首页 > 最新文献

2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Enhanced quantum multi-signature protocol based on controlled teleportation 基于受控隐形传态的增强型量子多重签名协议
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423537
Minghui Zhang, Huifang Li, Zhaoqiang Xia
The multi-user quantum signature protocol makes the message can be signed by more than one signatory. In this paper, we put forward an enhanced quantum multi-signature scheme based on Bell states and the controlled quantum teleportation. Compared to the previous multi-signature schemes, our protocol can offer higher security guaranteed by the fundamental laws of physics. While ensuring the nice security of the protocol we also pay attention to keeping its efficiency. Moreover, the scheme is more feasible with the present-day technique.
多用户量子签名协议使得消息可以由多个签名人签名。本文提出了一种基于贝尔态和受控量子隐形传态的增强型量子多重签名方案。与以前的多重签名方案相比,我们的协议可以提供更高的安全性,这是由基本的物理定律保证的。在保证协议良好安全性的同时,我们也注意保持协议的效率。此外,该方案在现有技术条件下更加可行。
{"title":"Enhanced quantum multi-signature protocol based on controlled teleportation","authors":"Minghui Zhang, Huifang Li, Zhaoqiang Xia","doi":"10.1109/ICACT.2016.7423537","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423537","url":null,"abstract":"The multi-user quantum signature protocol makes the message can be signed by more than one signatory. In this paper, we put forward an enhanced quantum multi-signature scheme based on Bell states and the controlled quantum teleportation. Compared to the previous multi-signature schemes, our protocol can offer higher security guaranteed by the fundamental laws of physics. While ensuring the nice security of the protocol we also pay attention to keeping its efficiency. Moreover, the scheme is more feasible with the present-day technique.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance study of LTE experimental testbed using OpenAirInterface 基于OpenAirInterface的LTE实验试验台性能研究
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423493
Chun Yeow Yeoh, M. Mokhtar, A. Rahman, A. Samingan
The next generation, 5G wireless access, is going to support a wide range of new applications and use cases, with the capabilities including very high achievable data rate, very low latency, ultra-high reliability and the possibility to handle extreme device densities. To avoid the costly deployment, operation and maintenance of future mobile network, Radio Access Network (RAN) virtualization or Cloud RAN is the answer to the problem. The idea is to move the baseband processing to the data center and run the RAN L1, L2 and L3 protocol layers using the commodity hardware, such as high-performance general purpose processors. An open source software-based LTE implementation, such as OpenAirInterface (OAI), is definitely accelerating the RAN cloudization and also realizing the possibility of low cost LTE network deployment in the future. In this paper, we describe the OAI LTE implementation emphasizing on the user plane data flow. We have successfully emulated over-the-air transmission for 1 UE and 1 eNB LTE network supporting both FDD Band 5 and TDD Band 38. We have also performed a thorough profiling of OAI, in terms of execution time, on the user plane data flow. Our results could be served as the reference for future optimization by open source community.
