{"title":"A novel gossip-based multirate overlay multicast strategy","authors":"Yanheng Wei, Junyi Wang, Zhishuai Gong","doi":"10.1109/ICT.2014.6845107","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845107","url":null,"abstract":"Overlay multicast is an efficient communication scheme for multipoint communication applications. This paper focuses on the transmission isolation and unbalanced load allocation problems of multi-rate multimedia transmission over embedded overlay topology where multicast receivers in the same session request service at different rates commensurate with their requirements. We propose a novel data distribution scheme by adopting gossip algorithm to overcome the transmission isolation problem via implementing cross-layer data transmission. More leaf members are involved in the data distribution process to share load stress for cluster leaders leading to more balanced data distribution structure. Simulation results show that gossip-based protocol, without transmission isolation, can reasonably build and maintain a more balanced overlay topology than the traditional multicast protocol.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130370060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink cognitive interference alignment for heterogeneous networks","authors":"S. Ali, D. Castanheira, Adão Silva, A. Gameiro","doi":"10.1109/ICT.2014.6845115","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845115","url":null,"abstract":"The deployment of small-cells along a macro-cell is considered to be an effective solution in order to increase the capacity and offload the traffic from the macro-cell system. In current heterogeneous configuration with large number of deployments, it is likely that the small-cells will coexist with macro cells over the same spectrum as additional spectrum licenses are difficult and expensive to acquire. The coexistence of these cells leads to considerable interference between the two systems. In this context, we propose an underlay downlink cognitive interference alignment approach in order to remove both the interference from small-cells to the macro-cell system and from macro-cell to the small-cells. In the proposed scheme the small-cells sense the unused resources in the space dimension of the macro-cell and then communicate without interfering with the macro-cell system. The simulation results show that the secondary system does not affect the performance of primary system. The proposed scheme also provides close to optimal performance with minor overheads.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128791309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nothing can compare with a population, besides agents","authors":"Yann Busnel","doi":"10.1109/ICT.2014.6845151","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845151","url":null,"abstract":"Leveraging the resemblances between two areas explored so far independently enables to provide a theoretical framework for distributed systems where global behaviors emerge from a set of local interactions. The contribution of this paper arise from the observation that population protocols and multi-agent systems (MAS) bear many resemblances. Particularly, some subclasses of MAS seem to fit the same computational power than population protocols. Population protocols provide theoretical foundations for mobile tiny device networks. On the other hand, from long-standing research study in distributed artificial intelligence, MAS forms an interesting model for society and owns a broad spectrum of application field, from simple reactive system to social sciences. Linking the both model should offers several extremely interesting outcomes.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"De Bruijn sequences as Zero Correlation Zone codes for satellite navigation systems","authors":"Mahdiyar Sarayloo, E. Gambi, S. Spinsante","doi":"10.1109/ICT.2014.6845111","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845111","url":null,"abstract":"This paper discusses the possible application of an innovative set of binary sequences, the De Bruijn ones, as spreading codes in satellite navigation systems. Binary De Bruijn sequences feature inherent Zero Correlation Zone property, that may be effectively exploited to strongly limit the impact of multi-path and interference. Simulation results are presented, referred to span 5 De Bruijn sequences, to show the orthogonality and correlation-related properties of these codes, that may properly fit the requirements of satellite based navigation systems.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On adaptive live streaming in mobile cloud computing environments with D2D cooperation","authors":"Geng Xi, Xiaoyi Zhang, Kaiming Qu","doi":"10.1109/ICT.2014.6845148","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845148","url":null,"abstract":"The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming services over the mobile networks. Leveraging the mobile cloud computing and wireless Device to Device (D2D) technology, we propose and discuss a framework to improve the quality of video services in a special scenario that adjacent mobile devices desire to synchronously receive a live content stream. Traditionally, these devices are competitors to the expensive and variation server to device interfaces, even they request for the same live stream. The proposed cloud-based live stream server will improve the Dynamic Adaptive streaming over HTTP (DASH) service by computing and transcoding the original stream segment according to the accumulated bandwidth of the devices' group, then divide the trans-coded stream segment into fragments for each device to fetch. After the devices received the fragments, every device can get the whole segment by exchanging the fragments through the free short-range D2D interface. This mechanism could provide higher resolution live streaming with less expense by the cooperation among adjacent mobile devices. The Quality of Experience (QoE) and network utilization will also be improved. We present the scheme in details and our implementation on Android smart-phones to testify the performance.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131056451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Muhamud-Kayat, M. Ali, Mohd Khairul Mohd Salleh, M. H. M. Rusli
