By Topic

16th International Conference on Advanced Communication Technology

16-19 Feb. 2014

Filter Results

Displaying Results 1 - 25 of 305
  • [Front cover]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (6541 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Message from general chair

    Publication Year: 2014, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (223 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2014, Page(s):iii - xiii
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Active reviewer list

    Publication Year: 2014, Page(s):xiv - xx
    Request permission for commercial reuse | PDF file iconPDF (2947 KB)
    Freely Available from IEEE
  • List of Outstanding Paper Award

    Publication Year: 2014, Page(s):xxi - xxv
    Request permission for commercial reuse | PDF file iconPDF (2269 KB)
    Freely Available from IEEE
  • Session overview - The Final Program of ICACT 2014 (Session Overview)

    Publication Year: 2014, Page(s):xxvi - xxvii
    Request permission for commercial reuse | PDF file iconPDF (2341 KB)
    Freely Available from IEEE
  • [Tutorial and Plenary sessions - 6 abstracts]

    Publication Year: 2014, Page(s):xxviii - xxxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Provides an abstract for each of the tutorial and plenary presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2014, Page(s):i - xxvii
    Request permission for commercial reuse | PDF file iconPDF (2685 KB)
    Freely Available from IEEE
  • Path loss model considering Doppler shift for high speed railroad communication

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    In this paper, we propose the tuned free-space path loss modelling in high speed railroad considering Doppler effect. We use tuned free space path loss model which is utilized for measurement results at high speed railroad. The environment of high speed rail is mostly at viaduct and tintinnii over than 50 percent. The purpose of this paper is analyzing Doppler shift effect at viaduct and plain by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of TAC configuration in mobile communication systems: A tabu search approach

    Publication Year: 2014, Page(s):5 - 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2904 KB) | HTML iconHTML

    Recently, the mobile communication has been rapidly changing the LTE-based mobile communication. In LTE-based mobile communication system, paging performance is a critical factor to be considered, a paging area is defined as TAC, which is group of cells. In this paper, we propose a new scheme for configuration of TAC to maximize the paging success rate. This scheme constructs a TAC using traffic l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-step time delay difference estimation method for initial random access in satellite LTE system

    Publication Year: 2014, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2885 KB) | HTML iconHTML

    In initial random access, base station (BS) estimates the distance between the user equipment (UE) and BS. In the mobile satellite system (MSS), however, the characteristics of large transmission delay makes the estimation method used in the terrestrial system not applicable in the MSS. To solve this problem, a two-step time delay difference estimation scheme is proposed for orthogonal frequency d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LTE idle mode optimization improving end user experiences

    Publication Year: 2014, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4915 KB) | HTML iconHTML

    This paper presents the methodology of defining the measurement trigger conditions and evaluation conditions of LTE cell reselection for release 9 capable UEs. In the proposal of cell reselection parameters, the RSRQ measurement quantity is considered to account for the increase of packet traffic in LTE networks. In addition, the proposal is designed to improve the end user experiences such the LT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIP-based vertical handover scheme with bicasting

    Publication Year: 2014, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2829 KB) | HTML iconHTML

    Due the complexity of the wireless environments, single technology cannot be efficient to provide demands of mobile users. Hence, in cooperation with heterogeneous wireless technologies, the next generation of wireless systems makes it possible to communicate everywhere. Providing high performance and data rate is what this cooperation has promised to meet. So issues related to the heterogeneity o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographie key generation from PUF data using efficient fuzzy extractors

    Publication Year: 2014, Page(s):23 - 26
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2008 KB) | HTML iconHTML

    Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators, they need to be combined with an extraction technique to derive reliable bit strings (i.e., cryptographic key). An approach based on an error correcting code was proposed by Dodis et al. and is known as a fuzzy extractor. However, this method appears to be difficult for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GoHop: Personal VPN to defend from censorship

    Publication Year: 2014, Page(s):27 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Internet censorship threatens people's online privacy, and in recent years, new technologies such as high-speed Deep Packet Inspection (DPI) and statistical traffic analysis methods had been applied in country scale censorship and surveillance projects. Traditional encryption protocols cannot hide statistical flow properties and new censoring systems can easily detect and block them "in the dark".... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous communication and its importance in social networking

    Publication Year: 2014, Page(s):34 - 39
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3770 KB) | HTML iconHTML

    Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an indispensable part of social life and industrial activity for mankind. For various reasons, however, today's networks are vulnerable to numerous risks, such as information leakage, privacy infringement and data corruption. Through this research, the authors tried to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design of security framework for data privacy in e-health system using web service

    Publication Year: 2014, Page(s):40 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2350 KB) | HTML iconHTML

    E-Health is a common term used for electronic health, where the services and systems provided include electronic health records, prescriptions, consumer health information, healthcare information systems, and so on. In this period of time, several patients have started to use e-health, considering the convenience of services delivered and cost reduction. The popularity has abruptly been increasing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A support middleware solution for e-healthcare system security

    Publication Year: 2014, Page(s):44 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2546 KB) | HTML iconHTML

    This paper presents a middleware solution to secure data and network in the e-healthcare system. The e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A subjective — VoIP quality estimation model for G.729 based on native Thai users

    Publication Year: 2014, Page(s):48 - 53
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3660 KB) | HTML iconHTML

    VoIP is very useful but it there are quality issues when delays or losses occur in the network. Thus, VoIP quality assessment for voice quality assurance or improvement is important. Voice quality assessment is mainly divided into objective and subjective methods. However, several researchers prefer subjective methods to objective methods because the term `voice quality' is very subjective. Accord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using DLNA cloud for sharing multimedia contents beyond home networks

    Publication Year: 2014, Page(s):54 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3444 KB) | HTML iconHTML

    The recent emergence of Digital Living Network Alliance (DLNA) standard has made multimedia content sharing among devices in home networks easier than ever before. Several studies have focused on extending the operation of DLNA devices beyond the home networks based on devices called home gateways (HGs). However, these architectures just limit on sharing between two home networks. In order to conn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMBUBOT: Ambulance robot Automated External Defibrillator robotic ambulance

    Publication Year: 2014, Page(s):58 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (35673 KB) | HTML iconHTML

    The purpose of this paper is to introduce a novel robot in order to overcome some difficulties in providing an Automated External Defibrillator (AED) device at the nearest location of victim suffering from sudden cardiac arrest in the shortest possible time before the advent of the ambulance. We designed and developed an ambulance robot, called it Ambubot, that brings along an AED to help lay resc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on the performance evaluation of container tracking device based on M2M

    Publication Year: 2014, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3886 KB) | HTML iconHTML

    Tracking device is M2M based Conveyance Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. Tracking device is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service delivery platform for open IPTV convergence service creation and management

    Publication Year: 2014, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3836 KB) | HTML iconHTML

    IPTV brought a new digital era in the broadcasting domain. The main change of digital broadcasting is an advent of a bi-directional interactive service feature. Using that bi-directionality, IPTV provides various kinds of convergence service such as information providing, advertisement, and e-commerce. But the number of services required to be developed and to be provided to users geometrically in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.