下一代5G无线接入将支持广泛的新应用和用例,其功能包括非常高的可实现数据速率、非常低的延迟、超高的可靠性以及处理极端设备密度的可能性。为了避免未来移动网络高昂的部署、运营和维护成本,无线接入网(RAN)虚拟化或云RAN是解决这一问题的答案。其想法是将基带处理转移到数据中心,并使用商用硬件(如高性能通用处理器)运行RAN L1、L2和L3协议层。基于开源软件的LTE实现,如OpenAirInterface (OAI),无疑加速了RAN的云化,也实现了未来低成本LTE网络部署的可能性。本文以用户平面数据流为重点,描述了OAI LTE的实现。我们成功地模拟了支持FDD Band 5和TDD Band 38的1 UE和1 eNB LTE网络的空中传输。我们还在用户平面数据流上就执行时间对OAI进行了全面的分析。我们的结果可以作为开源社区未来优化的参考。
{"title":"Performance study of LTE experimental testbed using OpenAirInterface","authors":"Chun Yeow Yeoh, M. Mokhtar, A. Rahman, A. Samingan","doi":"10.1109/ICACT.2016.7423493","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423493","url":null,"abstract":"The next generation, 5G wireless access, is going to support a wide range of new applications and use cases, with the capabilities including very high achievable data rate, very low latency, ultra-high reliability and the possibility to handle extreme device densities. To avoid the costly deployment, operation and maintenance of future mobile network, Radio Access Network (RAN) virtualization or Cloud RAN is the answer to the problem. The idea is to move the baseband processing to the data center and run the RAN L1, L2 and L3 protocol layers using the commodity hardware, such as high-performance general purpose processors. An open source software-based LTE implementation, such as OpenAirInterface (OAI), is definitely accelerating the RAN cloudization and also realizing the possibility of low cost LTE network deployment in the future. In this paper, we describe the OAI LTE implementation emphasizing on the user plane data flow. We have successfully emulated over-the-air transmission for 1 UE and 1 eNB LTE network supporting both FDD Band 5 and TDD Band 38. We have also performed a thorough profiling of OAI, in terms of execution time, on the user plane data flow. Our results could be served as the reference for future optimization by open source community.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Differentiated assignment of extrinsic information in iterated decoding of fixed weight codewords 定权码字迭代译码中外部信息的差异化赋值
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423620
Wonsun Bong, Y. C. Kim
Constant amplitude multi-code (CAMC) CDMA has the same structure as a recursively generated single parity check product code. A top-level codeword of CAMC is recursively constructed from lower-level codewords. In the iterative decoding of CAMC, log likelihood ratio (LLR), a priori information and extrinsic information (EI) of a codeword is a weighted sum of LLR values of associated codewords from which it is despread or into which it is spread. In this paper, we show that differentiated assignment of EI in the computation of LLR can improve the performance of bit error correction. The weights of CAMC codewords are fixed at two fixed values. We let EI converge fast to saturation value when a codeword has the correct weight. The proposed method achieved performance improvement of 0.1 ~ 0.3 dB in Eb/No over the regular iterated decoding of CAMC. When compared with despreading ON/OFF control, a gain of about 0. 1 dB is achieved, which is meaningful near the Shannon capacity limit.
恒幅多码(CAMC) CDMA与递归生成的单奇偶校验码结构相同。CAMC的顶层码字是由底层码字递归构造而成的。在CAMC的迭代译码过程中,码字的对数似然比(LLR)、先验信息和外在信息(EI)是该码字所传播的相关码字的LLR值的加权和。在本文中,我们证明了在LLR的计算中,EI的微分赋值可以提高误码校正的性能。CAMC码字的权值固定在两个固定值上。当码字具有正确的权值时,我们让EI快速收敛到饱和值。与常规的CAMC迭代解码相比,该方法在Eb/No下的性能提高了0.1 ~ 0.3 dB。与扩频ON/OFF控制相比,增益约为0。达到了1 dB,这在Shannon容量极限附近是有意义的。
{"title":"Differentiated assignment of extrinsic information in iterated decoding of fixed weight codewords","authors":"Wonsun Bong, Y. C. Kim","doi":"10.1109/ICACT.2016.7423620","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423620","url":null,"abstract":"Constant amplitude multi-code (CAMC) CDMA has the same structure as a recursively generated single parity check product code. A top-level codeword of CAMC is recursively constructed from lower-level codewords. In the iterative decoding of CAMC, log likelihood ratio (LLR), a priori information and extrinsic information (EI) of a codeword is a weighted sum of LLR values of associated codewords from which it is despread or into which it is spread. In this paper, we show that differentiated assignment of EI in the computation of LLR can improve the performance of bit error correction. The weights of CAMC codewords are fixed at two fixed values. We let EI converge fast to saturation value when a codeword has the correct weight. The proposed method achieved performance improvement of 0.1 ~ 0.3 dB in Eb/No over the regular iterated decoding of CAMC. When compared with despreading ON/OFF control, a gain of about 0. 1 dB is achieved, which is meaningful near the Shannon capacity limit.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AAaS: Area approaching and spray-and-wait routing scheme for DTN in Android AAaS: Android DTN的区域逼近和喷雾等待路由方案
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423451
Weitao Wang, Huimei Lu, Yong Xiang, Bingying Cai, Jingbang Wu, Rui Gao
Most of the existing DTN routing algorithms have been studied in the simulation environment. They are not sufficiently used to the historical location and historical neighbor's information. So AAaS (Area Approaching and Spray-and-Wait) routing algorithm is proposed, which considers the practicability of the algorithm and the rules of the node's movement and the law of the meeting. AAaS divides the map into areas by the administrative area, public places and areas the DTN nodes clustered with historical GPS position. Each area maintenance the frequency vectors of different time scales and the frequency vectors of the historical encountered neighbor. AAaS forwards the bundles by these frequency vectors in the bundle lifetime, select the appropriate next hop, more efficient use of the limited bandwidth of encountered nodes in DTN network. Finally, the prototype of AAaS routing algorithm is implemented in Android based on Bytewalla. The experimental results prove that, even in the case of the buffer is not limited, the AAaS is more efficient than Epidemic in the use of the limited bandwidth between encountered nodes.
