首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Outage performance analysis of IHDAF cooperative based communication system 基于IHDAF协同通信系统的中断性能分析
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323693
Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, T. Han, K. Kwak
In this paper, we propose an incremental hybrid decode-amplify-forward (IHDAF) cooperative scheme based free space optical (FSO) communication system to resist the performance degradation caused by path loss, atmospheric turbulence, and pointing errors. The IHDAF cooperative FSO system can choose direct transmission, decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols flexibly according to the instantaneous channel state information (CSI) and signal-to-noise ratio (SNR). The outage probability analysis of the IHDAF cooperative FSO system is also presented in the weak turbulence channel with pointing errors. Numerical results show that the proposed IHDAF cooperative FSO system improves the system performance compared with the other conventional cooperative FSO systems. Moreover, we also study the effects of the power allocation and the relay position on the system performance of the proposed IHDAF cooperative FSO system.
在本文中,我们提出了一种基于增量混合解码-放大-转发(IHDAF)合作方案的自由空间光学(FSO)通信系统,以抵抗路径损耗、大气湍流和指向误差引起的性能下降。IHDAF合作FSO系统可以根据信道瞬时状态信息(CSI)和信噪比(SNR)灵活选择直接传输、解码转发(DF)和放大转发(AF)中继协议。在具有指向误差的弱湍流信道中,对IHDAF合作FSO系统的中断概率进行了分析。数值结果表明,与其他传统的FSO系统相比,所提出的IHDAF协同FSO系统的性能得到了提高。此外,我们还研究了功率分配和中继位置对所提出的IHDAF合作FSO系统性能的影响。
{"title":"Outage performance analysis of IHDAF cooperative based communication system","authors":"Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, T. Han, K. Kwak","doi":"10.23919/ICACT.2018.8323693","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323693","url":null,"abstract":"In this paper, we propose an incremental hybrid decode-amplify-forward (IHDAF) cooperative scheme based free space optical (FSO) communication system to resist the performance degradation caused by path loss, atmospheric turbulence, and pointing errors. The IHDAF cooperative FSO system can choose direct transmission, decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols flexibly according to the instantaneous channel state information (CSI) and signal-to-noise ratio (SNR). The outage probability analysis of the IHDAF cooperative FSO system is also presented in the weak turbulence channel with pointing errors. Numerical results show that the proposed IHDAF cooperative FSO system improves the system performance compared with the other conventional cooperative FSO systems. Moreover, we also study the effects of the power allocation and the relay position on the system performance of the proposed IHDAF cooperative FSO system.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test system RFID协议一致性测试系统中标签相位和幅度的计算算法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323667
Na Wang, Yingge Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang
Nowadays, RFID (Radio Frequency Identification) technology is widely used in logistics management, tolling system as well as authorization management. But either the performance of reader or tag is the largest influence factor in RFID systems compared with other components, so this paper mainly works on how to calculate tag phase and amplitude by signal with CFO that have an obvious influence on signal. This paper propose, an algorithm reducing influence CFO and carrier frequency drift have based on RFID protocol conformance test system and RFID signal analysis system. We find the change of signal with statistical idea and piecewise linear fitting to solve CFO. The difficulty is how to pinpoint location where rate of change changes and locate the start and end of signal. We use rate of change of tag phase and tag amplitude to separate tag signal to correct it, and we use cluster to get center points of signal to calculate tag phase. This algorithm has been used in our system. In this paper, we finished segmentation of signal and analysis of signal. To separate tag signal and reader signal more accurately, we filter signal firstly and then use state transition model. We calculate the value of carrier roughly with simple cluster firstly. Then we start work with state transition model. Finally, we get right location of reader signal and tag signal. And we introduce how to get the phase and amplitude of 18000-6C tag signal and 18000-6B tag signal. We analysis the influence on 18000-6c signal and 18000-6B that CFO and frequency drift have, and propose algorithms for different protocol. We get that 18000-6b IQ signals approximately periodic, but period is a little fluctuate. We use statistical idea to find the period accurately and use fitting curve to fit the change of phase. We get that tag-phase of 18000-6C signal increased linearly in a symbol. So with 18000-6c signal, we adopt piecewise linear fitting not linear regression in a whole of tag signal. After we modify the phase and then we get the correct tag amplitude and tag phase.
