Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323701
H. Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman
In this digital era, different organizations have started taking attendance using biometric fingerprint authentication. This will keep the track of employee's attendance but the question arises if the employee is fully present at his/her workplace after giving attendance. In this modern era of digitalization, it is seen that after giving attendance a huge number of employees escape away from their workplace and do their personal job in the office time. This paper focuses on a smart attendance system where an android device will be used as a smart ID card. A mobile application is developed in Java to ensure the attendance of an individual employee using bio-metric fingerprint authentication. In addition, the entire working place will be a Wi-Fi zone. So, the connection or disconnection of the android device (Smart ID card) to the router will determine whether an employee is present in the working place or not. A counter will be there into the system to count the total amount of time an employee spends in the working place.
{"title":"Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authentication","authors":"H. Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman","doi":"10.23919/ICACT.2018.8323701","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323701","url":null,"abstract":"In this digital era, different organizations have started taking attendance using biometric fingerprint authentication. This will keep the track of employee's attendance but the question arises if the employee is fully present at his/her workplace after giving attendance. In this modern era of digitalization, it is seen that after giving attendance a huge number of employees escape away from their workplace and do their personal job in the office time. This paper focuses on a smart attendance system where an android device will be used as a smart ID card. A mobile application is developed in Java to ensure the attendance of an individual employee using bio-metric fingerprint authentication. In addition, the entire working place will be a Wi-Fi zone. So, the connection or disconnection of the android device (Smart ID card) to the router will determine whether an employee is present in the working place or not. A counter will be there into the system to count the total amount of time an employee spends in the working place.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323745
Hyeong-Ho Lee, Yun Chul Choi, B. Ahn, J. Choi
This paper presents protocol messages, signalling procedures, and use cases for Media Independent Management (MIM) in Software-Defined Networking (SDN)-based wireless access networks. MIM control framework allows to control and to acquire information in a media independent way through a generic interface between higher layers and existing media-specific link layers. Focusing on tightly-coupled integration between SDN and MIM control planes, this paper describes signalling architecture, protocol messages, high-level signalling procedures for resource management and seamless handover, and three use cases of MIM in SDN-based heterogeneous wireless access networks.
{"title":"Protocols and use cases for media independent management in SDN-based wireless access networks","authors":"Hyeong-Ho Lee, Yun Chul Choi, B. Ahn, J. Choi","doi":"10.23919/ICACT.2018.8323745","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323745","url":null,"abstract":"This paper presents protocol messages, signalling procedures, and use cases for Media Independent Management (MIM) in Software-Defined Networking (SDN)-based wireless access networks. MIM control framework allows to control and to acquire information in a media independent way through a generic interface between higher layers and existing media-specific link layers. Focusing on tightly-coupled integration between SDN and MIM control planes, this paper describes signalling architecture, protocol messages, high-level signalling procedures for resource management and seamless handover, and three use cases of MIM in SDN-based heterogeneous wireless access networks.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323917
Fei Ding, Ye Wang, E. Tong, Zhiwen Pan, Xiao-hu You
In this paper, a low-complexity practical energy saving algorithm by switching off/on some eNBs in a real dense urban scenario considering historical and real-time eNB load is proposed. First, eNBs are ranked according to their loads in an ascending order and the first eNB in the list with load decreasing and smaller than a low threshold is pre-selected as target switching off cell. Then, the effect of the target switching off eNB on neighbour eNBs is evaluated. The target eNB switches-off while the load of neighbour eNBs after the eNB switches off is smaller than another threshold. Since estimation of the additional load on the neighbour eNBs due to the switch-off eNB is of high complexity, a fast estimation algorithm considering the whole eNB load by a traffic load conversion coefficient is proposed. The traffic load conversion coefficient declines slowly with the increasing of site traffic load. Third, the switching-off eNB can be switched on by the active eNBs in a distributed way. Based on the load changes in a week period of the eNB, the cumulative probability distribution of normalized load is analyzed, and then the threshold value of the eNB in different periods is evaluated. The energy saving ratio is obviously related with the interval between the switched on or off threshold values and the complexity of the algorithm is significantly reduced. Simulation results show that the proposed energy saving scheme can save up to 24% energy consumption and with low system complexity.
