Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245957
Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim
This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service
{"title":"IPv6 based CDMA/WLAN heterogeneous network interworking","authors":"Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim","doi":"10.1109/ICACT.2005.245957","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245957","url":null,"abstract":"This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246198
J. Pedersen, T. Riaz, O. Madsen
Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter
{"title":"Traffic load on interconnection lines of generalized double ring network structures","authors":"J. Pedersen, T. Riaz, O. Madsen","doi":"10.1109/ICACT.2005.246198","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246198","url":null,"abstract":"Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246113
YoungHwan Kwon, S. Choi, J. Choi, Hyung Jun Kim, Jungsoo Park
This paper proposes an efficient multicast setup mechanism for mobile hosts in multiprotocol label switching (MPLS) network. A management of multicast tree is based on MPLS label. A mobile node (MN) can join a specific multicast group through egress LER after movement detecting. In our mechanism, egress LER has a responsibility to join multicast group and transmit multicast data traffic to MN as remote subscription. After MN joining, data forwarding method uses MPLS-based forwarding. This MPLS-based mobile multicast algorithm can improve performance and solve other mobile multicast problems such as tunnel convergence problem, late join latency, nonoptimized route and complexity
{"title":"Efficient multicast setup mechanism for mobile hosts in MPLS network","authors":"YoungHwan Kwon, S. Choi, J. Choi, Hyung Jun Kim, Jungsoo Park","doi":"10.1109/ICACT.2005.246113","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246113","url":null,"abstract":"This paper proposes an efficient multicast setup mechanism for mobile hosts in multiprotocol label switching (MPLS) network. A management of multicast tree is based on MPLS label. A mobile node (MN) can join a specific multicast group through egress LER after movement detecting. In our mechanism, egress LER has a responsibility to join multicast group and transmit multicast data traffic to MN as remote subscription. After MN joining, data forwarding method uses MPLS-based forwarding. This MPLS-based mobile multicast algorithm can improve performance and solve other mobile multicast problems such as tunnel convergence problem, late join latency, nonoptimized route and complexity","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245944
Dongyoung Kim, Hyochan Bang, Jungchan Na
The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.
{"title":"Intrusion alert normalization method using AWK scripts and attack name database","authors":"Dongyoung Kim, Hyochan Bang, Jungchan Na","doi":"10.1109/ICACT.2005.245944","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245944","url":null,"abstract":"The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246130
Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang
This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.
{"title":"Multiple maneuvering target data association based on genetic algorithms","authors":"Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang","doi":"10.1109/ICACT.2005.246130","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246130","url":null,"abstract":"This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246071
Park Joo-Sang, Kim Young-il, Lee Yong-Joon
RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained
{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246071","url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246081
Mao-Hsiu Hsu, Jhin-Fang Huang
In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure
{"title":"High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder","authors":"Mao-Hsiu Hsu, Jhin-Fang Huang","doi":"10.1109/ICACT.2005.246081","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246081","url":null,"abstract":"In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245964
Jaekyung Choi
Nowadays, in telecommunication market in Korea, there are intensive competitions among service providers and users become to call for enhanced QoS. In response to current business environment change, service providers strive to find solutions to be more competitive by differentiating from others or to meet users' expectations and needs. Among these endeavors, deployment of SLA (service level agreement) is one of effective alternative in achieving service providers' such purpose. But, in deploying SLA, most of service providers simply adopt either best practice of other service providers by benchmarking without consideration service providers' situation or restricted internal managerial quality index without filtering which SLOs (service level objectives) should be deployed, which SLOs has priorities, etc. Furthermore the process of SLA management consisted of operations of network infrastructures, operation staffs, service management has a problem that the SLA management process has not been dealt with sufficient care and systematic exertion. In this paper, we suggest a new framework for SLA deployment and management using the concept and methodology of six sigma. Namely, we present a systematic framework for SLA deployment from selecting SLO by collecting VOC (voice of customers) and deriving CTQ (critical to quality) by using six sigma methodology to SLA management by adopting process of QoS measurement and improvement by using six sigma methodology. In conclusion, we give insights to service providers about necessary factors to be considered in the process of quality management desired to enhance the degree of customers' satisfaction and service providers' network and service operational efficiency
