首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Design of a 2.4 GHz high-performance mixer with current bleeding topology 2.4 GHz高性能流放拓扑混频器的设计
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323659
W. Lee, K. Tsang
The important characteristics of a mixer including high conversion gain, low noise, high dynamic range, low third-order intermodulation distortion and low unwanted leakage signals between ports have reconsidered. A double balanced Gilbert-cell with a class-A amplifier bleeding mixer (DBGC CAAB mixer) is designed and implemented. The voltage gain of 14 dB at class-A amplifier is used to magnifier the local oscillator (LO) signal. Current of class-A amplifier is injected into the Gibert mixer as a bleeding current to improve the performance of the trans-conductor stage. The DBGC CAAB mixer achieves a conversion gain of 17.5 dB at −14 dBm LO power, and the noise figure is suppressed from 45 dB to 10.7 dB. It is important to stress that the new configuration has a third-order intermodulation (HP3) at −9 dBm which is considered to be insignificant. The DBGC CAAB mixer is implemented by using 0.18-μm RFCMOS technology and operates at the 2.4 GHz ISM application with 10 MHz intermediate frequency. The power consumption is 12 mA at 1.5 V supply voltage.
重新考虑了混频器的重要特性,包括高转换增益、低噪声、高动态范围、低三阶互调失真和端口间低不必要的泄漏信号。设计并实现了一种带A类放血混频器(DBGC - CAAB混频器)的双平衡吉尔伯特单元。a类放大器的电压增益为14db,用于放大本振(LO)信号。为了提高跨导体级的性能,将a类放大器的电流作为出血性电流注入到Gibert混频器中。DBGC - CAAB混频器在- 14 dBm LO功率下实现17.5 dB的转换增益,噪声指数从45 dB抑制到10.7 dB。重要的是要强调,新配置在−9 dBm处具有三阶互调(HP3),这被认为是微不足道的。DBGC CAAB混频器采用0.18 μm RFCMOS技术实现,工作于2.4 GHz ISM应用,中频为10 MHz。在1.5 V供电电压下,功耗为12ma。
{"title":"Design of a 2.4 GHz high-performance mixer with current bleeding topology","authors":"W. Lee, K. Tsang","doi":"10.23919/ICACT.2018.8323659","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323659","url":null,"abstract":"The important characteristics of a mixer including high conversion gain, low noise, high dynamic range, low third-order intermodulation distortion and low unwanted leakage signals between ports have reconsidered. A double balanced Gilbert-cell with a class-A amplifier bleeding mixer (DBGC CAAB mixer) is designed and implemented. The voltage gain of 14 dB at class-A amplifier is used to magnifier the local oscillator (LO) signal. Current of class-A amplifier is injected into the Gibert mixer as a bleeding current to improve the performance of the trans-conductor stage. The DBGC CAAB mixer achieves a conversion gain of 17.5 dB at −14 dBm LO power, and the noise figure is suppressed from 45 dB to 10.7 dB. It is important to stress that the new configuration has a third-order intermodulation (HP3) at −9 dBm which is considered to be insignificant. The DBGC CAAB mixer is implemented by using 0.18-μm RFCMOS technology and operates at the 2.4 GHz ISM application with 10 MHz intermediate frequency. The power consumption is 12 mA at 1.5 V supply voltage.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The real-time session inspection method using heartbeat signal 基于心跳信号的实时会话检测方法
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323721
Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi
In this paper, we present how to store the session information from the Heartbeat signal, which is generated at regular intervals during the network session, in real packet analysis tools. Since the existing session information retrieval method checks the session information at the end of the session, information cannot be confirmed in the case of an active session. To verify the information of the active session, this paper utilizes the heartbeat signal generated by the session every certain period. By analyzing active session information, it is possible to analyze information about flows and packets in a session in real time.
