Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779156
Heon-min Lee, Su-bin Han, Taerim Lee, Sanguk Shin
In recent years, the importance of e-Discovery is being strongly emphasized according to the rapid increase of litigation between the business corporations. The success of e-Discovery depends on how well the litigant and lawyer search relevant evidence, and it is closely associated with making fine queries based on their analysis of complaint and data set. Therefore, this paper proposes a Query Recommending Scheme called QRS for an efficient evidence search in e-Discovery procedure. This scheme is composed with four different phases and various techniques are applied such as document parsing, machine learning and scoring. We describe how QRS works using the flow chart and introduce further researches for the improvement of QRS.
{"title":"A Query Recommending Scheme for an efficient evidence search in e-Discovery","authors":"Heon-min Lee, Su-bin Han, Taerim Lee, Sanguk Shin","doi":"10.1109/ICACT.2014.6779156","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779156","url":null,"abstract":"In recent years, the importance of e-Discovery is being strongly emphasized according to the rapid increase of litigation between the business corporations. The success of e-Discovery depends on how well the litigant and lawyer search relevant evidence, and it is closely associated with making fine queries based on their analysis of complaint and data set. Therefore, this paper proposes a Query Recommending Scheme called QRS for an efficient evidence search in e-Discovery procedure. This scheme is composed with four different phases and various techniques are applied such as document parsing, machine learning and scoring. We describe how QRS works using the flow chart and introduce further researches for the improvement of QRS.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"30 1","pages":"1237-1241"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86275839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779202
S. Shaker
Turbo codes have been incorporated into many important wireless communication standards including the satellite return channel in DVB-RCS standards. According to their iterative nature, the computational complexity of turbo decoder is much higher than that of convolutional FEC decoders. From the hardware implementation point of view, the complexity can be reduced by using quantized decoder. For DVB-RCS turbo coding, there are many block sizes and different code rates. In order to realize the DVB-RCS turbo decoder efficiently, an algorithm should be developed for the best computation of quantization range for each code rate and at different signal-to-noise ratios. This paper investigates the decoder input quantization of low complexity decoding algorithm and proposes an algorithm for efficient decoder quantization by introducing a scaling factor into the decoding algorithm, aiming to achieve significant improvement in the hardware implementation of the decoder architecture.
{"title":"DVB-RCS: Efficiently quantized turbo decoder","authors":"S. Shaker","doi":"10.1109/ICACT.2014.6779202","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779202","url":null,"abstract":"Turbo codes have been incorporated into many important wireless communication standards including the satellite return channel in DVB-RCS standards. According to their iterative nature, the computational complexity of turbo decoder is much higher than that of convolutional FEC decoders. From the hardware implementation point of view, the complexity can be reduced by using quantized decoder. For DVB-RCS turbo coding, there are many block sizes and different code rates. In order to realize the DVB-RCS turbo decoder efficiently, an algorithm should be developed for the best computation of quantization range for each code rate and at different signal-to-noise ratios. This paper investigates the decoder input quantization of low complexity decoding algorithm and proposes an algorithm for efficient decoder quantization by introducing a scaling factor into the decoding algorithm, aiming to achieve significant improvement in the hardware implementation of the decoder architecture.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"103 1","pages":"426-433"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77277665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778983
A. Morikawa, Hiroshi Yamamoto, Maki Yamamoto, K. Yamazaki
Timing synchronization is essential in case where multiple sensor nodes with ultrasonic sensors are deployed on the same place. This is because the ultrasonic sensors should be powered at an appropriate timing so as to prevent ultrasonic interference. In this paper, we propose a harmful bird attack system and a new timing synchronization method for ZigBee sensor network. In this timing synchronizing method, by concentrating the processing load to the server, the amount of calculation on each node can be minimized and is unaffected by the increase in the number of nodes. Evaluation of the proposed method has shown that it sufficiently fulfills the timing requirement for the proposed harmful birds attack system.
