首页 > 最新文献

16th International Conference on Advanced Communication Technology最新文献

英文 中文
Time synchronization method of network testing system by standard wave 基于标准波的网络测试系统时间同步方法
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779136
Jongkuk Lee, Youn-seo Jeong, Ki-dong Nam
The time synchronization is very important for network testing that is at a long distance. For time synchronization, two different network testing apparatuses uses a network time protocol (NTP) or a geographic position system (GPS). For using GPS with less timing error, an expensive GPS antenna needs to be installed outside the door. NTP is through the network. The network itself causes a time delay and the error in the time delay of the network occurs. So, NTP has not been used to measure a high speed network. This paper has been made in an effort to provide a network testing system using a Standard Wave to facilitate time synchronization with at least two network testing apparatuses, and an operating method thereof. The Standard Wave has extremely little time error. It helps to perform accurate testing.
对于远距离网络测试来说,时间同步是非常重要的。对于时间同步,两个不同的网络测试设备使用网络时间协议(NTP)或地理位置系统(GPS)。为了使用定时误差较小的GPS,需要在门外安装昂贵的GPS天线。NTP通过网络配置。网络本身造成时延,导致网络时延误差。因此,NTP还没有被用来测量高速网络。本文旨在提供一种使用标准波的网络测试系统,以方便与至少两台网络测试设备进行时间同步,并提供一种操作方法。标准波具有极小的时间误差。它有助于执行准确的测试。
{"title":"Time synchronization method of network testing system by standard wave","authors":"Jongkuk Lee, Youn-seo Jeong, Ki-dong Nam","doi":"10.1109/ICACT.2014.6779136","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779136","url":null,"abstract":"The time synchronization is very important for network testing that is at a long distance. For time synchronization, two different network testing apparatuses uses a network time protocol (NTP) or a geographic position system (GPS). For using GPS with less timing error, an expensive GPS antenna needs to be installed outside the door. NTP is through the network. The network itself causes a time delay and the error in the time delay of the network occurs. So, NTP has not been used to measure a high speed network. This paper has been made in an effort to provide a network testing system using a Standard Wave to facilitate time synchronization with at least two network testing apparatuses, and an operating method thereof. The Standard Wave has extremely little time error. It helps to perform accurate testing.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75621211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The solution of denial of service attack on ordered broadcast Intent 基于有序广播意图的拒绝服务攻击解决方案
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778989
Ji-Soo Oh, Min-Woo Park, Tai M. Chung
The Android's message passing system provides late run-time binding between components in the same or different applications, and it promotes inter-application collaboration. However, the message passing mechanism has also numerous vulnerabilities, so that Android applications can be exposed to attacks from malicious applications. Denial of service (DoS) attack on ordered broadcasts is a typical attack that exploits vulnerabilities of message passing. A malicious application which launches the attack intercepts broadcast messages by setting itself high priority, and then aborts it to prevent other benign applications from receiving it. In this paper, we propose a security framework for detecting DoS attacks on ordered broadcasts. We insert our framework into Android platform, and then the framework inspects receivers of broadcast messages. If the framework detects any threats, it issues warning to user. Finally, we provides scenario about our framework and discuss future directions.
