Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061391
Junhyuk Park, Wonyong Yoon
This paper presents a proof-of-concept software-defined networking (SDN) based on Multi-controller for heterogeneous wireless networks, which can be helpful for researchers. There is limitation in the design of the existing architecture of the controller to manage the messages generated from the user equipment (UE). Our proposed architecture has more flexible and scalable through the hierarchical structure of Multi-controller and the loosely-coupled heterogeneous networks. In this paper we present the procedure of handover scenario using proposed architecture.
{"title":"SDN-based heterogeneous network architecture with Multi-Controllers","authors":"Junhyuk Park, Wonyong Yoon","doi":"10.23919/ICACT48636.2020.9061391","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061391","url":null,"abstract":"This paper presents a proof-of-concept software-defined networking (SDN) based on Multi-controller for heterogeneous wireless networks, which can be helpful for researchers. There is limitation in the design of the existing architecture of the controller to manage the messages generated from the user equipment (UE). Our proposed architecture has more flexible and scalable through the hierarchical structure of Multi-controller and the loosely-coupled heterogeneous networks. In this paper we present the procedure of handover scenario using proposed architecture.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123624052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061361
Brice A. Elono Ongbwa, A. Kora, Thierry J. Fotso Wabo
There is no standard method on how to carry out Indoor Radio Frequency (RF) coverage assessments in 3G and 4G mobile networks. Random methods are preferred by RF engineers when performing measurement campaigns. Unfortunately, in indoor environments, these random methods are usually limited to assessing RF coverage around the internal contours of buildings. The above methods are exposed to several shortcomings such as the geographical occupancy of the space and the size of samples collected. The Special Drive Test Route (SDTR) method was introduced and works better than these random methods. Even though the SDTR is better as compared to random methods, it is not perfect. For instance, this method has limitations in choosing the direction of the route and the spacing between routes. This paper focuses on Square SDTR and provides strategy to overcome the limitations of the SDTR method, in order to give RF engineers a more reliable way to assess indoor RF coverage in 3G and 4G mobile networks. As a result, spacing between axes should not exceed 1.5m to get more reliable results and in 67% of studied cases, more samples could be collected by carefully choosing itinerary path direction.
{"title":"Improvement of Special Drive Test Route (SDTR) Reliability for Indoor Radio Frequency Coverage Assessment in 3G/4G Mobile Networks","authors":"Brice A. Elono Ongbwa, A. Kora, Thierry J. Fotso Wabo","doi":"10.23919/ICACT48636.2020.9061361","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061361","url":null,"abstract":"There is no standard method on how to carry out Indoor Radio Frequency (RF) coverage assessments in 3G and 4G mobile networks. Random methods are preferred by RF engineers when performing measurement campaigns. Unfortunately, in indoor environments, these random methods are usually limited to assessing RF coverage around the internal contours of buildings. The above methods are exposed to several shortcomings such as the geographical occupancy of the space and the size of samples collected. The Special Drive Test Route (SDTR) method was introduced and works better than these random methods. Even though the SDTR is better as compared to random methods, it is not perfect. For instance, this method has limitations in choosing the direction of the route and the spacing between routes. This paper focuses on Square SDTR and provides strategy to overcome the limitations of the SDTR method, in order to give RF engineers a more reliable way to assess indoor RF coverage in 3G and 4G mobile networks. As a result, spacing between axes should not exceed 1.5m to get more reliable results and in 67% of studied cases, more samples could be collected by carefully choosing itinerary path direction.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061393
Gang Zhao, Bingbing Di, Hui He
In recent years, online education service platform has swept the world due to its high quality, openness and variety of education resource, and user registered in online platform has increased dramatically. However, the traditional centralized information storage method based on the third-party may cause problems such as the loss and disclosure of the transaction subject identity data, seriously threatening the legitimate rights and interests of users. Therefore, based on education service theory, this paper applies blockchain technology to identity authentication to design and implement a blockchain-based digital education transaction subject identity authentication system. The system proposed in this study can store identity information in ciphertext form and is jointly verified and maintained by the entire network node, thus it can guarantee the security and reliability of identity data in the digital identity authentication.