{"title":"Ultrasonic sensor system for ecology observation and timing synchronization of ZigBee network","authors":"A. Morikawa, Hiroshi Yamamoto, Maki Yamamoto, K. Yamazaki","doi":"10.1109/ICACT.2014.6778983","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778983","url":null,"abstract":"Timing synchronization is essential in case where multiple sensor nodes with ultrasonic sensors are deployed on the same place. This is because the ultrasonic sensors should be powered at an appropriate timing so as to prevent ultrasonic interference. In this paper, we propose a harmful bird attack system and a new timing synchronization method for ZigBee sensor network. In this timing synchronizing method, by concentrating the processing load to the server, the amount of calculation on each node can be minimized and is unaffected by the increase in the number of nodes. Evaluation of the proposed method has shown that it sufficiently fulfills the timing requirement for the proposed harmful birds attack system.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 5","pages":"365-370"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91440974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779061
M. Suh, Sae Hyong Park, Byungjoon Lee, Sunhee Yang
Many have recognized the need to restructure the current internet work into a much more dynamic networking environment. It is difficult for today's inflexible infrastructure to cope with the fast changing demands of the users. As a result, Software-Defined Network (SDN) was introduced around 2005 to transform today's network to have centralized management, rapid innovation, and programmability by decoupling the control and data planes. This study focuses on developing a firewall application that runs over an OpenFlow-based SDN controller to show that most of the firewall functionalities are able to be built on software, without the aid of a dedicated hardware. Among many OpenFlow controllers that already exist for the public, we have chosen POX written in Python for the experiment; and to create the SDN network topology, we have used VirtualBox and Mininet. In this study, we cover the implementation detail of our firewall application, as well as the experimentation result.
{"title":"Building firewall over the software-defined network controller","authors":"M. Suh, Sae Hyong Park, Byungjoon Lee, Sunhee Yang","doi":"10.1109/ICACT.2014.6779061","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779061","url":null,"abstract":"Many have recognized the need to restructure the current internet work into a much more dynamic networking environment. It is difficult for today's inflexible infrastructure to cope with the fast changing demands of the users. As a result, Software-Defined Network (SDN) was introduced around 2005 to transform today's network to have centralized management, rapid innovation, and programmability by decoupling the control and data planes. This study focuses on developing a firewall application that runs over an OpenFlow-based SDN controller to show that most of the firewall functionalities are able to be built on software, without the aid of a dedicated hardware. Among many OpenFlow controllers that already exist for the public, we have chosen POX written in Python for the experiment; and to create the SDN network topology, we have used VirtualBox and Mininet. In this study, we cover the implementation detail of our firewall application, as well as the experimentation result.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"744-748"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90321137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779168
Haedong Lee, Aekyung Moon
This paper contains about the research and the building of an effective agricultural yield forecasting system based on real-time monthly weather. It is difficult to predict the agricultural crop production because of the abnormal weather that happens every year and rapid regional climate change due to global warming. The development of agricultural yield forecasting system that leverages real-time weather information is urgently required. In this research, we cover how to process the number of weather data(monthly, daily) and how to configure the prediction system. We establish a non-parametric statistical model on the basis of 33 years of agricultural weather information. According to the implemented model, we predict final production using the monthly weather information. This paper contains the results of the simulation.
{"title":"Development of yield prediction system based on real-time agricultural meteorological information","authors":"Haedong Lee, Aekyung Moon","doi":"10.1109/ICACT.2014.6779168","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779168","url":null,"abstract":"This paper contains about the research and the building of an effective agricultural yield forecasting system based on real-time monthly weather. It is difficult to predict the agricultural crop production because of the abnormal weather that happens every year and rapid regional climate change due to global warming. The development of agricultural yield forecasting system that leverages real-time weather information is urgently required. In this research, we cover how to process the number of weather data(monthly, daily) and how to configure the prediction system. We establish a non-parametric statistical model on the basis of 33 years of agricultural weather information. According to the implemented model, we predict final production using the monthly weather information. This paper contains the results of the simulation.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"53 1","pages":"1292-1295"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91025981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779033
Bumho Kim, Jeong-Woo Lee, K. Yoon
There has been an increase in the demand for a high-quality video codec that supports 4K (3,840 × 2,160) or more. JPEG2000 is an important technique for data compression, which has been successfully used in digital cinema and medical application. To process the high workload of JPEG2000 coding for large-scale video data, hybrid CPU/GPU platform is used to obtain high computing power. In this paper, we develop and implementation of the JPEG2000 compression standard in hybrid CPU/GPU platforms. Specifically, we develop multi-GPU implementations of the JPEG2000 encode to obtain high computing power and balance the load between cores and GPUs in the hybrid architecture. In out experiments with multi-GPU, we couple the JPEG2000 codec optimized for multicores and multi-GPUs and achieve high performance of the JPEG2000 compression.
