{"title":"Aspects related to geo localization based on mobiles' measurements in WCDMA wireless networks","authors":"Irina Cotanis, Le Le","doi":"10.1109/ICCNC.2012.6167556","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167556","url":null,"abstract":"The launch of smart phones and the myriad of 3G services that they support require that mobiles' geo-location in wireless networks go beyond service localization, emergency call service, and home location billing. Operators aiming for more and more cost efficient network operations need to consider mobiles' positioning for UTRAN internal utilization such as location-assisted handover as well as for network optimization and troubleshooting such as dropped and blocked calls/sessions and detection of coverage holes. The paper gives a brief overview of geo-location techniques generally used in mobile networks and proposes a solution suitable for mobiles' positioning in WCDMA networks based on phone measurements. The paper discusses aspects related to the characteristics of geo-location in the context of the wireless environment, particularly WCDMA, and the challenges imposed on the calculation of the mobile geo-location estimate. The paper discusses how a proposed solution based on the phone's measurements solves the WCDMA challenges. and what are the achieved performances.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDoS discrimination by Linear Discriminant Analysis (LDA)","authors":"Theerasak Thapngam, Shui Yu, Wanlei Zhou","doi":"10.1109/ICCNC.2012.6167480","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167480","url":null,"abstract":"In this paper, we propose an effective approach with a supervised learning system based on Linear Discriminant Analysis (LDA) to discriminate legitimate traffic from DDoS attack traffic. Currently there is a wide outbreak of DDoS attacks that remain risky for the entire Internet. Different attack methods and strategies are trying to challenge defence systems. Among the behaviours of attack sources, repeatable and predictable features differ from source of legitimate traffic. In addition, the DDoS defence systems lack the learning ability to fine-tune their accuracy. This paper analyses real trace traffic from publicly available datasets. Pearson's correlation coefficient and Shannon's entropy are deployed for extracting dependency and predictability of traffic data respectively. Then, LDA is used to train and classify legitimate and attack traffic flows. From the results of our experiment, we can confirm that the proposed discrimination system can differentiate DDoS attacks from legitimate traffic with a high rate of accuracy.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal placement of multiple visual sensors using simulation of pedestrian movement","authors":"Yunyoung Nam, Sangjin Hong","doi":"10.1109/ICCNC.2012.6167509","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167509","url":null,"abstract":"This paper present an optimal camera placement method that analyzes a spatial-temporal model and calculates priorities of spaces using simulation of pedestrian movement. In order to cover the space efficiently, we accomplished an agent-based simulation based on classification of space and pattern analysis of moving people. We have developed an agent-based camera placement method considering camera performance and space utility extracted from a path finding algorithm. We demonstrate that the method not only determines the optimal number of cameras, but also coordinates the position and orientation of the cameras with considering the installation costs. To validate the method, we show simulation results in a specific space.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizing top user behavior of Sina microblogging in the context of different events","authors":"Yubao Zhang, Hui Wang, Zhihong Jiang, Pei Li","doi":"10.1109/ICCNC.2012.6167462","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167462","url":null,"abstract":"Extremely popular and commonly adopted microblogging service is not only a new form of communication, but also seen as a place for ”fueling” viral marketing. Due to essential openness and growing ubiquity, microblogsphere offers ways to manipulate the trending topics, through arranging a number of ”messengers” who send messages and make a push on maximizing influence propagation. In this paper, we present an initial study on quantifying and characterizing the events referring to viral campaigns launched in microblogsphere. Our study is based on two independent data sets, one corresponds to an event referring to viral campaign and the other can be considered as not planned. We examine collectively dynamic response of the event referring to viral campaign, in comparison with the event not planed. We find the event referring to viral campaign exhibits different evolving pattern from the other event. Top users with extremely high yield of microblogs in the event referring to viral campaign has been proven to account for the exceptional pattern of dynamic response. We further investigate the individual dynamic response and calculate the centrality of top users for quantitative characterization of these users. This work aims to suggest insights into the evolving of events referring to the viral campaign launched in microblogsphere and the behavior pattern of top users in these events who may dominate the event evolving.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RocketTC: A high throughput traffic classification architecture","authors":"Zhou Zhou, Tian Song, Wen-Fei Fu","doi":"10.1109/ICCNC.2012.6167454","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167454","url":null,"abstract":"Real-time traffic classification is becoming increasingly critical for network management, traffic engineering, and network security. Current software-based solutions, however, have difficulties dealing with a great number of flows in today's high-speed networks. This paper proposes RocketTC, a scalable FPGA-based architecture, to accelerate traffic classification while maintaining high accuracy. It combines two significant elements: (1) an efficient flow management scheme using on-chip BRAMs for storing the flow table, and (2) a parallel and pipelined classification engine array with partial dynamic reconfiguration (PDR) on FPGA. We have implemented and evaluated RocketTC on Xilinx Virtex-5 FPGA based platform. Our results show a sustained throughput of over 20 Gbps for minimum packet size of 40 bytes, and high accuracy above 97% for classifying nearly a hundred popular applications. Additionally, it is easy for RocketTC to update more application types.