如今,RFID(无线射频识别)技术被广泛应用于物流管理、收费系统以及授权管理等领域。但在RFID系统中,读写器的性能和标签的性能是影响RFID系统性能的最大因素,因此本文主要研究如何利用对信号影响明显的CFO来计算标签的相位和幅度。本文提出了一种基于RFID协议一致性测试系统和RFID信号分析系统的降低CFO和载波频率漂移影响的算法。我们用统计的思想和分段线性拟合来寻找信号的变化来解决CFO问题。难点在于如何精确定位变化率变化的位置以及信号的开始和结束位置。利用标签相位变化率和标签振幅变化率对标签信号进行分离校正,利用聚类得到信号中心点计算标签相位。该算法已在我们的系统中得到应用。在本文中,我们完成了信号的分割和分析。为了更准确地分离标签信号和读取器信号,我们先对信号进行滤波,然后使用状态转移模型。我们首先用简单聚类粗略计算载波的值。然后我们开始研究状态转换模型。最后,我们得到了读取器信号和标签信号的正确位置。介绍了18000-6C标签信号和18000-6B标签信号的相位和幅度的获取方法。分析了CFO和频率漂移对18000-6c信号和18000-6B信号的影响,提出了针对不同协议的算法。我们得到18000-6b的IQ信号大致是周期性的,但周期有一点波动。我们用统计学的思想准确地找到周期,用拟合曲线来拟合相位的变化。我们得到18000-6C信号的标签相位在一个符号中线性增加。所以对于18000-6c的信号,我们对整个标签信号采用分段线性拟合而不是线性回归。在我们修改相位之后我们就得到了正确的标签振幅和相位。
{"title":"An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test system","authors":"Na Wang, Yingge Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang","doi":"10.23919/ICACT.2018.8323667","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323667","url":null,"abstract":"Nowadays, RFID (Radio Frequency Identification) technology is widely used in logistics management, tolling system as well as authorization management. But either the performance of reader or tag is the largest influence factor in RFID systems compared with other components, so this paper mainly works on how to calculate tag phase and amplitude by signal with CFO that have an obvious influence on signal. This paper propose, an algorithm reducing influence CFO and carrier frequency drift have based on RFID protocol conformance test system and RFID signal analysis system. We find the change of signal with statistical idea and piecewise linear fitting to solve CFO. The difficulty is how to pinpoint location where rate of change changes and locate the start and end of signal. We use rate of change of tag phase and tag amplitude to separate tag signal to correct it, and we use cluster to get center points of signal to calculate tag phase. This algorithm has been used in our system. In this paper, we finished segmentation of signal and analysis of signal. To separate tag signal and reader signal more accurately, we filter signal firstly and then use state transition model. We calculate the value of carrier roughly with simple cluster firstly. Then we start work with state transition model. Finally, we get right location of reader signal and tag signal. And we introduce how to get the phase and amplitude of 18000-6C tag signal and 18000-6B tag signal. We analysis the influence on 18000-6c signal and 18000-6B that CFO and frequency drift have, and propose algorithms for different protocol. We get that 18000-6b IQ signals approximately periodic, but period is a little fluctuate. We use statistical idea to find the period accurately and use fitting curve to fit the change of phase. We get that tag-phase of 18000-6C signal increased linearly in a symbol. So with 18000-6c signal, we adopt piecewise linear fitting not linear regression in a whole of tag signal. After we modify the phase and then we get the correct tag amplitude and tag phase.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QAT: Evaluation of a dedicated hardware accelerator for high performance web service QAT:评估用于高性能web服务的专用硬件加速器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323723
Shuai Xue, Liu Yao, Zhangkai Wang
Security is increasingly becoming a vital necessity for web service. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that are used to provide confidentiality and data integrity between two applications. SSL/TLS has been widely integrated into web service applications. However, the heavy overhead that is brought by frequent encryption and decryption operations in SSL/TLS has terribly burden the CPU. To address this issue, various vendors and researchers focused on developing new alternatives, such as GPU-based and FPGA-based accelerators. Unfortunately, expensive development cost and time cost seriously restrict their deployment in web servers. In this paper, we present and evaluate an emerging dedicated hardware accelerator named Quick Assist Technology(QAT). We analyse and explain the QAT's asynchronous working mode and how it cooperates with OpenSSL and Nginx server. The experimental results show that the dedicated hardware accelerator can speed up the number of connections by 10x comparing to the traditional software ways.
