首页 > 最新文献

2008 10th International Conference on Advanced Communication Technology最新文献

英文 中文
Rain Effects on SDH-based Networks Using Protection Switching 利用保护交换对基于ssh的网络的雨效应
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494063
N. Maleki, R. Khosravi, M.K. Shokouhi
In this paper, radio relay systems for Synchronous Digital Hierarchy (SDH)-based networks with path type Synchronous transfer Module of order 0 (STM-0) without protection switching and with 1+1 switching configuration as said in Recommendation ITU-R F.750 are considered. Byte Interleaved Parity (BIP) codes are used for error monitoring. Rain causes fading and the blocks are received in errors because of this fading and the SES may occur because of these errored blocks and the system may arrive in unavailable state. In this paper, the unavailability ratios of these two systems are calculated and the results are compared with the objectives in Recommendation ITU-R P.1703 and it is assumed that the link comprises the access portion of a network and forms a part of a national portion of a constant bit rat digital path element.
本文考虑了采用ITU-R F.750建议书中所述的1+1交换配置的无保护交换的路径型0阶同步传输模块(STM-0)的基于同步数字层次(SDH)网络的无线电中继系统。字节交错奇偶校验(BIP)码用于错误监控。雨导致衰落,并且由于衰落而接收到错误的块,并且可能由于这些错误的块而发生SES,并且系统可能到达不可用状态。本文计算了这两种系统的不可用率,并将结果与ITU-R P.1703建议书中的目标进行了比较,并假设该链路包括网络的接入部分,并构成恒定比特率数字路径元素的国家部分的一部分。
{"title":"Rain Effects on SDH-based Networks Using Protection Switching","authors":"N. Maleki, R. Khosravi, M.K. Shokouhi","doi":"10.1109/ICACT.2008.4494063","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494063","url":null,"abstract":"In this paper, radio relay systems for Synchronous Digital Hierarchy (SDH)-based networks with path type Synchronous transfer Module of order 0 (STM-0) without protection switching and with 1+1 switching configuration as said in Recommendation ITU-R F.750 are considered. Byte Interleaved Parity (BIP) codes are used for error monitoring. Rain causes fading and the blocks are received in errors because of this fading and the SES may occur because of these errored blocks and the system may arrive in unavailable state. In this paper, the unavailability ratios of these two systems are calculated and the results are compared with the objectives in Recommendation ITU-R P.1703 and it is assumed that the link comprises the access portion of a network and forms a part of a national portion of a constant bit rat digital path element.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Key Exchange Protocol Based on RSA-OAEP 一种新的基于RSA-OAEP的密钥交换协议
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494096
Jie Liu, Jianhua Li
Optimal asymmetric encryption padding (OAEP) is widely accepted because of its provable security and practicability. In this paper, a novel key exchange protocol based on RSA-OAEP cryptosystem was presented. The protocol is efficient in computation and communication. It is secure against known key attack and eavesdrop attack. It also can provide mutual authentication, forward secrecy and key freshness, which are standard security attributes that key exchange protocols should have.
最优非对称加密填充(OAEP)由于其可证明的安全性和实用性而被广泛接受。提出了一种新的基于RSA-OAEP密码体制的密钥交换协议。该协议具有较高的计算效率和通信效率。它对已知密钥攻击和窃听攻击是安全的。它还可以提供相互认证、前向保密和密钥新鲜度,这些都是密钥交换协议应该具备的标准安全属性。
{"title":"A Novel Key Exchange Protocol Based on RSA-OAEP","authors":"Jie Liu, Jianhua Li","doi":"10.1109/ICACT.2008.4494096","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494096","url":null,"abstract":"Optimal asymmetric encryption padding (OAEP) is widely accepted because of its provable security and practicability. In this paper, a novel key exchange protocol based on RSA-OAEP cryptosystem was presented. The protocol is efficient in computation and communication. It is secure against known key attack and eavesdrop attack. It also can provide mutual authentication, forward secrecy and key freshness, which are standard security attributes that key exchange protocols should have.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Enhanced MCS for Direct Relaying in Transparent RS of IEEE 802.16j 用于 IEEE 802.16j 透明 RS 中直接中继的增强型 MCS
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493951
S. Chae, Young-il Kim
We propose an enhanced MCS for demodulation-and-forward scheme in transparent RS. The demodulation-and-forward scheme only demodulates and modulates the received signal to relay in symbol-by-symbol manner. In this scheme, RS can relay the received signal within one frame period. However, RS could suffer from frame delay when it adopts decode and forward scheme. In addition, we think that MR-BS is required to have enhanced MCS for demodulation-and-forward scheme instead of the MCS in existing specifications of 802.16e. With making use of coding rate 2/3 and 5/6 for both QPSK and 16-QAM, which is absent between BS and MS link, the link quality between BS and RS can be enhanced by using lower modulation orders. And also, we want to suggest another encoding slot concatenation and its concatenation rule and parameters and its simulations results will show merits of enhanced MCS than existing MCS performances.
