Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674659
Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim
In this paper, memory reduction method using the Sub-PFP is proposed. That is, two-dimensional PFPs in conventional N-LUT method can be converted by one-dimensional Sub-PFPs using trigonometric relations. Some experiments with a test 3-D object are carried out and the reduction ratio of LUT is analyzed.
{"title":"Memory reduction of N-LUT method using sub-principle fringe patterns","authors":"Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim","doi":"10.1109/ICTC.2010.5674659","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674659","url":null,"abstract":"In this paper, memory reduction method using the Sub-PFP is proposed. That is, two-dimensional PFPs in conventional N-LUT method can be converted by one-dimensional Sub-PFPs using trigonometric relations. Some experiments with a test 3-D object are carried out and the reduction ratio of LUT is analyzed.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131683850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674789
Jong-Yeon Park, Jiwoong Choi, Okyeon Yi
White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against white box attack model [1,2]. However, slower performance by operating too many look up tables is a problem of practical use of white box cryptography. Also key updating on dynamic situations of white box cryptography is much harder than key updating of black box cryptography. Thus, this paper suggests using a specific mode of operation to improve speed of white box implementations, and show concrete examples of enhancement of performance. Also, it suggests a technique of key updating with dynamic and static tables in practically.
{"title":"Methods for practical whitebox cryptography","authors":"Jong-Yeon Park, Jiwoong Choi, Okyeon Yi","doi":"10.1109/ICTC.2010.5674789","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674789","url":null,"abstract":"White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against white box attack model [1,2]. However, slower performance by operating too many look up tables is a problem of practical use of white box cryptography. Also key updating on dynamic situations of white box cryptography is much harder than key updating of black box cryptography. Thus, this paper suggests using a specific mode of operation to improve speed of white box implementations, and show concrete examples of enhancement of performance. Also, it suggests a technique of key updating with dynamic and static tables in practically.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674777
Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn
In this paper, We present more accurate access delay analysis through the consideration of piggyback request. In our analysis, we derived a formula for access delay introducing a self-similar traffic model to prove the effect of the piggyback request. We also show that the piggyback request can greatly affect the access delay under high traffic conditions.
{"title":"Analysis of access delay under high traffic conditions in CATV networks","authors":"Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn","doi":"10.1109/ICTC.2010.5674777","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674777","url":null,"abstract":"In this paper, We present more accurate access delay analysis through the consideration of piggyback request. In our analysis, we derived a formula for access delay introducing a self-similar traffic model to prove the effect of the piggyback request. We also show that the piggyback request can greatly affect the access delay under high traffic conditions.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER (Bit Error Rate) performance according to the FFT input bit resolution in WiBro system","authors":"Y. Lee, Young-il Kim, Cheol-Hye Cho, W. Ryu, Whan-woo Kim","doi":"10.1109/ICTC.2010.5674270","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674270","url":null,"abstract":"This paper finds the optimum input bit size of FFT engine in WiBro system through the uncoded-BER performances of computer simulation.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126271027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674779
Hyung-Jik Lee, Jeunwoo Lee
Desktop virtualization allows IT developments to reduce management and support costs, along with capital expenses for desktop hardware. Therefore, a user uses virtualization services using management tools, but they are not compatible with each other. As a result, t he O VF i s used as t he standard for the virtual machine image in order to provide virtualization solution for companies. Therefore, in this paper, we suggest the management software can generalize a management API and a user interface used in the management tool and can be used even in the virtualization solutions of any companies.
{"title":"Design for management software of desktop virtualization solutions","authors":"Hyung-Jik Lee, Jeunwoo Lee","doi":"10.1109/ICTC.2010.5674779","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674779","url":null,"abstract":"Desktop virtualization allows IT developments to reduce management and support costs, along with capital expenses for desktop hardware. Therefore, a user uses virtualization services using management tools, but they are not compatible with each other. As a result, t he O VF i s used as t he standard for the virtual machine image in order to provide virtualization solution for companies. Therefore, in this paper, we suggest the management software can generalize a management API and a user interface used in the management tool and can be used even in the virtualization solutions of any companies.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674819
Tran Trung Duy, H. Kong
In this paper, we propose and evaluate the performance of two cooperative multi-hop transmission protocols. We derive expressions of packet error rate (PER) and average number of transmissions for the proposed protocols. The Monte-Carlo simulations are presented to verify the theoretical analyses.
