首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
A physical layer security-based routing protocol in mobile ad-hoc wireless networks 移动自组织无线网络中基于物理层安全的路由协议
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323777
Kyusung Shim, Tri Nhu Do, Beongku An
Physical layer security has been considered as a sustainable technique that is competitive with existing cryptographic approaches to combat security attacks in the next generation wireless networks. In this paper, we study the vulnerability of mobile ad-hoc wireless networks in which there is an eavesdropper monitoring for the data transmissions in the networks. To this end, we propose a Physical Layer Security-based Routing protocol, called PLSR, which uses ad-hoc on-demand distance vector as the underlying technology. The main features and contributions of the proposed PLSR are as follows. First, PLSR considers a cross-layer approach that uses the information of both physical layer and network layer together to support QoS transmission (i.e., secure transmission) efficiently. When a routing route is established, both the physical layer information, PLS information using distance between neighbors and eavesdroppers, and the network layer information, i.e., the number of hops, are considered together as the parameters for route establishment. Second, PLSR establishes the routing routes that can avoid the eavesdroppers to support secure transmission. The performance evaluation of the proposed PLSR using OPNET shows that PLSR can efficiently support the security capability of routing and multi-hop transmission in mobile ad-hoc wireless networks.
物理层安全被认为是一种可持续的技术,可以与现有的加密方法竞争,以对抗下一代无线网络中的安全攻击。本文研究了移动自组织无线网络中存在窃听者监控数据传输的脆弱性。为此,我们提出了一种基于物理层安全的路由协议,称为PLSR,它使用ad-hoc按需距离矢量作为底层技术。建议的PLSR的主要特点和贡献如下。首先,PLSR考虑了一种跨层的方法,将物理层和网络层的信息结合起来,有效地支持QoS传输(即安全传输)。在建立路由时,物理层信息、利用邻居与窃听者之间距离的PLS信息和网络层信息即跳数一起作为路由建立的参数。其次,PLSR建立可以避免窃听者的路由,以支持安全传输。基于OPNET的PLSR性能评估表明,PLSR能够有效支持移动自组织无线网络中路由和多跳传输的安全能力。
{"title":"A physical layer security-based routing protocol in mobile ad-hoc wireless networks","authors":"Kyusung Shim, Tri Nhu Do, Beongku An","doi":"10.23919/ICACT.2018.8323777","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323777","url":null,"abstract":"Physical layer security has been considered as a sustainable technique that is competitive with existing cryptographic approaches to combat security attacks in the next generation wireless networks. In this paper, we study the vulnerability of mobile ad-hoc wireless networks in which there is an eavesdropper monitoring for the data transmissions in the networks. To this end, we propose a Physical Layer Security-based Routing protocol, called PLSR, which uses ad-hoc on-demand distance vector as the underlying technology. The main features and contributions of the proposed PLSR are as follows. First, PLSR considers a cross-layer approach that uses the information of both physical layer and network layer together to support QoS transmission (i.e., secure transmission) efficiently. When a routing route is established, both the physical layer information, PLS information using distance between neighbors and eavesdroppers, and the network layer information, i.e., the number of hops, are considered together as the parameters for route establishment. Second, PLSR establishes the routing routes that can avoid the eavesdroppers to support secure transmission. The performance evaluation of the proposed PLSR using OPNET shows that PLSR can efficiently support the security capability of routing and multi-hop transmission in mobile ad-hoc wireless networks.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Load distribution method using multicore based NIC for high-performance computing system 基于多核网卡的高性能计算系统负载分配方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323655
Jaeguk Ahn, Jong-Beom Kim, W. Choi, Jong-Oh Kim, S. Choi
Cloud computing is becoming more important in Software Defined Networking (SDN) / Network Function Virtualization (NFV). Virtual Machine (VM) and various services require higher performance servers. Accordingly, the performance of the server also requires high capacity and high performance. As the performance of hardware increases, it is required to increase the speed in the data plane area. In order to increase the speed of the data plane area, it is necessary to adjust the core affinity for each flow. When passing through the kernel, the kernel performs packet header parsing, which is overhead in terms of speed. Therefore we propose a data plane acceleration technology with load distribution of multicore (28 core) based Network Interface Card (NIC) in the test environment that delivers packets at 20 Gbps.