我们为透明 RS 中的解调-前向方案提出了一种增强型 MCS。解调-前向方案只对接收到的信号进行逐个符号的解调和调制。在这种方案中,RS 可以在一个帧周期内转发接收到的信号。但是,RS 采用解调-前向方案时可能会出现帧延迟。此外,我们认为 MR-BS 在采用解调和前转方案时需要增强 MCS,而不是 802.16e 现有规范中的 MCS。通过使用 QPSK 和 16-QAM 的编码率 2/3 和 5/6(BS 和 MS 链路之间不存在这种编码率),可以通过使用较低的调制阶数来提高 BS 和 RS 之间的链路质量。此外,我们还想提出另一种编码时隙连接及其连接规则和参数,其仿真结果将显示增强型 MCS 比现有 MCS 性能更优越。
{"title":"Enhanced MCS for Direct Relaying in Transparent RS of IEEE 802.16j","authors":"S. Chae, Young-il Kim","doi":"10.1109/ICACT.2008.4493951","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493951","url":null,"abstract":"We propose an enhanced MCS for demodulation-and-forward scheme in transparent RS. The demodulation-and-forward scheme only demodulates and modulates the received signal to relay in symbol-by-symbol manner. In this scheme, RS can relay the received signal within one frame period. However, RS could suffer from frame delay when it adopts decode and forward scheme. In addition, we think that MR-BS is required to have enhanced MCS for demodulation-and-forward scheme instead of the MCS in existing specifications of 802.16e. With making use of coding rate 2/3 and 5/6 for both QPSK and 16-QAM, which is absent between BS and MS link, the link quality between BS and RS can be enhanced by using lower modulation orders. And also, we want to suggest another encoding slot concatenation and its concatenation rule and parameters and its simulations results will show merits of enhanced MCS than existing MCS performances.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127668922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experience of USN MAC based on 424MHz band IEEE 802.15.4 基于424MHz频段IEEE 802.15.4的USN MAC经验
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493776
Kyeseon Lee, Nae-Su Kim, D. Kim
In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.
在建筑外,关于传感器网络应用的要求越来越高,但在建筑外构建传感器网络存在频率难的问题。经过传感器网络物理层和MAC层标准处理的IEEE802.15.4标准发布的频段为2.4 GHz和868 / 915 MHz。在国内可以使用的频率是2.4 GHz。”2.4 GHz节点在建筑物外部难以操作。在韩国,可以作为窄带使用的频段是424和447兆赫。因此,需要能够在国内运行的424或447 MHz频段的传感器节点。
{"title":"Experience of USN MAC based on 424MHz band IEEE 802.15.4","authors":"Kyeseon Lee, Nae-Su Kim, D. Kim","doi":"10.1109/ICACT.2008.4493776","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493776","url":null,"abstract":"In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Link Quality-Aware Packet Forwarding Architecture for Wireless Mesh Network 无线网状网络中链路质量感知的分组转发体系结构
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493919
Hung Quoc Vo, C. Hong
Traffic engineering, as its name, is the art of manipulating traffic around so that traffic from congested links is moved onto the unused capacity on the other links. So, providing traffic engineering support in multi-hop wireless network has become increasingly important due to the low bandwidth nature of wireless channels. In this work, we propose a novel approach to control the traffic to avoid congestion by decoupling forwarding process from the routing process. The proposal is interested in provisioning quality of service guarantees for planned Wireless Mesh Networks which are being used widely as a broadband wireless access network.