{"title":"A low-complexity practical energy saving algorithm for real dense wireless scenario","authors":"Fei Ding, Ye Wang, E. Tong, Zhiwen Pan, Xiao-hu You","doi":"10.23919/ICACT.2018.8323917","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323917","url":null,"abstract":"In this paper, a low-complexity practical energy saving algorithm by switching off/on some eNBs in a real dense urban scenario considering historical and real-time eNB load is proposed. First, eNBs are ranked according to their loads in an ascending order and the first eNB in the list with load decreasing and smaller than a low threshold is pre-selected as target switching off cell. Then, the effect of the target switching off eNB on neighbour eNBs is evaluated. The target eNB switches-off while the load of neighbour eNBs after the eNB switches off is smaller than another threshold. Since estimation of the additional load on the neighbour eNBs due to the switch-off eNB is of high complexity, a fast estimation algorithm considering the whole eNB load by a traffic load conversion coefficient is proposed. The traffic load conversion coefficient declines slowly with the increasing of site traffic load. Third, the switching-off eNB can be switched on by the active eNBs in a distributed way. Based on the load changes in a week period of the eNB, the cumulative probability distribution of normalized load is analyzed, and then the threshold value of the eNB in different periods is evaluated. The energy saving ratio is obviously related with the interval between the switched on or off threshold values and the complexity of the algorithm is significantly reduced. Simulation results show that the proposed energy saving scheme can save up to 24% energy consumption and with low system complexity.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323703
Chun Yeow Yeoh, A. Man, Q. Ashraf, A. Samingan
Low Power Wide Area (LPWA) connectivity, a wireless wide area technology that is characterized for interconnecting devices with low bandwidth connectivity and focusing on range and power efficiency, is seen as one of the fastest-growing components of Internet-of-Things (IoT). The LPWA connectivity is used to serve a diverse range of vertical applications, including agriculture, consumer, industrial, logistic, smart building, smart city and utilities. 3GPP has defined the maiden Narrowband IoT (NB-IoT) specification in Release 13 (Rel-13) to accommodate the LPWA demand. Several major cellular operators, such as China Mobile, Deutsch Telekom and Vodafone, have announced their NB-IoT trials or commercial network in year 2017. In Telekom Malaysia, we have setup a NB-IoT trial network for End-to-End (E2E) integration study. Our experimental assessment showed that the battery lifetime target for NB-IoT devices as stated by 3GPP utilizing latest-to-date Commercial Off-The-Shelf (COTS) NB-IoT modules is yet to be realized. Finally, several recommendations on how to optimize the battery lifetime while designing firmware for NB-IoT device are also provided.
{"title":"Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT module","authors":"Chun Yeow Yeoh, A. Man, Q. Ashraf, A. Samingan","doi":"10.23919/ICACT.2018.8323703","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323703","url":null,"abstract":"Low Power Wide Area (LPWA) connectivity, a wireless wide area technology that is characterized for interconnecting devices with low bandwidth connectivity and focusing on range and power efficiency, is seen as one of the fastest-growing components of Internet-of-Things (IoT). The LPWA connectivity is used to serve a diverse range of vertical applications, including agriculture, consumer, industrial, logistic, smart building, smart city and utilities. 3GPP has defined the maiden Narrowband IoT (NB-IoT) specification in Release 13 (Rel-13) to accommodate the LPWA demand. Several major cellular operators, such as China Mobile, Deutsch Telekom and Vodafone, have announced their NB-IoT trials or commercial network in year 2017. In Telekom Malaysia, we have setup a NB-IoT trial network for End-to-End (E2E) integration study. Our experimental assessment showed that the battery lifetime target for NB-IoT devices as stated by 3GPP utilizing latest-to-date Commercial Off-The-Shelf (COTS) NB-IoT modules is yet to be realized. Finally, several recommendations on how to optimize the battery lifetime while designing firmware for NB-IoT device are also provided.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131276331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323839
Donghwan Shin, Jonguk Choi
ACR (Automatic Contents Recognition) technology is a technology for automatically recognizing contents, and mainly recognizes contents using audio signal processing technology. The reason why ACR technology is necessary is to recognize the content currently being broadcast and provide an additional service suitable for it. Because of this necessity, internationally, ACR technology is selected as a standard in ATSC 3.0. In Korea, IBB (Integrated Broadcast and Broadband) service is included as domestic UHD broadcasting technology standard. In this paper, we describe the standard progress of ACR technology as domestic IBB standard and discuss why ACR technology is needed in actual broadcasting environment and future development direction. In particular, there is a limitation that the standardized part can only be provided by UHD TV. UHD TV Terrestrial broadcasting started in May 2017 based on ATSC 3.0 for the first time in the world. However, considering the domestic situation that more than 90% of users watch using set-top boxes, the number of households receiving UHD broadcasting directly is expected to be less than 10%. In addition, UHD broadcasting can only use UHD TV purchased in 2017 to use additional information service using ACR technology. DTV broadcasting will continue until UHD 100% broadcasting will be available by 2027 because the average TV replacement cycle is about 10 years on average. Accordingly, the time to replace the TV with UHD TV is expected to take more than 10 years. In this paper, the technology and direction to solve these problems are proposed.