云计算在软件定义网络(SDN) /网络功能虚拟化(NFV)中变得越来越重要。虚拟机和各种业务对服务器的性能要求越来越高。相应的,对服务器的性能也要求高容量、高性能。随着硬件性能的提高,需要在数据平面区域提高速度。为了提高数据平面区域的速度,需要对每个流的核心亲和力进行调整。当通过内核时,内核执行包头解析,这在速度方面是开销。因此,我们在测试环境中提出了一种基于多核(28核)网络接口卡(NIC)负载分配的数据平面加速技术,其传输速率为20gbps。
{"title":"Load distribution method using multicore based NIC for high-performance computing system","authors":"Jaeguk Ahn, Jong-Beom Kim, W. Choi, Jong-Oh Kim, S. Choi","doi":"10.23919/ICACT.2018.8323655","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323655","url":null,"abstract":"Cloud computing is becoming more important in Software Defined Networking (SDN) / Network Function Virtualization (NFV). Virtual Machine (VM) and various services require higher performance servers. Accordingly, the performance of the server also requires high capacity and high performance. As the performance of hardware increases, it is required to increase the speed in the data plane area. In order to increase the speed of the data plane area, it is necessary to adjust the core affinity for each flow. When passing through the kernel, the kernel performs packet header parsing, which is overhead in terms of speed. Therefore we propose a data plane acceleration technology with load distribution of multicore (28 core) based Network Interface Card (NIC) in the test environment that delivers packets at 20 Gbps.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The architecture of multi media multi path system 多媒体多路径系统体系结构
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323845
B. Lee, Hea-Sook Park
The defense network uses a strategic network, a tactical network, etc., and these networks are operated in isolation from the Internet. In addition to wired and wireless networks, it also uses diverse and complex private networks such as walkie-talkie networks, military telephone networks, and military satellite networks. In particular, because the defense network must ensure the survivability of the network, even if the network is managed by the army itself and the military support facilities are well, the network can be restored by the emergency backup operation should be possible. In this paper, we investigate the technology trends and technology to guarantee the survivability, stability and security of wired and wireless networks in various defense networks using various media, and develop a multi — media multi — path adaptive network technology.
防御网采用战略网、战术网等,这些网络与Internet隔离运行。除了有线和无线网络外,它还使用各种复杂的专用网络,如对讲机网络、军事电话网络和军事卫星网络。特别是,由于国防网络必须保证网络的生存性,即使网络是由军队自己管理的,军事保障设施也很好,网络可以通过紧急备份操作恢复也应该是可能的。本文研究了在多种介质的各种防御网络中保证有线和无线网络生存性、稳定性和安全性的技术发展趋势和技术,并开发了一种多媒体多路径自适应网络技术。
{"title":"The architecture of multi media multi path system","authors":"B. Lee, Hea-Sook Park","doi":"10.23919/ICACT.2018.8323845","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323845","url":null,"abstract":"The defense network uses a strategic network, a tactical network, etc., and these networks are operated in isolation from the Internet. In addition to wired and wireless networks, it also uses diverse and complex private networks such as walkie-talkie networks, military telephone networks, and military satellite networks. In particular, because the defense network must ensure the survivability of the network, even if the network is managed by the army itself and the military support facilities are well, the network can be restored by the emergency backup operation should be possible. In this paper, we investigate the technology trends and technology to guarantee the survivability, stability and security of wired and wireless networks in various defense networks using various media, and develop a multi — media multi — path adaptive network technology.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The flow-reduced malware detection system by controlling inactive/active timeout 通过控制非活动/活动超时减少流量的恶意软件检测系统
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323759
Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi
This paper shows the flow reduction effect of malware detection system through inactive/active timeout control. In the gigabyte network environment, the DB search speed of the malware detection system that processes high-speed, largecapacity data is affected by the number of stored flows. Therefore, it is necessary to reduce the number of stored flows. The malware detection system captures network data with the First-N technique and adjusts the session length by modifying the inactive/active timeout. A drill-down mechanism is used for malware inspection of network data stored in DB. Inactive/active timeout is adjusted to verify that the number of flows decreases as the session length increases.