交通工程,顾名思义,是一门操纵交通的艺术,以便将拥堵路段的交通转移到其他路段的闲置容量上。因此,由于无线信道的低带宽特性,在多跳无线网络中提供流量工程支持变得越来越重要。在这项工作中,我们提出了一种通过将转发过程与路由过程解耦来控制流量以避免拥塞的新方法。该提案关注的是为计划中的无线Mesh网络提供服务质量保证,该网络被广泛用作宽带无线接入网。
{"title":"Link Quality-Aware Packet Forwarding Architecture for Wireless Mesh Network","authors":"Hung Quoc Vo, C. Hong","doi":"10.1109/ICACT.2008.4493919","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493919","url":null,"abstract":"Traffic engineering, as its name, is the art of manipulating traffic around so that traffic from congested links is moved onto the unused capacity on the other links. So, providing traffic engineering support in multi-hop wireless network has become increasingly important due to the low bandwidth nature of wireless channels. In this work, we propose a novel approach to control the traffic to avoid congestion by decoupling forwarding process from the routing process. The proposal is interested in provisioning quality of service guarantees for planned Wireless Mesh Networks which are being used widely as a broadband wireless access network.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of UWB Diversity Antenna for PDA Applications 用于PDA的超宽带分集天线设计
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493830
Seokjin Hong, Jaewon Lee, Jaehoon Choi
Two elements diversity planar antenna for a multiple-input multiple-output application is proposed. By adopting two Y-shaped radiators, the antenna provides wideband impedance matching characteristic over the desired frequency band. To reduce the mutual coupling between two radiating elements, three stubs are inserted in the ground plane. Good impedance matching and improved isolation characteristics are observed. The measured impedance bandwidth of the proposed antenna ranges from 2.27 GHz to 10.2 GHz for return loss less than 10 dB. Parametric analysis has been conducted to investigate the effect of radiator length and insertion of stubs on the impedance bandwidth and isolation characteristics.
提出了一种适用于多输入多输出应用的双元分集平面天线。通过采用两个y形辐射体,该天线在期望的频带内提供宽带阻抗匹配特性。为了减少两个辐射元件之间的相互耦合,在接地面上插入了三个插脚。观察到良好的阻抗匹配和改进的隔离特性。在回波损耗小于10 dB的情况下,天线的阻抗带宽测量范围为2.27 GHz ~ 10.2 GHz。通过参数分析研究了辐射体长度和插根对阻抗带宽和隔离特性的影响。
{"title":"Design of UWB Diversity Antenna for PDA Applications","authors":"Seokjin Hong, Jaewon Lee, Jaehoon Choi","doi":"10.1109/ICACT.2008.4493830","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493830","url":null,"abstract":"Two elements diversity planar antenna for a multiple-input multiple-output application is proposed. By adopting two Y-shaped radiators, the antenna provides wideband impedance matching characteristic over the desired frequency band. To reduce the mutual coupling between two radiating elements, three stubs are inserted in the ground plane. Good impedance matching and improved isolation characteristics are observed. The measured impedance bandwidth of the proposed antenna ranges from 2.27 GHz to 10.2 GHz for return loss less than 10 dB. Parametric analysis has been conducted to investigate the effect of radiator length and insertion of stubs on the impedance bandwidth and isolation characteristics.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Trust Type Based Semantic Web Services Assessment and Selection 基于信任类型的语义Web服务评估与选择
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494190
Yukyong Kim, Kyung-Goo Doh
As multiple service providers make themselves available on-line, the trustworthiness of services becomes significant. In Web services environments, services from different providers might have to be combined to establish a complete service. Although the individual service can be trusted, the composed service is not guaranteed against trust. Thus there must be a way to determine the composed service is trusted. This paper presents a trust type model to deduce the trust level of composed services. Then, we present a conceptual framework which enables trust based service discovery and selection. Using the inferred trust type of the composed service as the weight, we can evaluate service candidates and select the best match of them. Finally we describe the experiment results to validate our QoS based service selection.