安全性正日益成为web服务的重要需求。安全套接字层(SSL)和传输层安全性(TLS)是用于在两个应用程序之间提供机密性和数据完整性的加密协议。SSL/TLS已广泛集成到web服务应用程序中。但是,SSL/TLS中频繁的加解密操作带来的沉重开销给CPU带来了沉重的负担。为了解决这个问题,各种供应商和研究人员都致力于开发新的替代方案,例如基于gpu和基于fpga的加速器。不幸的是,昂贵的开发成本和时间成本严重限制了它们在web服务器上的部署。在本文中,我们提出并评估了一种新兴的专用硬件加速器——快速辅助技术(QAT)。我们分析和解释了QAT的异步工作模式,以及它如何与OpenSSL和Nginx服务器合作。实验结果表明,与传统的软件方式相比,专用硬件加速器的连接数提高了10倍。
{"title":"QAT: Evaluation of a dedicated hardware accelerator for high performance web service","authors":"Shuai Xue, Liu Yao, Zhangkai Wang","doi":"10.23919/ICACT.2018.8323723","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323723","url":null,"abstract":"Security is increasingly becoming a vital necessity for web service. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that are used to provide confidentiality and data integrity between two applications. SSL/TLS has been widely integrated into web service applications. However, the heavy overhead that is brought by frequent encryption and decryption operations in SSL/TLS has terribly burden the CPU. To address this issue, various vendors and researchers focused on developing new alternatives, such as GPU-based and FPGA-based accelerators. Unfortunately, expensive development cost and time cost seriously restrict their deployment in web servers. In this paper, we present and evaluate an emerging dedicated hardware accelerator named Quick Assist Technology(QAT). We analyse and explain the QAT's asynchronous working mode and how it cooperates with OpenSSL and Nginx server. The experimental results show that the dedicated hardware accelerator can speed up the number of connections by 10x comparing to the traditional software ways.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Video scene title generation based on explicit and implicit relations among caption words 基于标题词之间显式和隐式关系的视频场景标题生成
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323835
Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim
Titles of videos are the most important aspect to provide various services. Recently, scene based or video fragments based services have been launched. Since videos in such services are often automatically generated by segmenting a video, these contents cannot have their own titles. As a result, titles of the video fragments are annotated by human hands. To reduce the cost for manual annotation of video titles, this paper proposes a novel method to generate titles of videos by selecting informative sentences from closed captions. The proposed method utilizes explicit and implicit relations among words occurred in closed captions by constructing a stochastic matrix. And then, the proposed method picks important words up based on their weights estimated with TextRank. A title is generated by selecting a sentence with important words from closed captions. Experimental results shows several cases with well-known Korean TV programs.
视频标题是提供各种服务的最重要的方面。最近推出了基于场景或视频片段的服务。由于这些服务中的视频通常是通过分割视频自动生成的,因此这些内容不能有自己的标题。因此,视频片段的标题是由人工注释的。为了降低人工标注视频标题的成本,本文提出了一种从封闭字幕中选择信息句生成视频标题的新方法。该方法通过构造一个随机矩阵来利用封闭字幕中出现的词之间的显式和隐式关系。然后,该方法根据TextRank估计的重要单词的权重提取重要单词。通过从封闭的标题中选择包含重要单词的句子来生成标题。实验结果表明,在韩国知名电视节目中有几个例子。
{"title":"Video scene title generation based on explicit and implicit relations among caption words","authors":"Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim","doi":"10.23919/ICACT.2018.8323835","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323835","url":null,"abstract":"Titles of videos are the most important aspect to provide various services. Recently, scene based or video fragments based services have been launched. Since videos in such services are often automatically generated by segmenting a video, these contents cannot have their own titles. As a result, titles of the video fragments are annotated by human hands. To reduce the cost for manual annotation of video titles, this paper proposes a novel method to generate titles of videos by selecting informative sentences from closed captions. The proposed method utilizes explicit and implicit relations among words occurred in closed captions by constructing a stochastic matrix. And then, the proposed method picks important words up based on their weights estimated with TextRank. A title is generated by selecting a sentence with important words from closed captions. Experimental results shows several cases with well-known Korean TV programs.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless identifying system based on nano-tags 基于纳米标签的无线识别系统
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323909
Mikhail Blinnikov, R. Pirmagomedov
Currently quite a lot of attention is paid to research in the field of Nano Communications. The use of nanomachines leads to improvement of existing applications. Example of such applications is wireless identifying system based on nano-tags. This article considers system that identifying items using passive nano-tags (harvesting energy from external electromagnetic waves). The article also considers the use THz band to transmit data and the numerical estimation of communication channel characteristics for the first “window of transparency”.
