来改变这一趋势。但是,像韩国和日本这样的国家仍然面临着生育率远低于替代生育率的问题。建模和仿真为理解种群动态提供了一种很好的方法。近年来,基于智能体的建模(ABM)在仿真领域得到了广泛的应用。我们提出了一种基于实际人口数据馈送代理的模型,其中模拟中的代理将实际人口普查数据作为输入并模拟人口生育动态。生育率是衡量人口变化的主要指标。我们将尝试通过考虑年龄、收入、支出、社会福利等各种因素来了解生育率是如何演变的;从微观到宏观。代理人的决定,如结婚,然后有一定数量的孩子,将基于这些因素。生育率是通过一对夫妇在育龄期生育的孩子数量来预测的。我们希望通过这个模型来分析和理解社会效益等因素的影响。
{"title":"Simulating demography — Dynamics of fertility using a multi agent model","authors":"Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn","doi":"10.1109/ICACT.2016.7423559","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423559","url":null,"abstract":"Many countries of the world have seen fertility rate declines. Sincere efforts have been made by the governments to change this trend. But still, countries like Korea & Japan are facing the problem of fertility rates well below the replacement fertility rates. Modeling and simulation offer a good way of understanding the dynamics of population. Of late, agent based modeling (ABM) has gained quite a lot of popularity in the field of simulation. We propose an actual population data fed agent based model whereby the agents in the simulation would take as input the actual census data and simulate the population fertility dynamics. Fertility rates are the main measures of population change. We will try and understand how fertility evolves by taking into various factors such as age, income, expenditure, social benefits; from the micro to macro level. The decisions of the agents, such as to get married and then have certain number of children, would be based on these factors. The fertility is predicted by accessing number of children a couple would have in the child bearing age. We hope to analyze and understand the effect of factors such as social benefits by this model.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-configuration and smart binding control on IOT applications 物联网应用的自配置和智能绑定控制
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423282
Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin
The rapid development of wireless communication technology facilitates the realization of the Internet of Things (IOT). Self-configuration and smart connection system have become relative important issue in accordance with extensive applications of IOT, and the energy saving concepts. Therefore, this work presents the integration of `Self-configuration and Wisdom Connection System' with Wireless Sensor Networks (WSN), IOT and ZigBee technology, to actualize self-configuration based on a received signal strength indicator Received Signal Strength Indicator (RSSI), lighting auto-configuration area, regional allocation, and sub-areas. The proposed `Self-configuration and Wisdom Connection System' automatically configures different lightings to the same position within in the range -3dBm when the RSSI value varies only slightly. The system is configured to the same lighting site within the experimental environment when the sub-area range set -3dBm. This study presents a significant contribution to new configuration of objects in IOT, context awareness control, and optimization of network control platform.
无线通信技术的快速发展为物联网的实现提供了便利。随着物联网的广泛应用和节能理念的提出,自配置和智能连接系统已成为相对重要的问题。因此,本工作提出了“自配置和智慧连接系统”与无线传感器网络(WSN)、物联网和ZigBee技术的集成,以实现基于接收信号强度指标(RSSI)、照明自动配置区域、区域分配和子区域的自配置。提出的“自配置智能连接系统”在RSSI值变化很小的情况下,自动将不同的照明配置到-3dBm范围内的同一位置。本系统配置为实验环境内同一照明站点时,子区域范围设置为-3dBm。该研究对物联网中对象的新配置、环境感知控制和网络控制平台的优化做出了重要贡献。
{"title":"Self-configuration and smart binding control on IOT applications","authors":"Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin","doi":"10.1109/ICACT.2016.7423282","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423282","url":null,"abstract":"The rapid development of wireless communication technology facilitates the realization of the Internet of Things (IOT). Self-configuration and smart connection system have become relative important issue in accordance with extensive applications of IOT, and the energy saving concepts. Therefore, this work presents the integration of `Self-configuration and Wisdom Connection System' with Wireless Sensor Networks (WSN), IOT and ZigBee technology, to actualize self-configuration based on a received signal strength indicator Received Signal Strength Indicator (RSSI), lighting auto-configuration area, regional allocation, and sub-areas. The proposed `Self-configuration and Wisdom Connection System' automatically configures different lightings to the same position within in the range -3dBm when the RSSI value varies only slightly. The system is configured to the same lighting site within the experimental environment when the sub-area range set -3dBm. This study presents a significant contribution to new configuration of objects in IOT, context awareness control, and optimization of network control platform.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel multi-carrier waveform with high spectral efficiency: Semi-orthogonal frequency division multiplexing 一种新的高频谱效率的多载波波形:半正交频分复用
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423299
Fan Yang, Xin Wang
In this paper, semi-orthogonal frequency multiplexing (SOFDM) is proposed, which has doubled spectral efficiency over OFDM by halving the subcarrier spacing. SOFDM is orthogonal in real field but non-orthogonal in complex field. To cancel the inter carrier interference caused by non-orthogonality, linear equalization algorithms are introduced based on inter carrier cross-correlation matrix. However SOFDM still suffer a performance loss due to the white noise power amplification effect of linear equalization. To further improve the performance, by use of the special property of inter carrier cross-correlation matrix, complementary SOFDM is provided, which is orthogonal in both real and complex field. It has identical spectral efficiency with OFDM but obtain a diversity gain in fading channel. And a HARQ-style flexible complementary SOFDM is introduced, which can obtain not only performance gain but also spectral efficiency gain.
