Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206156
Lee Dong-yeal, Oh Seung-hyeub
Many papers, which submitted as of yet, describe the method of upstream DBA in EPONs. In this paper, we propose the method to improve bandwidth utilization by using modified DRR (deficit round robin) mechanism in ONU scheduling. The ONU provides three different users with their own different upstream bandwidth. In simulation, prime user, medium user, best-effort user, each has been allocated 7500 byte(equivalent to 30 Mbps), 5000 byte (20 Mbps) and 2500 byte (10 Mbps) per one cycle (2 ms). Simulation results show that the proposed method gives more of 10% utilization improvement compared to legacy method
{"title":"A new DBA scheme to improve bandwidth utilization in EPONs","authors":"Lee Dong-yeal, Oh Seung-hyeub","doi":"10.1109/ICACT.2006.206156","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206156","url":null,"abstract":"Many papers, which submitted as of yet, describe the method of upstream DBA in EPONs. In this paper, we propose the method to improve bandwidth utilization by using modified DRR (deficit round robin) mechanism in ONU scheduling. The ONU provides three different users with their own different upstream bandwidth. In simulation, prime user, medium user, best-effort user, each has been allocated 7500 byte(equivalent to 30 Mbps), 5000 byte (20 Mbps) and 2500 byte (10 Mbps) per one cycle (2 ms). Simulation results show that the proposed method gives more of 10% utilization improvement compared to legacy method","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206047
Puo-Iang Chen, Chung-Wei Huang, Tung-Shou Chen
The product life cycle of Hi-Tech industry become shorter and shorter in recent years. Production line must work as fast as it can when products design finish. Otherwise, industry is very difficult to survive in the Hi-Tech industry with keen competition. As the result, it is difficult to satisfy production rate and defective rate at the same time. Production line in traditional factory is that quality controller needs to use vision sense to confirm manufacture procedure and controls the situation of production line such as they should adjust production parameter at any time, control procedure to reduce defective rate, increasing effective output products, reduce production cost, and increase profitability. In our research, we want to reduce burdens for quality controller. We use image processing intend of using vision sense by quality controller before. Our research develops a virtual instrumentation system to reach our goal
{"title":"An integrated virtual instrumentation system using statistical process control and image processing","authors":"Puo-Iang Chen, Chung-Wei Huang, Tung-Shou Chen","doi":"10.1109/ICACT.2006.206047","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206047","url":null,"abstract":"The product life cycle of Hi-Tech industry become shorter and shorter in recent years. Production line must work as fast as it can when products design finish. Otherwise, industry is very difficult to survive in the Hi-Tech industry with keen competition. As the result, it is difficult to satisfy production rate and defective rate at the same time. Production line in traditional factory is that quality controller needs to use vision sense to confirm manufacture procedure and controls the situation of production line such as they should adjust production parameter at any time, control procedure to reduce defective rate, increasing effective output products, reduce production cost, and increase profitability. In our research, we want to reduce burdens for quality controller. We use image processing intend of using vision sense by quality controller before. Our research develops a virtual instrumentation system to reach our goal","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206273
S. Ok, Hojin Park
Home gateway is a piece of important home network equipment serving as a connection route to allow external access to your home installations. This equipment is an object of management as seen from the viewpoint of enterpriser and is constructed as a system based on OSGi (open service gateway initiative) platform in order to facilitate management. The management server assigned outside is remotely managing multiple home gateways based on OSGi and needs initial provisioning function for system registration during initial booting process or rebooting process. This paper aims to realize initial provisioning function for home gateway based on OSGi and to test it
家庭网关是一种重要的家庭网络设备,作为连接路由,允许外部访问您的家庭设备。从企业的角度来看,该设备是一个管理对象,为了便于管理,基于OSGi (open service gateway initiative)平台构建了一个系统。外部分配的管理服务器基于OSGi远程管理多个家庭网关,在初始启动或重启过程中需要初始配置功能进行系统注册。本文旨在基于OSGi实现家庭网关的初始配置功能,并对其进行测试
