Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914392
Seungyong Yoon, Jeongnyeo Kim, Hyunsook Cho
This paper relates to mobile malware detection for prevention against financial charge caused by the malicious behavior using SMS. In this paper, we propose the method that conducts malicious behavior monitoring and various analysis techniques to detect the attack. This method includes malware installation check, SMS sending and receiving analysis, and signature-based pattern matching. Therefore, we can effectively respond against SMS mobile malware attacks.
{"title":"Detection of SMS mobile malware","authors":"Seungyong Yoon, Jeongnyeo Kim, Hyunsook Cho","doi":"10.1109/ELINFOCOM.2014.6914392","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914392","url":null,"abstract":"This paper relates to mobile malware detection for prevention against financial charge caused by the malicious behavior using SMS. In this paper, we propose the method that conducts malicious behavior monitoring and various analysis techniques to detect the attack. This method includes malware installation check, SMS sending and receiving analysis, and signature-based pattern matching. Therefore, we can effectively respond against SMS mobile malware attacks.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914444
Dwi Agung Nugroho, Dong-Seong Kim
This paper proposes an adaptive rate fallback (ARF) to optimize data transmission in industrial wireless local area networks. The proposed algorithm is based on acknowledgement (ACK) along with SNR information from receiver and implemented in IEEE 802.11g. The proposed method shows improvement in bit-error-rate (BER) and still guarantees time constraint for industrial networks.
{"title":"Automatic rate fallback algorithm for industrial WLANs","authors":"Dwi Agung Nugroho, Dong-Seong Kim","doi":"10.1109/ELINFOCOM.2014.6914444","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914444","url":null,"abstract":"This paper proposes an adaptive rate fallback (ARF) to optimize data transmission in industrial wireless local area networks. The proposed algorithm is based on acknowledgement (ACK) along with SNR information from receiver and implemented in IEEE 802.11g. The proposed method shows improvement in bit-error-rate (BER) and still guarantees time constraint for industrial networks.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914391
Heesung Park, H. Cha
In LEO satellite applications, the regulator can be optimized from the point of mass and volume by limiting the power of the solar array. This paper describes the method how to prevent the over-power generation of the solar array and verifies the proposed method by simulation. The proposed method is simple, so it is easy to apply. In comparison with existing operation mode of the SAR, it is added to one more operation mode, which is a constant power mode. The operation point of the solar array is moved to the voltage area in this mode, therefore the power generated from the solar array is limited. This method can be applicable to other MPPT algorithm such as the P&O and incremental conductance method.
{"title":"Power limitation method of the solar array regulator for LEO satellites","authors":"Heesung Park, H. Cha","doi":"10.1109/ELINFOCOM.2014.6914391","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914391","url":null,"abstract":"In LEO satellite applications, the regulator can be optimized from the point of mass and volume by limiting the power of the solar array. This paper describes the method how to prevent the over-power generation of the solar array and verifies the proposed method by simulation. The proposed method is simple, so it is easy to apply. In comparison with existing operation mode of the SAR, it is added to one more operation mode, which is a constant power mode. The operation point of the solar array is moved to the voltage area in this mode, therefore the power generated from the solar array is limited. This method can be applicable to other MPPT algorithm such as the P&O and incremental conductance method.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914399
M. Ohta, Hiroki Otani, K. Yamashita
This report proposes a novel desktop VR. Based on the position of the user's face, the proposed system selects the most appropriate image of an object from a set of photos taken at various angles and simply “pastes” it onto the screen at an appropriate location and scale. By using this system, users can strongly feel the presence of the object.
{"title":"Photo-based desktop virtual reality system","authors":"M. Ohta, Hiroki Otani, K. Yamashita","doi":"10.1109/ELINFOCOM.2014.6914399","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914399","url":null,"abstract":"This report proposes a novel desktop VR. Based on the position of the user's face, the proposed system selects the most appropriate image of an object from a set of photos taken at various angles and simply “pastes” it onto the screen at an appropriate location and scale. By using this system, users can strongly feel the presence of the object.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122100931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914405
Jin-Hyung Kim, J. Kwon, Y. Ko
In this paper a new multi-baseline stereo matching framework based on a modified belief propagation algorithm is presented to acquire dense depth-map. We propose a new matching cost, Extended Mean of Absolute Differences as local evidence in order to consider all possible disparity candidates and obtain dense depth-map. Also we propose a method that decides the weight parameter λ in belief propagation algorithm adaptively to local texture activity.