在本文中,我们介绍了如何在真实的数据包分析工具中存储网络会话期间定期产生的心跳信号中的会话信息。由于现有的会话信息检索方法在会话结束时检查会话信息,因此在会话活动的情况下无法确认信息。为了验证活动会话的信息,本文利用会话每隔一段时间产生的心跳信号。通过分析活动会话信息,可以实时分析会话中的流和包信息。
{"title":"The real-time session inspection method using heartbeat signal","authors":"Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi","doi":"10.23919/ICACT.2018.8323721","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323721","url":null,"abstract":"In this paper, we present how to store the session information from the Heartbeat signal, which is generated at regular intervals during the network session, in real packet analysis tools. Since the existing session information retrieval method checks the session information at the end of the session, information cannot be confirmed in the case of an active session. To verify the information of the active session, this paper utilizes the heartbeat signal generated by the session every certain period. By analyzing active session information, it is possible to analyze information about flows and packets in a session in real time.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"76 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel measurements and characterizations for automobile factory environments 汽车工厂环境的通道测量和表征
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323707
Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang
There is tremendous hype around the Internet of Things, and particularly in the industrial realm (the industrial Internet of Things, IIoT), where many expect to find the biggest opportunity in the near term. The IIoT is also an important application in the fifth generation of wireless communications. In this paper, the channel propagations are investigated based on the realistic measurement data in an automobile factory. The path loss model is extracted using Least Square (LS) method, and the K factor is also parameterized. Meanwhile, the time delay (root mean squared delay) and the amount of multipath component (MPC)s are investigated and compared with typical propagation results. These results are beneficial and informative when designing wireless networks for IIoT.
围绕物联网有大量的炒作,特别是在工业领域(工业物联网,IIoT),许多人期望在短期内找到最大的机会。工业物联网也是第五代无线通信的重要应用。本文基于某汽车制造厂的实测数据,对信道传播进行了研究。采用最小二乘法提取路径损失模型,并对K因子进行参数化。同时,研究了时延(均方根延迟)和多径分量(MPC)的数量,并与典型的传播结果进行了比较。这些结果在设计工业物联网无线网络时是有益的和有价值的。
{"title":"Channel measurements and characterizations for automobile factory environments","authors":"Liu Liu, Ke Zhang, C. Tao, Kun Zhang, Ze Yuan, Jianhua Zhang","doi":"10.23919/ICACT.2018.8323707","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323707","url":null,"abstract":"There is tremendous hype around the Internet of Things, and particularly in the industrial realm (the industrial Internet of Things, IIoT), where many expect to find the biggest opportunity in the near term. The IIoT is also an important application in the fifth generation of wireless communications. In this paper, the channel propagations are investigated based on the realistic measurement data in an automobile factory. The path loss model is extracted using Least Square (LS) method, and the K factor is also parameterized. Meanwhile, the time delay (root mean squared delay) and the amount of multipath component (MPC)s are investigated and compared with typical propagation results. These results are beneficial and informative when designing wireless networks for IIoT.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protecting end-device from replay attack on LoRaWAN 保护终端设备免受LoRaWAN重放攻击
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323683
WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi
In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.
在本文中,我们提出了一种使用专有消息的RSSI和握手技术来保护终端设备的方法。重放攻击是LoRaWAN中常用的一种攻击方式。在无线网络环境中嗅探数据包是很容易的。如果攻击者入侵LoRaWAN提供的服务,则可能暴露终端设备的使用模式,或者重播攻击可能导致与用户的连接出现问题。为了防止重放攻击,LoRaWAN标准使用了用户识别方法,即使用DevNonce值,但这并不是一个完整的对策。为了弥补这些漏洞,我们提出了一种通过使用称为RSSI的网络物理特性和称为专有握手的新技术来保护用户的方法。
{"title":"Protecting end-device from replay attack on LoRaWAN","authors":"WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi","doi":"10.23919/ICACT.2018.8323683","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323683","url":null,"abstract":"In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
5G framework based on multi-level edge computing with D2D enabled communication 基于多层次边缘计算的5G框架,支持D2D通信
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323811
Abdelhamied A. Ateya, A. Muthanna, A. Koucheryavy
There is no doubt that the release of the fifth generation of the mobile cellular system (5G) becomes a great demand year by year, especially with the massive increase of heterogeneous Wireless devices. The 5G network will be a platform for wide variety of industries. Designing of 5G cellular system faces various challenges related to the capacity and traffic. One way to solve these challenges is to employ device-to-device (D2D) communication and mobile edge computing (MEC). Employing these technologies offload the core network and increase the capacity of the system. In this work, we propose a frame work for the 5G cellular system based on D2D communication and multi-level cloud units employed at the edge of the cellular network. The system employs four levels of cloud units with various hardware capabilities. The D2D communication is used as the communication technology in the first level of clouds. Employing D2D together with multi-level edge cloud units achieves varies benefits to the system as the system level simulation provides.
