A. Ghavidel, Roghich Karimzadeh Baee, E. Mehrshahi
{"title":"High Efficient Millimeter Wave Rectangular Cavity Power Combiner/Divider","authors":"A. Ghavidel, Roghich Karimzadeh Baee, E. Mehrshahi","doi":"10.1109/ISNCC.2019.8909136","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909136","url":null,"abstract":"This work reports a highly efficient millimeter waves power combiner/divider using rectangular cavity with two coaxial ports as input and a rectangular waveguide port as output. Input ports (with different electrical-lengths) are implemented to excite the rectangular cavity. A septum is placed in the middle of the cavity to achieve isolation. It operates at frequency ranges 38.4 to 40.2 GHz with 15dB return loss at ports and 20dB isolation between input ports, and insertion loss of 3.1dB. Combining efficiency is estimated about 97 percent. The power combiner performance demonstrates that it has the potential to implement in the upcoming millimeter-wave transmitters.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121703232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blockchain Smart ContractApplication Framework","authors":"A. Mendi, Tolga Erol, Emre Safak, Tolga Kaym","doi":"10.1109/ISNCC.2019.8909194","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909194","url":null,"abstract":"Blockchain is an emerging technology which gained popularity with Bitcoin, which is the most famous application of that technology. After Bitcoin became popular, new usage areas of Blockchain was started to being investigating because of the advantage of the technology such as security, agentless transaction, and transparency. HAVELSAN is a large scale software company, investigates on new generation technologies and works on to adapt it. In this manner, Blockchain is one of these new generation technologies that brings impressive advantages. Blockchain is a decentralized transactional database technology in which all transactions are encrypted on blocks, allowing the buyer and seller to make a secure exchange between themselves directly. In this transactional database technology, all transactions are recorded in a structure called “Distributed (Open) Ledger”, where transactions are held and open to all users. In the traditional approach (central database), when the database is controlled by a third party, the copy of the database in the Blockchain approach is available to all participants. This prevents the data from being corrupted and destroyed. In order to be able to modify this distributed structure, the relevant changes must be recorded on all computers in the system. The success of any type of cyber attack becomes impossible because of the necessity of accepting changes in the vast majority of the network. Smart Contract is a key concept of Blockchain in order to gather all these advantages. Smart Contracts not only define the rules and penalties around an agreement in the same way that a traditional contract does, but also automatically enforce those obligations. HAVELSAN is a large scale software company that has wide range of operation field, so there could be different applications of Blockchain with regard to company operation fields. Combining this variety with the importance of Smart Contract concept, which could be counted as the basis for most Blockchain applications, it is beneficial to establish a strong based Smart Contract frame before starting to build our own applications with Blockchain. Therefore, we aimed to build our customized Smart Contract structure before developing miscellaneous applications. In this article, HAVELSAN Blockchain Smart Contract framework establishment; which infrastructures were used, the problems encountered during the development and the most applicable way of use this framework will be explained.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131923476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Wavelet Packet Modulation for Wireless Digital Communications","authors":"M. R. Effendi, T. Mengko, A. Gunawan, A. Munir","doi":"10.1109/ISNCC.2019.8909167","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909167","url":null,"abstract":"In recent years, the efficient modulation is an essential parameter for digital communications. One of modulation systems which offers bandwidth efficiency is Orthogonal Wavelet Division Multiplexing (OWDM) system. This paper deals with the performance evaluation of wavelet packet modulation for wireless digital communications in the presence of additive white Gaussian noise (AWGN) and frequency selective fading with Rayleigh distribution. The implementation of wavelet packet modulation with $M$ -ary phase shift keying (PSK), called as $M$ -ary PSK OWDM, is proposed to achieve high performance of modulation with bandwidth efficiency. As comparison, the performance of $M$ -ary PSK Orthogonal Frequency Division Multiplexing (OFDM) is also conducted in similar channel circumstances. The result shows the use of wavelet packet modulation could significantly improve bit error rate (BER) compared to $M$ -ary PSK OFDM system.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fair and Privacy-preserving Reservation Scheme for Charging Electric Vehicles","authors":"Khaled Rabieh, A. Aydogan","doi":"10.1109/ISNCC.2019.8909163","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909163","url":null,"abstract":"Enormous benefits are expected from Electric Vehicle (EV) which is a promising alternative to replace traditional gasoline car. However, the EV's cruising range is much shorter than the range offered by gasoline cars. Congestion at the charging stations is expected not only because of the frequent charging demands of EVs, but for the long time of charging batteries as well. In this paper, we propose a privacy-aware and fair reservation scheme for EVs charging scenarios. The drivers submit their reservation requests to the charging stations anonymously to protect their location privacy. To achieve fairness, a selfish driver should not be able to submit/authenticate many reservation requests to fill the charging queue for his own benefit. The EVs use an efficient anonymous credentials from bilinear pairings for anonymous authentication with the charging station to protect their privacy and K-times anonymous authentication to restrict a selfish driver from submitting many reservation request. Our evaluations show that the proposed scheme can efficiently preserve the drivers' privacy, secure the communication and achieve fairness with low communication and computation overhead.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Oral Sessions ISNCC 2019","authors":"","doi":"10.1109/isncc.2019.8909156","DOIUrl":"https://doi.org/10.1109/isncc.2019.8909156","url":null,"abstract":"","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhijiao Huang, Mei Yu, G. Jiang, Ken Chen, Zongju Peng, Fen Chen
