By Topic

2015 17th International Conference on Advanced Communication Technology (ICACT)

1-3 July 2015

Filter Results

Displaying Results 1 - 25 of 198
  • Designing a multi-agent model using BDI architecture for population dynamics

    Publication Year: 2015, Page(s):448 - 453
    Request permission for commercial reuse | PDF file iconPDF (1323 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (254 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2015, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (718 KB) | HTML iconHTML
    Freely Available from IEEE
  • Objectives

    Publication Year: 2015, Page(s):iii - xi
    Request permission for commercial reuse | PDF file iconPDF (697 KB)
    Freely Available from IEEE
  • Reviewer lists

    Publication Year: 2015, Page(s):xii - xviii
    Request permission for commercial reuse | PDF file iconPDF (680 KB)
    Freely Available from IEEE
  • Outstanding paper lists

    Publication Year: 2015, Page(s):xix - xxiii
    Request permission for commercial reuse | PDF file iconPDF (752 KB)
    Freely Available from IEEE
  • Session overview

    Publication Year: 2015, Page(s):xxiv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (756 KB)
    Freely Available from IEEE
  • Plenary keynote speechs

    Publication Year: 2015, Page(s):xxvii - xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (941 KB)

    Provides an abstract for each of the plenary presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2015, Page(s):i - xvi
    Request permission for commercial reuse | PDF file iconPDF (832 KB)
    Freely Available from IEEE
  • Lattice-reduction aided soft-output detector for spectrally efficient FDM system

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1527 KB) | HTML iconHTML

    In this paper, we propose the lattice-reduction (LR) aided soft-output detector in conjunction with channel decoder for spectrally efficient frequency division multiplexing (SE-FDM) system. The SE-FDM system can increase spectral efficiency by overlapping the subcarrier closer than the orthogonality condition, but result in inter-carrier-interference (ICI) at receiver. Thus, we utilize the LR-aide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing performance of adaptive duty cycle scheduling algorithm and attribute based efficient data delivery for code dissemination in multihop wireless sensor network

    Publication Year: 2015, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (837 KB) | HTML iconHTML

    In this paper, we have analyzed the performances of two designed algorithms which are an integral part of our research to formulate more energy efficient Code Dissemination Protocol for Multihop Wireless Sensor Network to provide the facility of reprogramming in order to support energy efficient over-the-air software updates in sensor, to set new functionalities or features, patch errors in the so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical eNB off/on based energy saving scheme for real LTE networks

    Publication Year: 2015, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB) | HTML iconHTML

    In this paper, a low-complexity practical energy saving algorithm by switching off/on some eNBs in a real dense urban scenario considering historical and real-time eNB load is proposed. First, eNBs are ranked according to their loads in an ascending order and the first eNB in the list with load decreasing and smaller than a low threshold is pre-selected as target switching off cell. Then, the effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic-aware data delivery strategy for vehicular ad hoc networks

    Publication Year: 2015, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (861 KB) | HTML iconHTML

    Vehicular Ad Hoc Network (VANET) is an emerging class of wireless network that operates in a vehicular environment to provide communication between vehicles. VANET can be used by wide variety of applications to improve road safety, traffic efficiency and driving comfort. With the high dynamic nature of this network, communication linkage among vehicles in the environment suffers from link-breakage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-band full-duplex wireless powered communication networks

    Publication Year: 2015, Page(s):23 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (947 KB) | HTML iconHTML

    In this paper, we consider wireless powered communication network (WPCN) in which a hybrid access point (H-AP) and user equipments (UEs) all operate in in-band full-duplex (IFD) mode. FD ability of UE allows it to harvest energy from the received energy while it transmits information in uplink (UL) at the same time, as well as that of the H-AP allows it to broadcast energy in the downlink (DL) whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous sensor networks in the heterogeneous LTE network

    Publication Year: 2015, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (765 KB) | HTML iconHTML