{"title":"Implementation of initial provisioning function for home gateway based on open service gateway initiative platform","authors":"S. Ok, Hojin Park","doi":"10.1109/ICACT.2006.206273","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206273","url":null,"abstract":"Home gateway is a piece of important home network equipment serving as a connection route to allow external access to your home installations. This equipment is an object of management as seen from the viewpoint of enterpriser and is constructed as a system based on OSGi (open service gateway initiative) platform in order to facilitate management. The management server assigned outside is remotely managing multiple home gateways based on OSGi and needs initial provisioning function for system registration during initial booting process or rebooting process. This paper aims to realize initial provisioning function for home gateway based on OSGi and to test it","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206365
Cheonshu Park, J. Sohn
In this paper, we present the efficient method that generates a service process to provide more information using the Web service and control robot behavior for intelligent robot. And we propose a cache mechanism to save the memory and improve speed in the processing of service plan. The most suitable service plan is discovered by the service composition, and then generates executable process. An executable process is transmitting to process execution engine. An execution engine execute service plan
{"title":"A study on the service process generation system for intelligent robot","authors":"Cheonshu Park, J. Sohn","doi":"10.1109/ICACT.2006.206365","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206365","url":null,"abstract":"In this paper, we present the efficient method that generates a service process to provide more information using the Web service and control robot behavior for intelligent robot. And we propose a cache mechanism to save the memory and improve speed in the processing of service plan. The most suitable service plan is discovered by the service composition, and then generates executable process. An executable process is transmitting to process execution engine. An execution engine execute service plan","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206017
Yun-kyung Lee, Hong-il Ju, Jee-hye Park, J. Han
User authentication is an essential component for secured home network service. It enables non-authorized persons not to use the home network. User authentication mechanisms supplying various authentication methods can provide user convenience in user authentication. To add to this, the use of the home gateway included in the authentication server function enable users to be authenticated in the home gateway, the users can use all authorized home network service and Internet contents services. It is possible by the authentication agent of the home gateway. This paper describes user authentication mechanism using authentication server
{"title":"User authentication mechanism using authentication server in home network","authors":"Yun-kyung Lee, Hong-il Ju, Jee-hye Park, J. Han","doi":"10.1109/ICACT.2006.206017","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206017","url":null,"abstract":"User authentication is an essential component for secured home network service. It enables non-authorized persons not to use the home network. User authentication mechanisms supplying various authentication methods can provide user convenience in user authentication. To add to this, the use of the home gateway included in the authentication server function enable users to be authenticated in the home gateway, the users can use all authorized home network service and Internet contents services. It is possible by the authentication agent of the home gateway. This paper describes user authentication mechanism using authentication server","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132440187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206223
Ingu Han, Y. Tscha, Kyoon-Ha Lee
In the case of being of multiple server hosting the same resources in wireless multi-hop sensor networks, the publishing/subscribing scheme based on a cross-shaped trajectory results in anomaly for a client to locate a contents server which is not even close because the contents location server computes the distance of server for itself instead of client. In this paper, we analyze this problem and propose a solution to discover the nearby server from a client. The proposed algorithm makes use the location information of all servers (at most 4, one per direction) to compute a nearby server from client, replies back the location of nearby server to client. The result of our simulation shows that the proposed algorithm performs favorably more than the method based on the view of location server in terms of cost
