By Topic

Advanced Communication Technology (ICACT), 2014 16th International Conference on

Date 16-19 Feb. 2014

Filter Results

Displaying Results 1 - 25 of 305
  • [Front cover]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (6541 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB)  
    Freely Available from IEEE
  • Message from general chair

    Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (223 KB)  
    Freely Available from IEEE
  • [Front matter]

    Page(s): iii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (188 KB)  
    Freely Available from IEEE
  • Active reviewer list

    Page(s): xiv - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (2947 KB)  
    Freely Available from IEEE
  • List of Outstanding Paper Award

    Page(s): xxi - xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (2269 KB)  
    Freely Available from IEEE
  • Session overview - The Final Program of ICACT 2014 (Session Overview)

    Page(s): xxvi - xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (2341 KB)  
    Freely Available from IEEE
  • [Tutorial and Plenary sessions - 6 abstracts]

    Page(s): xxviii - xxxiii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB)  

    Provides an abstract for each of the tutorial and plenary presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Page(s): i - xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (2685 KB)  
    Freely Available from IEEE
  • Path loss model considering Doppler shift for high speed railroad communication

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    In this paper, we propose the tuned free-space path loss modelling in high speed railroad considering Doppler effect. We use tuned free space path loss model which is utilized for measurement results at high speed railroad. The environment of high speed rail is mostly at viaduct and tintinnii over than 50 percent. The purpose of this paper is analyzing Doppler shift effect at viaduct and plain by using modified path loss model. Simulation results show that proposed path loss model considering estimated Doppler shift coincides with the free space loss model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of TAC configuration in mobile communication systems: A tabu search approach

    Page(s): 5 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2904 KB) |  | HTML iconHTML  

    Recently, the mobile communication has been rapidly changing the LTE-based mobile communication. In LTE-based mobile communication system, paging performance is a critical factor to be considered, a paging area is defined as TAC, which is group of cells. In this paper, we propose a new scheme for configuration of TAC to maximize the paging success rate. This scheme constructs a TAC using traffic load, TAC size and handover patterns. Then we propose the improvement algorithm using tabu search. From the performance analysis with real traffic data of Seoul in Korea, we can see that the proposed TAC configuration provides larger paging success rates than the existing TAC configuration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-step time delay difference estimation method for initial random access in satellite LTE system

    Page(s): 10 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2885 KB) |  | HTML iconHTML  

    In initial random access, base station (BS) estimates the distance between the user equipment (UE) and BS. In the mobile satellite system (MSS), however, the characteristics of large transmission delay makes the estimation method used in the terrestrial system not applicable in the MSS. To solve this problem, a two-step time delay difference estimation scheme is proposed for orthogonal frequency division multiple access (OFDMA) multi-beam satellite system. We first divide a beam cell into some layered small sub-areas according to the different delay difference values. Then, two types of Physical Random Access Channel (PRACH) preamble burst format are performed: the first one is for the fractional delay difference value measurement and the second one is for the integer part. Further, complete criteria for the designation of PRACH parameters are proposed and closed-form expressions of the system performance are also derived, including the false alarm probability and the missed detection probability. Finally, according to the numerical analysis, the method shows good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LTE idle mode optimization improving end user experiences

    Page(s): 14 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4915 KB) |  | HTML iconHTML  

    This paper presents the methodology of defining the measurement trigger conditions and evaluation conditions of LTE cell reselection for release 9 capable UEs. In the proposal of cell reselection parameters, the RSRQ measurement quantity is considered to account for the increase of packet traffic in LTE networks. In addition, the proposal is designed to improve the end user experiences such the LTE camp-on ratio, the avoidance of unnecessary cell reselection measurements causing the battery drain and the ping-pong effect between LTE and WCDMA inter-RAT cell reselection or redirection. The cell reselection parameter proposal is made based on the field test data collected in Tokyo metropolitan area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIP-based vertical handover scheme with bicasting

    Page(s): 19 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2829 KB) |  | HTML iconHTML  

    Due the complexity of the wireless environments, single technology cannot be efficient to provide demands of mobile users. Hence, in cooperation with heterogeneous wireless technologies, the next generation of wireless systems makes it possible to communicate everywhere. Providing high performance and data rate is what this cooperation has promised to meet. So issues related to the heterogeneity of wireless environment like handover should be addressed. With the appearance of overlapping wireless networks, MNs have to switch their connections between different access technologies having different capabilities and characteristics. In this case, the handover process is more complex and is known as Vertical Handover. In this paper, we focus on the vertical handover management and use an extension of SIP to support vertical handover with bicasting. Delay reduction and SIP signaling messages overhead reduction are the challenges we have tried to improve with our proposed method. To evaluate our proposed method, we use the OPNET Modeler 14.5 and it's Performance for real-time service besides examining the VoIP. Simulation has been performed on UMTS/WLAN networks. The results show that our technique can improve latency and throughput. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographie key generation from PUF data using efficient fuzzy extractors

    Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2008 KB) |  | HTML iconHTML  

    Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators, they need to be combined with an extraction technique to derive reliable bit strings (i.e., cryptographic key). An approach based on an error correcting code was proposed by Dodis et al. and is known as a fuzzy extractor. However, this method appears to be difficult for non-specialists to implement. In our recent study, we reported the results of some example implementations using PUF data and presented a detailed implementation diagram. In this paper, we describe a more efficient implementation method by replacing the hash function output with the syndrome from the BCH code. The experimental results show that the Hamming distance between two keys vary according to the key size and information-theoretic security has been achieved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GoHop: Personal VPN to defend from censorship

    Page(s): 27 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (576 KB) |  | HTML iconHTML  

    Internet censorship threatens people's online privacy, and in recent years, new technologies such as high-speed Deep Packet Inspection (DPI) and statistical traffic analysis methods had been applied in country scale censorship and surveillance projects. Traditional encryption protocols cannot hide statistical flow properties and new censoring systems can easily detect and block them "in the dark". Recent work showed that traffic morphing and protocol obfuscation are effective ways to defend from statistical traffic analysis. In this paper, we proposed a novel traffic obfuscation protocol, where client and server communicate on random port. We implemented our idea as an open-source VPN tool named GoHop, and developed several obfuscation method including pre-shared key encryption, traffic shaping and random port communication. Experiments has shown that GoHop can successfully bypass internet censoring systems, and can provide high-bandwidth network throughput. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous communication and its importance in social networking

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3770 KB) |  | HTML iconHTML  

    Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an indispensable part of social life and industrial activity for mankind. For various reasons, however, today's networks are vulnerable to numerous risks, such as information leakage, privacy infringement and data corruption. Through this research, the authors tried to establish an in-depth understanding of the importance of anonymous communication in social networking which is mostly used by ordinary and non-technical people. It demonstrates how the commonly used non-anonymous communication scheme in social networking can turn the Internet into a very dangerous platform because of its built-in nature making its users' identity easily traceable. After providing some introductory information on internet protocol (IP), internal working mechanism of social networking and concept of anonymity on the Internet, Facebook is used as a case study in demonstrating how various network tracing tools and gimmicks could be used to reveal identity of its users and victimize many innocent people. It then demonstrates working mechanism of various tools that can turn the Facebook social networking site into a safe and anonymous platform. The paper concludes by summarizing pros and cons of various anonymous communication techniques and highlighting its importance for social networking platforms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design of security framework for data privacy in e-health system using web service

    Page(s): 40 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2350 KB) |  | HTML iconHTML  

    E-Health is a common term used for electronic health, where the services and systems provided include electronic health records, prescriptions, consumer health information, healthcare information systems, and so on. In this period of time, several patients have started to use e-health, considering the convenience of services delivered and cost reduction. The popularity has abruptly been increasing due to a wide range of services. From the system administrator's perspectives, not only protecting privacy of patients is considered a difficult task, but also building trust of patients in e-health. In this paper, a design of security framework for data privacy in e-Health system based on web service architecture is proposed. It is interesting to note that the approach proposed in this paper is not limited to e-Health system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A support middleware solution for e-healthcare system security

    Page(s): 44 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2546 KB) |  | HTML iconHTML  

    This paper presents a middleware solution to secure data and network in the e-healthcare system. The e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack Moreover, an efficient and cost effective approach middleware solution is discussed for the delivery of secure services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A subjective — VoIP quality estimation model for G.729 based on native Thai users

    Page(s): 48 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3660 KB) |  | HTML iconHTML  