本文展示了恶意软件检测系统通过主动/非主动超时控制来减少流量的效果。在千兆网络环境下,对于处理高速大容量数据的恶意软件检测系统,其DB搜索速度受存储流数量的影响。因此,有必要减少存储流的数量。恶意软件检测系统采用First-N技术捕获网络数据,并通过修改非活动/活动超时来调整会话长度。采用钻取机制对数据库中存储的网络数据进行恶意检测。调整非活动/活动超时,以验证流的数量是否随着会话长度的增加而减少。
{"title":"The flow-reduced malware detection system by controlling inactive/active timeout","authors":"Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi","doi":"10.23919/ICACT.2018.8323759","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323759","url":null,"abstract":"This paper shows the flow reduction effect of malware detection system through inactive/active timeout control. In the gigabyte network environment, the DB search speed of the malware detection system that processes high-speed, largecapacity data is affected by the number of stored flows. Therefore, it is necessary to reduce the number of stored flows. The malware detection system captures network data with the First-N technique and adjusts the session length by modifying the inactive/active timeout. A drill-down mechanism is used for malware inspection of network data stored in DB. Inactive/active timeout is adjusted to verify that the number of flows decreases as the session length increases.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to evaluating the number of potential cycles in an all-one base matrix 求全一基矩阵中势环数的一种方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323661
Sheng Jiang, F. Lau
The “Tree Method” is usually used to identify potential cycles in low-density parity-check codes. However, with the increasing demand of high girth codes, the method becomes hard to implement because of the exponential increase of both space complexity and time complexity. In this paper, a new method is introduced to evaluate potential cycles for all-one base matrix. The method applies to large cycle length and arbitrary size base matrix. The principle of potential cycle and potential cycle duplication are studied to support the new approach. Instead of doing low efficient exhaustive search, the approach gives the number of potential cycles without duplication directly. The results of cycle numbers are given, which are verified by the “Tree Method”.
“树形方法”通常用于识别低密度奇偶校验码中的潜在循环。然而,随着高周长码需求的增加,由于空间复杂度和时间复杂度呈指数增长,该方法变得难以实现。本文提出了一种求全一基矩阵势环的新方法。该方法适用于大周期长度和任意大小的基矩阵。研究了势循环和势循环重复的原理,以支持新方法。该方法不需要进行低效率的穷举搜索,而是直接给出无重复的潜在循环数。给出了循环数的计算结果,并用“树形法”进行了验证。
{"title":"An approach to evaluating the number of potential cycles in an all-one base matrix","authors":"Sheng Jiang, F. Lau","doi":"10.23919/ICACT.2018.8323661","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323661","url":null,"abstract":"The “Tree Method” is usually used to identify potential cycles in low-density parity-check codes. However, with the increasing demand of high girth codes, the method becomes hard to implement because of the exponential increase of both space complexity and time complexity. In this paper, a new method is introduced to evaluate potential cycles for all-one base matrix. The method applies to large cycle length and arbitrary size base matrix. The principle of potential cycle and potential cycle duplication are studied to support the new approach. Instead of doing low efficient exhaustive search, the approach gives the number of potential cycles without duplication directly. The results of cycle numbers are given, which are verified by the “Tree Method”.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated vehicle parking system and unauthorized parking detector 自动泊车系统和非法停车探测器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323823
Ishraq Haider Chowdhury, Afsana Abida, Mehedi Hasan Muaz
In this modern world, with the rapid growth of population vehicle traffic has become a part of our day to day life. Moreover, unauthorized vehicle has also increased. Thus our proposed system aims to ensure proper management of vehicles in the public places such as educational institute, office etc in order to prevent unauthorized vehicle parking and traffic. The features include detection of permitted and non-permitted vehicles on the main gate, detection of unauthorized vehicle parking in the restricted zone thus sending SMS to the authority to take action and taking fine from the vehicle user. Parking charge is also taken from the parked vehicles inside the parking lot before they leave. There are also parking lights which will be lit whenever a car enters a specific parking lot.