毫无疑问,第五代移动蜂窝系统(5G)的发布是一个逐年增长的巨大需求,特别是随着异构无线设备的大量增加。5G网络将成为各种行业的平台。5G蜂窝系统的设计面临着与容量和流量相关的各种挑战。解决这些挑战的一种方法是采用设备对设备(D2D)通信和移动边缘计算(MEC)。采用这些技术可以减轻核心网的负担,提高系统的容量。在这项工作中,我们提出了一种基于D2D通信和蜂窝网络边缘采用的多级云单元的5G蜂窝系统框架。该系统采用具有不同硬件能力的四层云单元。采用D2D通信作为云第一层的通信技术。将D2D与多级边缘云单元结合使用,可以实现系统级仿真所提供的各种好处。
{"title":"5G framework based on multi-level edge computing with D2D enabled communication","authors":"Abdelhamied A. Ateya, A. Muthanna, A. Koucheryavy","doi":"10.23919/ICACT.2018.8323811","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323811","url":null,"abstract":"There is no doubt that the release of the fifth generation of the mobile cellular system (5G) becomes a great demand year by year, especially with the massive increase of heterogeneous Wireless devices. The 5G network will be a platform for wide variety of industries. Designing of 5G cellular system faces various challenges related to the capacity and traffic. One way to solve these challenges is to employ device-to-device (D2D) communication and mobile edge computing (MEC). Employing these technologies offload the core network and increase the capacity of the system. In this work, we propose a frame work for the 5G cellular system based on D2D communication and multi-level cloud units employed at the edge of the cellular network. The system employs four levels of cloud units with various hardware capabilities. The D2D communication is used as the communication technology in the first level of clouds. Employing D2D together with multi-level edge cloud units achieves varies benefits to the system as the system level simulation provides.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133675619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Study on multi-network traffic modeling in distribution communication network access service 配电网接入业务中多网络流量建模研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323895
Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang
Network traffic model is the basis for network performance analysis, dynamic allocation of network bandwidth and network planning and construction. A good traffic model and prediction method is great significance for the design of a new generation of network protocols, network management and diagnosis, design of high performance routers, load balancers Network hardware equipment and improving the quality of the network services. With the construction of energy smart grid, especially in the distribution network is particularly evident. Increasing the variety of electrical equipment, which make distribution and communication network structure more complex and changeable, including a variety of communication systems, more Equipment, a larger scale and communication traffic characteristics. It can cause a great impact on the backbone network capacity. Considering the reliability and security of the power grid, this paper analyzes the characteristics of conventional traffic model based on the traffic characteristics of the distribution network and establishes a multi-convergence traffic prediction model to be used in the distribution network to improve the accuracy of network traffic prediction. Provide a reliable theoretical basis.