Android的消息传递系统在相同或不同应用程序中的组件之间提供了后期运行时绑定,并促进了应用程序间的协作。然而,消息传递机制也存在许多漏洞,使得Android应用程序容易受到恶意应用程序的攻击。对有序广播的拒绝服务攻击是一种典型的利用消息传递漏洞的攻击。发起攻击的恶意应用程序通过将自身设置为高优先级来拦截广播消息,然后将其终止,以防止其他良性应用程序接收到广播消息。在本文中,我们提出了一个检测有序广播的DoS攻击的安全框架。我们将我们的框架插入Android平台,然后该框架检查广播消息的接收者。如果框架检测到任何威胁,它会向用户发出警告。最后,我们给出了我们的框架的场景,并讨论了未来的发展方向。
{"title":"The solution of denial of service attack on ordered broadcast Intent","authors":"Ji-Soo Oh, Min-Woo Park, Tai M. Chung","doi":"10.1109/ICACT.2014.6778989","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778989","url":null,"abstract":"The Android's message passing system provides late run-time binding between components in the same or different applications, and it promotes inter-application collaboration. However, the message passing mechanism has also numerous vulnerabilities, so that Android applications can be exposed to attacks from malicious applications. Denial of service (DoS) attack on ordered broadcasts is a typical attack that exploits vulnerabilities of message passing. A malicious application which launches the attack intercepts broadcast messages by setting itself high priority, and then aborts it to prevent other benign applications from receiving it. In this paper, we propose a security framework for detecting DoS attacks on ordered broadcasts. We insert our framework into Android platform, and then the framework inspects receivers of broadcast messages. If the framework detects any threats, it issues warning to user. Finally, we provides scenario about our framework and discuss future directions.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73199678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Road side unit assisted stochastic multi-hop broadcast scheme for instant emergency message propagation 基于路旁单元辅助的随机多跳广播方案的即时应急信息传播
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2015.7224909
Xing Fan, Bo Yang, R. Yamamoto, Y. Tanaka
VANET (Vehicular ad hoc Network) is a special kind of ad hoc wireless network where every single node is a vehicle moving in a relatively high velocity, which leads to exclusive challenges like rapid changing topologies, safety and privacy concerns. In this specific network, the propagation of emergency messages could be critical to save human lives and property. Many researchers have proposed routing or broadcast protocols to solve the problems in VANET. The objective of this paper is to propose a broadcast scheme in VANET that is not likely to cause broadcast storm problem with a reasonable delay and high delivery rate. Since VANET is an attack-prone network and any kind of malicious behaviour in VANET might cause serious loss or even death in reality, we should also refrain from using beacons to exchange privacy-sensitive information in V2V (Vehicle to Vehicle). In this paper, a multi-hop broadcast scheme that makes use of RSU and V2I (Vehicle to Infrastructure) communication is proposed. The simulation result shows that the proposed scheme outperforms static stochastic broadcast scheme in terms of delivery rate. Comparing to flooding, we offer a better delay and less network usage.
VANET(车辆自组织网络)是一种特殊的自组织无线网络,其中每个节点都是一辆以相对较高速度移动的车辆,这导致了快速变化的拓扑,安全和隐私问题等排他性挑战。在这个特定的网络中,紧急信息的传播对于拯救人类生命和财产至关重要。许多研究人员提出了路由或广播协议来解决VANET中的问题。本文的目标是在VANET中提出一种不可能引起广播风暴问题的广播方案,具有合理的延迟和高传输率。由于VANET是一个容易受到攻击的网络,在现实中,VANET中的任何恶意行为都可能造成严重的损失甚至死亡,因此我们也应该避免在V2V(车对车)中使用信标交换隐私敏感信息。本文提出了一种利用RSU和V2I (Vehicle to Infrastructure)通信的多跳广播方案。仿真结果表明,该方案在传输速率方面优于静态随机广播方案。与泛洪相比,我们提供了更好的延迟和更少的网络使用。
{"title":"Road side unit assisted stochastic multi-hop broadcast scheme for instant emergency message propagation","authors":"Xing Fan, Bo Yang, R. Yamamoto, Y. Tanaka","doi":"10.1109/ICACT.2015.7224909","DOIUrl":"https://doi.org/10.1109/ICACT.2015.7224909","url":null,"abstract":"VANET (Vehicular ad hoc Network) is a special kind of ad hoc wireless network where every single node is a vehicle moving in a relatively high velocity, which leads to exclusive challenges like rapid changing topologies, safety and privacy concerns. In this specific network, the propagation of emergency messages could be critical to save human lives and property. Many researchers have proposed routing or broadcast protocols to solve the problems in VANET. The objective of this paper is to propose a broadcast scheme in VANET that is not likely to cause broadcast storm problem with a reasonable delay and high delivery rate. Since VANET is an attack-prone network and any kind of malicious behaviour in VANET might cause serious loss or even death in reality, we should also refrain from using beacons to exchange privacy-sensitive information in V2V (Vehicle to Vehicle). In this paper, a multi-hop broadcast scheme that makes use of RSU and V2I (Vehicle to Infrastructure) communication is proposed. The simulation result shows that the proposed scheme outperforms static stochastic broadcast scheme in terms of delivery rate. Comparing to flooding, we offer a better delay and less network usage.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72823561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Simple and feasible dynamic bandwidth and polling allocation for XGPON 简单可行的XGPON动态带宽和轮询分配
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779186
M. Han
In this paper, we propose a simple and feasible dynamic bandwidth allocation (SFDBA) algorithm in order to utilize the unallocated bandwidth and to achieve the implementation feasibility. SFDBA is based on an immediate allocation with colorless grant (IACG) algorithm but SFDBA uses only a single available byte counter and a single down counter for multiple queues of a same service class. Since multiple queues share the same available byte counter, the unallocated bandwidth of a queue can be utilized by another queues. For better service fairness, SFDBA changes the starting queue of scheduling in a round-robin manner. Using simulations, we show that SFDBA is superior to existing methods in mean delay, frame delay variance and frame loss rate.