现有的DTN路由算法大多在仿真环境下进行了研究。他们对历史位置和历史邻居的信息没有充分的了解。为此提出了AAaS (Area approached and Spray-and-Wait)路由算法,该算法考虑了算法的实用性以及节点的运动规律和相遇规律。AAaS根据行政区域、公共场所和DTN节点与历史GPS位置聚集的区域将地图划分为区域。每个区域保持不同时间尺度的频率向量和历史上遇到的相邻区域的频率向量。AAaS在包生命周期内通过这些频率向量转发包,选择合适的下一跳,更有效地利用DTN网络中遇到的节点的有限带宽。最后,基于Bytewalla在Android平台上实现了AAaS路由算法的原型。实验结果证明,即使在缓冲区不受限制的情况下,AAaS在利用遇到节点之间有限的带宽方面也比Epidemic更有效。
{"title":"AAaS: Area approaching and spray-and-wait routing scheme for DTN in Android","authors":"Weitao Wang, Huimei Lu, Yong Xiang, Bingying Cai, Jingbang Wu, Rui Gao","doi":"10.1109/ICACT.2016.7423451","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423451","url":null,"abstract":"Most of the existing DTN routing algorithms have been studied in the simulation environment. They are not sufficiently used to the historical location and historical neighbor's information. So AAaS (Area Approaching and Spray-and-Wait) routing algorithm is proposed, which considers the practicability of the algorithm and the rules of the node's movement and the law of the meeting. AAaS divides the map into areas by the administrative area, public places and areas the DTN nodes clustered with historical GPS position. Each area maintenance the frequency vectors of different time scales and the frequency vectors of the historical encountered neighbor. AAaS forwards the bundles by these frequency vectors in the bundle lifetime, select the appropriate next hop, more efficient use of the limited bandwidth of encountered nodes in DTN network. Finally, the prototype of AAaS routing algorithm is implemented in Android based on Bytewalla. The experimental results prove that, even in the case of the buffer is not limited, the AAaS is more efficient than Epidemic in the use of the limited bandwidth between encountered nodes.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of cyber security policy in industrial control system using data diodes 基于数据二极管的工业控制系统网络安全策略研究
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423374
Boo-Sun Jeon, Jungchan Na
The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer network to receive data directly from a less secure source while prohibiting the transmission of data in the opposite direction. In this paper, we describe data diode applied into industrial control system, after reviewing the commercial product, we address the various ways to apply a data diode in ICS and future works.