网络流量模型是网络性能分析、网络带宽动态分配和网络规划建设的基础。良好的流量模型和预测方法对于设计新一代网络协议、网络管理和诊断、设计高性能路由器、负载均衡器等网络硬件设备以及提高网络服务质量具有重要意义。随着能源智能电网的建设,特别是在配电网中显得尤为明显。电气设备的种类不断增加,这使得配电网和通信网的结构更加复杂多变,包括各种通信系统、更多的设备、更大的规模和通信流量等特点。这会对骨干网的容量造成很大的影响。考虑到电网的可靠性和安全性,本文基于配电网的流量特性,分析了传统流量模型的特点,建立了一种多收敛的配电网流量预测模型,以提高配电网流量预测的准确性。提供可靠的理论依据。
{"title":"Study on multi-network traffic modeling in distribution communication network access service","authors":"Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang","doi":"10.23919/ICACT.2018.8323895","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323895","url":null,"abstract":"Network traffic model is the basis for network performance analysis, dynamic allocation of network bandwidth and network planning and construction. A good traffic model and prediction method is great significance for the design of a new generation of network protocols, network management and diagnosis, design of high performance routers, load balancers Network hardware equipment and improving the quality of the network services. With the construction of energy smart grid, especially in the distribution network is particularly evident. Increasing the variety of electrical equipment, which make distribution and communication network structure more complex and changeable, including a variety of communication systems, more Equipment, a larger scale and communication traffic characteristics. It can cause a great impact on the backbone network capacity. Considering the reliability and security of the power grid, this paper analyzes the characteristics of conventional traffic model based on the traffic characteristics of the distribution network and establishes a multi-convergence traffic prediction model to be used in the distribution network to improve the accuracy of network traffic prediction. Provide a reliable theoretical basis.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient partitioner for distributed OLTP DBMS 分布式OLTP DBMS的高效分区器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323697
Wenkang Chen
Distributed online transaction processing (OLTP) database management systems (DBMS) are characterized with ACID properties, that is atomicity, consistency, isolation, durability. However, these OLTP DBMSs that handle massive data schema, need to be scalable that cannot give up strong transactional and consistency requirements. The large-scale schemas are deployed on distributed server and each server's memory is limited, in that case, how this system partition is the key factor to affect its performance. In this paper, we present a partition approach, that applies to general schema and taking care of load balancing and distributed transaction rates. Our method achieve this by periodically update the partition plan and migration hot data among the servers. OLTP workload are modeled as a graph and using a graph partition algorithm to partition set of data into same server that are often co-accessed by one transaction. To evaluate our method, our framework Assort is integrated into a distributed, main-memory DBMS and shows that it can partition schema in OLTP DBMS and enable the system to outperformance traditional method 3–4x throughput.
分布式联机事务处理(OLTP)数据库管理系统(DBMS)具有ACID特性,即原子性、一致性、隔离性和持久性。但是,这些处理大量数据模式的OLTP dbms需要具有可伸缩性,不能放弃强大的事务性和一致性需求。大规模模式部署在分布式服务器上,每个服务器的内存有限,在这种情况下,系统分区的方式是影响其性能的关键因素。在本文中,我们提出了一种分区方法,它适用于一般模式,并考虑负载平衡和分布式事务率。我们的方法通过定期更新分区计划和在服务器之间迁移热数据来实现这一点。OLTP工作负载建模为图,并使用图分区算法将数据集划分到同一服务器中,这些服务器通常由一个事务共同访问。为了评估我们的方法,我们将我们的框架sort集成到一个分布式主存DBMS中,并表明它可以在OLTP DBMS中划分模式,并使系统的性能优于传统方法3 - 4倍的吞吐量。
{"title":"Efficient partitioner for distributed OLTP DBMS","authors":"Wenkang Chen","doi":"10.23919/ICACT.2018.8323697","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323697","url":null,"abstract":"Distributed online transaction processing (OLTP) database management systems (DBMS) are characterized with ACID properties, that is atomicity, consistency, isolation, durability. However, these OLTP DBMSs that handle massive data schema, need to be scalable that cannot give up strong transactional and consistency requirements. The large-scale schemas are deployed on distributed server and each server's memory is limited, in that case, how this system partition is the key factor to affect its performance. In this paper, we present a partition approach, that applies to general schema and taking care of load balancing and distributed transaction rates. Our method achieve this by periodically update the partition plan and migration hot data among the servers. OLTP workload are modeled as a graph and using a graph partition algorithm to partition set of data into same server that are often co-accessed by one transaction. To evaluate our method, our framework Assort is integrated into a distributed, main-memory DBMS and shows that it can partition schema in OLTP DBMS and enable the system to outperformance traditional method 3–4x throughput.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses 影响医院信息系统成功实施的因素:对伊朗护士的初步试点研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323867
Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare
There is little data on the Iranian nurses' level of satisfaction with Hospital Information System implementation in university hospitals. The aims of this study were:1) To determine the reliability and validity of factors which can affect the successful implementation of Hospital Information System for nursing staff 2) and use them to propose a new implementation success model.
