Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206303
Do Young Kim, Jong Won Park
This paper describes on a design and implementation of ASIC to integrate with high-quality voice over wireless LAN for the application of hand-held terminal, which is based on the wideband speech codec algorithm and IEEE 802.11e-based QoS mechanism. The target of this work mainly focused on the single chip integration for VoIP terminal providing the differentiated high-quality Internet telephony service through wireless LAN. In the design of ASIC, ARM926EJ is adopted for a high-performance single RISC core to remove additional high-cost DSP device. Also wireless MAC and PHY layer based on IEEE802.11a, b, and g had designed and implemented on this device
{"title":"A design and implementation of ASIC for high-quality VoIP terminal over wireless LAN","authors":"Do Young Kim, Jong Won Park","doi":"10.1109/ICACT.2006.206303","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206303","url":null,"abstract":"This paper describes on a design and implementation of ASIC to integrate with high-quality voice over wireless LAN for the application of hand-held terminal, which is based on the wideband speech codec algorithm and IEEE 802.11e-based QoS mechanism. The target of this work mainly focused on the single chip integration for VoIP terminal providing the differentiated high-quality Internet telephony service through wireless LAN. In the design of ASIC, ARM926EJ is adopted for a high-performance single RISC core to remove additional high-cost DSP device. Also wireless MAC and PHY layer based on IEEE802.11a, b, and g had designed and implemented on this device","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206072
E. Taropa, V. P. Srini, Wong-Jong Lee, T. Han
Accurate environment sensing has become crucial in various domains ranging from remote control, remote collaboration, navigation in autonomous vehicles and disaster prevention systems. The common characteristics for these applications are: diverse sensors operating at different rates resulting in the heterogeneity of data sources, constant processing time constraints, and real-time decision making processes based on the collected information. A reliable data fusion model must address each of these requirements and must allow the user to constantly monitor the flow of data in the framework. This paper proposes a hierarchical model for data fusion using real time objects and an application program interface (API)
{"title":"Data fusion applied on autonomous ground vehicles","authors":"E. Taropa, V. P. Srini, Wong-Jong Lee, T. Han","doi":"10.1109/ICACT.2006.206072","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206072","url":null,"abstract":"Accurate environment sensing has become crucial in various domains ranging from remote control, remote collaboration, navigation in autonomous vehicles and disaster prevention systems. The common characteristics for these applications are: diverse sensors operating at different rates resulting in the heterogeneity of data sources, constant processing time constraints, and real-time decision making processes based on the collected information. A reliable data fusion model must address each of these requirements and must allow the user to constantly monitor the flow of data in the framework. This paper proposes a hierarchical model for data fusion using real time objects and an application program interface (API)","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206080
Chengliang Li, Weiyu Zheng
In DS-CDMA communication systems, each user is distinguished by a unique spreading code to modulate binary data. At the side of the receiver, the signal for the desired user must be separated from the summed signal. This paper presents a subspace separator and functional link neural network based method to separate the desired user and eliminate the co-channel and interference as well as additional Gaussian noise. At last some computer simulation results of the receiver combining these two techniques are given
{"title":"Subspace Separator and Functional Link Neural Network Based Receiver for DS-CDMA Signal","authors":"Chengliang Li, Weiyu Zheng","doi":"10.1109/ICACT.2006.206080","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206080","url":null,"abstract":"In DS-CDMA communication systems, each user is distinguished by a unique spreading code to modulate binary data. At the side of the receiver, the signal for the desired user must be separated from the summed signal. This paper presents a subspace separator and functional link neural network based method to separate the desired user and eliminate the co-channel and interference as well as additional Gaussian noise. At last some computer simulation results of the receiver combining these two techniques are given","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126295480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206230
S. Sachidananda, M. Shah, S. Gopalan, S. Varadarajan
Snort rule-checking is one of the most popular forms of network intrusion detection systems (NIDS). Recent work in string matching has focused on offloading string matching to hardware realizations in order to achieve time and space efficiencies. However, any form of implementation would have to maintain a threshold performance in order to keep with the packet data rate. While trying to maintain this threshold, control-unit is forced to either drop some packets or some rules. In this work, we present a packet priority technique that prioritizes the packets such that there is a high probability that the potentially malicious packets are detected within the threshold limit. We also present a novel intelligent string arrangement (ISA) that enables complete packet scanning in a smart and time efficient manner