本文提出了一种简单可行的动态带宽分配(SFDBA)算法,以充分利用未分配的带宽,达到实现的可行性。SFDBA基于使用无色授权(IACG)算法的立即分配,但是SFDBA对于同一服务类的多个队列仅使用单个可用字节计数器和单个down计数器。由于多个队列共享相同的可用字节计数器,因此一个队列的未分配带宽可以由另一个队列利用。为了更好的服务公平性,SFDBA以轮询的方式更改调度的启动队列。仿真结果表明,SFDBA算法在平均时延、帧时延方差和帧损失率等方面都优于现有算法。
{"title":"Simple and feasible dynamic bandwidth and polling allocation for XGPON","authors":"M. Han","doi":"10.1109/ICACT.2014.6779186","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779186","url":null,"abstract":"In this paper, we propose a simple and feasible dynamic bandwidth allocation (SFDBA) algorithm in order to utilize the unallocated bandwidth and to achieve the implementation feasibility. SFDBA is based on an immediate allocation with colorless grant (IACG) algorithm but SFDBA uses only a single available byte counter and a single down counter for multiple queues of a same service class. Since multiple queues share the same available byte counter, the unallocated bandwidth of a queue can be utilized by another queues. For better service fairness, SFDBA changes the starting queue of scheduling in a round-robin manner. Using simulations, we show that SFDBA is superior to existing methods in mean delay, frame delay variance and frame loss rate.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Asymmetric RTS/CTS in ad hoc Wireless LAN 无线局域网中的非对称RTS/CTS
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779025
A. Matoba, M. Hanada, Ho-Gun Moon, M. Kim
A wireless network node with the Omni antenna tends to cause problems called "Hidden Node" and "Exposed Node". RTS/CTS mechanism has been introduced to mitigate Hidden Node and most of existing researches assume that RTS and CTS are sent at the same data rate. In this paper we have intentionally allocate different transmission rate to RTS and CTS in order to mitigate effect of Exposed Node. The simulation result showed that the proposed method achieved higher throughput.
带有Omni天线的无线网络节点往往会导致“隐藏节点”和“暴露节点”的问题。RTS/CTS机制被引入以缓解隐节点,现有的大多数研究假设RTS和CTS以相同的数据速率发送。在本文中,我们有意为RTS和CTS分配不同的传输速率,以减轻暴露节点的影响。仿真结果表明,该方法具有较高的吞吐量。
{"title":"Asymmetric RTS/CTS in ad hoc Wireless LAN","authors":"A. Matoba, M. Hanada, Ho-Gun Moon, M. Kim","doi":"10.1109/ICACT.2014.6779025","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779025","url":null,"abstract":"A wireless network node with the Omni antenna tends to cause problems called \"Hidden Node\" and \"Exposed Node\". RTS/CTS mechanism has been introduced to mitigate Hidden Node and most of existing researches assume that RTS and CTS are sent at the same data rate. In this paper we have intentionally allocate different transmission rate to RTS and CTS in order to mitigate effect of Exposed Node. The simulation result showed that the proposed method achieved higher throughput.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74179684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel distance estimation algorithm of two-hop neighbor in wireless sensor networks 无线传感器网络中新的两跳邻居距离估计算法
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778985
S. Choi, Joongsoo Ma
In case of wireless networks which does not contain a localization system, Euclidean distance between two nodes those are out of carrier sensing range each other cannot be measured with ranging techniques such as RSSI, ToA, and TDoA since they are not able to communicate directly. To deal with this issue, range-free schemes like a hop-count based approach and a connectivity based approach were used. These methods, however, are decreased in accuracy at low node density networks, so it is hard to apply to other wireless network except the densely deployed sensor networks. In this paper, we present a novel distance estimation method. When two nodes are in 2-hop neighbor relation, our method can estimate a distance using ranging information of their overlapped neighbors and connectivity information. Simulation results show that the proposed method outperforms hop count based and connectivity based distance estimation methods.