关于伊朗护士对大学医院实施医院信息系统的满意度的数据很少。本研究的目的是:1)确定影响护理人员成功实施医院信息系统的因素的信度和效度,并利用这些因素提出一种新的实施成功模型。
{"title":"Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses","authors":"Shahab Rezaian, Harhodin Bin Salamat, R. Malekzadeh, Rasimah Chemohd Yusoff, N. Zare","doi":"10.23919/ICACT.2018.8323867","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323867","url":null,"abstract":"There is little data on the Iranian nurses' level of satisfaction with Hospital Information System implementation in university hospitals. The aims of this study were:1) To determine the reliability and validity of factors which can affect the successful implementation of Hospital Information System for nursing staff 2) and use them to propose a new implementation success model.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123504506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication V2V通信中不同环境下障碍物对视线信号衰减的影响
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323629
M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee
In Vanet, Secure and Smart Intelligent Transport System (SSITS) support both safety and non-safety applications in terms of throughput and collision performance. In vehicle to vehicle (V2V) communication, the network should provide a good throughput and should reduce collision. To provide an efficient throughput for V2V communication under different environments (such as City, Highway, and Rural), a good radio propagation model is required in order to support the real-time implementation. The existing radio propagation path loss models for V2V network adopt mean additional attenuation sophisticated obstacle fading model such as Nakagami, Log normal and so on. These models do not consider the effects of the vehicle in modeling LOS among transmitter and receiver and also do not consider evaluation under different environments. The presence of Line of sight (LOS) component (such as reflection or diffraction) requires the amplification of signal or power. Due to this, here we present an efficient radio propagation path loss model considering the obstacle in LOS (vehicle) under different environmental conditions in the presence of LOS. The experiments are conducted to evaluate the performance of the proposed model in terms of throughput and collision considering a varied number of vehicles under City, Highway and rural environments. The result shows that the proposed model is efficient considering varied density.
在Vanet中,安全和智能交通系统(SSITS)在吞吐量和碰撞性能方面支持安全和非安全应用。在车对车(V2V)通信中,网络应提供良好的吞吐量,并应减少碰撞。为了在不同的环境下(如城市、公路和农村)提供高效的V2V通信吞吐量,需要一个良好的无线电传播模型来支持实时实现。现有的V2V网络无线电传播路径损耗模型采用平均附加衰减复杂障碍衰落模型,如Nakagami、Log normal等。这些模型没有考虑飞行器在模拟发射器和接收器之间的LOS时的影响,也没有考虑不同环境下的评估。视距分量(如反射或衍射)的存在需要信号或功率的放大。鉴于此,本文提出了一种考虑LOS(车辆)中障碍物在不同环境条件下的有效无线电传播路径损失模型。在城市、公路和农村环境下,考虑不同数量的车辆,进行了实验,以评估所提出模型在吞吐量和碰撞方面的性能。结果表明,考虑到密度的变化,该模型是有效的。
{"title":"Obstacles effects on signal attenuation in line of sight for different environments in V2V communication","authors":"M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee","doi":"10.23919/ICACT.2018.8323629","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323629","url":null,"abstract":"In Vanet, Secure and Smart Intelligent Transport System (SSITS) support both safety and non-safety applications in terms of throughput and collision performance. In vehicle to vehicle (V2V) communication, the network should provide a good throughput and should reduce collision. To provide an efficient throughput for V2V communication under different environments (such as City, Highway, and Rural), a good radio propagation model is required in order to support the real-time implementation. The existing radio propagation path loss models for V2V network adopt mean additional attenuation sophisticated obstacle fading model such as Nakagami, Log normal and so on. These models do not consider the effects of the vehicle in modeling LOS among transmitter and receiver and also do not consider evaluation under different environments. The presence of Line of sight (LOS) component (such as reflection or diffraction) requires the amplification of signal or power. Due to this, here we present an efficient radio propagation path loss model considering the obstacle in LOS (vehicle) under different environmental conditions in the presence of LOS. The experiments are conducted to evaluate the performance of the proposed model in terms of throughput and collision considering a varied number of vehicles under City, Highway and rural environments. The result shows that the proposed model is efficient considering varied density.