随着多个服务提供商在网上提供服务,服务的可信度变得非常重要。在Web服务环境中,可能必须将来自不同提供者的服务组合起来以建立完整的服务。尽管单个服务是可信的,但是组合的服务不能保证不受信任。因此,必须有一种方法来确定组合的服务是否可信。本文提出了一个信任类型模型来推导组合服务的信任级别。然后,我们提出了一个基于信任的服务发现和选择的概念框架。使用组合服务的推断信任类型作为权重,我们可以评估候选服务并从中选择最佳匹配。最后给出了基于QoS的服务选择的实验结果。
{"title":"Trust Type Based Semantic Web Services Assessment and Selection","authors":"Yukyong Kim, Kyung-Goo Doh","doi":"10.1109/ICACT.2008.4494190","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494190","url":null,"abstract":"As multiple service providers make themselves available on-line, the trustworthiness of services becomes significant. In Web services environments, services from different providers might have to be combined to establish a complete service. Although the individual service can be trusted, the composed service is not guaranteed against trust. Thus there must be a way to determine the composed service is trusted. This paper presents a trust type model to deduce the trust level of composed services. Then, we present a conceptual framework which enables trust based service discovery and selection. Using the inferred trust type of the composed service as the weight, we can evaluate service candidates and select the best match of them. Finally we describe the experiment results to validate our QoS based service selection.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multicast Architecture over Next Generation Network 下一代网络的多播架构
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493748
Jong Min Lee, Juyoung Park, S. Kang, J. Choi
ITU-T SG13 is standardizing multicast framework architecture of next generation network. This specifies the architecture and functions of next generation network multicast services that make use of next generation network architecture and its features. In this paper, we describe the functional architecture of next generation network for multicast services in NGN release 2.
ITU-T SG13正在对下一代网络的组播框架体系结构进行标准化。它规定了利用下一代网络体系结构及其特点的下一代网络多播业务的体系结构和功能。本文描述了NGN第2版中用于组播业务的下一代网络的功能架构。
{"title":"Multicast Architecture over Next Generation Network","authors":"Jong Min Lee, Juyoung Park, S. Kang, J. Choi","doi":"10.1109/ICACT.2008.4493748","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493748","url":null,"abstract":"ITU-T SG13 is standardizing multicast framework architecture of next generation network. This specifies the architecture and functions of next generation network multicast services that make use of next generation network architecture and its features. In this paper, we describe the functional architecture of next generation network for multicast services in NGN release 2.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Unified Authentication for Multi-mode Terminal between Service and Access network in NGN NGN中业务与接入网间多模终端统一认证设计
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493999
Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu
Presently, while the various accesses come out, it is necessary to have the separate authentication process if it wants to connect to each access. The various accesses are accommodated in the future NGN leading in ITU-T and TISPAN. Service providers become to provide a service based on them. The important access network is the XDSL, WLAN, WiMax and WCDMA. The ongoing wireless LAN standardization and R&D activities worldwide, which target bit rates higher than 100 Mb/s, combined with the recent successful deployment of WLANs in numerous hotspots justify the fact that WLAN technology will play a key role in wireless data transmission. Cellular network operators have recognized this fact, and strive to exploit WLAN technology and integrate this technology into their cellular data networks. In order that the service continuity is guaranteed while crossing the access network, the mobility management technology and integrated authentication and authorization technology are needed. In order that the seamless handover is provided, the various modes which are the same as those of the fast handover are considered. However, it has an effect that it is moreover many with authentication process. In this paper, we suppose that the various accesses are passed through. We propose for a single-sign-on for crossing from various accesses to the service level about the efficient integrated authentication technology. We focus on these interworking mechanisms, which effectively combine the various data access networks into integrated fixed, wireless and mobile data environments capable of ubiquitous data services and very high data rates in hotspot locations..
