Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061484
Xuan Hu, Jie Liu, Yichen Wang
Because of the increasing complexity of software systems as well as the more various types of R&D personnel of the workers, software development is going to a significant trend of knowledge intensification. In the field of knowledge engineering, an ontology is an explicit specification of a conceptualization. In this paper, the ontology method is used to construct the requirement knowledge framework and the various of requirement knowledge is expressed as a clear, complete and consistent hierarchical ontology concept and association, which is more conducive to knowledge sharing and reuse as well as reflects multiple viewpoints of stakeholders. Furthermore, the relevant content of the decomposition of the generalization ontology is added in the framework, which is divided into the structure ontology and action ontology. It makes up for the deficiency of undifferentiated knowledge composition representation of the generalization ontology. Besides, the concept of software requirement error pattern is proposed and integrated into the multi-ontology framework of requirement knowledge in a consistent form. Based on the framework, the domain requirement model and the application requirement model can be built. It can be adopted as the basis of the requirement elicitation activities to avoid errors and improve the quality and reliability of software products.
{"title":"Researches on Software Requirements Elicitation Approach of the Aviation Electronics Systems based on Multi-ontology","authors":"Xuan Hu, Jie Liu, Yichen Wang","doi":"10.23919/ICACT48636.2020.9061484","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061484","url":null,"abstract":"Because of the increasing complexity of software systems as well as the more various types of R&D personnel of the workers, software development is going to a significant trend of knowledge intensification. In the field of knowledge engineering, an ontology is an explicit specification of a conceptualization. In this paper, the ontology method is used to construct the requirement knowledge framework and the various of requirement knowledge is expressed as a clear, complete and consistent hierarchical ontology concept and association, which is more conducive to knowledge sharing and reuse as well as reflects multiple viewpoints of stakeholders. Furthermore, the relevant content of the decomposition of the generalization ontology is added in the framework, which is divided into the structure ontology and action ontology. It makes up for the deficiency of undifferentiated knowledge composition representation of the generalization ontology. Besides, the concept of software requirement error pattern is proposed and integrated into the multi-ontology framework of requirement knowledge in a consistent form. Based on the framework, the domain requirement model and the application requirement model can be built. It can be adopted as the basis of the requirement elicitation activities to avoid errors and improve the quality and reliability of software products.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061265
M. Rana, Reshma Khanom, Md. Mostafizur Rahman, A. Abdelhadi
Our goal is to design different Vivaldi antennas with simple, small, and low cost. They can be used in Ku frequency band, which can be used for brain tumor detection in the presence of abnormal tissues or tumor. The whole work is divided by two parts, antenna design part and brain tumor detection part. The antenna is being designed to work properly across the given Ku frequency 13.5 GHz to 14.71GHz. For tumor detection, a multilayer brain model (skin, fat, bone and white matter) is designed using the CST microwave studio. Basically, the antenna is placed between the skull and white matter of brain model to radiate into brain tissues. We analyzed the return loss and 3dB point to ensure the presence of brain tumor. The measured specific absorption rate shows that it is within the patient safety range.
{"title":"Design and Analysis of Effective Vivaldi Antennas for Brain Tumor Detections: Ku Frequency Band","authors":"M. Rana, Reshma Khanom, Md. Mostafizur Rahman, A. Abdelhadi","doi":"10.23919/ICACT48636.2020.9061265","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061265","url":null,"abstract":"Our goal is to design different Vivaldi antennas with simple, small, and low cost. They can be used in Ku frequency band, which can be used for brain tumor detection in the presence of abnormal tissues or tumor. The whole work is divided by two parts, antenna design part and brain tumor detection part. The antenna is being designed to work properly across the given Ku frequency 13.5 GHz to 14.71GHz. For tumor detection, a multilayer brain model (skin, fat, bone and white matter) is designed using the CST microwave studio. Basically, the antenna is placed between the skull and white matter of brain model to radiate into brain tissues. We analyzed the return loss and 3dB point to ensure the presence of brain tumor. The measured specific absorption rate shows that it is within the patient safety range.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128299977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/icact48636.2020.9061520
{"title":"List Contrib","authors":"","doi":"10.23919/icact48636.2020.9061520","DOIUrl":"https://doi.org/10.23919/icact48636.2020.9061520","url":null,"abstract":"","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061240
Da-Yu Kao, Ni-Chen Wu, Fuching Tsai
The explosive growth of computer technologies creates many electronic data and produces much digital evidence of people's lives. As technology has improved, the volume of data for cybercrime investigation keeps growing at unprecedented rates and creating a quandary for Law Enforcement Agencies (LEAs). This study discusses the rise of digital evidence and the triage needs in digital forensic processing. It requires the sincere examination of all available data volumes at the scene or in the lab to present digital evidence in a court of law. In order to maintain the relevance, reliability, and sufficiency of digital evidence, investigators must establish a process model that can provide a quick response at the scene. This study proposes the novel triage triangle strategy of digital forensic components and illustrates TEAR phases from the viewpoint of THOR dimensions to describe the proper practices for identifying, collecting, acquiring, and preserving the digital data. It facilitates the efficiency and effectiveness of reducing digital forensic backlogs for LEAs.
