首页 > 最新文献

2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC ASIC中SHA-256哈希的高性能并行硬件架构
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061457
Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang
The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.
SHA-256算法用于保证数据的完整性和真实性,以达到良好的安全性,因此在电子交易和比特币等各种应用中发挥着重要作用。SHA-256的计算能力是哈希算法的一个主要研究方向。为了提高硬件的计算能力,本设计首先利用流水线原理和时序预测电路来寻找最有效的实现架构。然后结合哈希函数和硬件特性对其进行优化,给出了一个高性能的SHA-256哈希硬件架构。采用三条管道代替圆函数中的关键路径,缩短了计时路径,并将计算链划分为独立的步长。SHA-256的多重计算是在并行管道中进行的,这表明计算能力可以达到标准SHA-256实现的3倍。提出的SHA-256硬件架构已经实现,并与英特尔14nm技术合成。仿真和综合结果表明,与标准实现相比,提出的SHA-256哈希吞吐量可提高3倍,功耗降低50.7%,面积成本为2.9倍。
{"title":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","authors":"Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang","doi":"10.23919/ICACT48636.2020.9061457","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061457","url":null,"abstract":"The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatial Modulation Based Color-Intensity Shift Keying in VLC System 基于空间调制的VLC系统色强移位键控
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061540
Xiang Gao, Xiao-peng Yan, Zhiquan Bai
In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.
本文提出了一种用于可见光通信(VLC)系统的基于空间调制的色强移位键控(SM CISK)调制方案。该方案将传统的色移键控(CSK)、脉冲幅度调制(PAM)和SM结合在一起,有效地利用了颜色、强度和空间域的自由度。它保持恒定的平均发射功率,以满足正常照明的无闪烁要求。基于最大似然(ML)检测,研究了该方案的误码率。仿真结果验证了该方案优于联合色空间调制(SM - CSK)和CISK调制方案。
{"title":"Spatial Modulation Based Color-Intensity Shift Keying in VLC System","authors":"Xiang Gao, Xiao-peng Yan, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061540","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061540","url":null,"abstract":"In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Analytical Visualization of Deep Web 深网分析可视化研究
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061283
WooHyun Park
Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.
现在,有大量的数据,如裸体照片和儿童色情,这让人无地自容。此外,人们还通过未知的黑暗渠道分销毒品。特别是,大多数交易都是通过暗网进行的。“深度网络是指谷歌等搜索引擎无法检测到的加密网络。用户必须使用Tor才能访问暗网上的网站”[4]。换句话说,暗网使用Tor的加密客户端。因此,用户可以访问暗网上的多个站点,但不知道该站点的发起者是谁。本文针对此类犯罪的现状,提出了一种基于深度网络的犯罪信息视觉系统的开发思路。分析了深网的现状,并利用Java实现了数据的可视化。预计该计划将有助于更有效地管理和监测犯罪在未知的网络,如深网,洪流等。
{"title":"A Study on Analytical Visualization of Deep Web","authors":"WooHyun Park","doi":"10.23919/ICACT48636.2020.9061283","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061283","url":null,"abstract":"Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forensic Artifacts of Network Traffic on WeChat Calls 微信电话网络流量的取证文物
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061437
Da-Yu Kao, Ting-Chi Wang, Fuching Tsai
Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.
互联网协议语音(VoIP)应用程序,如b微信、Whatsapp或LINE,在过去几年中越来越受欢迎。VoIP报文分析是执法机关侦查犯罪的重要手段之一。由于其便利性和多功能性,微信应用程序在亚洲,特别是在台湾和中国大陆被大量的人访问。因此,本研究使用Wireshark来揭示微信消息和语音呼叫背后的工具标记。对于LEAs识别网络罪犯并将其绳之以法,这将是一个极好的帮助。
{"title":"Forensic Artifacts of Network Traffic on WeChat Calls","authors":"Da-Yu Kao, Ting-Chi Wang, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061437","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061437","url":null,"abstract":"Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-time Molecular Analysis Methods Based on Cloud Computing 基于云计算的实时分子分析方法
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061274
Maxim Zakharov, A. Muthanna, R. Kirichek, A. Koucheryavy
Today, quite a lot of attention is paid to the integration of information technology and medicine. E-health network development makes it possible. The principles of e-health networks imply the use of small-sized mobile medical devices - sensors and actuators. As a rule, sensors, and actuators are combined into a network and operate with other network devices: gateways, cloud servers, etc. The article discusses the network scheme, including a portable near-infrared spectrometer for molecular analysis of food products and its interaction with the Internet in the process of data collection and processing.