目前,纳米通信领域的研究备受关注。纳米机器的使用导致现有应用的改进。这种应用的例子是基于纳米标签的无线识别系统。本文研究了一种利用被动纳米标签(从外部电磁波中获取能量)识别物品的系统。本文还考虑了使用太赫兹波段进行数据传输,并对第一个“透明窗口”的通信信道特性进行了数值估计。
{"title":"Wireless identifying system based on nano-tags","authors":"Mikhail Blinnikov, R. Pirmagomedov","doi":"10.23919/ICACT.2018.8323909","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323909","url":null,"abstract":"Currently quite a lot of attention is paid to research in the field of Nano Communications. The use of nanomachines leads to improvement of existing applications. Example of such applications is wireless identifying system based on nano-tags. This article considers system that identifying items using passive nano-tags (harvesting energy from external electromagnetic waves). The article also considers the use THz band to transmit data and the numerical estimation of communication channel characteristics for the first “window of transparency”.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An SDN framework for video conference in inter-domain network 面向跨域网络视频会议的SDN框架
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323847
Teerawut Banchuen, Kiattikun Kawila, K. Rojviboonchai
Video conference is the most popular application which is required high quality of service (QoS) such as delay and jitter. Several existing mechanisms for enhancing were proposed in the traditional network not only at the application side as video clients but also at the network core as network routers. Although, these mechanisms can provide a good quality of service, they require a lot of maintenance cost. In addition, the static routing with the shortest-path fashion at the network gateways is not enough to provide a high quality of service for video/audio data transferring due to the affectation of background traffic. Software Defined Network (SDN) is an emerging network architecture that allows a network operator to manage their network environment by programmable centralized control. This not only reduces the cost of maintenance but also increase the performance of networking. In this paper, we proposed an SDN framework for video conference in inter-domain network. The framework used the Packet Pair technique to consider the characteristics of bandwidth and end-to-end delay between two video conference clients. A transferring path and network gateway inside-domain are set up based on this information without a requirement of a routing modification of outside-domains. The evaluation results from Mininet emulator and OF@TEIN testbed show that our framework outperforms the traditional networking significantly in terms of QoS metrics.
视频会议是目前最受欢迎的应用,它对服务质量(QoS)有较高的要求,如延迟和抖动等。在传统网络中,既有应用端(如视频客户端)的增强机制,也有核心端(如网络路由器)的增强机制。尽管这些机制可以提供高质量的服务,但它们需要大量的维护成本。此外,由于后台流量的影响,网络网关采用最短路径方式的静态路由不足以为视频/音频数据传输提供高质量的服务。软件定义网络(SDN)是一种新兴的网络架构,它允许网络运营商通过可编程的集中控制来管理他们的网络环境。这不仅降低了维护成本,而且提高了网络的性能。本文提出了一种用于跨域网络视频会议的SDN框架。该框架采用分组对技术来考虑两个视频会议客户端之间的带宽和端到端延迟特性。在不需要修改外域路由的情况下,根据这些信息建立域内传输路径和网关。Mininet仿真器和OF@TEIN测试平台的评估结果表明,我们的框架在QoS指标方面明显优于传统网络。
{"title":"An SDN framework for video conference in inter-domain network","authors":"Teerawut Banchuen, Kiattikun Kawila, K. Rojviboonchai","doi":"10.23919/ICACT.2018.8323847","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323847","url":null,"abstract":"Video conference is the most popular application which is required high quality of service (QoS) such as delay and jitter. Several existing mechanisms for enhancing were proposed in the traditional network not only at the application side as video clients but also at the network core as network routers. Although, these mechanisms can provide a good quality of service, they require a lot of maintenance cost. In addition, the static routing with the shortest-path fashion at the network gateways is not enough to provide a high quality of service for video/audio data transferring due to the affectation of background traffic. Software Defined Network (SDN) is an emerging network architecture that allows a network operator to manage their network environment by programmable centralized control. This not only reduces the cost of maintenance but also increase the performance of networking. In this paper, we proposed an SDN framework for video conference in inter-domain network. The framework used the Packet Pair technique to consider the characteristics of bandwidth and end-to-end delay between two video conference clients. A transferring path and network gateway inside-domain are set up based on this information without a requirement of a routing modification of outside-domains. The evaluation results from Mininet emulator and OF@TEIN testbed show that our framework outperforms the traditional networking significantly in terms of QoS metrics.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Statistical traffic generation methods for urban traffic simulation 城市交通模拟的统计交通生成方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323711
Hye-Su Song, Okgee Min
The urban traffic analysis is an important issue in government strategies, and there are diverse researches to address urban traffic states including congestion states. In this paper, we focus on the traffic simulation technology of various methods to analyse urban traffic states. Especially, traffic demand estimation and generation is one of key functions for simulation results to reflect real urban traffic states well. Thus, we propose the traffic demand estimation process for urban traffic simulation using trip estimation model based on L1 regularized regression model and learning the trip estimation model with trajectory data in this paper. Also, we apply the traffic demand estimation process to a case of Gangdong-gu, Seoul. Finally, we show the estimation results and simulation results by the SALT Traffic Simulator based on SUMO (Simulation of Urban MObility), so that the estimated trips are similar to real traffic patterns and the simulation results from estimated trips is within about 10% errors coverage.