{"title":"Design and Implementation of the Digital Education Transaction Subject Two-factor Identity Authentication System Based on Blockchain","authors":"Gang Zhao, Bingbing Di, Hui He","doi":"10.23919/ICACT48636.2020.9061393","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061393","url":null,"abstract":"In recent years, online education service platform has swept the world due to its high quality, openness and variety of education resource, and user registered in online platform has increased dramatically. However, the traditional centralized information storage method based on the third-party may cause problems such as the loss and disclosure of the transaction subject identity data, seriously threatening the legitimate rights and interests of users. Therefore, based on education service theory, this paper applies blockchain technology to identity authentication to design and implement a blockchain-based digital education transaction subject identity authentication system. The system proposed in this study can store identity information in ciphertext form and is jointly verified and maintained by the entire network node, thus it can guarantee the security and reliability of identity data in the digital identity authentication.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121873982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061217
R. Kirichek, T. Dinh, V. Pham, Maxim Zakharov, D. Le, A. Koucheryavy
Recently, unmanned aerial systems have emerged in different fields such as entertainment, military, Internet of Things, emergencies, etc. In these systems, unmanned aerial vehicles (UAVs) communicate with each other based on a flying network to provide services to customers such as live streaming, high-speed access point, etc. The mobility of UAVs can bring many advantages in emergency cases such as rescuing and searching victims in areas where the network infrastructure is not available. However, the crucial task needed to be done first is to locate the victims' coordinates. In this paper, we propose the positioning methods based on a flying network for emergencies by detecting the WiFi signals generated from victims' phones. A structure of UAV-swarms is considered to optimize the searching time. Considering proposed methods, the influence of the error of distance measurement and the number of received signals on the evaluation of the positioning process results is simulated.
{"title":"Positioning Methods Based on Flying Network for Emergencies","authors":"R. Kirichek, T. Dinh, V. Pham, Maxim Zakharov, D. Le, A. Koucheryavy","doi":"10.23919/ICACT48636.2020.9061217","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061217","url":null,"abstract":"Recently, unmanned aerial systems have emerged in different fields such as entertainment, military, Internet of Things, emergencies, etc. In these systems, unmanned aerial vehicles (UAVs) communicate with each other based on a flying network to provide services to customers such as live streaming, high-speed access point, etc. The mobility of UAVs can bring many advantages in emergency cases such as rescuing and searching victims in areas where the network infrastructure is not available. However, the crucial task needed to be done first is to locate the victims' coordinates. In this paper, we propose the positioning methods based on a flying network for emergencies by detecting the WiFi signals generated from victims' phones. A structure of UAV-swarms is considered to optimize the searching time. Considering proposed methods, the influence of the error of distance measurement and the number of received signals on the evaluation of the positioning process results is simulated.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061334
R. Teng, K. Yano, Yoshinori Suzuki
The large number of Internet of things (IoT) terminals increases the cost and difficulty of IoT network management such as network scan. Wireless IoT networks that have low data rate especially require low overhead for network management to avoid interruption. Hence, it is important to make an automatic identification of network type for effective network management. To successfully estimate the type of a network, in which IoT terminals are involved, this study examines the fundamental properties of the response delay of IoT terminals in scan events. We carry out indoor experiments of network scan to wireless terminals in wireless LAN (WLAN) and Low Power, Wide Area (LPWA) networks, including Wi-SUN and LoRa network. From the result of response delay obtained from the experiments, we then examine the basic property of the response delay, especially about the minimum response delay. Finally, we propose a scheme of network-type estimation based on the property of the minimum delay in different networks. The evaluation results show that the scan response delay is a useful factor for successfully identifying different types of IoT networks.
{"title":"Identification of IoT Network Type Based on The Response Delay Property","authors":"R. Teng, K. Yano, Yoshinori Suzuki","doi":"10.23919/ICACT48636.2020.9061334","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061334","url":null,"abstract":"The large number of Internet of things (IoT) terminals increases the cost and difficulty of IoT network management such as network scan. Wireless IoT networks that have low data rate especially require low overhead for network management to avoid interruption. Hence, it is important to make an automatic identification of network type for effective network management. To successfully estimate the type of a network, in which IoT terminals are involved, this study examines the fundamental properties of the response delay of IoT terminals in scan events. We carry out indoor experiments of network scan to wireless terminals in wireless LAN (WLAN) and Low Power, Wide Area (LPWA) networks, including Wi-SUN and LoRa network. From the result of response delay obtained from the experiments, we then examine the basic property of the response delay, especially about the minimum response delay. Finally, we propose a scheme of network-type estimation based on the property of the minimum delay in different networks. The evaluation results show that the scan response delay is a useful factor for successfully identifying different types of IoT networks.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123231059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061552
Fuching Tsai, Ming-Chun Hsu, Da-Yu Kao
Drug problem has contributed a rapid impact on today's society. It is not only a threat of human health but also causes a great impact on the social security issue. As drug abuse tends to organized crimes, we must consider the social network relationships among criminals to formulate better strategies against drugs. This research applied exponential random graph models (ERGMs) to analyze dynamic relations of drug crime. The strength of ERGMs is the ability to handle complicated dependency patterns which violate the basic assumption of traditional statistical methodologies. The homophily test and Monte Carlo Markov Chain (MCMC) estimation are used to explore the drug offenders' attributes and structural interactions, respectively. The experimental result shows that the homophily effect is significant on drug co-offenders relations regarding to occupation, education, nationality, drug type and recidivism. In addition, the positive 2-path coefficient indicates that drug offenders tend to share friends and form a cluster. The results of this paper reveal the advantages of structural implications in analyzing drug-related crime, as well as its ability to facilitate the cognition of crime prevention and intervention strategies.