{"title":"Priority-based high-speed intelligent rule-checking","authors":"S. Sachidananda, M. Shah, S. Gopalan, S. Varadarajan","doi":"10.1109/ICACT.2006.206230","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206230","url":null,"abstract":"Snort rule-checking is one of the most popular forms of network intrusion detection systems (NIDS). Recent work in string matching has focused on offloading string matching to hardware realizations in order to achieve time and space efficiencies. However, any form of implementation would have to maintain a threshold performance in order to keep with the packet data rate. While trying to maintain this threshold, control-unit is forced to either drop some packets or some rules. In this work, we present a packet priority technique that prioritizes the packets such that there is a high probability that the potentially malicious packets are detected within the threshold limit. We also present a novel intelligent string arrangement (ISA) that enables complete packet scanning in a smart and time efficient manner","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206307
Hongseok Jeon, Junghoon Jee
IEEE 802.16 is one of broadband wireless access technologies and will become a key technology for growing wireless IP network. However, point-to-point oriented network such as IEEE 802.16 introduces some issues in applying conventional standard IPv6 neighbor discovery protocol (NDP). Following the previous 3GPP model for IPv6 NDP is not flexible in IPv6 link configuration since it assigns different network prefixes to each subscriber stations. We presents a mechanism which can allocate a common network prefix to all subscriber stations under the same IPv6 link. Through this mechanism, the standard IPv6 NDP can be applied to IEEE 802.16 networks without modifying conventional host-side operation
{"title":"IPv6 Neighbor Discovery Protocol for Common Prefix Allocation in IEEE 802.16","authors":"Hongseok Jeon, Junghoon Jee","doi":"10.1109/ICACT.2006.206307","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206307","url":null,"abstract":"IEEE 802.16 is one of broadband wireless access technologies and will become a key technology for growing wireless IP network. However, point-to-point oriented network such as IEEE 802.16 introduces some issues in applying conventional standard IPv6 neighbor discovery protocol (NDP). Following the previous 3GPP model for IPv6 NDP is not flexible in IPv6 link configuration since it assigns different network prefixes to each subscriber stations. We presents a mechanism which can allocate a common network prefix to all subscriber stations under the same IPv6 link. Through this mechanism, the standard IPv6 NDP can be applied to IEEE 802.16 networks without modifying conventional host-side operation","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115935112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206265
Doan Huy Cuong, J. Choi, D. Guha
The rising number of mobile users, the advent of various radio access technologies, and the increasing importance of IP services over wireless as well as wired networks pose a number of new design and deployment challenges. While mobile IP has been designed for mobility management in IP networks, it still has a high latency and signaling overhead during handoff. Some proposals for seamless handover support have been published and some analytic work on their performance done. However, there are still many issues in multimedia and real-time service provisioning over mobile IP networks. One of the main reasons is that the current IP network is best effort based and cannot provide QoS guarantee for real-time services. In this paper, we propose a flow-based routing scheme in mobile IPv6 networks to support real-time traffic by using the flow label field in IPv6 packets. The proposed scheme takes the advantages of rapid establishment of a flow and fast forward of packets based on flow state information that lowers the packet processing time and transmission delay; the hierarchical network structure that reduces signaling loads, and a fast flow handoff algorithm that ensures minimal handover latencies and packet losses
{"title":"Flow-based forwarding scheme and performance analysis in mobile IPv6 networks","authors":"Doan Huy Cuong, J. Choi, D. Guha","doi":"10.1109/ICACT.2006.206265","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206265","url":null,"abstract":"The rising number of mobile users, the advent of various radio access technologies, and the increasing importance of IP services over wireless as well as wired networks pose a number of new design and deployment challenges. While mobile IP has been designed for mobility management in IP networks, it still has a high latency and signaling overhead during handoff. Some proposals for seamless handover support have been published and some analytic work on their performance done. However, there are still many issues in multimedia and real-time service provisioning over mobile IP networks. One of the main reasons is that the current IP network is best effort based and cannot provide QoS guarantee for real-time services. In this paper, we propose a flow-based routing scheme in mobile IPv6 networks to support real-time traffic by using the flow label field in IPv6 packets. The proposed scheme takes the advantages of rapid establishment of a flow and fast forward of packets based on flow state information that lowers the packet processing time and transmission delay; the hierarchical network structure that reduces signaling loads, and a fast flow handoff algorithm that ensures minimal handover latencies and packet losses","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.205994
Hyundong Kim, S. Choe