在不包含定位系统的无线网络中,由于无法直接通信,因此无法使用RSSI、ToA、TDoA等测距技术测量彼此不在载波感知范围内的两个节点之间的欧氏距离。为了解决这个问题,使用了基于跳数的方法和基于连通性的方法等无距离方案。然而,这些方法在低节点密度的网络中精度降低,因此很难应用于除密集部署的传感器网络之外的其他无线网络。本文提出了一种新的距离估计方法。当两个节点处于2跳邻居关系时,我们的方法可以利用它们重叠邻居的距离信息和连通性信息来估计距离。仿真结果表明,该方法优于基于跳数和基于连通性的距离估计方法。
{"title":"Novel distance estimation algorithm of two-hop neighbor in wireless sensor networks","authors":"S. Choi, Joongsoo Ma","doi":"10.1109/ICACT.2014.6778985","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778985","url":null,"abstract":"In case of wireless networks which does not contain a localization system, Euclidean distance between two nodes those are out of carrier sensing range each other cannot be measured with ranging techniques such as RSSI, ToA, and TDoA since they are not able to communicate directly. To deal with this issue, range-free schemes like a hop-count based approach and a connectivity based approach were used. These methods, however, are decreased in accuracy at low node density networks, so it is hard to apply to other wireless network except the densely deployed sensor networks. In this paper, we present a novel distance estimation method. When two nodes are in 2-hop neighbor relation, our method can estimate a distance using ranging information of their overlapped neighbors and connectivity information. Simulation results show that the proposed method outperforms hop count based and connectivity based distance estimation methods.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79078954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A semantic-based approach for representing successful graduate predictive rules 用于表示成功的毕业预测规则的基于语义的方法
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778953
Noppamas Pukkhem
This paper seeks to identify the factors of university students in major of Computer Science at Thaksin University, Thailand that predicts successful completion of the bachelor's degree. Decision tree C4.5/J48, ID3 and ADTree algorithm, the classification algorithms in data mining which are commonly used in many areas can also be implemented to generate the classification rules. In our experiment with 128 training records, we found an overall accuracy of C4.5/J48 algorithm was 90.625%, ID3 algorithm and ADTree were 96.875%. Moreover, we extend the classification rule by applying a semantic-based approach for creating a classification tree ontology. The ontology represent about the classification rules that used to enable machines to interpret and identify learner factors in process of prediction. We also explain how ontological representation plays a role in classifying students to predictive target class. The inference layer of classification tree ontology is based on SWRL (Semantic Web Rule Language), making a clarify separation of the program component and connected explicit modules. One of the major advantages of the proposed approach is that identifying success factors will give students an awareness of essential features for successful completion of their graduate studies.