城市交通分析是政府战略中的一个重要问题,针对城市交通状态包括拥堵状态的研究多种多样。在本文中,我们重点研究了各种方法的交通仿真技术来分析城市交通状态。其中,交通需求的估计与生成是仿真结果能较好地反映城市交通真实状态的关键功能之一。因此,本文提出了基于L1正则化回归模型的出行估计模型和学习轨迹数据出行估计模型的城市交通仿真交通需求估计过程。并以首尔江东区为例,对交通需求进行了分析。最后,给出了基于SUMO (simulation of Urban MObility)的SALT交通模拟器的估算结果和仿真结果,使得估算行程与真实交通模式接近,且估算行程的仿真结果误差范围在10%左右。
{"title":"Statistical traffic generation methods for urban traffic simulation","authors":"Hye-Su Song, Okgee Min","doi":"10.23919/ICACT.2018.8323711","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323711","url":null,"abstract":"The urban traffic analysis is an important issue in government strategies, and there are diverse researches to address urban traffic states including congestion states. In this paper, we focus on the traffic simulation technology of various methods to analyse urban traffic states. Especially, traffic demand estimation and generation is one of key functions for simulation results to reflect real urban traffic states well. Thus, we propose the traffic demand estimation process for urban traffic simulation using trip estimation model based on L1 regularized regression model and learning the trip estimation model with trajectory data in this paper. Also, we apply the traffic demand estimation process to a case of Gangdong-gu, Seoul. Finally, we show the estimation results and simulation results by the SALT Traffic Simulator based on SUMO (Simulation of Urban MObility), so that the estimated trips are similar to real traffic patterns and the simulation results from estimated trips is within about 10% errors coverage.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper 窃听者存在下基于最佳路径选择方法的收获-传输认知多跳网络性能增强
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323741
Tran Dinh Hieu, Tran Trung Duy, S. Choi
This paper proposes a path-selection protocol to enhance outage performance for harvest-to-transmit (HT) multi-hop cooperative cognitive radio networks. In the proposed protocol, one of available paths between a secondary source and a secondary destination is chosen to send the source data to the destination. The source and relays on the selected path must harvest energy from the radio frequency (RF) signals of ambient beacons for the data transmission. Under the presence of a primary user (PU) and a secondary eavesdropper (E), these transmitting nodes also have to adjust their transmit power to satisfy an interference constraint given by PU as well as to against eavesdropping attacks from E. For performance evaluation, we derive exact and asymptotic closed-form expressions of end-to-end outage probability (OP) for the proposed scheme over Rayleigh fading channel. Monte Carlo simulations are then performed to validate the theoretical derivations.
提出了一种提高多跳协作认知无线网络中断性能的路径选择协议。在提议的协议中,选择辅助源和辅助目标之间的一条可用路径将源数据发送到目标。选定路径上的源和中继必须从环境信标的射频(RF)信号中获取能量以进行数据传输。在主用户(PU)和副窃听者(E)存在的情况下,这些发送节点还必须调整其发射功率以满足PU给出的干扰约束以及来自E的窃听攻击。为了评估性能,我们推导了所提出方案在瑞利衰落信道上的端到端中断概率(OP)的精确和渐近封闭形式表达式。然后进行蒙特卡罗模拟来验证理论推导。
{"title":"Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper","authors":"Tran Dinh Hieu, Tran Trung Duy, S. Choi","doi":"10.23919/ICACT.2018.8323741","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323741","url":null,"abstract":"This paper proposes a path-selection protocol to enhance outage performance for harvest-to-transmit (HT) multi-hop cooperative cognitive radio networks. In the proposed protocol, one of available paths between a secondary source and a secondary destination is chosen to send the source data to the destination. The source and relays on the selected path must harvest energy from the radio frequency (RF) signals of ambient beacons for the data transmission. Under the presence of a primary user (PU) and a secondary eavesdropper (E), these transmitting nodes also have to adjust their transmit power to satisfy an interference constraint given by PU as well as to against eavesdropping attacks from E. For performance evaluation, we derive exact and asymptotic closed-form expressions of end-to-end outage probability (OP) for the proposed scheme over Rayleigh fading channel. Monte Carlo simulations are then performed to validate the theoretical derivations.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
IoT security vulnerability: A case study of a Web camera 物联网安全漏洞:网络摄像头的案例研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323685
Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim
The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.