{"title":"Multi-baseline based texture adaptive belief propagation stereo matching technique for dense depth-map acquisition","authors":"Jin-Hyung Kim, J. Kwon, Y. Ko","doi":"10.1109/ELINFOCOM.2014.6914405","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914405","url":null,"abstract":"In this paper a new multi-baseline stereo matching framework based on a modified belief propagation algorithm is presented to acquire dense depth-map. We propose a new matching cost, Extended Mean of Absolute Differences as local evidence in order to consider all possible disparity candidates and obtain dense depth-map. Also we propose a method that decides the weight parameter λ in belief propagation algorithm adaptively to local texture activity.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"19 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914362
Jun Beom Kho, Wonjune Lee, S. Choi, Jaihie Kim
Facial features used for gender classification are affected by their aging process, because human's face is gradually changed as they grow up. Thus, in this paper, we propose a gender classification method robust to age variation by using age information and two facial features: appearance and geometry feature. Local Binary Patterns (LBP) is used as an appearance feature to classify gender of young and adult age group, and Euclidean distance among facial feature points is used as a geometry feature to classify gender of old age group. Experimental results showed that performance of our proposed method is increased about 2% compared to gender classification without using age information.
{"title":"A gender classification method using age information","authors":"Jun Beom Kho, Wonjune Lee, S. Choi, Jaihie Kim","doi":"10.1109/ELINFOCOM.2014.6914362","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914362","url":null,"abstract":"Facial features used for gender classification are affected by their aging process, because human's face is gradually changed as they grow up. Thus, in this paper, we propose a gender classification method robust to age variation by using age information and two facial features: appearance and geometry feature. Local Binary Patterns (LBP) is used as an appearance feature to classify gender of young and adult age group, and Euclidean distance among facial feature points is used as a geometry feature to classify gender of old age group. Experimental results showed that performance of our proposed method is increased about 2% compared to gender classification without using age information.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914402
Chungmu Oh, W. Ro
The policy and sensitivity of VM(Virtual Machine) migration among the clusters or servers has been the center of the debate. If the sensitivity is high, the entire infrastructure's performance is exacerbated due to frequent migration. On the other hand, if the sensitivity is low, the VM's performance on the server can be decreased due to the performance degradation of specific servers or clusters. Also, the policies have a huge impact on VM self or overall infrastructure when VMs are migrated. Therefore, a decision of the policy and sensitivity to balance the loads among clusters or servers is important for retaining the entire infrastructure's performance. In this paper, we introduce the hyper threading-aware migration method in Xen environment, improves the performance of VMs by evaluating if VM's workload is single thread or not, and arranging VMs on proper clusters (with Hyper Thread/without Hyper Thread).
{"title":"Hyper threading-aware Virtual Machine migration","authors":"Chungmu Oh, W. Ro","doi":"10.1109/ELINFOCOM.2014.6914402","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914402","url":null,"abstract":"The policy and sensitivity of VM(Virtual Machine) migration among the clusters or servers has been the center of the debate. If the sensitivity is high, the entire infrastructure's performance is exacerbated due to frequent migration. On the other hand, if the sensitivity is low, the VM's performance on the server can be decreased due to the performance degradation of specific servers or clusters. Also, the policies have a huge impact on VM self or overall infrastructure when VMs are migrated. Therefore, a decision of the policy and sensitivity to balance the loads among clusters or servers is important for retaining the entire infrastructure's performance. In this paper, we introduce the hyper threading-aware migration method in Xen environment, improves the performance of VMs by evaluating if VM's workload is single thread or not, and arranging VMs on proper clusters (with Hyper Thread/without Hyper Thread).","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914454
Siwarat Limphapayom, D. H. Le, W. Pora
This article describes communication between a simulated smart meter and a simulated data concentrator unit (DCU) conformed to DLMS/COSEM. The communication is based on the three-layer, HDLC-based profile. A DLMS/COSEM library was developed. The APDUs generated by the library were the same as those from examples in the standard book. Furthermore, employing this library, the data concentrator unit can read successfully commercial DLMS meters.