{"title":"Proposal of value-added service based on real-time automatic content recognition","authors":"Donghwan Shin, Jonguk Choi","doi":"10.23919/ICACT.2018.8323839","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323839","url":null,"abstract":"ACR (Automatic Contents Recognition) technology is a technology for automatically recognizing contents, and mainly recognizes contents using audio signal processing technology. The reason why ACR technology is necessary is to recognize the content currently being broadcast and provide an additional service suitable for it. Because of this necessity, internationally, ACR technology is selected as a standard in ATSC 3.0. In Korea, IBB (Integrated Broadcast and Broadband) service is included as domestic UHD broadcasting technology standard. In this paper, we describe the standard progress of ACR technology as domestic IBB standard and discuss why ACR technology is needed in actual broadcasting environment and future development direction. In particular, there is a limitation that the standardized part can only be provided by UHD TV. UHD TV Terrestrial broadcasting started in May 2017 based on ATSC 3.0 for the first time in the world. However, considering the domestic situation that more than 90% of users watch using set-top boxes, the number of households receiving UHD broadcasting directly is expected to be less than 10%. In addition, UHD broadcasting can only use UHD TV purchased in 2017 to use additional information service using ACR technology. DTV broadcasting will continue until UHD 100% broadcasting will be available by 2027 because the average TV replacement cycle is about 10 years on average. Accordingly, the time to replace the TV with UHD TV is expected to take more than 10 years. In this paper, the technology and direction to solve these problems are proposed.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323797
Sukritta Harnmetta, S. Ngamsuriyaroj
An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy.
{"title":"Classification of Exploit-Kit behaviors via machine learning approach","authors":"Sukritta Harnmetta, S. Ngamsuriyaroj","doi":"10.23919/ICACT.2018.8323797","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323797","url":null,"abstract":"An Exploit-Kit (EK) is the cyber attacking tool which targets in finding vulnerabilities appeared on a web browser instance such as web-plugins, add-on instances usually installed in a web browser. Such instances may send some suitable malware payload through the vulnerabilities they found. This kind of such cyber-attack is known as the drive-by-download attack where malware downloading do not require any interaction from users. In addition, EK can do self-protection by imitating a benign website or responding to end-users with HTTP 404 error code whenever it encountered an unsupported target web browser. As a result, detecting EK requires a lot of effort. However, when an EK launches an attack, there are some patterns of interactions between a host and a victim. In this work, we obtain a set of data from www.malware-traffic-analysis.net and analyze those interactions in order to identify a set of features. We use such features to build a model for classifying interaction patterns of each EK type. Our experiments show that, with 5,743 network flows and 45 features, our model using Decision tree approach can classify EK traffic and EK type with accuracy of 97.74% and 97.11% respectively. In conclusion, our proposed work can help detect the behavior of EK with high accuracy.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323793
S. Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim
Due to the development of machine learning, interest in automatic recognition of objects in videos is increasing. In the sports field, there is a growing demand for a technology for automatically recognizing and tracking various objects in a sports game video. However, it is very difficult to recognize and track an object without proper preprocessing due to its small size and large sports field. In this paper, we compare background substraction and edge detection, which are typical preprocessing methods for automatic recognition and tracking of objects in sports images, and analyze advantages and disadvantages of each method.