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123771737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Forensic analysis of network packets from penetration test toolkits 通过渗透测试工具包对网络数据包进行取证分析
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323757
Da-Yu Kao, Yu-Siang Wang, Fuching Tsai, Chien-Hung Chen
Cyber-attacks are likely to continue to increase in size and frequency. As attackers get smarter than before, so do efforts made to protect against unwanted data theft. The purpose of this paper is to look for unusual patterns by repeatable experiments among the constant buzz of network packets that make up PT activities. The utilization of different PT toolkits, like Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner, and Path Analyzer Pro, facilitates cyber-attackers to bring down online system. It is capable of discerning network traffic on the vast streams of network information available through the connected machines from the following three phases: data collection, data reduction, and data analysis. Network forensics can aid in detecting attack behavior. This paper accommodates real-time evidence collection as a network feature against attackers. The identification of unusual patterns in network packets has been put to use in the ongoing battle to stay one step ahead of malicious hackers, who could be anyone from disgruntled customers to nation states. This approach can be easily deployed and should be applicable to any type of network-based assessment.
网络攻击的规模和频率可能会继续增加。随着攻击者变得比以前更聪明,为防止不必要的数据盗窃所做的努力也越来越多。本文的目的是通过可重复的实验,在构成PT活动的网络数据包的持续嗡嗡声中寻找不寻常的模式。利用不同的PT工具包,如Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner和Path Analyzer Pro,便于网络攻击者使在线系统瘫痪。它能够从以下三个阶段识别通过连接的机器提供的大量网络信息流中的网络流量:数据收集、数据简化和数据分析。网络取证可以帮助检测攻击行为。本文将实时证据收集作为对抗攻击者的网络特征。识别网络数据包中的异常模式已被用于对抗恶意黑客,这些恶意黑客可能是任何心怀不满的客户,也可能是国家。这种方法可以很容易地部署,并且应该适用于任何类型的基于网络的评估。
{"title":"Forensic analysis of network packets from penetration test toolkits","authors":"Da-Yu Kao, Yu-Siang Wang, Fuching Tsai, Chien-Hung Chen","doi":"10.23919/ICACT.2018.8323757","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323757","url":null,"abstract":"Cyber-attacks are likely to continue to increase in size and frequency. As attackers get smarter than before, so do efforts made to protect against unwanted data theft. The purpose of this paper is to look for unusual patterns by repeatable experiments among the constant buzz of network packets that make up PT activities. The utilization of different PT toolkits, like Winfingerprint, Superscan, Nmap, SoftPerfect Network Scanner, NeoTrace, Nessus Vulnerability Scanner, and Path Analyzer Pro, facilitates cyber-attackers to bring down online system. It is capable of discerning network traffic on the vast streams of network information available through the connected machines from the following three phases: data collection, data reduction, and data analysis. Network forensics can aid in detecting attack behavior. This paper accommodates real-time evidence collection as a network feature against attackers. The identification of unusual patterns in network packets has been put to use in the ongoing battle to stay one step ahead of malicious hackers, who could be anyone from disgruntled customers to nation states. This approach can be easily deployed and should be applicable to any type of network-based assessment.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"59 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124277530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1