In this paper, we propose a preamble structure and present a coarse timing synchronization method based on it. Performance of the proposed synchronization method is compared to Schmidl's method in terms of detection, missing, false alarm probability and mean acquisition time. For frequency selective multipath fading channels, our proposed synchronization method has a higher detection probability and a lower false alarm probability than Schmidl's method at high SNRs (greater than 1 dB). The mean acquisition time of the proposed method is also improved at high SNRs
{"title":"A Timing Synchronization of OFDMA-TDD Systems over Multipath Fading Channels","authors":"Hyundong Kim, S. Choe","doi":"10.1109/ICACT.2006.205994","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205994","url":null,"abstract":"In this paper, we propose a preamble structure and present a coarse timing synchronization method based on it. Performance of the proposed synchronization method is compared to Schmidl's method in terms of detection, missing, false alarm probability and mean acquisition time. For frequency selective multipath fading channels, our proposed synchronization method has a higher detection probability and a lower false alarm probability than Schmidl's method at high SNRs (greater than 1 dB). The mean acquisition time of the proposed method is also improved at high SNRs","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206317
Seungyong Yoon, J. Oh, Jongsoo Jang
One of the major problems and limiting factor with network-based IDS(NIDS) is the high false positive alert rate. In order to reduce these false positive alerts, a lot of methods and techniques are proposed. Stateful packet inspection (SPI) is one of these solutions. Stateless IDSs generate tremendous false positive alerts while stick or snot attempts to attack. Most existing NIDS have SPI modules which supports statefulness but they don't satisfy high-performance in gigabit Internet environment. To solve this problem, we propose a hardware based SPI module that supports up to 1 million connections with 2-step state management scheme in this paper
{"title":"Design of SPI module in large-scale network","authors":"Seungyong Yoon, J. Oh, Jongsoo Jang","doi":"10.1109/ICACT.2006.206317","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206317","url":null,"abstract":"One of the major problems and limiting factor with network-based IDS(NIDS) is the high false positive alert rate. In order to reduce these false positive alerts, a lot of methods and techniques are proposed. Stateful packet inspection (SPI) is one of these solutions. Stateless IDSs generate tremendous false positive alerts while stick or snot attempts to attack. Most existing NIDS have SPI modules which supports statefulness but they don't satisfy high-performance in gigabit Internet environment. To solve this problem, we propose a hardware based SPI module that supports up to 1 million connections with 2-step state management scheme in this paper","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two-dimensional electrophoresis gel (2DE) image is used widely to look for unusual protein from organisms that cause human ails. The flowchart of 2DE research is divided into several sectors, and there are significant correlations between them. If these works are finished by manpower, they will be reiterative, boring, wasting time, and painstaking. We implement an integrated Web-based system named NT2GS which can get more accurate results, increase harmonization, and save more time to improve a convenient system
{"title":"An Integrated Web-Based System for Two-Dimensional Electrophoresis Gel Images","authors":"Tung-Shou Chen, Tian-Shing Wang, Mao-Chuan Hsiao, Chun-Wei Tsai","doi":"10.1109/ICACT.2006.206002","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206002","url":null,"abstract":"Two-dimensional electrophoresis gel (2DE) image is used widely to look for unusual protein from organisms that cause human ails. The flowchart of 2DE research is divided into several sectors, and there are significant correlations between them. If these works are finished by manpower, they will be reiterative, boring, wasting time, and painstaking. We implement an integrated Web-based system named NT2GS which can get more accurate results, increase harmonization, and save more time to improve a convenient system","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130268514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206399
Jong-Geun Park, Changjin Ahn, Hee-Nam Cho, Il-Soo Byun, F. Desmons, Seong-Woon Kim
In the WBEM architecture, all of CIM Operations are represented using XML and then encapsulated by an HTTP header. But XML has a drawback which size tends to be large. Binary XML is a new alternative technology to resolve this performance problem. In this paper, we introduce a newly noteworthy distributed resource information management framework based on CIM and WBEM standards of DMTF. In addition to it, we propose a method for representing and transporting CIM operations using Binary XML in the WBEM architecture. It can enhance a performance of message transportation between WBEM clients and a WEBM server
{"title":"A method for representing and transporting CIM operations using binary XML in the WBEM architecture","authors":"Jong-Geun Park, Changjin Ahn, Hee-Nam Cho, Il-Soo Byun, F. Desmons, Seong-Woon Kim","doi":"10.1109/ICACT.2006.206399","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206399","url":null,"abstract":"In the WBEM architecture, all of CIM Operations are represented using XML and then encapsulated by an HTTP header. But XML has a drawback which size tends to be large. Binary XML is a new alternative technology to resolve this performance problem. In this paper, we introduce a newly noteworthy distributed resource information management framework based on CIM and WBEM standards of DMTF. In addition to it, we propose a method for representing and transporting CIM operations using Binary XML in the WBEM architecture. It can enhance a performance of message transportation between WBEM clients and a WEBM server","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}