工业控制系统的安全性在2010年的Stuxnet事件中成为一个大话题。为了解决这些问题,数据二极管应运而生。数据二极管是一种计算机安全装置,它限制两台计算机之间沿网络连接的通信,使数据只能在一个方向上传输。这使得更敏感或高度机密的计算机网络能够直接从不太安全的来源接收数据,同时禁止反向传输数据。本文介绍了数据二极管在工业控制系统中的应用,在回顾了工业控制系统中数据二极管的商业产品之后,讨论了数据二极管在工业控制系统中的各种应用方法和今后的工作。
{"title":"A study of cyber security policy in industrial control system using data diodes","authors":"Boo-Sun Jeon, Jungchan Na","doi":"10.1109/ICACT.2016.7423374","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423374","url":null,"abstract":"The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer network to receive data directly from a less secure source while prohibiting the transmission of data in the opposite direction. In this paper, we describe data diode applied into industrial control system, after reviewing the commercial product, we address the various ways to apply a data diode in ICS and future works.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A caching mechanism for FAT file system in low-performance embedded system 低性能嵌入式系统中FAT文件系统的缓存机制
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423563
Jeaho Hwang, K. Won
FAT file system is one of the most common file systems on various targets and operating systems. However, it has a performance issue on sequential writing to low-bandwidth storage due to reading FAT area and directory entries. In this paper, we design and implement an efficient FAT caching mechanism for sequential writing to low-bandwidth. The mechanism consists two parts: metadata cache and whole FAT read-ahead cache. As a result, we show 20x improvement for sequential writing to low bandwidth storage with our caching mechanism.
FAT文件系统是各种目标和操作系统上最常见的文件系统之一。但是,由于读取FAT区域和目录条目,它在向低带宽存储进行顺序写入时存在性能问题。在本文中,我们设计并实现了一种高效的低带宽顺序写入FAT缓存机制。该机制由两部分组成:元数据缓存和整个FAT预读缓存。结果显示,使用我们的缓存机制,对低带宽存储的顺序写入提高了20倍。
{"title":"A caching mechanism for FAT file system in low-performance embedded system","authors":"Jeaho Hwang, K. Won","doi":"10.1109/ICACT.2016.7423563","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423563","url":null,"abstract":"FAT file system is one of the most common file systems on various targets and operating systems. However, it has a performance issue on sequential writing to low-bandwidth storage due to reading FAT area and directory entries. In this paper, we design and implement an efficient FAT caching mechanism for sequential writing to low-bandwidth. The mechanism consists two parts: metadata cache and whole FAT read-ahead cache. As a result, we show 20x improvement for sequential writing to low bandwidth storage with our caching mechanism.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Table based KNN for categorizing words 基于表的KNN分类词
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423523
T. Jo
In this research, we propose the table based KNN as the approach to the text categorization. In previous works, we discovered that encoding texts into tables improved the performance in the text categorization, so in this research, become to consider the possibility of encoding words into tables as well as texts. In this research, we encode words into tables where entries are texts and their weights, and apply the table based version of the KNN to the task of word categorization. As the benefits from this research, we expect the better performance and more stability than the traditional version of the KNN, by doing so. Therefore, the goal of this research is to provide the improved approach to the word categorization task.
在本研究中,我们提出了基于表的KNN作为文本分类的方法。在之前的工作中,我们发现将文本编码为表格可以提高文本分类的性能,因此在本研究中,我们开始考虑将单词编码为表格以及将文本编码为表格的可能性。在本研究中,我们将单词编码为表,其中条目为文本及其权重,并将基于表的KNN版本应用于单词分类任务。由于这项研究的好处,我们期望通过这样做,比传统版本的KNN有更好的性能和更大的稳定性。因此,本研究的目的是提供一种改进的词分类方法。
{"title":"Table based KNN for categorizing words","authors":"T. Jo","doi":"10.1109/ICACT.2016.7423523","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423523","url":null,"abstract":"In this research, we propose the table based KNN as the approach to the text categorization. In previous works, we discovered that encoding texts into tables improved the performance in the text categorization, so in this research, become to consider the possibility of encoding words into tables as well as texts. In this research, we encode words into tables where entries are texts and their weights, and apply the table based version of the KNN to the task of word categorization. As the benefits from this research, we expect the better performance and more stability than the traditional version of the KNN, by doing so. Therefore, the goal of this research is to provide the improved approach to the word categorization task.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method of logically time synchronization for safety-critical distributed system 安全关键型分布式系统的逻辑时间同步方法
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423390
Jeman Park, Taeho Kim
Legacy real-time and embedded systems have been small scale and standalone. However, recently they are increasingly being connected to create large-scale distributed system. Such distributed embedded system is realized in automotive, medical, and manufacturing automation. Also, there are many researches about software platform for large-scale distributed system. Verification of the application is required in SW platform for safety-critical distributed system. However, the verification complexity increases in practice as several factors such as delay, jitter and error. An equivalent synchronized execution of distributed tasks are required in distributed realtime system. Our method is based on the PALS (Physically Asynchronous Logically Synchronous) which is a complexity-reducing architectural pattern for distributed real-time systems. It allows developers to design, verify and implement a logically synchronous implementation of real-time distributed applications. In this paper, we introduce a logical time synchronization for reducing complexity between distributed nodes in distributed embedded system. It make verification and development of distributed software easier. It is helpful to develop distributed embedded system which requires safety and reliability. This paper is useful for application programmer or system manager who wants to establish distributed embedded system which requires safety and reliability.