如今,信息技术与医学的融合受到了相当多的关注。电子保健网络的发展使其成为可能。电子保健网络的原则意味着使用小型移动医疗设备——传感器和执行器。通常,传感器和执行器被组合成一个网络,并与其他网络设备(网关、云服务器等)一起运行。本文讨论了食品分子分析的便携式近红外光谱仪的网络化方案,以及在数据采集和处理过程中与互联网的交互作用。
{"title":"Real-time Molecular Analysis Methods Based on Cloud Computing","authors":"Maxim Zakharov, A. Muthanna, R. Kirichek, A. Koucheryavy","doi":"10.23919/ICACT48636.2020.9061274","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061274","url":null,"abstract":"Today, quite a lot of attention is paid to the integration of information technology and medicine. E-health network development makes it possible. The principles of e-health networks imply the use of small-sized mobile medical devices - sensors and actuators. As a rule, sensors, and actuators are combined into a network and operate with other network devices: gateways, cloud servers, etc. The article discusses the network scheme, including a portable near-infrared spectrometer for molecular analysis of food products and its interaction with the Internet in the process of data collection and processing.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134129302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power Allocation for Multi-Relay AF Cooperative System with Maximum System Capacity 最大系统容量下多中继AF协作系统的功率分配
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061227
Geng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai
In order to maximize the capacity of the cooperative communication system, a power allocation scheme for multi-relay AF cooperative system based on blind relays is presented in this paper. Under the premise that the source power is known, the power allocation problem is modeled to maximize the capacity of the system and transformed into the standard convex optimization. The power allocation factors of each relay is obtained by solving the Karush-Kuhn-Tucher (KKT) condition. Finally, the capacity and outage probability of the proposed scheme are provided for the proposed power allocation scheme. Compared with the typical equal power allocation, the proposed convex optimization-based power allocation scheme achieves better performance.
为了使协作通信系统的容量最大化,提出了一种基于盲中继的多中继自动对焦协作系统的功率分配方案。在源功率已知的前提下,以系统容量最大化为目标对功率分配问题进行建模,并将其转化为标准的凸优化问题。通过求解Karush-Kuhn-Tucher (KKT)条件,得到各继电器的功率分配系数。最后给出了所提出的功率分配方案的容量和停电概率。与典型的等功率分配方案相比,所提出的基于凸优化的功率分配方案具有更好的性能。
{"title":"Power Allocation for Multi-Relay AF Cooperative System with Maximum System Capacity","authors":"Geng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061227","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061227","url":null,"abstract":"In order to maximize the capacity of the cooperative communication system, a power allocation scheme for multi-relay AF cooperative system based on blind relays is presented in this paper. Under the premise that the source power is known, the power allocation problem is modeled to maximize the capacity of the system and transformed into the standard convex optimization. The power allocation factors of each relay is obtained by solving the Karush-Kuhn-Tucher (KKT) condition. Finally, the capacity and outage probability of the proposed scheme are provided for the proposed power allocation scheme. Compared with the typical equal power allocation, the proposed convex optimization-based power allocation scheme achieves better performance.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTV 通过SDN和IPTV改善塞内加尔数学和哲学教育的解决方案提案
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061455
Samba Diouf, Kéba Gueye, S. Ouya, G. Mendy
The purpose of this article is to contribute to the access to quality education in Mathematics and Philosophy for all children in the country, including those in remote areas of the capital, through an IPTV platform. To do this, we offer an SDN network integrated into an IPTV infrastructure in order to have an agile and automated interactive platform, but capable of video streaming. Interactivity is managed by Verto-FreeSwitch, agility, streaming and automation are the responsibility of SDN. The interactive IPTV server performs a multicast broadcast for learners. With a web browser or an IPTV client, learners can follow courses and interact in real time with teachers via the Verto-FreeSwitch module. The use of SDN allows to benefit from a better configuration of equipment to optimize data storage servers, but when coupled with IPTV they allow democratization of access to Mathematics and Philosophy courses.
