Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206274
Youngjae Kim, Dongman Lee
An architecture for a personal context-based universal remote controller system is proposed. The proposed scheme allows user to apply preferable functions of appliance services to user contexts. We describe a method for handling and adapting user preferences interacting with home server. The result shows graphic user interfaces by adapting UI generation algorithm dynamically. This work is implemented using network enabled PDA in active surroundings smart home environments
{"title":"A personal context-aware universal remote controller for a smart home environment","authors":"Youngjae Kim, Dongman Lee","doi":"10.1109/ICACT.2006.206274","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206274","url":null,"abstract":"An architecture for a personal context-based universal remote controller system is proposed. The proposed scheme allows user to apply preferable functions of appliance services to user contexts. We describe a method for handling and adapting user preferences interacting with home server. The result shows graphic user interfaces by adapting UI generation algorithm dynamically. This work is implemented using network enabled PDA in active surroundings smart home environments","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114815536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206091
Jeong-Si Kim, Chaedeok Lim
Writing device drivers is known as very difficult developing process. In particular, writing low-level code for accessing devices and manipulating their kernel resources is tedious and error-prone. But, ever since the first device drivers have been written, their development process has made little progress. In this paper, we present a remote diagnostic tool for USB device kernel resources. This tool provides a method that device driver developers access devices and manipulating their kernel resources directly without writing any code for kernel programming. The presented tool in this paper, therefore, reduces the burden in developing USB device drivers and improves their productivity
{"title":"A remote diagnostic tool for USB kernel resources in the embedded Linux systems","authors":"Jeong-Si Kim, Chaedeok Lim","doi":"10.1109/ICACT.2006.206091","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206091","url":null,"abstract":"Writing device drivers is known as very difficult developing process. In particular, writing low-level code for accessing devices and manipulating their kernel resources is tedious and error-prone. But, ever since the first device drivers have been written, their development process has made little progress. In this paper, we present a remote diagnostic tool for USB device kernel resources. This tool provides a method that device driver developers access devices and manipulating their kernel resources directly without writing any code for kernel programming. The presented tool in this paper, therefore, reduces the burden in developing USB device drivers and improves their productivity","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123419558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206285
Sangseung Kang, J. Sohn
The URC service composition technology provides various functions that automatically select Web services, and dynamically create and compose Web service plans based on service templates. In this paper, we propose a service template authoring environment for the URC service composition system in the semantic Web services environments. The proposed authoring environment provides users with an effective and easy tool by the user-friendly graphical processing functions for the service template resources including creation, addition, deletion, and modification of the URC service templates
{"title":"A service template authoring environment for URC service composition","authors":"Sangseung Kang, J. Sohn","doi":"10.1109/ICACT.2006.206285","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206285","url":null,"abstract":"The URC service composition technology provides various functions that automatically select Web services, and dynamically create and compose Web service plans based on service templates. In this paper, we propose a service template authoring environment for the URC service composition system in the semantic Web services environments. The proposed authoring environment provides users with an effective and easy tool by the user-friendly graphical processing functions for the service template resources including creation, addition, deletion, and modification of the URC service templates","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206022
Yung-Tsung Hou, Tzu-Chen Lee, B. Jeng, Chia-Mei Chen
Wireless sensor networks provide an alternative way of improving our environments, such as environment surveillance, hazard monitoring, and other customized environmental applications. Good coverage of service in a sensor network is an essential issue to ensure the quality of service. This paper studies the deployment of new sensor nodes such that the improvement of the coverage is optimized. Based on computational geometry and graph theory, we propose an optimal polynomial time algorithm for sensor node deployment. We also prove the properties of such deployment and the correctness of the optimal solution