物联网(IoT)是通过互联网连接和控制的设备。随着时间的推移,物联网设备的使用呈指数级增长,我们的数据每天都被物联网设备捕获。最近关于针对物联网设备的恶意软件的新闻和一些当前的研究表明,在大多数情况下,这些设备上没有实施安全控制。物联网设备的使用呈指数级增长,这些设备对敏感数据的处理越来越多,它们的大规模利用是我们工作背后的动力。像Mirai这样的恶意软件目前被用来构建大型僵尸网络,用于DDoS攻击,每秒产生高达1.2 tb的网络流量。我们将讨论物联网设备安全受到威胁时的威胁,并提供IP摄像机的案例研究。我们还介绍了现代恶意软件如何以及为什么专门针对物联网设备的各个方面。最后,我们讨论了保护物联网的重要性,并提供了减少设备利用的基本安全实践。
{"title":"IoT security vulnerability: A case study of a Web camera","authors":"Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim","doi":"10.23919/ICACT.2018.8323685","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323685","url":null,"abstract":"The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A PCA-based method for IoT network traffic anomaly detection 基于pca的物联网网络流量异常检测方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323765
Dang-Hai Hoang, H. Nguyen
Network operators need effective tools to quickly detect anomalies in traffic data for identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT (Internet of Things) networks is becoming a challenge task due to limited network resources and performance. Comprehensive detection methods are no longer effective for IoT networks, calling for developing lightweight solutions. Methods using Principal Component Analysis (PCA) is an attractive approach due to complexity reduction. Anomaly detection techniques based on PCA received a lot of attention in the past. However, there are remaining issues by applying PCA such as the choice of principal components for complexity reduction. This paper investigates PCA techniques used in previous typical research works and proposes a new general formula for distance calculation and a new detection method based on PCA for IoT networks. The paper investigates formula parameters using several experiments. Results indicated that our new method is suitable for quick detection of network traffic anomalies with lower complexity.
网络运营商需要有效的工具来快速检测流量数据中的异常情况,从而识别网络攻击。与传统互联网相比,由于网络资源和性能的限制,物联网(IoT)网络中的异常检测正成为一项具有挑战性的任务。综合检测方法对物联网网络不再有效,需要开发轻量级解决方案。使用主成分分析(PCA)方法是一种有吸引力的方法,因为它降低了复杂性。基于PCA的异常检测技术在过去受到了广泛的关注。然而,应用主成分分析仍然存在一些问题,如降低复杂性的主成分选择。本文对以往典型研究工作中使用的主成分分析技术进行了研究,提出了一种新的物联网网络距离计算通用公式和一种新的基于主成分分析的检测方法。本文通过多次试验对配方参数进行了研究。结果表明,该方法适用于较低复杂度的网络流量异常快速检测。
{"title":"A PCA-based method for IoT network traffic anomaly detection","authors":"Dang-Hai Hoang, H. Nguyen","doi":"10.23919/ICACT.2018.8323765","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323765","url":null,"abstract":"Network operators need effective tools to quickly detect anomalies in traffic data for identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT (Internet of Things) networks is becoming a challenge task due to limited network resources and performance. Comprehensive detection methods are no longer effective for IoT networks, calling for developing lightweight solutions. Methods using Principal Component Analysis (PCA) is an attractive approach due to complexity reduction. Anomaly detection techniques based on PCA received a lot of attention in the past. However, there are remaining issues by applying PCA such as the choice of principal components for complexity reduction. This paper investigates PCA techniques used in previous typical research works and proposes a new general formula for distance calculation and a new detection method based on PCA for IoT networks. The paper investigates formula parameters using several experiments. Results indicated that our new method is suitable for quick detection of network traffic anomalies with lower complexity.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1