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation and scheduling in cloud computing","authors":"E. Elghoneimy, O. Bouhali, H. Alnuweiri","doi":"10.1109/ICCNC.2012.6167434","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167434","url":null,"abstract":"Cloud computing is a platform that hosts applications and services for businesses and users to accesses computing as a service. In this paper, we identify two scheduling and resource allocation problems in cloud computing. We describe Hadoop MapReduce and its schedulers, and present recent research efforts in this area including alternative schedulers and enhancements to existing schedulers. The second scheduling problem is the provisioning of virtual machines to resources in the cloud. We present a survey of the different approaches to solve this resource allocation problem. We also include recent research and standards for inter-connecting clouds and discuss the suitability of running scientific applications in the cloud.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An autonomic plane for Wireless Body Sensor Networks","authors":"G. Fortino, Stefano Galzarano, A. Liotta","doi":"10.1109/ICCNC.2012.6167566","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167566","url":null,"abstract":"Wireless Body Sensor Networks (WBSN) have proved to be a potential technology for developing applications that can monitor and control physical and biochemical parameters on the human body. Developing such applications is rather cumbersome, since these have to meet a combination of conflicting requirements. Achieving accuracy, efficiency, correctness, fault-tolerance, adaptability and reliability on WBSN is tricky because these features have to be provided beyond the design/implementation phase, notably at execution time. In this paper we explore the viability and convenience of autonomic computing in the context of WBSNs. In particular, we propose to extend a conventional WBSN framework with an autonomic plane, a way for separating out the provision of self-* properties from the WBSN application logic. This separation of concerns leads to an ease of deployment and run-time management of new applications. We study this approach in the context of SPINE2 framework, showing how this can be readily enhanced with an autonomic layer. We find that this enhancement brings not only considerable functional improvements but also measurable performance benefits.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth estimation and rate adaptation in HTTP streaming","authors":"Bing Zhou, Jingyuan Wang, Z. Zou, Jiangtao Wen","doi":"10.1109/ICCNC.2012.6167520","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167520","url":null,"abstract":"HTTP Streaming is one type of video streaming technology, delivering multimedia data using HTTP/TCP. Due to the strict boundaries between layers of the OSI communication model, HTTP Streaming client at the Application Layer can only see the bandwidth that TCP at the Transport Layer supplies. How to estimate the upcoming bandwidth in the future according to the bandwidth history HTTP Streaming client has seen is the first problem this paper wants to address. Since the network bandwidth represents the data producing rate for the media player at the client and the media bitrate represents the data consuming rate of the media player, the quality of user experience of HTTP Streaming would be at a low level, if there is mismatch between the network bandwidth and the media bitrate. How to make rate adaptation for HTTP Streaming system based on the bandwidth estimation results is the second problem this paper wants to address. From the experimental results, we can see our bandwidth estimation and rate adaptation algorithm proposed to tackle the above two problems can provide a better enhancement for the prevalent HTTP Streaming system, comparing with the rate adaptation algorithm using common throughput smoothing strategy.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and analysis of a solar powered wireless sensor node","authors":"Hengzhao Yang, Y. Zhang","doi":"10.1109/ICCNC.2012.6167570","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167570","url":null,"abstract":"A wireless sensor node powered by solar energy is modeled and analyzed. The sensor node consists of six components: solar panel, maximum power point tracker, input stage, supercapacitor, output stage, and load. The components are either modeled using equivalent circuits or characterized by behavior defining parameters. The sensor node model is first simulated and analyzed using a typical solar radiation and a fixed load current. Results show that these component models capture their characteristics. Two supercapacitor models, the variable leakage resistance model and the energy iteration equation model, are compared within the sensor node model. Their potential impacts on sensor node operation are investigated.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regenerator allocation for scheduled lightpath demands in translucent optical networks","authors":"Ying Chen, A. Jaekel","doi":"10.1109/ICCNC.2012.6167430","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167430","url":null,"abstract":"Physical layer impairments limit the maximum distance a signal can travel in the optical domain in wavelength-routed optical networks. In translucent optical networks, regenerators are made available at certain nodes, so long-haul lightpaths can undergo signal regeneration, if needed. A number of different routing and wavelength assignment (RWA) techniques for translucent networks have already been proposed in the literature, for both static and dynamic traffic. However, such techniques fail to exploit the resource sharing capabilities inherent in the scheduled traffic model (STM). Recent research has clearly established the advantages of holding-time-aware strategies for resource allocation of such scheduled (periodic) lightpath demands. In this paper, we propose a new and efficient integer linear program (ILP) based formulation for resource allocation of scheduled lightpath demands in translucent optical networks. To the best of our knowledge, this is the first holding-time-aware approach that allows optimal sharing of regenerators and other resources among non-overlapping demands to obtain a cost-effective solution. Simulation results indicate it is possible achieve significant improvements compared to existing techniques that do not consider such resource sharing.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}