目前,当各种访问出现时,如果要连接到每个访问,就必须有单独的身份验证过程。在以ITU-T和TISPAN为主导的未来NGN中,可以容纳各种访问。服务提供者开始在它们的基础上提供服务。重要的接入网是XDSL、WLAN、WiMax和WCDMA。全球范围内正在进行的无线局域网标准化和研发活动,其目标是比特率高于100 Mb/s,再加上WLAN最近在众多热点地区的成功部署,证明了WLAN技术将在无线数据传输中发挥关键作用。蜂窝网络运营商已经认识到这一事实,并努力开发无线局域网技术,并将该技术集成到其蜂窝数据网络中。为了保证业务在跨接入网时的连续性,需要采用移动性管理技术和集成认证授权技术。为了提供无缝切换,考虑了与快速切换相同的各种模式。然而,它的影响是它与认证过程的关系更大。在本文中,我们假设通过了各种访问。我们提出了一种单点登录的方法,用于从各种不同的访问方式跨越到服务级别,这是一种高效的集成认证技术。我们专注于这些互联机制,这些机制有效地将各种数据接入网络组合成集成的固定、无线和移动数据环境,能够在热点位置提供无处不在的数据服务和非常高的数据速率。
{"title":"Design of Unified Authentication for Multi-mode Terminal between Service and Access network in NGN","authors":"Kwihoon Kim, Hyun-Woo Lee, Seoung-kyun Jo, Won Ryu","doi":"10.1109/ICACT.2008.4493999","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493999","url":null,"abstract":"Presently, while the various accesses come out, it is necessary to have the separate authentication process if it wants to connect to each access. The various accesses are accommodated in the future NGN leading in ITU-T and TISPAN. Service providers become to provide a service based on them. The important access network is the XDSL, WLAN, WiMax and WCDMA. The ongoing wireless LAN standardization and R&D activities worldwide, which target bit rates higher than 100 Mb/s, combined with the recent successful deployment of WLANs in numerous hotspots justify the fact that WLAN technology will play a key role in wireless data transmission. Cellular network operators have recognized this fact, and strive to exploit WLAN technology and integrate this technology into their cellular data networks. In order that the service continuity is guaranteed while crossing the access network, the mobility management technology and integrated authentication and authorization technology are needed. In order that the seamless handover is provided, the various modes which are the same as those of the fast handover are considered. However, it has an effect that it is moreover many with authentication process. In this paper, we suppose that the various accesses are passed through. We propose for a single-sign-on for crossing from various accesses to the service level about the efficient integrated authentication technology. We focus on these interworking mechanisms, which effectively combine the various data access networks into integrated fixed, wireless and mobile data environments capable of ubiquitous data services and very high data rates in hotspot locations..","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Semantic-Based Image Retrieval Method 一种新的基于语义的图像检索方法
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493928
A. Lakdashti, M. Moin, K. Badie
In this paper, we design a fuzzy system for image retrieval to reduce the semantic gap in the content-based image retrieval systems. Our main contribution is three-fold: (1) designing a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (2) a fuzzy system for semantic-based image retrieval, and (3) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but has enough potential in learning semantics from the user and making a powerful approach to improve the performance of CBIR systems, as our experiments on a set of 2000 images supports our claim.
本文设计了一个模糊图像检索系统,以减少基于内容的图像检索系统中的语义缺口。我们的主要贡献有三个方面:(1)设计了一种模糊建模方法来模拟图像检索任务中的专家行为,(2)一个基于语义的图像检索模糊系统,(3)一个用于创建模糊规则的训练算法。所提出的解决方案不仅在基于语义的图像检索领域是一个新颖的想法,而且在从用户那里学习语义方面具有足够的潜力,并为提高CBIR系统的性能提供了强有力的方法,因为我们在2000张图像上的实验支持了我们的说法。
{"title":"A Novel Semantic-Based Image Retrieval Method","authors":"A. Lakdashti, M. Moin, K. Badie","doi":"10.1109/ICACT.2008.4493928","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493928","url":null,"abstract":"In this paper, we design a fuzzy system for image retrieval to reduce the semantic gap in the content-based image retrieval systems. Our main contribution is three-fold: (1) designing a fuzzy modeling approach to model the expert human behavior in the image retrieval task, (2) a fuzzy system for semantic-based image retrieval, and (3) a training algorithm for creating the fuzzy rules. The proposed solution not only is a novel idea in the semantic-based image retrieval field, but has enough potential in learning semantics from the user and making a powerful approach to improve the performance of CBIR systems, as our experiments on a set of 2000 images supports our claim.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2008 10th International Conference on Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1