{"title":"A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs","authors":"Da-Yu Kao, Ni-Chen Wu, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061240","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061240","url":null,"abstract":"The explosive growth of computer technologies creates many electronic data and produces much digital evidence of people's lives. As technology has improved, the volume of data for cybercrime investigation keeps growing at unprecedented rates and creating a quandary for Law Enforcement Agencies (LEAs). This study discusses the rise of digital evidence and the triage needs in digital forensic processing. It requires the sincere examination of all available data volumes at the scene or in the lab to present digital evidence in a court of law. In order to maintain the relevance, reliability, and sufficiency of digital evidence, investigators must establish a process model that can provide a quick response at the scene. This study proposes the novel triage triangle strategy of digital forensic components and illustrates TEAR phases from the viewpoint of THOR dimensions to describe the proper practices for identifying, collecting, acquiring, and preserving the digital data. It facilitates the efficiency and effectiveness of reducing digital forensic backlogs for LEAs.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129210202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061566
{"title":"Keynote1","authors":"","doi":"10.23919/ICACT48636.2020.9061566","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061566","url":null,"abstract":"","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123380035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061364
Lili Zhao, M. Ni, Xiaodan Cui, Weidong Wang, Jinfeng Zhang
This Time-triggered Ethernet (TTE) is a valid manner to ensure the timeliness, reliability and accuracy of time-triggered (TT) messages which make up for the shortcomings of traditional Ethernet. Satisfiability Modulo Theories (SMT) is the main theory to generate the traditional TTE schedule. However, the calculation time of SMT is too long when the number of time-triggered messages is large. To solve the problem, bin-packing algorithm is applied to the scheduling problem. This paper aims to optimize and improve the bin-packing algorithm including the packing rules and empty box design method based on the principle of the two-staged bin-packing algorithm. With the improved algorithm we proposed, it can ensure the feasibility and porosity of scheduling table. Additionaly, it can also improves the transmission performance of event-triggered (ET) messages without affecting TT messages transmission. The simulation results show that the improved algorithm reduces the latency of the ET messages and greatly shortens the calculation time of the scheduling algorithm.
{"title":"The Research of Scheduling Algorithm Based on Time-Triggered Ethernet","authors":"Lili Zhao, M. Ni, Xiaodan Cui, Weidong Wang, Jinfeng Zhang","doi":"10.23919/ICACT48636.2020.9061364","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061364","url":null,"abstract":"This Time-triggered Ethernet (TTE) is a valid manner to ensure the timeliness, reliability and accuracy of time-triggered (TT) messages which make up for the shortcomings of traditional Ethernet. Satisfiability Modulo Theories (SMT) is the main theory to generate the traditional TTE schedule. However, the calculation time of SMT is too long when the number of time-triggered messages is large. To solve the problem, bin-packing algorithm is applied to the scheduling problem. This paper aims to optimize and improve the bin-packing algorithm including the packing rules and empty box design method based on the principle of the two-staged bin-packing algorithm. With the improved algorithm we proposed, it can ensure the feasibility and porosity of scheduling table. Additionaly, it can also improves the transmission performance of event-triggered (ET) messages without affecting TT messages transmission. The simulation results show that the improved algorithm reduces the latency of the ET messages and greatly shortens the calculation time of the scheduling algorithm.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/icact48636.2020.9061459
{"title":"Session Overview","authors":"","doi":"10.23919/icact48636.2020.9061459","DOIUrl":"https://doi.org/10.23919/icact48636.2020.9061459","url":null,"abstract":"","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061436
A. Chen, M. R. Uddin, Law Foo Kui, N. Lingas
In this paper, SOI rib waveguides with the variation of core dimensions have been demonstrated. The analysis of a silicon rib waveguide is performed by simulating the SOI waveguide containing a forward biased PN junction by applying the electro-optic carrier - injection effect via electric voltage changes. The dimensions of the waveguide/ring resonator have been altered. The dimensions of the waveguide/ring resonator include the width of the core waveguide (W), the height of the core waveguide (Hc), the rib thickness (Hr) and the height of buried oxide (Ho). Thus, in this research, the dimensions of the waveguide/ring resonator will be varied at distinct value with a specific interval in order to investigate the performance of the micro-ring resonator. This is because as the dimensions of the waveguide vary, its resonance wavelength will be change and thus shifting of resonance will occur. The simulation generates refractive index of the waveguide with respect to the applied voltage and refractive index, loss, gain and dispersion of the waveguide with respect to wavelength.
