Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423388
B. Lee, B. Lee
Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization environment, it has greater impact on disability virtual resources, when the physical devices had a fault. In this paper, when physical faults occurred in the NFV Framework, or logical failure occurs on a specific logical device, we will present a structure for Fault Localization method to ensure the continuity of service in NFVI.
{"title":"Fault localization in NFV framework","authors":"B. Lee, B. Lee","doi":"10.1109/ICACT.2016.7423388","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423388","url":null,"abstract":"Network function virtualization is quickly gaining acceptance as the new approach to delivering communication services. The promises of greater flexibility and dramatically reduced time to introduce new services coupled with the cost advantages, are driving communications service providers(CSP) around the world to begin deploying NFV-based services. But NFV service is actually operated based on virtualization environment, it has greater impact on disability virtual resources, when the physical devices had a fault. In this paper, when physical faults occurred in the NFV Framework, or logical failure occurs on a specific logical device, we will present a structure for Fault Localization method to ensure the continuity of service in NFVI.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423543
P. Sedtheetorn, T. Chulajata
This paper presents original analysis on the downlink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to our accurate evaluation technique, a closed-form expression of NOMA spectral efficiency is proposed. With the closed form, the exact average of NOMA spectral efficiency can be achieved at different system parameters. Moreover, this closed form can be used to evaluate other orthogonal multiple access (OMA) techniques such as orthogonal frequency division multiple access (OFDMA).
{"title":"Spectral efficiency evaluation for non-orthogonal multiple access in Rayleigh fading","authors":"P. Sedtheetorn, T. Chulajata","doi":"10.1109/ICACT.2016.7423543","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423543","url":null,"abstract":"This paper presents original analysis on the downlink spectral efficiency of non-orthogonal multiple access (NOMA) in Rayleigh fading environment. According to our accurate evaluation technique, a closed-form expression of NOMA spectral efficiency is proposed. With the closed form, the exact average of NOMA spectral efficiency can be achieved at different system parameters. Moreover, this closed form can be used to evaluate other orthogonal multiple access (OMA) techniques such as orthogonal frequency division multiple access (OFDMA).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423505
Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi
Resent study of load management minimizes for electricity bill and peak load, but does not consider convenience about human experience. Just focused on saving energy management of the electricity price can't consider residential customers convenience. In this paper, we propose optimal load control strategy for human convenience as well as to minimize the electricity price. The strategy is to use some of the indoor environmental parameters, reflecting the various forms of patterns of energy management system, which controls the load within a range that can maintain human convenience.
{"title":"An algorithm for home energy management using environmental conditions","authors":"Eun Soon Ki, Jeong sik Kim, Seung Min Ryu, S. Choi","doi":"10.1109/ICACT.2016.7423505","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423505","url":null,"abstract":"Resent study of load management minimizes for electricity bill and peak load, but does not consider convenience about human experience. Just focused on saving energy management of the electricity price can't consider residential customers convenience. In this paper, we propose optimal load control strategy for human convenience as well as to minimize the electricity price. The strategy is to use some of the indoor environmental parameters, reflecting the various forms of patterns of energy management system, which controls the load within a range that can maintain human convenience.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423459
Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot
This paper proposes a mathematical model as a decision tool for the choice of radio access solutions adapted to a geographical region through universal access. It integrates the formalism related to engineering radio network access in general as well as financial constraints imposed by the access and universal service funds. Services considered are voice and data services. This approach has helped to derive a general expression set for radio technologies. The coverage and capacity deployment strategy has also been combined to clarify the optimal implementation based on financial constraints. A case study on the Ouaddai region in Chad accompanied by simulations curves for wireless technologies as Wi-Fi, WiMAX and CDMA for example has shown the efficiency of such approach.
{"title":"Radio access model for universal service","authors":"Idriss Saleh Bachar, A. Kora, R. M. Faye, C. Aupetit-Berthelemot","doi":"10.1109/ICACT.2016.7423459","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423459","url":null,"abstract":"This paper proposes a mathematical model as a decision tool for the choice of radio access solutions adapted to a geographical region through universal access. It integrates the formalism related to engineering radio network access in general as well as financial constraints imposed by the access and universal service funds. Services considered are voice and data services. This approach has helped to derive a general expression set for radio technologies. The coverage and capacity deployment strategy has also been combined to clarify the optimal implementation based on financial constraints. A case study on the Ouaddai region in Chad accompanied by simulations curves for wireless technologies as Wi-Fi, WiMAX and CDMA for example has shown the efficiency of such approach.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124244032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423314
Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong
Traditionally, home appliances are controlled by switches or remote controllers manually. In order to control the appliances, a user have to be near the switches or carry remote controllers all the time. To alleviate this inconvenience, this paper proposes a control system for home appliances using human speech and context information. We present an architecture of the control system and a process to control home appliances composed of three steps: speech detection, speech recognition, and command execution. To validate our system, we show two useful case studies by testing it at POSTECH smart home and UPnP-OSGi simulator.