本文提出了一种半正交频率复用(SOFDM)方法,通过将子载波间距减半,使频谱效率比OFDM提高一倍。SOFDM在实域是正交的,在复域是非正交的。为了消除非正交性引起的载波间干扰,引入了基于载波间互相关矩阵的线性均衡算法。然而,由于线性均衡的白噪声功率放大效应,SOFDM仍然存在性能损失。为了进一步提高性能,利用载波间互相关矩阵的特殊性质,提出了在实场和复场均正交的互补SOFDM。它具有与OFDM相同的频谱效率,但在衰落信道中获得了分集增益。介绍了一种harq型柔性互补SOFDM,它不仅能获得性能增益,还能获得频谱效率增益。
{"title":"A novel multi-carrier waveform with high spectral efficiency: Semi-orthogonal frequency division multiplexing","authors":"Fan Yang, Xin Wang","doi":"10.1109/ICACT.2016.7423299","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423299","url":null,"abstract":"In this paper, semi-orthogonal frequency multiplexing (SOFDM) is proposed, which has doubled spectral efficiency over OFDM by halving the subcarrier spacing. SOFDM is orthogonal in real field but non-orthogonal in complex field. To cancel the inter carrier interference caused by non-orthogonality, linear equalization algorithms are introduced based on inter carrier cross-correlation matrix. However SOFDM still suffer a performance loss due to the white noise power amplification effect of linear equalization. To further improve the performance, by use of the special property of inter carrier cross-correlation matrix, complementary SOFDM is provided, which is orthogonal in both real and complex field. It has identical spectral efficiency with OFDM but obtain a diversity gain in fading channel. And a HARQ-style flexible complementary SOFDM is introduced, which can obtain not only performance gain but also spectral efficiency gain.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Doppler mitigation for high-speed rail communications 高速铁路通信的高效多普勒减缓
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423499
B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee
Since the high-speed rail (HSR) communications are suffering from the huge Doppler shift, an efficient Doppler mitigation method is proposed in this paper. The proposed method mainly concerns about the mitigation of Doppler shift in OFDM based systems, especially for the case of employing mmWave with very high mobility. The proposed method can be used for both downlink and uplink of the system and it is quite robust to the time-varying mobility. Furthermore, the pilot-aided channel estimation for Doppler compensation is not necessary in most of the cases, which indicates the pilot density in time-domain can be reduced. Simulation results show that by using the proposed method, the residual Doppler shift can be compressed to 0 Hz with the probability of 90%.
针对高速铁路通信中存在的巨大多普勒频移问题,提出了一种有效的多普勒抑制方法。本文提出的方法主要关注OFDM系统中多普勒频移的抑制问题,特别是在使用具有极高迁移率的毫米波的情况下。该方法既适用于系统的下行链路,也适用于上行链路,并且对时变移动性具有较强的鲁棒性。此外,在大多数情况下,不需要进行多普勒补偿的导频辅助信道估计,这表明在时域上可以降低导频密度。仿真结果表明,该方法可将剩余多普勒频移压缩到0 Hz,压缩概率为90%。
{"title":"Efficient Doppler mitigation for high-speed rail communications","authors":"B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee","doi":"10.1109/ICACT.2016.7423499","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423499","url":null,"abstract":"Since the high-speed rail (HSR) communications are suffering from the huge Doppler shift, an efficient Doppler mitigation method is proposed in this paper. The proposed method mainly concerns about the mitigation of Doppler shift in OFDM based systems, especially for the case of employing mmWave with very high mobility. The proposed method can be used for both downlink and uplink of the system and it is quite robust to the time-varying mobility. Furthermore, the pilot-aided channel estimation for Doppler compensation is not necessary in most of the cases, which indicates the pilot density in time-domain can be reduced. Simulation results show that by using the proposed method, the residual Doppler shift can be compressed to 0 Hz with the probability of 90%.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115063961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2016 18th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1