{"title":"Optimal coverage deployment for wireless sensor networks","authors":"Yung-Tsung Hou, Tzu-Chen Lee, B. Jeng, Chia-Mei Chen","doi":"10.1109/ICACT.2006.206022","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206022","url":null,"abstract":"Wireless sensor networks provide an alternative way of improving our environments, such as environment surveillance, hazard monitoring, and other customized environmental applications. Good coverage of service in a sensor network is an essential issue to ensure the quality of service. This paper studies the deployment of new sensor nodes such that the improvement of the coverage is optimized. Based on computational geometry and graph theory, we propose an optimal polynomial time algorithm for sensor node deployment. We also prove the properties of such deployment and the correctness of the optimal solution","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206189
So Young Park, Jeong-Tae Kim, Shin-Gak Kang
As adoption of VoIP service increases, concern about spreading of VoIP spam is increasing also. In this paper, we analyze applicability of traditional spam regulations to VoIP spam. Specifically, we chose several representative countering spam regulations - opt-out, opt-in, labeling and pricing. As the result of analysis, we can see that the applicability differs according to the type of regulation and the type of VoIP spam
{"title":"Analysis of applicability of traditional spam regulations to VoIP spam","authors":"So Young Park, Jeong-Tae Kim, Shin-Gak Kang","doi":"10.1109/ICACT.2006.206189","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206189","url":null,"abstract":"As adoption of VoIP service increases, concern about spreading of VoIP spam is increasing also. In this paper, we analyze applicability of traditional spam regulations to VoIP spam. Specifically, we chose several representative countering spam regulations - opt-out, opt-in, labeling and pricing. As the result of analysis, we can see that the applicability differs according to the type of regulation and the type of VoIP spam","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124704911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205957
Ren Gang, Chen Binghai
After a brief introduction on Chinese 3G process and 1xEV-DO technology, a 1xEV-DO 3G mobile experimental system project was introduced with details in both technology implementation and project management aspect; next, a business analysis about short term estimation and long term potential of this project was conducted on this 3G experimental network and other existing local commercial telecommunication infrastructures as well; finally, the authors make a brief summary and indicate some future research directions
{"title":"1xEV-DO 3G mobile experimental system project report with a local market analysis","authors":"Ren Gang, Chen Binghai","doi":"10.1109/ICACT.2006.205957","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205957","url":null,"abstract":"After a brief introduction on Chinese 3G process and 1xEV-DO technology, a 1xEV-DO 3G mobile experimental system project was introduced with details in both technology implementation and project management aspect; next, a business analysis about short term estimation and long term potential of this project was conducted on this 3G experimental network and other existing local commercial telecommunication infrastructures as well; finally, the authors make a brief summary and indicate some future research directions","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205931
B. Choi, D. Seo
GUMF (global user management framework) that is proposed in this research can be applied to next generation networks such as BcN (broadband convergence network), it's QoS guaranteed security framework for users can solve the present Internet's security vulnerability. GUMF offers anonymity for users of the service and uses the user's real-name or ID for management of service and it's technology can realize secure QoS. GUMF needs a management framework, UMS (user management system), VNC (virtual network controller) etc. UMS consists of a root UMS in country dimension and local UMS in each site dimension. VNC's network security equipment includes VPN, QoS and security functions etc., and it achieves the QoSS (quality of security service) and CLS (communication level switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and most current attacks such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and the user's security service level is decided according to the level of the private information. Level 3 users that offer bio-information can receive secure network service where privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer a profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization
{"title":"On the study of service security model for privacy using global user management framework","authors":"B. Choi, D. Seo","doi":"10.1109/ICACT.2006.205931","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205931","url":null,"abstract":"GUMF (global user management framework) that is proposed in this research can be applied to next generation networks such as BcN (broadband convergence network), it's QoS guaranteed security framework for users can solve the present Internet's security vulnerability. GUMF offers anonymity for users of the service and uses the user's real-name or ID for management of service and it's technology can realize secure QoS. GUMF needs a management framework, UMS (user management system), VNC (virtual network controller) etc. UMS consists of a root UMS in country dimension and local UMS in each site dimension. VNC's network security equipment includes VPN, QoS and security functions etc., and it achieves the QoSS (quality of security service) and CLS (communication level switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and most current attacks such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and the user's security service level is decided according to the level of the private information. Level 3 users that offer bio-information can receive secure network service where privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer a profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205928