{"title":"Design of a systematic framework for deploying SLA using six sigma methodology","authors":"Jaekyung Choi","doi":"10.1109/ICACT.2005.245964","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245964","url":null,"abstract":"Nowadays, in telecommunication market in Korea, there are intensive competitions among service providers and users become to call for enhanced QoS. In response to current business environment change, service providers strive to find solutions to be more competitive by differentiating from others or to meet users' expectations and needs. Among these endeavors, deployment of SLA (service level agreement) is one of effective alternative in achieving service providers' such purpose. But, in deploying SLA, most of service providers simply adopt either best practice of other service providers by benchmarking without consideration service providers' situation or restricted internal managerial quality index without filtering which SLOs (service level objectives) should be deployed, which SLOs has priorities, etc. Furthermore the process of SLA management consisted of operations of network infrastructures, operation staffs, service management has a problem that the SLA management process has not been dealt with sufficient care and systematic exertion. In this paper, we suggest a new framework for SLA deployment and management using the concept and methodology of six sigma. Namely, we present a systematic framework for SLA deployment from selecting SLO by collecting VOC (voice of customers) and deriving CTQ (critical to quality) by using six sigma methodology to SLA management by adopting process of QoS measurement and improvement by using six sigma methodology. In conclusion, we give insights to service providers about necessary factors to be considered in the process of quality management desired to enhance the degree of customers' satisfaction and service providers' network and service operational efficiency","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246058
Nam-Shik Park, Kang-Woo Lee, Hyun Kim, Seong-il Jin
Ubiquitous computing is the idea that invisible computation everywhere can enhance life in the real world. Applications and services in ubiquitous environments must be aware of their changing environments and adapt according to changing contexts. However, developing such systems providing context-aware applications or services is still a complex and time-consuming task. Therefore, we introduce architecture of context-aware service middleware (CASM) that provides a middleware-level support for building and rapid prototyping of context-aware services and describe interactions based on the architecture
{"title":"A middleware for context-aware application services in ubiquitous environments","authors":"Nam-Shik Park, Kang-Woo Lee, Hyun Kim, Seong-il Jin","doi":"10.1109/ICACT.2005.246058","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246058","url":null,"abstract":"Ubiquitous computing is the idea that invisible computation everywhere can enhance life in the real world. Applications and services in ubiquitous environments must be aware of their changing environments and adapt according to changing contexts. However, developing such systems providing context-aware applications or services is still a complex and time-consuming task. Therefore, we introduce architecture of context-aware service middleware (CASM) that provides a middleware-level support for building and rapid prototyping of context-aware services and describe interactions based on the architecture","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122612983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246223
Jongik Kim, Jun-Ki Min, O. Kwon
In this paper, we propose an inverted index technique and a novel structural join technique for accelerating XML path query evaluation. Our inverted index can retrieve element lists for path segments in a parent-child relationship. Our structural join technique can handle lists of element pairs while the existing techniques handle lists of elements. We show through experiments that these two proposed techniques are integrated to accelerate evaluation of XML path queries
{"title":"Retrieval of element lists using the 2-level deterministic inverted index for accelerating structural joins","authors":"Jongik Kim, Jun-Ki Min, O. Kwon","doi":"10.1109/ICACT.2005.246223","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246223","url":null,"abstract":"In this paper, we propose an inverted index technique and a novel structural join technique for accelerating XML path query evaluation. Our inverted index can retrieve element lists for path segments in a parent-child relationship. Our structural join technique can handle lists of element pairs while the existing techniques handle lists of elements. We show through experiments that these two proposed techniques are integrated to accelerate evaluation of XML path queries","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122895022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}