{"title":"A nearby server selection protocol based cross-shaped trajectory in sensor networks","authors":"Ingu Han, Y. Tscha, Kyoon-Ha Lee","doi":"10.1109/ICACT.2006.206223","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206223","url":null,"abstract":"In the case of being of multiple server hosting the same resources in wireless multi-hop sensor networks, the publishing/subscribing scheme based on a cross-shaped trajectory results in anomaly for a client to locate a contents server which is not even close because the contents location server computes the distance of server for itself instead of client. In this paper, we analyze this problem and propose a solution to discover the nearby server from a client. The proposed algorithm makes use the location information of all servers (at most 4, one per direction) to compute a nearby server from client, replies back the location of nearby server to client. The result of our simulation shows that the proposed algorithm performs favorably more than the method based on the view of location server in terms of cost","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206373
Van-Su Pham, Minh-Tuan Le, Linh Mai, G. Yoon
This work proposes a MMSE-QR decomposition-based (MMSE-QRD) low-complexity maximum-likelihood (ML) decoders for quasi-orthogonal space-time block code (QOSTBC) with 4 transmit antennas, denoted as MMSE-QRD LCML decoder. By stacking received symbols from different received symbol period together and applying QR decomposition on extended channel matrix (D. Wubben et al., 2001) resulting special format of matrix R, the proposed decoders is able to reduce complexity by decouple decoding as H. Jafarkhani (2001). In addition, by using the same principle of Minh-Tuan Le et al. (2005) to jointly detect signals, the MMSE-QRD LCML decoder is able to not only significantly reduce the computational load but also obtain ML performance
本文提出了一种基于MMSE-QR分解(MMSE-QRD)的具有4个发射天线的准正交空时分组码(QOSTBC)低复杂度最大似然(ML)解码器,称为MMSE-QRD LCML解码器。通过将不同接收符号周期的接收符号叠加在一起,并对扩展信道矩阵进行QR分解(D. Wubben et al., 2001),得到矩阵R的特殊格式,所提出的解码器能够像H. Jafarkhani(2001)那样通过解耦解码来降低复杂度。此外,MMSE-QRD LCML解码器采用Minh-Tuan Le et al.(2005)的相同原理联合检测信号,不仅可以显著降低计算负荷,还可以获得ML性能
{"title":"Low complexity MMSE-QRD-based ML decoder for quasi-orthogonal STBC scheme in MIMO wireless communications systems with four-transmit antennas","authors":"Van-Su Pham, Minh-Tuan Le, Linh Mai, G. Yoon","doi":"10.1109/ICACT.2006.206373","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206373","url":null,"abstract":"This work proposes a MMSE-QR decomposition-based (MMSE-QRD) low-complexity maximum-likelihood (ML) decoders for quasi-orthogonal space-time block code (QOSTBC) with 4 transmit antennas, denoted as MMSE-QRD LCML decoder. By stacking received symbols from different received symbol period together and applying QR decomposition on extended channel matrix (D. Wubben et al., 2001) resulting special format of matrix R, the proposed decoders is able to reduce complexity by decouple decoding as H. Jafarkhani (2001). In addition, by using the same principle of Minh-Tuan Le et al. (2005) to jointly detect signals, the MMSE-QRD LCML decoder is able to not only significantly reduce the computational load but also obtain ML performance","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206165
Byoung-Sup Shim, Dae-Ho Jeong, Soonja Lim, Hwan-Yong Kim
It is well known the fact that turbo codes has better performance as the number of iteration and the interleaver size increases in the AWGN channel environment. However, as the number of iteration and the interleaver size are increased, it is required much delay and computation for iterative decoding. Therefore, it is important to devise an efficient criterion to stop the iteration process and prevent unnecessary computations and decoding delay. In this paper, we propose a new stop criterion for decoding turbo codes. It is verifying that the proposal iterative decoding stop criterion can be reduced the average iterative decoding number compared to conventional schemes with a negligible degradation of the error performance
{"title":"A new stopping criterion for turbo codes","authors":"Byoung-Sup Shim, Dae-Ho Jeong, Soonja Lim, Hwan-Yong Kim","doi":"10.1109/ICACT.2006.206165","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206165","url":null,"abstract":"It is well known the fact that turbo codes has better performance as the number of iteration and the interleaver size increases in the AWGN channel environment. However, as the number of iteration and the interleaver size are increased, it is required much delay and computation for iterative decoding. Therefore, it is important to devise an efficient criterion to stop the iteration process and prevent unnecessary computations and decoding delay. In this paper, we propose a new stop criterion for decoding turbo codes. It is verifying that the proposal iterative decoding stop criterion can be reduced the average iterative decoding number compared to conventional schemes with a negligible degradation of the error performance","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206082