本文的目的是通过IPTV平台,为全国所有儿童,包括首都偏远地区的儿童,提供优质的数学和哲学教育。为了做到这一点,我们提供了一个集成到IPTV基础设施中的SDN网络,以便拥有一个灵活和自动化的交互平台,但能够视频流。交互性由Verto-FreeSwitch管理,敏捷性、流化和自动化是SDN的责任。交互式IPTV服务器对学习者进行组播。通过网络浏览器或IPTV客户端,学习者可以跟随课程,并通过Verto-FreeSwitch模块与教师实时互动。使用SDN可以从更好的设备配置中受益,以优化数据存储服务器,但当与IPTV结合使用时,它们可以使数学和哲学课程的访问民主化。
{"title":"Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTV","authors":"Samba Diouf, Kéba Gueye, S. Ouya, G. Mendy","doi":"10.23919/ICACT48636.2020.9061455","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061455","url":null,"abstract":"The purpose of this article is to contribute to the access to quality education in Mathematics and Philosophy for all children in the country, including those in remote areas of the capital, through an IPTV platform. To do this, we offer an SDN network integrated into an IPTV infrastructure in order to have an agile and automated interactive platform, but capable of video streaming. Interactivity is managed by Verto-FreeSwitch, agility, streaming and automation are the responsibility of SDN. The interactive IPTV server performs a multicast broadcast for learners. With a web browser or an IPTV client, learners can follow courses and interact in real time with teachers via the Verto-FreeSwitch module. The use of SDN allows to benefit from a better configuration of equipment to optimize data storage servers, but when coupled with IPTV they allow democratization of access to Mathematics and Philosophy courses.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Federated Learning on Malware Classification 联邦学习在恶意软件分类中的应用
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061261
Kuang-yao Lin, Wei-Ren Huang
In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.
近年来,一切都变得越来越系统化,这会产生很多网络安全问题。其中最重要的是恶意软件。现代恶意软件已进入高增长阶段。根据AV-TEST研究所显示,每天有超过350,000个新的恶意程序(恶意软件)和潜在不需要的应用程序(PUA)被注册。本文提出并讨论了这一威胁。此外,我们还通过使用联邦学习来考虑数据隐私。特征提取可以基于恶意软件执行。该方法在VirusTotal提供的数据集上达到了非常高的准确率(≈0.9167)。
{"title":"Using Federated Learning on Malware Classification","authors":"Kuang-yao Lin, Wei-Ren Huang","doi":"10.23919/ICACT48636.2020.9061261","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061261","url":null,"abstract":"In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Estimation of Convolutional Interleaver in a Non-cooperative Context 非合作环境下卷积交织器的估计
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061439
Yoon-Ji Kim, Geunbae Kim, D. Yoon
In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.
本文通过分析交错序列中的重复模式,提出了一种非合作环境下卷积交织器参数的盲估计方法。仿真结果验证了该方法在噪声环境下能够有效地估计卷积交织器参数。
{"title":"Estimation of Convolutional Interleaver in a Non-cooperative Context","authors":"Yoon-Ji Kim, Geunbae Kim, D. Yoon","doi":"10.23919/ICACT48636.2020.9061439","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061439","url":null,"abstract":"In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Design of IoT Device Configuration Translator for Intent-Based IoT-Cloud Services 面向基于意图的物联网云服务的物联网设备配置转换器设计
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061282
Chaehong Chung, J. Jeong
The rapid growth of IoT (Internet of Things) makes life better, but it can be a burden for IoT users to manage heterogeneous IoT devices in a timely and appropriate manner. In this paper, we propose an IoT device configuration translator for IoT-cloud services that enables IoT users who do not have expertise in IoT environments to efficiently configure their IoT devices. The user's high-level configuration based on natural language is delivered to the translator in IoT-cloud platform using NETCONF (Network Configuration Protocol). The translator, which is designed with three components using automata theory and database mapping information, translates the high-level configuration into a low-level configuration applicable to the IoT devices. This allows IoT users to configure their IoT devices without considering which protocols and platforms they work on.
物联网(IoT)的快速发展让生活变得更美好,但对于物联网用户来说,及时、适当地管理异构物联网设备可能是一种负担。在本文中,我们提出了一种物联网设备配置转换器,用于物联网云服务,使不具备物联网环境专业知识的物联网用户能够有效地配置其物联网设备。用户基于自然语言的高级配置通过NETCONF (Network configuration Protocol)协议在物联网云平台上传递给译者。转换器由三个组件组成,使用自动机理论和数据库映射信息,将高级配置转换为适用于物联网设备的低级配置。这使得物联网用户可以配置他们的物联网设备,而无需考虑他们使用的协议和平台。
{"title":"A Design of IoT Device Configuration Translator for Intent-Based IoT-Cloud Services","authors":"Chaehong Chung, J. Jeong","doi":"10.23919/ICACT48636.2020.9061282","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061282","url":null,"abstract":"The rapid growth of IoT (Internet of Things) makes life better, but it can be a burden for IoT users to manage heterogeneous IoT devices in a timely and appropriate manner. In this paper, we propose an IoT device configuration translator for IoT-cloud services that enables IoT users who do not have expertise in IoT environments to efficiently configure their IoT devices. The user's high-level configuration based on natural language is delivered to the translator in IoT-cloud platform using NETCONF (Network Configuration Protocol). The translator, which is designed with three components using automata theory and database mapping information, translates the high-level configuration into a low-level configuration applicable to the IoT devices. This allows IoT users to configure their IoT devices without considering which protocols and platforms they work on.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2020 22nd International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1