传统的实时和嵌入式系统规模较小,并且是独立的。然而,最近它们越来越多地被连接起来,以创建大规模的分布式系统。这种分布式嵌入式系统在汽车自动化、医疗自动化、制造业自动化等领域均有实现。同时,针对大型分布式系统的软件平台也有很多研究。对于安全关键型分布式系统,需要在软件平台上对应用程序进行验证。然而,在实际应用中,由于延迟、抖动和误差等因素的影响,验证的复杂性不断增加。在分布式实时系统中,分布式任务需要同等的同步执行。我们的方法基于PALS(物理异步逻辑同步),这是一种降低分布式实时系统复杂性的体系结构模式。它允许开发人员设计、验证和实现实时分布式应用程序的逻辑同步实现。为了降低分布式嵌入式系统中分布式节点间的复杂度,本文提出了一种逻辑时间同步方法。它使分布式软件的验证和开发变得更加容易。为开发对安全性和可靠性要求较高的分布式嵌入式系统提供了帮助。本文对应用程序员或系统管理员建立对安全性和可靠性有要求的分布式嵌入式系统有一定的参考价值。
{"title":"A method of logically time synchronization for safety-critical distributed system","authors":"Jeman Park, Taeho Kim","doi":"10.1109/ICACT.2016.7423390","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423390","url":null,"abstract":"Legacy real-time and embedded systems have been small scale and standalone. However, recently they are increasingly being connected to create large-scale distributed system. Such distributed embedded system is realized in automotive, medical, and manufacturing automation. Also, there are many researches about software platform for large-scale distributed system. Verification of the application is required in SW platform for safety-critical distributed system. However, the verification complexity increases in practice as several factors such as delay, jitter and error. An equivalent synchronized execution of distributed tasks are required in distributed realtime system. Our method is based on the PALS (Physically Asynchronous Logically Synchronous) which is a complexity-reducing architectural pattern for distributed real-time systems. It allows developers to design, verify and implement a logically synchronous implementation of real-time distributed applications. In this paper, we introduce a logical time synchronization for reducing complexity between distributed nodes in distributed embedded system. It make verification and development of distributed software easier. It is helpful to develop distributed embedded system which requires safety and reliability. This paper is useful for application programmer or system manager who wants to establish distributed embedded system which requires safety and reliability.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file EnCase取证技术用于解密速记算法在PowerPoint文件中的应用
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423533
Hyunho Kim, N. Bruce, Suhyun Park, Hoonjae Lee
The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Among others techniques of message hiding, stenography is one them but more suspicious as no one cannot see the secret message. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. In this paper, we propose a new technique to find a hidden message by analysing the in PowerPoint file using EnCase Transcript. The result analysis shows that Steganography technique had hidden a certain number of message which are invisible to naked eye.