本文旨在确定泰国他信大学计算机科学专业的大学生成功完成学士学位的因素。决策树C4.5/J48、ID3和ADTree算法等数据挖掘中许多领域常用的分类算法也可以实现生成分类规则。在128条训练记录的实验中,我们发现C4.5/J48算法的总体准确率为90.625%,ID3算法和ADTree的总体准确率为96.875%。此外,我们通过应用基于语义的方法来创建分类树本体来扩展分类规则。本体代表了机器在预测过程中能够解释和识别学习者因素的分类规则。我们还解释了本体论表征如何在将学生分类到预测目标类中发挥作用。分类树本体的推理层基于语义Web规则语言(SWRL),将程序组件与连接的显式模块进行了明确的分离。所提出的方法的主要优点之一是,确定成功因素将使学生了解成功完成研究生学习的基本特征。
{"title":"A semantic-based approach for representing successful graduate predictive rules","authors":"Noppamas Pukkhem","doi":"10.1109/ICACT.2014.6778953","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778953","url":null,"abstract":"This paper seeks to identify the factors of university students in major of Computer Science at Thaksin University, Thailand that predicts successful completion of the bachelor's degree. Decision tree C4.5/J48, ID3 and ADTree algorithm, the classification algorithms in data mining which are commonly used in many areas can also be implemented to generate the classification rules. In our experiment with 128 training records, we found an overall accuracy of C4.5/J48 algorithm was 90.625%, ID3 algorithm and ADTree were 96.875%. Moreover, we extend the classification rule by applying a semantic-based approach for creating a classification tree ontology. The ontology represent about the classification rules that used to enable machines to interpret and identify learner factors in process of prediction. We also explain how ontological representation plays a role in classifying students to predictive target class. The inference layer of classification tree ontology is based on SWRL (Semantic Web Rule Language), making a clarify separation of the program component and connected explicit modules. One of the major advantages of the proposed approach is that identifying success factors will give students an awareness of essential features for successful completion of their graduate studies.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81993233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple regression analysis of IEEE 802.16j relay network throughput IEEE 802.16j中继网络吞吐量的多元回归分析
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6778998
Kohei Higo, G. Hasegawa, Y. Taniguchi, H. Nakano, Morito Matsuoka
In IEEE 802.16J relay networks, time division multiple access (TDMA) is adopted for sharing wireless network resources while avoiding radio wave interference. Time slot assignment determines the degree of spatial reuse of wireless network resources and radio interference strength, which affects network performance. The relay network performance is also influenced by various factors, such as background noise level, path loss exponent, density of relay nodes, and transmission signal strength. In this paper, we present the results of multiple regression analysis of IEEE 802.16J relay network throughput. We first summarize the network environment parameters that affect the throughput of relay networks and conduct extensive simulation experiments with various sets of parameter values. From the simulation results, we investigate the relative effect of parameters on throughput performance by multiple regression analysis. The analysis results show that background noise level and path loss exponent are the key parameters for determining relay network throughput. We also obtain a regression equation to estimate the throughput with enough accuracy.
在IEEE 802.16J中继网络中,采用时分多址(TDMA)技术共享无线网络资源,同时避免无线电波干扰。时隙分配决定了无线网络资源的空间复用程度和无线电干扰强度,影响网络性能。中继网络的性能还受到各种因素的影响,如背景噪声水平、路径损耗指数、中继节点密度、传输信号强度等。本文给出了IEEE 802.16J中继网络吞吐量的多元回归分析结果。我们首先总结了影响中继网络吞吐量的网络环境参数,并用不同的参数值集进行了广泛的仿真实验。在仿真结果的基础上,采用多元回归分析研究了参数对吞吐量性能的相对影响。分析结果表明,背景噪声电平和路径损耗指数是决定中继网络吞吐量的关键参数。我们还得到了一个回归方程,以足够准确地估计吞吐量。
{"title":"Multiple regression analysis of IEEE 802.16j relay network throughput","authors":"Kohei Higo, G. Hasegawa, Y. Taniguchi, H. Nakano, Morito Matsuoka","doi":"10.1109/ICACT.2014.6778998","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778998","url":null,"abstract":"In IEEE 802.16J relay networks, time division multiple access (TDMA) is adopted for sharing wireless network resources while avoiding radio wave interference. Time slot assignment determines the degree of spatial reuse of wireless network resources and radio interference strength, which affects network performance. The relay network performance is also influenced by various factors, such as background noise level, path loss exponent, density of relay nodes, and transmission signal strength. In this paper, we present the results of multiple regression analysis of IEEE 802.16J relay network throughput. We first summarize the network environment parameters that affect the throughput of relay networks and conduct extensive simulation experiments with various sets of parameter values. From the simulation results, we investigate the relative effect of parameters on throughput performance by multiple regression analysis. The analysis results show that background noise level and path loss exponent are the key parameters for determining relay network throughput. We also obtain a regression equation to estimate the throughput with enough accuracy.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82183879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discovering personal places from location traces 从位置痕迹中发现个人地点
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779055
Muhammad Umair, Wan Seok Kim, Byoung Chul Choi, S. Jung
Sensing and computational capabilities in smartphones are enabling attractive new applications in the area of location aware systems. Location aware devices can accurately compute their physical location in the form of latitude and longitude. However places contain much more valuable information to user rather than coordinates. A place is important to a user's personal daily life and carries socially important meanings to a user such as a place where one studies, works, eats, lives etc. GPS enabled devices like smartphones and tablets use location as a context in applications to share their current location. A GPS log of a moving object contains time stamped latitude and longitude information. The discovery of a user's places is a key challenge and involves mapping of GPS data log to meaningful personally important places. In this paper, we propose an algorithm that extracts a user's personally important places from location traces, and evaluate the algorithm with real user's data.