{"title":"A parallel implementation of JPEG2000 encoder on multi-GPU system","authors":"Bumho Kim, Jeong-Woo Lee, K. Yoon","doi":"10.1109/ICACT.2014.6779033","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779033","url":null,"abstract":"There has been an increase in the demand for a high-quality video codec that supports 4K (3,840 × 2,160) or more. JPEG2000 is an important technique for data compression, which has been successfully used in digital cinema and medical application. To process the high workload of JPEG2000 coding for large-scale video data, hybrid CPU/GPU platform is used to obtain high computing power. In this paper, we develop and implementation of the JPEG2000 compression standard in hybrid CPU/GPU platforms. Specifically, we develop multi-GPU implementations of the JPEG2000 encode to obtain high computing power and balance the load between cores and GPUs in the hybrid architecture. In out experiments with multi-GPU, we couple the JPEG2000 codec optimized for multicores and multi-GPUs and achieve high performance of the JPEG2000 compression.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"1 1","pages":"610-613"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91156726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779154
Byungjoon Lee, Sae Hyong Park, Jisoo Shin, Sunhee Yang
SDN is a novel and promising networking technology that enables a software-based control over reactive packet-switching devices which query forwarding decisions for every flow: by controlling the answers to the queries, it is possible to `program' the whole network according to a specific set of networking policies. That kind of programmability is backed by NOS (Network OS), which is usually called SDN controller. A Controller supports network-controlling applications to run on top of it by transparently dealing with the actual communication with the switching devices. However, as the controller is normally centralized, the scalability and availability issue is inevitable: a controller should provide reasonable performance to each of the switching device regardless of the network size, and guarantee the non-stop operation of NOS applications against system and software failures to prevent the whole network from halting on the control plane crashes. In this paper, we investigate the issues deeply, and introduce a comprehensive solution called IRIS (ETRI Recursive SDN controller platform).
{"title":"IRIS: The Openflow-based Recursive SDN controller","authors":"Byungjoon Lee, Sae Hyong Park, Jisoo Shin, Sunhee Yang","doi":"10.1109/ICACT.2014.6779154","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779154","url":null,"abstract":"SDN is a novel and promising networking technology that enables a software-based control over reactive packet-switching devices which query forwarding decisions for every flow: by controlling the answers to the queries, it is possible to `program' the whole network according to a specific set of networking policies. That kind of programmability is backed by NOS (Network OS), which is usually called SDN controller. A Controller supports network-controlling applications to run on top of it by transparently dealing with the actual communication with the switching devices. However, as the controller is normally centralized, the scalability and availability issue is inevitable: a controller should provide reasonable performance to each of the switching device regardless of the network size, and guarantee the non-stop operation of NOS applications against system and software failures to prevent the whole network from halting on the control plane crashes. In this paper, we investigate the issues deeply, and introduce a comprehensive solution called IRIS (ETRI Recursive SDN controller platform).","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"14 1","pages":"1227-1231"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73561698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778952
Z. Adhoni, H. Al Hamad, A. A. Siddiqi, Zaheer Ahmed Adhonid
In this paper, we describe a Cloud-Based Cross LANGUAGE Search engine, which aims at providing a unifying framework for searching the Quranic verses in multi-language. It uses Drupal technology for the implementation Includes all necessary components for searching, building mobile applications and social networks around the central theme of Qur'an. A salient feature of the proposed API is the ability to retrieve Qur'anic verses in Arabic using search phrases in languages other than Arabic. The other part is design of a Mushaf recitation which is also cloud based and multi-language., we describe the core components and design patterns of the proposed API with emphasis on key design criteria.