随着信息技术和互联网通信的发展,大量的加密信息也随之产生。在其他信息隐藏技术中,速记是其中之一,但更可疑的是没有人能看到秘密信息。由于我们经常使用MS Office,所以有很多方法可以将PowerPoint作为普通文件来隐藏秘密信息。本文提出了一种利用EnCase Transcript分析PowerPoint文件中隐藏信息的新技术。分析结果表明,隐写技术隐藏了一定数量肉眼看不见的信息。
{"title":"EnCase forensic technology for decrypting stenography algorithm applied in the PowerPoint file","authors":"Hyunho Kim, N. Bruce, Suhyun Park, Hoonjae Lee","doi":"10.1109/ICACT.2016.7423533","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423533","url":null,"abstract":"The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Among others techniques of message hiding, stenography is one them but more suspicious as no one cannot see the secret message. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. In this paper, we propose a new technique to find a hidden message by analysing the in PowerPoint file using EnCase Transcript. The result analysis shows that Steganography technique had hidden a certain number of message which are invisible to naked eye.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social simulation: The need of data-driven agent-based modelling approach 社会模拟:基于数据驱动的智能体建模方法的需求
Pub Date : 1900-01-01 DOI: 10.1109/ICACT.2016.7423571
M. Sajjad, Karandeep Singh, Euihyun Paik, Chang-Won Ahn
Agent-based modeling and simulation (ABMS) has attracted social scientists and demographers in the field of social simulation. Due to large number of computer simulation technologies, ABMS approaches have been proposed with majority applications. ABMS composed of heterogeneous interacting agents, with several features which turn them into a significantly attractive modeling approach to simulate complex social systems. In this paper, first we explore the underlying social theories for ABMS, its simulation and modeling techniques, and computational frameworks. Second, our paper concentrate on the potential need of ABM techniques in the context of social simulation. An alternative ABM approach that is getting popularity is to inject data into agent-based simulation. To validate our model, we compare our results with actual-data. Our results closely matched with actual-data results in the case of mean-age at the demographic transition of first childbirth. Our work encourage ABM modelers to promote this trend while designing their models. Further, our paper is an attempt to merge the microsimulation approach into the agent-based simulation through injecting data into ABM approach.
基于主体的建模与仿真(ABMS)在社会仿真领域引起了社会科学家和人口统计学家的广泛关注。由于大量的计算机仿真技术,ABMS方法被提出并得到了广泛的应用。ABMS由异质相互作用的代理组成,具有一些特征,使它们成为一种非常有吸引力的模拟复杂社会系统的建模方法。在本文中,我们首先探讨了ABMS的潜在社会理论,它的模拟和建模技术,以及计算框架。其次,我们的论文集中在社会模拟背景下对ABM技术的潜在需求。另一种越来越流行的ABM方法是将数据注入到基于代理的模拟中。为了验证我们的模型,我们将结果与实际数据进行了比较。我们的结果与实际数据结果密切匹配的情况下,平均年龄在人口结构的转变,第一次分娩。我们的工作鼓励ABM建模者在设计他们的模型时促进这一趋势。此外,我们的论文试图通过向ABM方法中注入数据,将微仿真方法融入到基于agent的仿真中。
{"title":"Social simulation: The need of data-driven agent-based modelling approach","authors":"M. Sajjad, Karandeep Singh, Euihyun Paik, Chang-Won Ahn","doi":"10.1109/ICACT.2016.7423571","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423571","url":null,"abstract":"Agent-based modeling and simulation (ABMS) has attracted social scientists and demographers in the field of social simulation. Due to large number of computer simulation technologies, ABMS approaches have been proposed with majority applications. ABMS composed of heterogeneous interacting agents, with several features which turn them into a significantly attractive modeling approach to simulate complex social systems. In this paper, first we explore the underlying social theories for ABMS, its simulation and modeling techniques, and computational frameworks. Second, our paper concentrate on the potential need of ABM techniques in the context of social simulation. An alternative ABM approach that is getting popularity is to inject data into agent-based simulation. To validate our model, we compare our results with actual-data. Our results closely matched with actual-data results in the case of mean-age at the demographic transition of first childbirth. Our work encourage ABM modelers to promote this trend while designing their models. Further, our paper is an attempt to merge the microsimulation approach into the agent-based simulation through injecting data into ABM approach.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2016 18th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1