{"title":"Reconfigurable gap-coupled back-to-back truncated rhombus-like slotted patch antenna with steerable beams","authors":"S. Muhamud-Kayat, M. Ali, Mohd Khairul Mohd Salleh, M. H. M. Rusli","doi":"10.1109/ICT.2014.6845135","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845135","url":null,"abstract":"The paper presents an innovative antenna structure by incorporating a reconfigurable planar array antenna with parasitic elements, in which it comprises of two truncated rhombus-like slotted patch antennas in back-to-back configuration. The antenna emphasizes on these two design elements: slotted patch and parasitic elements to reconfigure its frequency and radiation pattern, respectively. On top of that, the deployment of an aperture coupling technique which separates feed network from the antenna radiating elements help to reduce spurious effects from the feed work. The main focus of this work is to design a reconfigurable antenna structure that is capable of operating at two different frequencies with steerable beams. In other words, both frequency and radiation pattern can be reconfigured by using the same antenna. A `state-of-the-art' design of rhombus-like slotted patch with truncated edges is also introduced in this paper. The integration of PIN diodes as RF switches with the feed network and parasitic elements enables the antenna to activate at two different frequencies with six different steerable beam directions at each frequency mode, F1=5.3GHz (0°, 10°, 170°, 180°, 190° and 350°) and F2=5.9GHz (0°, 20°, 160°, 180°, 200° and 340°). Both simulation and measurement results are presented and they agree well to each other. The antenna is compatible to be embedded with other mobile devices owing to its small and compact size. Furthermore, it has the potential to be applied in multiple applications based on 5.3GHz and 5.9GHz bands.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of DNSsec Delegation Signatures","authors":"F. Kammüller","doi":"10.1109/ICT.2014.6845127","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845127","url":null,"abstract":"In this paper, we present a formal model for the verification of the DNSsec Protocol in the interactive theorem prover Isabelle/HOL. Relying on the inductive approach to security protocol verification, this formal analysis provides a more expressive representation than the widely accepted model checking analysis. Our mechanized model allows to represent the protocol, all its possible traces and the attacker and his knowledge. The fine grained model allows to show origin authentication, and replay attack prevention. Most prominently, we succeed in expressing Delegation Signatures and proving their authenticity formally.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint relay transmit-receive antenna selection and opportunistic source selection strategy for full-duplex relaying","authors":"Rongsheng Li, Hui Gao, Wei Long, Tiejun Lv","doi":"10.1109/ICT.2014.6845076","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845076","url":null,"abstract":"In this paper, we investigate a cooperative relay network where two users exchange messages through a full-duplex relay. A joint relay transmit-receive antenna selection and opportunistic source selection (RAS-OSS) strategy is proposed to improve the performance of the full-duplex relay network, when the roles of the antennas at the full-duplex relay are not predefined. Both of the amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered at the relay. Asymptotic approximations of average transmission rate and outage probability are derived to evaluate the performance of the network when the RAS-OSS strategy is adopted. Both analytical and numerical results reveal that the asymptotic approximations are tight in high signal-to-noise ratio regime and the RAS-OSS strategy improves the performance of the network under both AF and DF protocols.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-phase Device-to-Device relay algorithms for data dissemination in a cluster","authors":"Junyi Wang, Zhishuai Gong, Yanheng Wei","doi":"10.1109/ICT.2014.6845108","DOIUrl":"https://doi.org/10.1109/ICT.2014.6845108","url":null,"abstract":"In cellular networks, Device-to-Device (D2D) links can be utilized for data dissemination via unicast or/and multicast within a cluster. For traditional D2D relay schemes, D2D links with poor channel conditions may be the bottleneck and result in conservative resource utilization. Therefore, we suggest preferentially selecting the good quality D2D links with high achievable data rates, which induces multi-phase transmissions. Such selective transmissions require us to pre-define a data rate threshold. Obviously, a larger threshold leads to more phases, which is harmful to efficient resource utilization. Hence, there is a tradeoff in selecting the data rate threshold. In the paper, we gradually design three rules to set the threshold and accordingly propose three D2D relay schemes, which can adaptively select the optimal relays, routing and number of phases according to the D2D links quality and our pre-defined thresholds. Simulation results show that our proposed schemes, in turn, yield ascending gains in terms of resource utilization and the best of them achieves a significant resource efficiency compared to the existing single-phase schemes.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"92 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ratasuk, Yanji Zhang, Du Lei, N. Mangalvedhe, Amitava Ghosh
{"title":"Coverage enhancement for M2M communications using LTE","authors":"R. Ratasuk, Yanji Zhang, Du Lei, N. Mangalvedhe, Amitava Ghosh","doi":"10.1109/ICT.2014.7575093","DOIUrl":"https://doi.org/10.1109/ICT.2014.7575093","url":null,"abstract":"With the widespread deployment of LTE 4G systems and large number of connected devices due to the Internet of Things, M2M services using LTE is under consideration by many cellular operators. To provide ubiquitous network coverage for M2M services, 3GPP will introduce coverage enhancement feature in Rel-13. In this paper we analyze features which will extend the range of an LTE system by up to 15dB. Performance analysis at both link and system levels will also be provided. We'll show that 15 dB coverage enhancement is feasible. The impact of this feature to system capacity depends on the fraction of UEs requiring coverage enhancement and their respective coverage shortfall.","PeriodicalId":154328,"journal":{"name":"2014 21st International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}