在这个现代世界,随着人口的快速增长,车辆交通已经成为我们日常生活的一部分。此外,非法车辆也有所增加。因此,我们建议的系统旨在确保公共场所(如教育机构、办公室等)的车辆得到妥善管理,以防止未经授权的车辆停放和交通。其功能包括检测正门允许和不允许的车辆,检测在限制区域内停放的未经授权的车辆,从而发送短信给当局采取行动,并向车辆用户收取罚款。停车场内停放的车辆在驶离前也要收取停车费。还有停车灯,当一辆车进入一个特定的停车场时,它就会亮起来。
{"title":"Automated vehicle parking system and unauthorized parking detector","authors":"Ishraq Haider Chowdhury, Afsana Abida, Mehedi Hasan Muaz","doi":"10.23919/ICACT.2018.8323823","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323823","url":null,"abstract":"In this modern world, with the rapid growth of population vehicle traffic has become a part of our day to day life. Moreover, unauthorized vehicle has also increased. Thus our proposed system aims to ensure proper management of vehicles in the public places such as educational institute, office etc in order to prevent unauthorized vehicle parking and traffic. The features include detection of permitted and non-permitted vehicles on the main gate, detection of unauthorized vehicle parking in the restricted zone thus sending SMS to the authority to take action and taking fine from the vehicle user. Parking charge is also taken from the parked vehicles inside the parking lot before they leave. There are also parking lights which will be lit whenever a car enters a specific parking lot.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A study on detection of anomaly behavior in automation industry 自动化行业异常行为检测方法研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323763
SuMi Ryu, Young Jin Kang, H. Lee
After the Third Industrial Revolution, which was based on computers and the Internet, recently the fourth industrial revolution appeared based on ICT convergence such as artificial intelligence, robots, and Internet of Things. Already in the tertiary industrial revolution, most of the machines were automated and the concept of Smart Factory appeared. This makes industrial systems easier to access and emphasizes the importance of security. Therefore, there are many security methods and systems for external intrusion and attack. Also, internal security is important because information leakage by insiders, tampering operations, and security accidents caused by malfunctions of machines also occur. However, there are not many systems, solutions, and methods for information leakage and attack in a damaging internal environment, and there is a low awareness of security. In this paper, we analyze the trends on the system, solutions and research for the detection of anomaly behavior in the present automation industry system and internal.
继以计算机和互联网为基础的第三次产业革命之后,最近出现了以人工智能、机器人、物联网等信息通信技术(ICT)为基础的第四次产业革命。在第三次工业革命中,大多数机器都实现了自动化,智能工厂的概念出现了。这使得工业系统更容易访问,并强调了安全的重要性。因此,针对外部入侵和攻击,出现了许多安全方法和系统。内部安全也很重要,因为内部人员泄露信息、篡改操作、机器故障引起的安全事故也很重要。然而,目前针对信息泄露和攻击的系统、解决方案和方法并不多,内部环境破坏严重,安全意识不高。本文分析了当前自动化工业系统和内部异常行为检测的系统发展趋势、解决方案和研究。
{"title":"A study on detection of anomaly behavior in automation industry","authors":"SuMi Ryu, Young Jin Kang, H. Lee","doi":"10.23919/ICACT.2018.8323763","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323763","url":null,"abstract":"After the Third Industrial Revolution, which was based on computers and the Internet, recently the fourth industrial revolution appeared based on ICT convergence such as artificial intelligence, robots, and Internet of Things. Already in the tertiary industrial revolution, most of the machines were automated and the concept of Smart Factory appeared. This makes industrial systems easier to access and emphasizes the importance of security. Therefore, there are many security methods and systems for external intrusion and attack. Also, internal security is important because information leakage by insiders, tampering operations, and security accidents caused by malfunctions of machines also occur. However, there are not many systems, solutions, and methods for information leakage and attack in a damaging internal environment, and there is a low awareness of security. In this paper, we analyze the trends on the system, solutions and research for the detection of anomaly behavior in the present automation industry system and internal.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"31 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applications 小型半模基片集成波导带通滤波器,结合e形缺陷接地结构,用于宽带通信和雷达应用
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323627
Chen-Cheng Wang, Zijun Wang, Y. Huang
In this paper, a size-miniaturized bandpass filter based on the half-mode substrate integrated waveguide (HM-SIW) and embedded E-shaped detected ground structure (DGS) is presented. Two pairs of embedded E-shaped DGSs are face-to-face configured and loaded into the conventional HMSIW section to constitute a HMSIW-DGS unit cell. First of all, the HMSIW is with inherent highpass characteristic, while the embedded E-shaped DGS is with bandgap function. By integrating these two characteristics together, the proposed HMSIW-DGS unit cell will exhibit bandpass transmission response, as the cutoff frequency of the HMSIW is lower than the resonant bandgap frequency of the DGS. Utilizing HMSIW instead of SIW can help to reduce size of the unit cell. Meanwhile, the electrically small DGS is also useful for the size miniaturization. Subsequently, the stepped-impedance structure is introduced into the E-shaped DGS to decrease its electrical size, which will effectively improve the tuning flexibility of the unit cell, and can consequently make the DGS with same physical size operate lower bandgap frequency. That is to say, the stepped-impedance structure can contribute to further size reduction of the DGS. Thirdly, the proposed unit cell is systematically investigated by using the theory of guided waves, with its propagation constant and dispersion characteristic being studied in detail, from which the bandpass transmission response can be captured obviously. To verify the transmission properties of the proposed unit cell, a bandpass filter with three cascading unit cells is implemented. The fabricated prototype achieves a central frequency of 10GHz, a fractional bandwidth of 23%, an insertion loss of 1.2dB and a return loss of 20dB. As compared with some reported SIW filters, the proposed one is with smaller size and similar performance, which illustrates its suitability for the wideband communication and radar applications.