{"title":"Exponential Random Graph Modeling of Co-Offender Drug Crimes","authors":"Fuching Tsai, Ming-Chun Hsu, Da-Yu Kao","doi":"10.23919/ICACT48636.2020.9061552","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061552","url":null,"abstract":"Drug problem has contributed a rapid impact on today's society. It is not only a threat of human health but also causes a great impact on the social security issue. As drug abuse tends to organized crimes, we must consider the social network relationships among criminals to formulate better strategies against drugs. This research applied exponential random graph models (ERGMs) to analyze dynamic relations of drug crime. The strength of ERGMs is the ability to handle complicated dependency patterns which violate the basic assumption of traditional statistical methodologies. The homophily test and Monte Carlo Markov Chain (MCMC) estimation are used to explore the drug offenders' attributes and structural interactions, respectively. The experimental result shows that the homophily effect is significant on drug co-offenders relations regarding to occupation, education, nationality, drug type and recidivism. In addition, the positive 2-path coefficient indicates that drug offenders tend to share friends and form a cluster. The results of this paper reveal the advantages of structural implications in analyzing drug-related crime, as well as its ability to facilitate the cognition of crime prevention and intervention strategies.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061543
M. Al-Absi, A. Al-Absi, H. Lee
DSRC (also known as IEEE 802.11p or WAVE) is a medium/short-range RF communication technology designed specifically for in-vehicle environments that provide high-speed, real-time, accurate, and reliable connectivity between vehicles and vehicles, vehicles, and roadside infrastructure. The single/two-way voice, image and data communication services support vehicle public safety, traffic management, in-transit information release, commercial freight management and nonstop charging services, which can significantly improve the safe operation efficiency of road traffic. It consists of a series of protocols and standards that work very similar to RFID technology. This study presents a compares DSRC with several other commonly used short-range wireless access technologies in terms of transmission rate, spectrum characteristics, and communication modes.
{"title":"Comparison between DSRC and other Short Range Wireless Communication Technologies","authors":"M. Al-Absi, A. Al-Absi, H. Lee","doi":"10.23919/ICACT48636.2020.9061543","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061543","url":null,"abstract":"DSRC (also known as IEEE 802.11p or WAVE) is a medium/short-range RF communication technology designed specifically for in-vehicle environments that provide high-speed, real-time, accurate, and reliable connectivity between vehicles and vehicles, vehicles, and roadside infrastructure. The single/two-way voice, image and data communication services support vehicle public safety, traffic management, in-transit information release, commercial freight management and nonstop charging services, which can significantly improve the safe operation efficiency of road traffic. It consists of a series of protocols and standards that work very similar to RFID technology. This study presents a compares DSRC with several other commonly used short-range wireless access technologies in terms of transmission rate, spectrum characteristics, and communication modes.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"98 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061489
Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee
Recently, public alert using CBS technology is becoming one of the most effective and popular tools for government. In this paper, we present a Republic of Korea (ROK) civilian technical specification for the second-generation interface between the government alert gateway and mobile service provider alert gateway. The requirements for the gateways and the interface protocol are described along with design philosophy and base specifications and ROK regulations.