Seong-Soon Joo, Y. Bang
In this paper, we propose a network architecture, uEthernet (universal Ethernet), which can support a wide variety of customized end-to-end quality by adding the concept on time-based resource allocation and deterministic switching to conventional Ethernet switching. We draw requirements on converting Ethernet network into a unified transport network in view of customized end-to-end quality and suggest an integrated frame network by providing asynchronous frame forwarding and synchronous frame switching on a unified switch
{"title":"Universal Ethernet Networks Based on the Cycle Reservation Scheduling","authors":"Seong-Soon Joo, Y. Bang","doi":"10.1109/ICACT.2006.205928","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205928","url":null,"abstract":"In this paper, we propose a network architecture, uEthernet (universal Ethernet), which can support a wide variety of customized end-to-end quality by adding the concept on time-based resource allocation and deterministic switching to conventional Ethernet switching. We draw requirements on converting Ethernet network into a unified transport network in view of customized end-to-end quality and suggest an integrated frame network by providing asynchronous frame forwarding and synchronous frame switching on a unified switch","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121585072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205922
Jinyong Jo, J. Kong, Okhwan Byeon
Uncompressed HD over IP is a broadband network application demanding high-end system performance. Finding bottleneck points and tuning them is essential for the service to achieve the performance requirements. In this paper, we massively investigate system parameters accelerating network and disk performance. Also, we introduce a software bottleneck and its effect to the system integrations
Uncompressed HD over IP是一种要求高端系统性能的宽带网络应用。找到瓶颈点并对其进行调优对于服务实现性能需求至关重要。在本文中,我们大量研究系统参数加速网络和磁盘性能。此外,我们还介绍了软件瓶颈及其对系统集成的影响
{"title":"Optimizing system performance for uncompressed HD over gigabit Ethernet: a case study","authors":"Jinyong Jo, J. Kong, Okhwan Byeon","doi":"10.1109/ICACT.2006.205922","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205922","url":null,"abstract":"Uncompressed HD over IP is a broadband network application demanding high-end system performance. Finding bottleneck points and tuning them is essential for the service to achieve the performance requirements. In this paper, we massively investigate system parameters accelerating network and disk performance. Also, we introduce a software bottleneck and its effect to the system integrations","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"2003 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206212
Il-Young Moon
With the growth of data communication service by mobile devices, WAP is a protocol proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. In this paper, it has analyzed transmission time for wireless application protocol (WAP) in wireless CDMA network. In order for segmentation and reassembly (SAR) to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the wireless transaction protocol (WTP) to define the resultant packet size and the level of fragmentation for each proceeding layer. SAR decreases transmission time of radio link protocol (RLP) baseband packets by sending packets. From the results, it was able to obtain packet transmission time and optimal WTP packet size in wireless network
WAP是随着移动设备数据通信业务的发展,为了在无线条件下根据用户请求高效访问互联网内容而提出的一种协议,具有较高的错误率和移动性。本文分析了无线CDMA网络中无线应用协议(WAP)的传输时间。为了进行分段和重组(SAR)以提高传输能力,使用从总包开始的分段和每层的增量分段来模拟消息的传输,使用无线事务协议(WTP)来定义生成的数据包大小和每个处理层的分段级别。SAR通过发送报文来减少RLP (radio link protocol)基带报文的传输时间。结果表明,该算法能够得到无线网络中WTP包的传输时间和最佳包大小
{"title":"Performance Evaluation of WAP Packet Considering WTP SAR Algorithm and RLP in Wireless Network","authors":"Il-Young Moon","doi":"10.1109/ICACT.2006.206212","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206212","url":null,"abstract":"With the growth of data communication service by mobile devices, WAP is a protocol proposed to efficiently access the Internet contents by user request through wireless condition that has a high error rate and mobility. In this paper, it has analyzed transmission time for wireless application protocol (WAP) in wireless CDMA network. In order for segmentation and reassembly (SAR) to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the wireless transaction protocol (WTP) to define the resultant packet size and the level of fragmentation for each proceeding layer. SAR decreases transmission time of radio link protocol (RLP) baseband packets by sending packets. From the results, it was able to obtain packet transmission time and optimal WTP packet size in wireless network","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}