    The introduction of a broad concept of the Internet of Things, together with the development of LTE systems (Long Term Evolution) raises a number of new challenges for the integration of resources of self-organizing networks and traffic management in LTE. The article investigates the possibilities of increasing in the residual energy and the duration of the life cycle of a sensor network by provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent bio-inspired algorithms for wireless sensor network design

    Publication Year: 2015, Page(s):33 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1921 KB) | HTML iconHTML

    The process of designing a wireless sensor network (WSN) is rather complicated. This process is not formalized in the form of a hard set of rules, algorithms and standards that guarantee the construction of WSN satisfying different requirements of the designer. This paper discusses the problem of constructing a WSN structure. In the proposed functional diagram of the WSN design we can allocate the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UHF RFID-based TV home shopping logistics system design and implementation

    Publication Year: 2015, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1226 KB) | HTML iconHTML

    The logistics of TV home shopping is operated by selling products through TV broadcasting after receiving all the products from suppliers. If orders from customers are complete, the products ordered are shipped to customers from the distribution center. However, many problems such as the products being delivered to other people or shortage in quantity occur due to picking errors and receiving/ship... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy harvesting techniques for low power RF sensors

    Publication Year: 2015, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (865 KB) | HTML iconHTML

    This paper presents the research conducted and the progress achieved in the design and implementation of the low cost Energy Harvesting System for low power remote RF Sensor applications. In this implementation, conventional battery is replaced with a super-capacitor which is charged by DC voltage harvested out of RF EM waves. The Friis equation was used to evaluate free space losses in RF Energy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secret handshake scheme for mobile-hierarchy architecture based underground emergency response system

    Publication Year: 2015, Page(s):54 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB) | HTML iconHTML

    Wireless Sensor Networks (WSNs) is one of the most important solutions for emergency applications, such as fire, flood and volcano monitoring, especially underground disasters. In this paper, we propose a mobile-hierarchy WSN architecture for underground emergency response system and a secure handshake scheme for the mobile-hierarchy architecture. In the discussions, the proposed secret attribute ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of darknet traffic characteristics between darknet sensors

    Publication Year: 2015, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4412 KB) | HTML iconHTML

    Today, Internet is incessantly attacked by wide variety of network-based threats. One of the ways to monitor or identify such prevailing threats is to monitor incoming traffic to unused network addresses popularly known as darknet and often also referred with various other names like network telescope or black hole. As, all the traffic arriving at darknet is mainly the result from malicious probin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Denoising of Stego-images for different noise models

    Publication Year: 2015, Page(s):65 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1666 KB) | HTML iconHTML

    Steganography plays an important role in secret communication systems, however the main drawbacks in Stego-images are presence of noise and degradation during acquisition or transmission. In this paper different noise models, including additive and multiplicative types, are studied They include Gaussian noise, salt and pepper noise and speckle noise. The criterion of noise removal problem depends ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-supervised model for network traffic anomaly detection

    Publication Year: 2015, Page(s):70 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1386 KB) | HTML iconHTML

    Network traffic anomaly detection can help to early detect network attacks because hacker's activities may result in unusual changes of network traffic, that are significant fluctuations compared to normal traffic of the network Among various anomaly detection approaches, principal component analysis (PCA) has been seen as an effective solution. Until now, PCA is basically applied to dimension red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method for partial recovering source code of telecommunication devices for vulnerability search

    Publication Year: 2015, Page(s):76 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    The article describes a automated method for searching of low level and medium level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. Typical vulnerabilities in source code and algorithms for its search is given. There is forecast to develop methods and utilities in the near future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standard development considerations of common alerting service for digital signage

    Publication Year: 2015, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    It is very important to provide common alerting information in the digital signage terminal. Common alerting information can be such as severe thunderstorm warning information, earthquake report information, child abduction warning, and so on. In this paper, we described the standard development considerations of common alert functionality to provide common alerting event which is produced from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.