{"title":"A simulation of a communication between a smart meter and a data concentrator unit conformed to DLMS/COSEM upon an HDLC profile","authors":"Siwarat Limphapayom, D. H. Le, W. Pora","doi":"10.1109/ELINFOCOM.2014.6914454","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914454","url":null,"abstract":"This article describes communication between a simulated smart meter and a simulated data concentrator unit (DCU) conformed to DLMS/COSEM. The communication is based on the three-layer, HDLC-based profile. A DLMS/COSEM library was developed. The APDUs generated by the library were the same as those from examples in the standard book. Furthermore, employing this library, the data concentrator unit can read successfully commercial DLMS meters.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914438
Ji-Hwan Lee, Deok-Weon Song, Sung-Yoon Jung
In this paper, we propose the analysis of other lighting sources' interferences for indoor Visible Light Communication (VLC) according to receiver's position, Field-Of-View (FOV) and presence of a wall reflecting light interference. Depending on the Line of Sight (LOS) characteristics of VLC receiver, we can guess that PD with small FOV may show better performance. However, simulation results say that there is the range of FOV that shows the best performance if we consider the alignment of the transmitter and receiver.
{"title":"Interference analysis of visible light communication based on PD array","authors":"Ji-Hwan Lee, Deok-Weon Song, Sung-Yoon Jung","doi":"10.1109/ELINFOCOM.2014.6914438","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914438","url":null,"abstract":"In this paper, we propose the analysis of other lighting sources' interferences for indoor Visible Light Communication (VLC) according to receiver's position, Field-Of-View (FOV) and presence of a wall reflecting light interference. Depending on the Line of Sight (LOS) characteristics of VLC receiver, we can guess that PD with small FOV may show better performance. However, simulation results say that there is the range of FOV that shows the best performance if we consider the alignment of the transmitter and receiver.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914375
Muhammad Hassan, A. Bermak
A multi-sensor array of the gas sensors is used in order to improve the selectivity of a single sensor and obtain a unique signature. Typically, pattern recognition algorithms are used to find a relationship between the multi-sensor array response and odor class. Theses methods usually accompanied with high computational requirement. Recent results reveal that time of first spike coding exhibits fast and efficient odor identification with reduced computational cost. The objective of this paper is two fold. Firstly, we propose a new probabilistic discriminative metric for assigning an odor class to observed test pattern of first spikes of the sensors in the array. Secondly, we propose the decision boundary criteria for the spike distance algorithm that assesses the spike pattern by comparing its relative distance with training gases. The performance evaluation of these metrics is carried out through experimental data of three different gases. The results show that our proposed metrics display excellent performance as compared to existing pattern recognition algorithms.
{"title":"Discriminative metrics for gas classification with spike latency coding","authors":"Muhammad Hassan, A. Bermak","doi":"10.1109/ELINFOCOM.2014.6914375","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914375","url":null,"abstract":"A multi-sensor array of the gas sensors is used in order to improve the selectivity of a single sensor and obtain a unique signature. Typically, pattern recognition algorithms are used to find a relationship between the multi-sensor array response and odor class. Theses methods usually accompanied with high computational requirement. Recent results reveal that time of first spike coding exhibits fast and efficient odor identification with reduced computational cost. The objective of this paper is two fold. Firstly, we propose a new probabilistic discriminative metric for assigning an odor class to observed test pattern of first spikes of the sensors in the array. Secondly, we propose the decision boundary criteria for the spike distance algorithm that assesses the spike pattern by comparing its relative distance with training gases. The performance evaluation of these metrics is carried out through experimental data of three different gases. The results show that our proposed metrics display excellent performance as compared to existing pattern recognition algorithms.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}