(Back to Session Schedule)

The 23rd International Technical Conference on Circuits/Systems, Computers and Communications

Session G7  Network Systems
Time: 13:00 - 14:30 Wednesday, July 9, 2008
Location: 8F 804 Room
Chairs: Rardchawadee Silapunt (King Mongkut University of Technology, Thailand), Atsushi Ohta (Aichi Prefectural University, Japan)

G7-1 (Time: 13:00 - 13:18)
TitleSpam Traffic Characterization
Author*Jung-Yoon Kim, Hyoung-Kee Choi (Sungkyunkwan University, Republic of Korea)
Pagepp. 961 - 964
KeywordSpam Traffic, Traffic Characterization, Spam, Email
AbstractIn recent years, email traffic has increased in the Internet. However, as the usage of emails has increased dramatically, the amount of spam traffic has increased tremendously too. There are many filters for spam detection and prevention, but most of them are not sufficiently efficient or accurate for use in practical filtering systems. To enhance the efficiency and accuracy of spam filtering, we first need to characterize and analyze the spam traffic. To accomplish this, we first collected spam traffic by capturing the email traffic on the backbone network of Sungkyunkwan University over a period of 24 hours and then classifying it into several categories using various approach levels in order to discover the characteristics and patterns within it. This study forms the basis for research into efficient and accurate spam filtering techniques.

G7-2 (Time: 13:18 - 13:36)
TitleSIDS Monitoring System using the LVQ
Author*Kyung Kwon Jung (Hallym University, Republic of Korea), Kyo Hwan Hyun, Joo Woong Kim, Jung Hoon Oh, Hyung Gook Joh, Ki Hwan Eom (Dongguk University, Republic of Korea)
Pagepp. 965 - 968
KeywordSIDS, tri-axis accelerometer, LVQ
AbstractSudden infant death syndrome (SIDS) is the leading cause of unexplained death of an apparently healthy infant aged one month to one year. This paper presents an infant monitoring system which detects the movement of infants to prevent SIDS. The proposed system is composed of a movement sensing part and a motion detecting part. The movement sensing part uses a tri-axis accelerometer. The motion detecting part is based on the LVQ algorithm. The proposed monitoring system connects to an alarm for alerting a parent when an infant is in a predetermined position. We evaluated the performance of the monitoring system through experiments.

G7-3 (Time: 13:36 - 13:54)
TitleAn MMSE Channel Estimation Algorithm based on the Conjugate Gradient Method for OFDM Systems
Author*Shigenori Kinjo (Japan Coast Guard Academy, Japan)
Pagepp. 969 - 972
KeywordOFDM systems, MMSE channel estimation, Conjugate gradient method
AbstractIn this report, we propose a new scheme in order to implement an MMSE channel estimator for OFDM systems.We know that the time domain maximum likelihood estimator (MSE) can achieve highly accurate impulse response estimation by using a time domain long preamble of an OFDM frame.

G7-4 (Time: 13:54 - 14:12)
TitleOn Verification of Marking-Dependent Terminacy for Data-Flow Program Nets
AuthorShingo Yamaguchi, *Keisuke Komiya, Qi-Wei Ge, Minoru Tanaka (Yamaguchi University, Japan)
Pagepp. 973 - 976
Keyworddata-flow program, program net, terminacy, dead, verification
AbstractIn this paper, we discuss terminacy at the initial marking for (data-flow) program nets. Ge et al. have proposed an algorithm to verify terminacy at any marking, i.e. structurally terminacy. However, there is no algorithm to verify terminacy at the initial marking. In this paper, we give a necessary and sufficient condition to verify the terminacy. Using this condition, we construct a polynomial time algorithm for a subclass of program nets. We also show that the problem to verify the terminacy for general program nets is undecidable.

G7-5 (Time: 14:12 - 14:30)
TitleConstruction of Petri Nets and Calculation of Elementary T-invariants for Multi-stage-Encryptions Public-Key Cryptography: MEPKC
Author*Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi University, Japan)
Pagepp. 977 - 980
Keywordpublic-key cryptography, MEPKC, key generator, Petri net, elementary T-invariant
AbstractThis paper aims at automatically generating Petri nets that are used as key generator of a public-key cryptography MEPKC. MEPKC is different from general public-key cryptography, which opens a key-generator to the public and uses the elementary T-invariants as the encryption keys to repeatedly encrypt a plain text stage by stage, and so that the its security can be as strong as expected. The Petri net used as a key generator must include a lot of elementary T-invariants, and the creator of the Petri net must be able to grasp all the elementary T-invariants. In this paper, we propose a method of generating Petri nets whose complexity is enough to be a key generator and obtaining all its the elementary T-invariants.