{"title":"A Cloud-Based Cross Language Search engine for Quranic application","authors":"Z. Adhoni, H. Al Hamad, A. A. Siddiqi, Zaheer Ahmed Adhonid","doi":"10.1109/ICACT.2014.6778952","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778952","url":null,"abstract":"In this paper, we describe a Cloud-Based Cross LANGUAGE Search engine, which aims at providing a unifying framework for searching the Quranic verses in multi-language. It uses Drupal technology for the implementation Includes all necessary components for searching, building mobile applications and social networks around the central theme of Qur'an. A salient feature of the proposed API is the ability to retrieve Qur'anic verses in Arabic using search phrases in languages other than Arabic. The other part is design of a Mushaf recitation which is also cloud based and multi-language., we describe the core components and design patterns of the proposed API with emphasis on key design criteria.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"12 1","pages":"218-221"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85129064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6779014
Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan
Brain Machine Interface (BMI) has made it possible for the disabled people to communicate with the external machine using their own senses. In the field of BMI, the invasive techniques have been widely used. This paper deals with the study of features of Electroencephalography (EEG), a non invasive technique that has been used for classifying two classes of movements, namely Extension and Flexion. Classification of movements is done on the basis of energy, entropy, skewness, kurtosis and their various combinations. The maximum accuracy of 91.93% has been obtained using discrete cosine transformation of energy and entropy. Finally the detected wrist movement is implemented on a mechanical Robotic Arm using ARDUINO UNO and MATLAB.
{"title":"Brain Machine Interface for wrist movement using Robotic Arm","authors":"Sidhika Varshney, Bhoomika Gaur, Omar Farooq, Y. Khan","doi":"10.1109/ICACT.2014.6779014","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6779014","url":null,"abstract":"Brain Machine Interface (BMI) has made it possible for the disabled people to communicate with the external machine using their own senses. In the field of BMI, the invasive techniques have been widely used. This paper deals with the study of features of Electroencephalography (EEG), a non invasive technique that has been used for classifying two classes of movements, namely Extension and Flexion. Classification of movements is done on the basis of energy, entropy, skewness, kurtosis and their various combinations. The maximum accuracy of 91.93% has been obtained using discrete cosine transformation of energy and entropy. Finally the detected wrist movement is implemented on a mechanical Robotic Arm using ARDUINO UNO and MATLAB.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"5 1","pages":"518-522"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88237186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-27DOI: 10.1109/ICACT.2014.6778970
T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee
Energy efficiency is one of the major concerns in designing protocols for WSNs. One of the energy-efficient communication protocols for this network is LEACH that works on cluster-based homogeneous WSNs. Though LEACH is energy-efficient but it does not take security into account. Because WSNs are usually deployed in remote and hostile areas, security becomes a concern in designing a protocol. In this paper we present our security analysis of five security protocols that have been proposed to strengthen LEACH protocols. Those protocols are SLEACH, SecLEACH, SC-LEACH, Armor LEACH and MS-LEACH.
{"title":"Survey on LEACH-based security protocols","authors":"T. M. Rahayu, Sanggon Lee, Hoon-Jae Lee","doi":"10.1109/ICACT.2014.6778970","DOIUrl":"https://doi.org/10.1109/ICACT.2014.6778970","url":null,"abstract":"Energy efficiency is one of the major concerns in designing protocols for WSNs. One of the energy-efficient communication protocols for this network is LEACH that works on cluster-based homogeneous WSNs. Though LEACH is energy-efficient but it does not take security into account. Because WSNs are usually deployed in remote and hostile areas, security becomes a concern in designing a protocol. In this paper we present our security analysis of five security protocols that have been proposed to strengthen LEACH protocols. Those protocols are SLEACH, SecLEACH, SC-LEACH, Armor LEACH and MS-LEACH.","PeriodicalId":6380,"journal":{"name":"16th International Conference on Advanced Communication Technology","volume":"27 1","pages":"304-309"},"PeriodicalIF":0.0,"publicationDate":"2014-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85426301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}