{"title":"Interface Design between Mobile Communication Service Provider and National Alert Originator in Korea","authors":"Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee","doi":"10.23919/ICACT48636.2020.9061489","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061489","url":null,"abstract":"Recently, public alert using CBS technology is becoming one of the most effective and popular tools for government. In this paper, we present a Republic of Korea (ROK) civilian technical specification for the second-generation interface between the government alert gateway and mobile service provider alert gateway. The requirements for the gateways and the interface protocol are described along with design philosophy and base specifications and ROK regulations.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133696288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061216
Veranika Mikhailava, Evgeny Pyshkin, V. Klyuev
This paper contributes to the experiments on using machine learning algorithms for image aesthetic evaluation, with particular focus on food plate image evaluation. Such an evaluation may be beneficial for professional and amateur cuisine makers, restaurant critiques, photographers, and travelers. We use a convolutional neural network at the training and recognition stages. The proof-of-concept experiments are arranged using our marked dataset of food plate images. Earth Mover's Distance algorithm is used for process validation. The analysis of results shows that the trained system predicts food image aesthetic value conforming to the collected human expert evaluations with good quality.
{"title":"Aesthetic Evaluation of Food Plate Images using Deep Learning","authors":"Veranika Mikhailava, Evgeny Pyshkin, V. Klyuev","doi":"10.23919/ICACT48636.2020.9061216","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061216","url":null,"abstract":"This paper contributes to the experiments on using machine learning algorithms for image aesthetic evaluation, with particular focus on food plate image evaluation. Such an evaluation may be beneficial for professional and amateur cuisine makers, restaurant critiques, photographers, and travelers. We use a convolutional neural network at the training and recognition stages. The proof-of-concept experiments are arranged using our marked dataset of food plate images. Earth Mover's Distance algorithm is used for process validation. The analysis of results shows that the trained system predicts food image aesthetic value conforming to the collected human expert evaluations with good quality.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129411685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061218
Edgard Ndassimba, G. M. Kossingou, Nadege Gladys Ndassimba, Kéba Gueye, S. Ouya
Since the rebellion of December 2012, Central African Republic government controls only 20% of the national territory. Most of health and telecommunications infrastructure are destroyed. Operators are not ready to reinvest; doctors are deserting these conflict zones. This has the consequence of increasing the mortality rate due to frequent diseases such as hypertension and diabetes. This article proposes, on the hand, the use of free spaces in television broadcasting channels called television white space (TVWS) to allow the establishment of broadband Internet network and on the other hand e relevant e-health solution for remote patient monitoring that operates this high-speed network. This solution based on Internet of Things (IoT) allows caregivers to collect data on patient's blood pressure, blood glucose level, electrocardiogram and body temperature in conflict areas and transmit them to a specialist doctor in the capital Bangui for better interpretation and indication. In our study, the monitoring and the data collection of the patients based on Internet of Thing is required because it allows the doctor located in Bangui than nursing staff located in conflicts areas to remotely get access to the vital parameter of the patient in real time and support the processes of making a decision regarding the need of the patient. The Internet of Thing solution is more efficient and flexible for real time data transmission between the doctor and the patient than the data also that can be collected from the existed devices and send to the doctors in the remote sites. This proposal contributes to the improvement of health services in countries in conflict and reduces mortality rates in areas not covered by conventional operators.
{"title":"The Impact of Using TVWS in the Field of Health in Countries in Conflict: The Case of Central African Republic","authors":"Edgard Ndassimba, G. M. Kossingou, Nadege Gladys Ndassimba, Kéba Gueye, S. Ouya","doi":"10.23919/ICACT48636.2020.9061218","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061218","url":null,"abstract":"Since the rebellion of December 2012, Central African Republic government controls only 20% of the national territory. Most of health and telecommunications infrastructure are destroyed. Operators are not ready to reinvest; doctors are deserting these conflict zones. This has the consequence of increasing the mortality rate due to frequent diseases such as hypertension and diabetes. This article proposes, on the hand, the use of free spaces in television broadcasting channels called television white space (TVWS) to allow the establishment of broadband Internet network and on the other hand e relevant e-health solution for remote patient monitoring that operates this high-speed network. This solution based on Internet of Things (IoT) allows caregivers to collect data on patient's blood pressure, blood glucose level, electrocardiogram and body temperature in conflict areas and transmit them to a specialist doctor in the capital Bangui for better interpretation and indication. In our study, the monitoring and the data collection of the patients based on Internet of Thing is required because it allows the doctor located in Bangui than nursing staff located in conflicts areas to remotely get access to the vital parameter of the patient in real time and support the processes of making a decision regarding the need of the patient. The Internet of Thing solution is more efficient and flexible for real time data transmission between the doctor and the patient than the data also that can be collected from the existed devices and send to the doctors in the remote sites. This proposal contributes to the improvement of health services in countries in conflict and reduces mortality rates in areas not covered by conventional operators.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115140274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}