{"title":"A smart home control system based on context and human speech","authors":"Yoonseon Han, J. Hyun, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/ICACT.2016.7423314","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423314","url":null,"abstract":"Traditionally, home appliances are controlled by switches or remote controllers manually. In order to control the appliances, a user have to be near the switches or carry remote controllers all the time. To alleviate this inconvenience, this paper proposes a control system for home appliances using human speech and context information. We present an architecture of the control system and a process to control home appliances composed of three steps: speech detection, speech recognition, and command execution. To validate our system, we show two useful case studies by testing it at POSTECH smart home and UPnP-OSGi simulator.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423435
Wook Hyun, Juyoung Park
In P2P-based contents distribution, an overlay network is constructed by peers that reside in user domain not service provider domain, and each peer shares data with each other. Due to the unmanageability characteristics of P2P networking, it tends to lead to inefficiency due to ignorance of underlying network in spite of its advantages and unfairness caused by absence of incentives to contributing peers. In order to solve several issues regarding P2P networking and making use of its advantages compared to existing server-client model, ITU-T Q.9/11 is developing a series of MP2P (Managed P2P communications) standards. In order to figure out the status of overlay network and gathering activities information of peers, it aggregates the information from peers that may not be trusted due to the possibility of forgery. It is important to assure the integrity and non-forgery of reports from peers. In this paper, we propose a method for gathering reliable peer activity report by use of digital signatures.
{"title":"Method for providing reliable peer activity report for managed P2P communications","authors":"Wook Hyun, Juyoung Park","doi":"10.1109/ICACT.2016.7423435","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423435","url":null,"abstract":"In P2P-based contents distribution, an overlay network is constructed by peers that reside in user domain not service provider domain, and each peer shares data with each other. Due to the unmanageability characteristics of P2P networking, it tends to lead to inefficiency due to ignorance of underlying network in spite of its advantages and unfairness caused by absence of incentives to contributing peers. In order to solve several issues regarding P2P networking and making use of its advantages compared to existing server-client model, ITU-T Q.9/11 is developing a series of MP2P (Managed P2P communications) standards. In order to figure out the status of overlay network and gathering activities information of peers, it aggregates the information from peers that may not be trusted due to the possibility of forgery. It is important to assure the integrity and non-forgery of reports from peers. In this paper, we propose a method for gathering reliable peer activity report by use of digital signatures.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128341243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423586
Nguyễn Hà Dương, Hoang Dang Hai
Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance and principal component analysis for network traffic anomaly detection. We also experiment clustering technique with suitable features to remove noise in training data along with some enhanced detection technique. With the approach of combining anomaly detection and signature-based detection system, we believe the quality of normal dataset will greatly improve.
{"title":"A model for network traffic anomaly detection","authors":"Nguyễn Hà Dương, Hoang Dang Hai","doi":"10.1109/ICACT.2016.7423586","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423586","url":null,"abstract":"Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance and principal component analysis for network traffic anomaly detection. We also experiment clustering technique with suitable features to remove noise in training data along with some enhanced detection technique. With the approach of combining anomaly detection and signature-based detection system, we believe the quality of normal dataset will greatly improve.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423490
Weirong Zhu, Hao-peng Chen, Fei Hu
Many great big data processing platforms, for example Hadoop Map Reduce, are keeping improving large-scale data processing performance which make big data processing focus of IT industry. Among them Spark has become increasingly popular big data processing framework since it was presented in 2010 first time. Spark use RDD for its data abstraction, targeting at the multiple iteration large-scale data processing with reuse of data, the in-memory feature of RDD make Spark faster than many other non-in-memory big data processing platform. However in-memory feature also bring the volatile problem, a failure or a missing RDD will cause Spark to recompute all the missing RDD on the lineage. And a long lineage will also increasing the time cost and memory usage of Driver analysing the lineage. A checkpoint will cut off the lineage and save the data which is required in the coming computing, the frequency to make a checkpoint and the RDDs which are selected to save will significantly influence the performance. In this paper, we are presenting an automatic checkpoint algorithm on Spark to help solve the long lineage problem with less influence on the performance. The automatic checkpoint will select the necessary RDD to save and bring an acceptable overhead and improve the time performance for multiple iteration.