{"title":"A comparative study on preprocessing methods for object tracking in sports events","authors":"S. Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim","doi":"10.23919/ICACT.2018.8323793","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323793","url":null,"abstract":"Due to the development of machine learning, interest in automatic recognition of objects in videos is increasing. In the sports field, there is a growing demand for a technology for automatically recognizing and tracking various objects in a sports game video. However, it is very difficult to recognize and track an object without proper preprocessing due to its small size and large sports field. In this paper, we compare background substraction and edge detection, which are typical preprocessing methods for automatic recognition and tracking of objects in sports images, and analyze advantages and disadvantages of each method.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323625
Sunghyun Kim, H. Jwa, J. Moon, J. Na
We propose a low-complexity downlink interference coordination algorithm in OFDMA networks. The algorithm aims to achieve high proportional fairness among cell-edge users, as the effects of inter-cell interference are most noticeable in cell-edge areas where users are interfered by signals from neighbor base-stations. We demonstrate that the performance of our algorithm is greater than that of a decentralized algorithm which aims at interference randomization. Our algorithm consists of two stages. In the first stage, it constructs a bipartite graph that describes which set of base-stations imposes significant interference on each cell-edge user. In the second stage, exploiting the structure of the constructed graph, it solves an optimization problem to attain high proportional fairness.
{"title":"Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networks","authors":"Sunghyun Kim, H. Jwa, J. Moon, J. Na","doi":"10.23919/ICACT.2018.8323625","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323625","url":null,"abstract":"We propose a low-complexity downlink interference coordination algorithm in OFDMA networks. The algorithm aims to achieve high proportional fairness among cell-edge users, as the effects of inter-cell interference are most noticeable in cell-edge areas where users are interfered by signals from neighbor base-stations. We demonstrate that the performance of our algorithm is greater than that of a decentralized algorithm which aims at interference randomization. Our algorithm consists of two stages. In the first stage, it constructs a bipartite graph that describes which set of base-stations imposes significant interference on each cell-edge user. In the second stage, exploiting the structure of the constructed graph, it solves an optimization problem to attain high proportional fairness.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132721113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323637
Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim
Shot category detection is a method that extracts classified shots which comprised of several sequenced frames. These are based on object detection, which relates feature extraction of image processing. Shot category detection is helpful to utilize the neural network. Neural networks are widely generalized to our society. Artificial neural networks applied in many kinds of researches and developments, which provide convenient technologies for fundamental knowledge of deep learning. In terms of artificial neural networks, we introduce shot category detection based on object detection using convolutional neural networks (CNN). This paper also proves that CNN is efficient for supervised learning.
{"title":"Shot category detection based on object detection using convolutional neural networks","authors":"Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim","doi":"10.23919/ICACT.2018.8323637","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323637","url":null,"abstract":"Shot category detection is a method that extracts classified shots which comprised of several sequenced frames. These are based on object detection, which relates feature extraction of image processing. Shot category detection is helpful to utilize the neural network. Neural networks are widely generalized to our society. Artificial neural networks applied in many kinds of researches and developments, which provide convenient technologies for fundamental knowledge of deep learning. In terms of artificial neural networks, we introduce shot category detection based on object detection using convolutional neural networks (CNN). This paper also proves that CNN is efficient for supervised learning.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.23919/ICACT.2018.8323883
Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, S. Ouya, Kéba Gueye
This paper propose a solution for improving the reliability of IMS HSS data by integrating a queue manager. It will interact between the I-CSCF, S-CSCF and HSS entities so that when transferring or downloading the user's profile, the HSS entity is operating normally, notifying the user that it is registered.
{"title":"Proposed solution for improving the reliability of HSS data by integrating a queue manager","authors":"Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, S. Ouya, Kéba Gueye","doi":"10.23919/ICACT.2018.8323883","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323883","url":null,"abstract":"This paper propose a solution for improving the reliability of IMS HSS data by integrating a queue manager. It will interact between the I-CSCF, S-CSCF and HSS entities so that when transferring or downloading the user's profile, the HSS entity is operating normally, notifying the user that it is registered.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"76 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}