{"title":"Performance analysis of cooperative multi-hop transmission protocols","authors":"Tran Trung Duy, H. Kong","doi":"10.1109/ICTC.2010.5674819","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674819","url":null,"abstract":"In this paper, we propose and evaluate the performance of two cooperative multi-hop transmission protocols. We derive expressions of packet error rate (PER) and average number of transmissions for the proposed protocols. The Monte-Carlo simulations are presented to verify the theoretical analyses.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674674
Min-Jung Baek, Ki-Il Kim, Sunghyun Cho
The Mint-Route routing protocol was proposed to enhance reliability by choosing adjacent link with the smallest number of lost packets as next hop in wireless sensor networks. However, since packets are transmitted over unstable wireless link, physical distance between nodes can mostly affect the reliability. So, long path with many hops is usually established between source and destination while considering current metrics. To solve this problem, we develop a revised Mint-Route protocol by considering the received packet as well as distance together while deciding parent node toward the sink. Simulations and their analysis are followed to validate the suitability of reduced end-to-end delay and enhanced reliability.
{"title":"A revised Mint-Route protocol in wireless sensor networks","authors":"Min-Jung Baek, Ki-Il Kim, Sunghyun Cho","doi":"10.1109/ICTC.2010.5674674","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674674","url":null,"abstract":"The Mint-Route routing protocol was proposed to enhance reliability by choosing adjacent link with the smallest number of lost packets as next hop in wireless sensor networks. However, since packets are transmitted over unstable wireless link, physical distance between nodes can mostly affect the reliability. So, long path with many hops is usually established between source and destination while considering current metrics. To solve this problem, we develop a revised Mint-Route protocol by considering the received packet as well as distance together while deciding parent node toward the sink. Simulations and their analysis are followed to validate the suitability of reduced end-to-end delay and enhanced reliability.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674703
Sungwon Lee, Dongseung Shin, Dongkyun Kim
Communications in underwater wireless sensor networks have a lot of limitations as compared to those in terrestrial sensor networks. In wireless sensor networks, a routing protocol finds a path between the source and sink nodes according to a routing metric. The hop count is the most widely used routing metric, however, it cannot reflect the quality of a link. It is expected that a link quality aware metric such as ETX can contribute to improving the performance, especially in underwater sensor networks (UWSNs). However, the direct adoption of ETX in UWSNs may not provide expected performance. In this paper, we investigate the effect of ETX measurement on the performance in UWSNs through NS-2 simulations.
{"title":"The effect of ETX measurement on routing performance in underwater sensor networks","authors":"Sungwon Lee, Dongseung Shin, Dongkyun Kim","doi":"10.1109/ICTC.2010.5674703","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674703","url":null,"abstract":"Communications in underwater wireless sensor networks have a lot of limitations as compared to those in terrestrial sensor networks. In wireless sensor networks, a routing protocol finds a path between the source and sink nodes according to a routing metric. The hop count is the most widely used routing metric, however, it cannot reflect the quality of a link. It is expected that a link quality aware metric such as ETX can contribute to improving the performance, especially in underwater sensor networks (UWSNs). However, the direct adoption of ETX in UWSNs may not provide expected performance. In this paper, we investigate the effect of ETX measurement on the performance in UWSNs through NS-2 simulations.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122464224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674794
Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee
In this paper, we build a framework for maximizing the utilization of solar-based harvesting energy in sensor networks. For this goal, we analyze the required power at each relay node and give the queueing framework for the power management. In the simulation, our proposed algorithm shows a superior performance than conventional ones in terms of the PRR (Packet Reception Rate) for a day according to the recharging efficiency.
{"title":"Optimal energy management over solar based energy harvesting sensor network","authors":"Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee","doi":"10.1109/ICTC.2010.5674794","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674794","url":null,"abstract":"In this paper, we build a framework for maximizing the utilization of solar-based harvesting energy in sensor networks. For this goal, we analyze the required power at each relay node and give the queueing framework for the power management. In the simulation, our proposed algorithm shows a superior performance than conventional ones in terms of the PRR (Packet Reception Rate) for a day according to the recharging efficiency.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674755
Soyoung Park, Shingak Kang
IP multimedia spam poses a threat to the users of various IP applications as well as email spam and SMS spam does. Considering this circumstances, we suggest functional architecture for countering IP multimedia spam. Specifically, we first propose functional architecture for countering IP multimedia spam. We then describe functionalities and interactions between functional components in the architecture. Finally, considerations for adoption of the anti-spam framework on telecommunications networks are provided.
{"title":"Functional architecture for countering IP multimedia spam","authors":"Soyoung Park, Shingak Kang","doi":"10.1109/ICTC.2010.5674755","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674755","url":null,"abstract":"IP multimedia spam poses a threat to the users of various IP applications as well as email spam and SMS spam does. Considering this circumstances, we suggest functional architecture for countering IP multimedia spam. Specifically, we first propose functional architecture for countering IP multimedia spam. We then describe functionalities and interactions between functional components in the architecture. Finally, considerations for adoption of the anti-spam framework on telecommunications networks are provided.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133366256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}