    VoIP is very useful but it there are quality issues when delays or losses occur in the network. Thus, VoIP quality assessment for voice quality assurance or improvement is important. Voice quality assessment is mainly divided into objective and subjective methods. However, several researchers prefer subjective methods to objective methods because the term `voice quality' is very subjective. According to that idea, this paper proposes a model for estimating VoIP quality provided by G.729, a common codec used over WAN, that has been created from subjective Mean Opinion Score (MOS), obtained from Thai users who use Thai, which is a tonal language and certainly different from other languages. For experiment and data gathering, the conversation-opinion tests with 354 native Thai users was conducted using a VoIP testbed system and G.729, under 17 test conditions, covering packet loss of 0-10% and packet delay of 0-800ms. Then, the gathered data was used to create the subjective MOS estimation model. Furthermore, a different set of subjective MOS data have been gathered from 64 native Thai users as the test set for the model evaluation. For model fitting, Matlab was applied, whereas Mean Absolute Percent Error (MAPE) was used for model evaluation. After obtaining the subjective MOS model, MAPE was calculated to evaluate the model. It has been found that the MAPE is 12.39%, which means this model is good (10% <; MAPE <; 20% means good). However, the MAPE may vary, depending on the test set. In conclusion, this paper presents a model of VoIP quality estimation for G.729 based on Thai users who communicate using the Thai language, called ThaiVQE-G729 for short. After evaluating the performance of this model, it has been confirmed that it is a good model. Therefore, this model is reliable and suitable to estimate MOS of G.729 in the Thai environment. Besides, this concept might be a prototype for other countries (e.g. China, Japan and Korea), due to the perceptual vo- ce quality can be affected by language and culture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using DLNA cloud for sharing multimedia contents beyond home networks

    Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3444 KB) |  | HTML iconHTML  

    The recent emergence of Digital Living Network Alliance (DLNA) standard has made multimedia content sharing among devices in home networks easier than ever before. Several studies have focused on extending the operation of DLNA devices beyond the home networks based on devices called home gateways (HGs). However, these architectures just limit on sharing between two home networks. In order to connect with another home network or when the D? address of a HG is changed, they require the reconfiguration from users. This paper proposes a novel architecture in which a DLNA cloud (DC) plays a role in managing all of HGs. The HGs just need to be configured in the first time connecting to the DC. Sharing policy is built based on the users' relationship in a social network In this architecture, DLNA users can easily share their content with their friends over the Internet. External multimedia content is transparently played in the home network as if it is located at user's HG. In addition, we also propose procedures for communication between the HG and the DC; as well as between the HG, the DC and the social network system (SNS). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMBUBOT: Ambulance robot Automated External Defibrillator robotic ambulance

    Page(s): 58 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (35673 KB) |  | HTML iconHTML  

    The purpose of this paper is to introduce a novel robot in order to overcome some difficulties in providing an Automated External Defibrillator (AED) device at the nearest location of victim suffering from sudden cardiac arrest in the shortest possible time before the advent of the ambulance. We designed and developed an ambulance robot, called it Ambubot, that brings along an AED to help lay rescuers for saving patients life in a sudden event of cardiac arrest. The first aid to the victim can be carried out once an incident alarm is transmitted to the Ambubot station by sensing via body-attached sensor and/or mobile phone application. Such applications transmit required information to the Ambubot center for further execution. Ambubot center is integrated with three independent servers namely database server, message controller, and GIS server. In addition, message controller server is connected with telecom's short message server for transmitting the message to family members of the patient. The Ambubot robots are located in Ambubot stations when several stations can be covered via single center where human operators are located. Different methods had been proposed for dispatching Ambubot to locate the victim namely tele-control, partially autonomous, and fully autonomous operations. While we have illustrated all those methods in this paper we present the conduction of the tele-control method to control the operation of the robot. In this method, not only Ambubot follows instructions of human operator till the robot reaches the location of victim and delivers the AED but also provides instruction to the people in the location for applying the AED hence the lay rescuers will dry the victim's chest and attach the AED pads by themselves while instructed and monitored by the human experts in the main center in real-time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on the performance evaluation of container tracking device based on M2M

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3886 KB) |  | HTML iconHTML  

    Tracking device is M2M based Conveyance Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. Tracking device is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/ humidity/ shock sensors. This paper introduces the development trend of tracking device, compares the container device which is developed thru this research and other company's tracking, and introduces tracking System which is designed and established using tracking device. Finally, from our tracking device, we believe that our approach can achieve the security goals driven by the government as well as create new business value for global supply chain participants. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service delivery platform for open IPTV convergence service creation and management

    Page(s): 73 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3836 KB) |  | HTML iconHTML  

    IPTV brought a new digital era in the broadcasting domain. The main change of digital broadcasting is an advent of a bi-directional interactive service feature. Using that bi-directionality, IPTV provides various kinds of convergence service such as information providing, advertisement, and e-commerce. But the number of services required to be developed and to be provided to users geometrically increases and the lifetime of services is shortened requiring services to be developed within a short period. To support the market demand for a massive service delivery, the IPTV platform based on service delivery platform (SDP) is essential. The SDP is a technique developed to meet the variation in communication and information technology convergence environments, allows service providers to rapidly create and deliver convergence services. This paper describes an Open D?TV service delivery platform structure and method for supporting rapid service creation by reusing pre-defined D?TV service components. We describe key components and functionalities of SDP, D?TV Enablers and its combination for service convergence. We show customer targeted mobile advertisement for Open D?TV convergence service example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.