智能手机的传感和计算能力使位置感知系统领域的新应用具有吸引力。位置感知设备可以精确地以经纬度的形式计算其物理位置。然而,对用户来说,位置包含比坐标更有价值的信息。一个地方对用户的个人日常生活很重要,对用户来说也具有重要的社会意义,比如一个学习、工作、吃饭、生活的地方等等。智能手机和平板电脑等支持GPS的设备在应用程序中使用位置作为上下文来共享它们当前的位置。移动对象的GPS日志包含时间戳的纬度和经度信息。发现用户的位置是一个关键的挑战,需要将GPS数据日志映射到有意义的个人重要位置。本文提出了一种从定位痕迹中提取用户个人重要场所的算法,并用实际用户数据对算法进行了评价。
{"title":"Discovering personal places from location traces","authors":"Muhammad Umair, Wan Seok Kim, Byoung Chul Choi, S. Jung","doi":"10.1109/ICACT.2014.6779055","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779055","url":null,"abstract":"Sensing and computational capabilities in smartphones are enabling attractive new applications in the area of location aware systems. Location aware devices can accurately compute their physical location in the form of latitude and longitude. However places contain much more valuable information to user rather than coordinates. A place is important to a user's personal daily life and carries socially important meanings to a user such as a place where one studies, works, eats, lives etc. GPS enabled devices like smartphones and tablets use location as a context in applications to share their current location. A GPS log of a moving object contains time stamped latitude and longitude information. The discovery of a user's places is a key challenge and involves mapping of GPS data log to meaningful personally important places. In this paper, we propose an algorithm that extracts a user's personally important places from location traces, and evaluate the algorithm with real user's data.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84671175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Skin detection for adult image identification 成人图像识别中的皮肤检测
Pub Date : 2014-03-27 DOI: 10.1109/ICACT.2014.6779041
Jung-Jae Yu, S. Han
This work is aimed at the estimation of the skin region in pornographic images to identify and block the pornographic contents. We propose a novel method to estimate the skin region using simple operation in HSV color space and additional postprocessing to reduce the noise effects. Our method does not require any pre-process such as object detection. It is fast and its result is good enough to be used for fitlering out the clear non-objectionable images before main identification process. So the proposed method can be used as pre-processing for more accurate poronographic image identification process.
本工作旨在对色情图像中的皮肤区域进行估计,以识别和屏蔽色情内容。我们提出了一种新的皮肤区域估计方法,该方法使用简单的HSV颜色空间运算和附加的后处理来降低噪声影响。我们的方法不需要任何预处理,如对象检测。该算法速度快,结果良好,可用于在主识别前过滤出清晰的无异议图像。因此,该方法可以作为更准确的色情图像识别过程的预处理。
{"title":"Skin detection for adult image identification","authors":"Jung-Jae Yu, S. Han","doi":"10.1109/ICACT.2014.6779041","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779041","url":null,"abstract":"This work is aimed at the estimation of the skin region in pornographic images to identify and block the pornographic contents. We propose a novel method to estimate the skin region using simple operation in HSV color space and additional postprocessing to reduce the noise effects. Our method does not require any pre-process such as object detection. It is fast and its result is good enough to be used for fitlering out the clear non-objectionable images before main identification process. So the proposed method can be used as pre-processing for more accurate poronographic image identification process.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90897332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
16th International Conference on Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1