Notice
There is currently an issue with the citation download feature. Learn more

2017 19th International Conference on Advanced Communication Technology (ICACT)

19-22 Feb. 2017

Filter Results

Displaying Results 1 - 25 of 222
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (725 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2017, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Objectives

    Publication Year: 2017, Page(s):iii - xiv
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • Reviewer lists

    Publication Year: 2017, Page(s):xv - xxii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Outstanding Paper lists

    Publication Year: 2017, Page(s):xxiii - xxvi
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Session overview

    Publication Year: 2017, Page(s):xxvii - xxviii
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Tutorial: Web hacking & defensing — Web hacking is nothing more than the skill of this century!

    Publication Year: 2017, Page(s):xxix - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB)

    We all know that Web hacking is nothing more than the skill of this century. So what does it means? It means that not everyone can get that skill. So you can see how privileged is to know Web hacking, in other hands its just like a sport, some are born with the talent, some have to practice a lot to get the necessary skills. The reason why a lot of newbies and non-professional hackers fail to get ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2017, Page(s):i - xxii
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE
  • Web hacking & defensing

    Publication Year: 2017, Page(s):1 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (17522 KB)

    Presents a collection of slides covering the following: Web protocol; Web log; and Web hacking tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end (e2e) Quality of Service (QoS) for IPv6 video streaming

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    With continuous progress and advances in Internet Technology (IT) devices like smart mobiles, tablets and laptops, an increasing demand for real time applications have emerged. Reliable Quality of Service (QoS) mechanism over IPv6 for video streaming is required. New advances resulted in huge real time traffic on the internet and a reliable (QoS) mechanism has become an urgent need to meet the req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating frequency improvement on FPGA implementation of a pipeline large-FFT processor

    Publication Year: 2017, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    In this paper, circuit complexity reduction in FPGA implementation of large N-point Radix-22 FFT with single-path delay feedback architecture is reported. Memory requirement of the FFT in the FPGA consists of two parts, the RAM data storage of the feedback in each stage of the data flow and the twiddle factors prepared as ROM for each complex multiplication. Through address rearrangemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trade-Off between spectral efficiency and energy efficiency in multi-cell uplink networks

    Publication Year: 2017, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    In this paper, we investigate the effect of user scheduling and transmit power control on trade-off between spectral efficiency and energy efficiency in multi-cell uplink networks. We assume that each user adaptively controls the transmit power according to its generating interference to other cell base stations (BSs) and each BS schedules the user having the largest effective channel gain among u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the spectral analysis of discrete-time faster-than-nyquist signaling

    Publication Year: 2017, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    The main purpose of the FTN signaling is to increase data rate without using additional bandwidth or transmission power. To analyze system characteristics of the FTN-based system, such as system capacity, there have been some studies on the power spectral density (PSD) of the FTN signaling. The present study analyzes the PSD characteristics of a discrete-time model of the FTN signaling, and compar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand anchor-based mobility support method for named data networking

    Publication Year: 2017, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    Addressing producer mobility in a Named Data Networking (NDN) is one of the challenging issues in the wireless network, which causes content unreachability problem and may impede overall quality of service. To cope with this, intermediate NDN routers have to update the forwarding information of content request toward a new position of a producer as reactive as possible. Several researchers have co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking of feature selection method for room-level localization using public APs

    Publication Year: 2017, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    As WiFi infrastructures and smartphones are propagated widely various WiFi fingerprint-based indoor localization system has been proposed. One of the approaches to improve the accuracy is the feature selection method that analyse the characteristics of WiFi RSSI and construct fingerprint database. However, none of the previous studies analysed about the number of features selected despite the fact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient ILACS control algorithm for intelligent LED indoor lighting system

    Publication Year: 2017, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    In this paper, we propose an efficient Indoor Light Automatic Control System (ILACS) control algorithm for intelligent LED indoor lighting systems. The proposed ILACS control algorithm includes elements such as daylight intensity measured through a PIR sensor and an illuminance sensor at lighting style by a defined schedule and occupancy detection. This algorithm controls lighting through a wirele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-supervised radio signal identification

    Publication Year: 2017, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1341 KB) | HTML iconHTML

    Radio emitter recognition in dense multi-user environments is an important tool for optimizing spectrum utilization, identifying and minimizing interference, and enforcing spectrum policy. Radio data is readily available and easy to obtain from an antenna, but labeled and curated data is often scarce making supervised learning strategies difficult and time consuming in practice. We demonstrate tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless monitoring method for diabetic foot temperature

    Publication Year: 2017, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB) | HTML iconHTML

    This work presents a wireless monitoring method for diabetic foot temperature. In the implementation we used an FLIR infrared camera, a BME280 temperature sensor and an embedded board. Our final suggestion is prototype of the wireless monitoring device of diabetic foot temperature and its mobile application for the smart devices such as wearable device, mobile phones, smart watches, tablets and pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A medium access control for the infraless peer aware communication networks

    Publication Year: 2017, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    In this paper, the peer aware communication (PAC) network is introduced as an infraless area network which supports peer group communication for the low power wireless devices. For providing efficient synchronized group communication, the PAC MAC superframe is suggested. To avoid interference among neighboring peer groups implicitly and to support the variety of required quality of peer group serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network abnormal behaviour analysis system

    Publication Year: 2017, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    As cyber attacks have increased in recent years, network forensics, which collects and analyses network packets as well as digital forensics, has been studied. However, high-speed networks such as 1 or 10 Gbps networks have many network flows. For example, a 1 Gbps network has hundreds of millions of network flows per day. Analysing network traffic in this situation is very difficult and time-cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive honeypot configuration, deployment and maintenance strategy

    Publication Year: 2017, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Since honeypots first appeared as an advanced network security concept they suffer from poor deployment and maintenance strategies. State-of-the-Art deployment is a manual process in which the honeypot needs to be configured and maintained by a network administrator. In this paper we present a method for a dynamic honeypot configuration, deployment and maintenance strategy based on machine learnin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the security of two sealed-bid auction schemes

    Publication Year: 2017, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    In this paper, we cryptanalyze two sealed-bid auction schemes and show that both schemes are not secure against the known-bid attack. In the first scheme, we show that a dishonest sealer can swap the price of a sealed-bid and yet its validity remains intact; in the second scheme, we show that a dishonest auctioneer can forge a bidder's bid if the bidder was once a winning bidder. We propose a work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LTE for military communication — Business models and vulnerabilities

    Publication Year: 2017, Page(s):64 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    This document outlines security issues concerning military use of LTE. It illustrates implications of different business models, and outlines vulnerabilities that decision makers should be aware of in order to protect the assets; user payload, metadata and network availability. The article shows that control of base stations has a major security impact. Roaming further increases the vulnerability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.