本文提出了一种基于半模衬底集成波导(ham - siw)和嵌入式e型探测地结构(DGS)的小型化带通滤波器。两对嵌入式e型dgs面对面配置并加载到传统的HMSIW截面中,构成HMSIW- dgs单元格。首先,HMSIW具有固有的高通特性,而嵌入式e形DGS具有带隙功能。通过将这两个特性结合在一起,所提出的HMSIW-DGS单元电池将表现出带通传输响应,因为HMSIW的截止频率低于DGS的谐振带隙频率。利用HMSIW代替SIW可以帮助减小单元格的尺寸。同时,电小的DGS也有助于尺寸小型化。随后,在e型DGS中引入阶跃阻抗结构,减小其电尺寸,有效提高单元胞的调谐灵活性,从而使相同物理尺寸的DGS工作在更低的带隙频率下。也就是说,阶跃阻抗结构有助于进一步减小DGS的尺寸。第三,利用导波理论对所提出的单胞进行了系统的研究,详细地研究了其传播常数和色散特性,从中可以明显地捕捉到带通传输响应。为了验证所提出的单元格的传输特性,实现了一个具有三个级联单元格的带通滤波器。该样机的中心频率为10GHz,分数带宽为23%,插入损耗为1.2dB,回波损耗为20dB。与已有的SIW滤波器相比,该滤波器体积更小,性能相近,适用于宽带通信和雷达应用。
{"title":"Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applications","authors":"Chen-Cheng Wang, Zijun Wang, Y. Huang","doi":"10.23919/ICACT.2018.8323627","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323627","url":null,"abstract":"In this paper, a size-miniaturized bandpass filter based on the half-mode substrate integrated waveguide (HM-SIW) and embedded E-shaped detected ground structure (DGS) is presented. Two pairs of embedded E-shaped DGSs are face-to-face configured and loaded into the conventional HMSIW section to constitute a HMSIW-DGS unit cell. First of all, the HMSIW is with inherent highpass characteristic, while the embedded E-shaped DGS is with bandgap function. By integrating these two characteristics together, the proposed HMSIW-DGS unit cell will exhibit bandpass transmission response, as the cutoff frequency of the HMSIW is lower than the resonant bandgap frequency of the DGS. Utilizing HMSIW instead of SIW can help to reduce size of the unit cell. Meanwhile, the electrically small DGS is also useful for the size miniaturization. Subsequently, the stepped-impedance structure is introduced into the E-shaped DGS to decrease its electrical size, which will effectively improve the tuning flexibility of the unit cell, and can consequently make the DGS with same physical size operate lower bandgap frequency. That is to say, the stepped-impedance structure can contribute to further size reduction of the DGS. Thirdly, the proposed unit cell is systematically investigated by using the theory of guided waves, with its propagation constant and dispersion characteristic being studied in detail, from which the bandpass transmission response can be captured obviously. To verify the transmission properties of the proposed unit cell, a bandpass filter with three cascading unit cells is implemented. The fabricated prototype achieves a central frequency of 10GHz, a fractional bandwidth of 23%, an insertion loss of 1.2dB and a return loss of 20dB. As compared with some reported SIW filters, the proposed one is with smaller size and similar performance, which illustrates its suitability for the wideband communication and radar applications.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An IoT-aware workflow model designer for smart alarm service about companion animal health check 基于物联网的伴侣动物健康检查智能报警服务工作流设计器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323899
Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim
Process-based application-driven environments are becoming very diverse. As IoT-based application implementations are widely used, an execution environment that can run IoT devices is needed. We want to use this IoT environment as a way to check the health of companion animals. We describe a workflow designer that supports an alarm service to provide an alarm service for health checks. This will provide access to one workflow designer to support the new service, and through these extensions, we will develop a workflow that supports a variety of IoT environments.