{"title":"Dimension Dependent Silicon Photonics Rib Waveguide Characterisation","authors":"A. Chen, M. R. Uddin, Law Foo Kui, N. Lingas","doi":"10.23919/ICACT48636.2020.9061436","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061436","url":null,"abstract":"In this paper, SOI rib waveguides with the variation of core dimensions have been demonstrated. The analysis of a silicon rib waveguide is performed by simulating the SOI waveguide containing a forward biased PN junction by applying the electro-optic carrier - injection effect via electric voltage changes. The dimensions of the waveguide/ring resonator have been altered. The dimensions of the waveguide/ring resonator include the width of the core waveguide (W), the height of the core waveguide (Hc), the rib thickness (Hr) and the height of buried oxide (Ho). Thus, in this research, the dimensions of the waveguide/ring resonator will be varied at distinct value with a specific interval in order to investigate the performance of the micro-ring resonator. This is because as the dimensions of the waveguide vary, its resonance wavelength will be change and thus shifting of resonance will occur. The simulation generates refractive index of the waveguide with respect to the applied voltage and refractive index, loss, gain and dispersion of the waveguide with respect to wavelength.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061542
Kwihoon Kim, Yong-Geun Hong
This paper is about the intelligent edge-based reinforcement learning control framework technology for manufacturing field solution and features large-scale learning, scalable edge distribution technology that can be applied to various task. In this paper, two items are proposed as features. The first proposes the General Reinforcement Learning Framework(GRLF) in manufacturing, and the second proposes the edge solution technology based on the GRLF in manufacturing. We apply the industrial solution such as grid sorter system for example. As a result of the industrial GRLF based grid sorter system, it was confirmed that when a total of 100 deliveries are randomly received into the grid sorter system by any emitter, all shipments are 100% accurate. It also classifies approximately 0.5 deliveries per step. This shows the efficiency of classifying around 30 deliveries per minute, assuming a step is performed per second.
{"title":"Industrial General Reinforcement Learning Control Framework System based on Intelligent Edge","authors":"Kwihoon Kim, Yong-Geun Hong","doi":"10.23919/ICACT48636.2020.9061542","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061542","url":null,"abstract":"This paper is about the intelligent edge-based reinforcement learning control framework technology for manufacturing field solution and features large-scale learning, scalable edge distribution technology that can be applied to various task. In this paper, two items are proposed as features. The first proposes the General Reinforcement Learning Framework(GRLF) in manufacturing, and the second proposes the edge solution technology based on the GRLF in manufacturing. We apply the industrial solution such as grid sorter system for example. As a result of the industrial GRLF based grid sorter system, it was confirmed that when a total of 100 deliveries are randomly received into the grid sorter system by any emitter, all shipments are 100% accurate. It also classifies approximately 0.5 deliveries per step. This shows the efficiency of classifying around 30 deliveries per minute, assuming a step is performed per second.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061249
L. Ndiaye, Kéba Gueye, Bessan Melckior Dégboé, S. Ouya
The need to communicate has become a necessity in Africa today, particularly in Senegalese families whose income level is low. The implementation of Interactive Voice Mailboxes (IVR) in an Internet Multimedia Sybsystem (IMS) environment increases communication services for 4G or even 5G. In this article, we propose an innovative Interactive Voice Response (IVR) solution in an IMS network. The goal is to have a network user, the ad or an audio ad listen to the end, in order to benefit from a phone credit rate without hanging up the phone. IVRs are implemented with Asterisk's Asterisk Gateway Interface (AGI). Once the call is launched, a check of its balance is carried out, if the person has credit allowing him to make a call, the announcement will not be played for him, but as soon as one notes a lack of credit, we propose to listen to the announcement until the end to grant him a sum allowing him to continue his call. Automatic credit reloading at the end of the ad is ensured by a Flask RESTFul Framework which is responsible for connecting to the MySQL database on the account of the user in question to credit his balance with a fixed sum. This solution will have a major impact on the current population and also on the level of research in general. It will make it possible to communicate even if one does not have money, the essential thing is to listen to an advertisement or a publicity until its end. As part of the research, it will allow researchers who are in areas where access to credit becomes very difficult and the need to want to exchange feels.
{"title":"Proposal of an IVR Solution and Granting of Credit With Asterisk's AGI and a Flask RESTFul Framework in an IMS Network: Case of an Advertisement","authors":"L. Ndiaye, Kéba Gueye, Bessan Melckior Dégboé, S. Ouya","doi":"10.23919/ICACT48636.2020.9061249","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061249","url":null,"abstract":"The need to communicate has become a necessity in Africa today, particularly in Senegalese families whose income level is low. The implementation of Interactive Voice Mailboxes (IVR) in an Internet Multimedia Sybsystem (IMS) environment increases communication services for 4G or even 5G. In this article, we propose an innovative Interactive Voice Response (IVR) solution in an IMS network. The goal is to have a network user, the ad or an audio ad listen to the end, in order to benefit from a phone credit rate without hanging up the phone. IVRs are implemented with Asterisk's Asterisk Gateway Interface (AGI). Once the call is launched, a check of its balance is carried out, if the person has credit allowing him to make a call, the announcement will not be played for him, but as soon as one notes a lack of credit, we propose to listen to the announcement until the end to grant him a sum allowing him to continue his call. Automatic credit reloading at the end of the ad is ensured by a Flask RESTFul Framework which is responsible for connecting to the MySQL database on the account of the user in question to credit his balance with a fixed sum. This solution will have a major impact on the current population and also on the level of research in general. It will make it possible to communicate even if one does not have money, the essential thing is to listen to an advertisement or a publicity until its end. As part of the research, it will allow researchers who are in areas where access to credit becomes very difficult and the need to want to exchange feels.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132904910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}