Sunghoon Jung, Minho Kang
This paper proposes a new media access (MAC) protocol for advanced optical burst switching (OBS) in metropolitan area networks (MANs). The considered node architecture has several fixed transmitters and one tunable receiver (FT-TR) for data channels. In general OBS network, data collisions occurred too much. This is because OBS is generally one-way-reservation-based switching scheme. To solve the problem, we propose an advanced MAC protocol supporting variable-size data bursts without any data collision. We named the proposed MAC protocol CFM scheme. CFM scheme uses the global wavelength information to detect data collision prior to transmitting control messages. In terms of simplicity and low delay, this MAC protocol has better performances in compare with LightRing which is another efficient scheme
{"title":"A new collision-free media access protocol for metro OBS ring networks","authors":"Sunghoon Jung, Minho Kang","doi":"10.1109/ICACT.2006.206082","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206082","url":null,"abstract":"This paper proposes a new media access (MAC) protocol for advanced optical burst switching (OBS) in metropolitan area networks (MANs). The considered node architecture has several fixed transmitters and one tunable receiver (FT-TR) for data channels. In general OBS network, data collisions occurred too much. This is because OBS is generally one-way-reservation-based switching scheme. To solve the problem, we propose an advanced MAC protocol supporting variable-size data bursts without any data collision. We named the proposed MAC protocol CFM scheme. CFM scheme uses the global wavelength information to detect data collision prior to transmitting control messages. In terms of simplicity and low delay, this MAC protocol has better performances in compare with LightRing which is another efficient scheme","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-05-08DOI: 10.1109/ICACT.2006.206291
Han-Seung Koo, O. Kwon, Sooin Lee, Sung-Woong Ra
Conditional access system (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil that entitlement control, and various schemes are existed for that. Among them, Tu introduced two schemes in F.K. Tu et al., (1999), which are the simple scheme and complete scheme of four levels hierarchy. The advantage of the simple scheme of four levels hierarchy is a small key generation and encryption load for a CAS, but it is not good for the dynamic entitlement management. On the other hand, the complete scheme of four levels hierarchy is good for the dynamic entitlement management, but key generation and encryption load for CAS is considerable when it is compared to the simple scheme. In this circumstance, we proposed a novel scheme, which is an active entitlement key management. The proposed scheme not only performs the dynamic entitlement management very efficiently, but also generates and encrypts keys with a small load for CAS, which is just the same as the load of the simple scheme
条件访问系统(CAS)执行授权管理,使只有合法用户才能观看付费服务。通常,CAS使用被动授权管理来实现这种授权控制,并且存在各种方案。其中,Tu在F.K. Tu et al.,(1999)中介绍了两种方案,即四层层次结构的简单方案和完全方案。简单的四层结构方案的优点是对CAS来说密钥生成和加密负载较小,但不利于动态授权管理。另一方面,四层结构的完整方案有利于动态授权管理,但与简单方案相比,CAS的密钥生成和加密负载较大。在这种情况下,我们提出了一种新的方案,即主动授权密钥管理。该方案不仅能够高效地进行动态授权管理,而且能够以很小的CAS负载生成和加密密钥,这与简单方案的负载相当
{"title":"Authorization refreshment management using ARL in DTV broadcasting","authors":"Han-Seung Koo, O. Kwon, Sooin Lee, Sung-Woong Ra","doi":"10.1109/ICACT.2006.206291","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206291","url":null,"abstract":"Conditional access system (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil that entitlement control, and various schemes are existed for that. Among them, Tu introduced two schemes in F.K. Tu et al., (1999), which are the simple scheme and complete scheme of four levels hierarchy. The advantage of the simple scheme of four levels hierarchy is a small key generation and encryption load for a CAS, but it is not good for the dynamic entitlement management. On the other hand, the complete scheme of four levels hierarchy is good for the dynamic entitlement management, but key generation and encryption load for CAS is considerable when it is compared to the simple scheme. In this circumstance, we proposed a novel scheme, which is an active entitlement key management. The proposed scheme not only performs the dynamic entitlement management very efficiently, but also generates and encrypts keys with a small load for CAS, which is just the same as the load of the simple scheme","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}