{"title":"ASC: Improving spark driver performance with automatic spark checkpoint","authors":"Weirong Zhu, Hao-peng Chen, Fei Hu","doi":"10.1109/ICACT.2016.7423490","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423490","url":null,"abstract":"Many great big data processing platforms, for example Hadoop Map Reduce, are keeping improving large-scale data processing performance which make big data processing focus of IT industry. Among them Spark has become increasingly popular big data processing framework since it was presented in 2010 first time. Spark use RDD for its data abstraction, targeting at the multiple iteration large-scale data processing with reuse of data, the in-memory feature of RDD make Spark faster than many other non-in-memory big data processing platform. However in-memory feature also bring the volatile problem, a failure or a missing RDD will cause Spark to recompute all the missing RDD on the lineage. And a long lineage will also increasing the time cost and memory usage of Driver analysing the lineage. A checkpoint will cut off the lineage and save the data which is required in the coming computing, the frequency to make a checkpoint and the RDDs which are selected to save will significantly influence the performance. In this paper, we are presenting an automatic checkpoint algorithm on Spark to help solve the long lineage problem with less influence on the performance. The automatic checkpoint will select the necessary RDD to save and bring an acceptable overhead and improve the time performance for multiple iteration.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423258
G. Khan, R. González, Eun-Chan Park
This paper gives an insight into IEEE 802.11ac by analysing its performance in terms of system throughput taking into consideration the key features of MAC and PHY layers. Throughput at MAC layer is calculated from transmission probability, contention window and transmission stage. Likewise, the new critical attributes of 802.11ac PHY (i.e. modulation and coding schemes, spatial streams, and channel bandwidth) are used to determine the throughput. To this end, a theoretical model is developed followed by simulation analysis. The results compare theoretical and simulation findings for different set of parameters. Furthermore, important trends and tradeoffs are identified between system throughput and (MAC + PHY) features as a function of number of contending stations and payload size.
{"title":"A performance analysis of MAC and PHY layers in IEEE 802.11ac wireless network","authors":"G. Khan, R. González, Eun-Chan Park","doi":"10.1109/ICACT.2016.7423258","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423258","url":null,"abstract":"This paper gives an insight into IEEE 802.11ac by analysing its performance in terms of system throughput taking into consideration the key features of MAC and PHY layers. Throughput at MAC layer is calculated from transmission probability, contention window and transmission stage. Likewise, the new critical attributes of 802.11ac PHY (i.e. modulation and coding schemes, spatial streams, and channel bandwidth) are used to determine the throughput. To this end, a theoretical model is developed followed by simulation analysis. The results compare theoretical and simulation findings for different set of parameters. Furthermore, important trends and tradeoffs are identified between system throughput and (MAC + PHY) features as a function of number of contending stations and payload size.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423447
Seung Beom Seo, Jae Young Kim, W. Jeon
Device-to-device (D2D) communication is a salient function of public safety networks for enabling communications, even in a disaster environment where the communication infrastructures are fully or partially destroyed. In order that devices directly communicate, they must first find and identify each other. Especially, in a disaster environment where wireless channel conditions may be very poor, discovery should be robust and fast for quick resume of the blocked communications again. In this paper, considering frequency selective fading which may lead to missing devices even though they exist, we propose a device discovery scheme using a simple physical layer waveform called signature. Typically, in a signature-based discovery under OFDMA-based system, a device advertises its presence by selecting a discovery channel and energizing subcarriers in the channel for a while (one subcarrier at a time). In the proposed scheme, we design discovery channels having well dispersed subcarriers to tolerate the frequency selectivity. By simulation, it is shown that not only successful discovery ratio of the proposed scheme is improved, but also our scheme is more frequency selective fading tolerant in comparison with other approaches.
{"title":"Robust and fast device discovery in OFDMA-based cellular networks for disaster environment","authors":"Seung Beom Seo, Jae Young Kim, W. Jeon","doi":"10.1109/ICACT.2016.7423447","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423447","url":null,"abstract":"Device-to-device (D2D) communication is a salient function of public safety networks for enabling communications, even in a disaster environment where the communication infrastructures are fully or partially destroyed. In order that devices directly communicate, they must first find and identify each other. Especially, in a disaster environment where wireless channel conditions may be very poor, discovery should be robust and fast for quick resume of the blocked communications again. In this paper, considering frequency selective fading which may lead to missing devices even though they exist, we propose a device discovery scheme using a simple physical layer waveform called signature. Typically, in a signature-based discovery under OFDMA-based system, a device advertises its presence by selecting a discovery channel and energizing subcarriers in the channel for a while (one subcarrier at a time). In the proposed scheme, we design discovery channels having well dispersed subcarriers to tolerate the frequency selectivity. By simulation, it is shown that not only successful discovery ratio of the proposed scheme is improved, but also our scheme is more frequency selective fading tolerant in comparison with other approaches.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}