基于流程的应用程序驱动的环境正变得非常多样化。随着基于物联网的应用实现的广泛应用,需要一个能够运行物联网设备的执行环境。我们希望利用这个物联网环境来检查伴侣动物的健康状况。我们描述了一个支持警报服务的工作流设计器,以便为健康检查提供警报服务。这将提供访问一个工作流设计器来支持新服务,通过这些扩展,我们将开发一个支持各种物联网环境的工作流。
{"title":"An IoT-aware workflow model designer for smart alarm service about companion animal health check","authors":"Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim","doi":"10.23919/ICACT.2018.8323899","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323899","url":null,"abstract":"Process-based application-driven environments are becoming very diverse. As IoT-based application implementations are widely used, an execution environment that can run IoT devices is needed. We want to use this IoT environment as a way to check the health of companion animals. We describe a workflow designer that supports an alarm service to provide an alarm service for health checks. This will provide access to one workflow designer to support the new service, and through these extensions, we will develop a workflow that supports a variety of IoT environments.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Associating risks of getting strokes with data from health checkup records using Dempster-Shafer Theory 使用邓普斯特-谢弗理论将中风风险与健康检查记录数据联系起来
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323709
Sergio Peñafiel, N. Baloian, J. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh
Prediction of future diseases from historical data of medical patients is a topic that has gained increasing interest given the growing availability of such data in electronic format. Most of the developed systems are based on machine learning techniques, which are good to find relations between data but do not help explaining causalities. In particular, it would be difficult to get a meaningful medical explanation for the relationship between a patient's health checkup data and the risk of developing a certain disease. On the other hand, expert system approaches, like Bayesian networks, are based on medical knowledge but have trouble dealing with high levels of uncertainty, which is crucial in this kind of scenario. In this work we present a prediction system for the risk of a patient having a (heart or brain) stroke based on past medical checkup data. The system is based on the Dempster-Shafer Theory of plausibility which is good for handling uncertainty. The data used belongs to a rural hospital in Okayama, Japan, where people are compelled to undergo annual health checkups by law. The model also produces rules that are able to relate data from exam results with the aforementioned risk, thus proposing a cause from the medical point of view. Experiments comparing the results of the Dempster-Shafer method with other machine learning methods like Multilayer perceptron, Quadratic discriminant analysis and Naive Bayes show that our approach performed the best in general, with an overall prediction accuracy of 61% and with the best precision value on true positive cases of stroke.
从医疗病人的历史数据中预测未来的疾病是一个越来越受关注的主题,因为电子格式的数据越来越多。大多数已开发的系统都是基于机器学习技术,这有助于发现数据之间的关系,但无助于解释因果关系。特别是,对于患者的健康检查数据与患某种疾病的风险之间的关系,很难得到有意义的医学解释。另一方面,专家系统方法,如贝叶斯网络,基于医学知识,但在处理高度不确定性方面存在困难,这在这种情况下至关重要。在这项工作中,我们提出了一个基于过去医疗检查数据的患者(心脏或大脑)中风风险的预测系统。该系统基于似是而非的登普斯特-谢弗理论,有利于处理不确定性。所使用的数据属于日本冈山的一家农村医院,根据法律规定,那里的人每年都要接受健康检查。该模型还产生了能够将检查结果数据与上述风险联系起来的规则,从而从医学角度提出原因。将Dempster-Shafer方法与其他机器学习方法(如多层感知器、二次判别分析和朴素贝叶斯)的结果进行比较的实验表明,我们的方法在总体上表现最好,总体预测准确率为61%,在真阳性中风病例上具有最佳精度值。
{"title":"Associating risks of getting strokes with data from health checkup records using Dempster-Shafer Theory","authors":"Sergio Peñafiel, N. Baloian, J. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh","doi":"10.23919/ICACT.2018.8323709","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323709","url":null,"abstract":"Prediction of future diseases from historical data of medical patients is a topic that has gained increasing interest given the growing availability of such data in electronic format. Most of the developed systems are based on machine learning techniques, which are good to find relations between data but do not help explaining causalities. In particular, it would be difficult to get a meaningful medical explanation for the relationship between a patient's health checkup data and the risk of developing a certain disease. On the other hand, expert system approaches, like Bayesian networks, are based on medical knowledge but have trouble dealing with high levels of uncertainty, which is crucial in this kind of scenario. In this work we present a prediction system for the risk of a patient having a (heart or brain) stroke based on past medical checkup data. The system is based on the Dempster-Shafer Theory of plausibility which is good for handling uncertainty. The data used belongs to a rural hospital in Okayama, Japan, where people are compelled to undergo annual health checkups by law. The model also produces rules that are able to relate data from exam results with the aforementioned risk, thus proposing a cause from the medical point of view. Experiments comparing the results of the Dempster-Shafer method with other machine learning methods like Multilayer perceptron, Quadratic discriminant analysis and Naive Bayes show that our approach performed the best in general, with an overall prediction accuracy of 61% and with the best precision value on true positive cases of stroke.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1