{"title":"Reconstruction Distortion Oriented Light Field Image Dataset for Visual Communication","authors":"Zhijiao Huang, Mei Yu, G. Jiang, Ken Chen, Zongju Peng, Fen Chen","doi":"10.1109/ISNCC.2019.8909170","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909170","url":null,"abstract":"As a representation of three dimensional scenes, light field has received increasing attention. In light field image processing, reconstruction method plays an important role, which can not only produce dense views to improve the spatial and angular resolution of the light field, but also effectively reduce the transmission data. However, the reconstruction methods inevitably reduce the quality of light field images, so the corresponding light field image quality assessment is necessary. In this paper, a reconstruction distortion oriented light field image dataset is firstly established, with several different reconstruction methods and the corresponding subjective evaluation scores. Secondly, the subjective scoring results of source sequences and their types of distorted versions are compared and analyzed. Finally, the dataset is evaluated with the existing objective quality assessment metrics. Experimental results show that different reconstruction methods have different preferences on the input light field resolution, and the performance of the state-of-the-art objective quality metrics can be improved.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DoS Attack Detection using Packet Statistics in SDN","authors":"Nail Goksel, Mehmet C. Demirci","doi":"10.1109/ISNCC.2019.8909114","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909114","url":null,"abstract":"Denial-of-service (DoS) attacks targeting the controller in software-defined networks (SDN) are dangerous due to the importance of the controller. In this paper, we characterize the effects of flooding attacks in SDN and discuss potential countermeasures. We concentrate on the controller-side effects of flooding attacks and present our experimental results on how packet-in message counts change in a simulation scenario. Our results imply that differentiating hosts based on only packet-in counts may be misleading for detecting attackers. Instead, packet-in to transmitted packet count ratio is better for distinguishing attackers from normal users. In addition, we measure fairness values with different attacker counts. Our results show that Jain's index is better than entropy in terms of detecting anomaly in our simulation environment. We leave utilizing fairness values to better handle packet-in requests as a future study.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Utility Based Metric and Routing for Energy Efficiency in Software Defined Networking","authors":"Beakal Gizachew Assefa, Öznur Özkasap","doi":"10.1109/ISNCC.2019.8909144","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909144","url":null,"abstract":"Software defined networking (SDN) is a rapidly growing networking paradigm in both industry and research areas, with network programmability as its powerful feature which enables propagating changes in the network easily. However, the links and switches are designed to accommodate maximum traffic load and their power consumption is not traffic aware. The logically centralized control in SDN enables dynamically minimizing the energy consumption of the links and the switches by diverting paths of packets. Energy efficiency and performance are opposite objectives that have to be addressed simultaneously. As the main contributions in this study, we first propose an energy efficiency metric Energy Profit Threshold (EPT) that is applicable to SDN. Then, we provide Integer Programming (IP) formulation with the objective of maximizing the EPT of a software defined network environment. Experimental results show that maximizing the EPT value exhibits energy saving of more than 35 % as compared to other utility based energy saving algorithms.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AMP-based Detector for Uplink OFDM-IDMA with Carrier Frequency Offset","authors":"Ranran He, Jiesi Kang, Yue Xiao, Bin Fu","doi":"10.1109/ISNCC.2019.8909113","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909113","url":null,"abstract":"In this paper, we propose an efficient approximate message passing (AMP) based detector for uplink orthogonal frequency division multiplexing-interleave division multiple access (OFDM-IDMA) systems. Analysis and simulation results show that the proposed detector is capable of providing lower computational complexity and better bit error rate (BER) performance than the conventional elementary signal estimator (ESE) conceived for IDMA systems. Furthermore, the carrier frequency offset (CFO) between the transmitter and the receiver in the uplink OFDM-IDMA is considered for practical systems. Based on the proposed AMP detector, an effective detection scheme is further proposed to mitigate the influence of CFO.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoAP based IoT data transfer from a Raspberry Pi to Cloud","authors":"T. L. Scott, A. Eleyan","doi":"10.1109/ISNCC.2019.8909150","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909150","url":null,"abstract":"This paper describes the development of an Internet of Things (IoT) monitoring system using ThingsBoard IoT platform. ThingsBoard is an open source software tool, which is used to collect, monitor and visualise streams of data received in real-time by sensor devices. The platform can be hosted in the cloud and provides Message Queuing Telemetry Transport (MQTT), The Constrained Application Protocol (CoAP) and HyperText Transfer Protocol (HTTP) protocols support. MQTT and HTTP protocols have mostly been used to develop various IoT systems. However, this paper investigates the use of the CoAP in transmitting sensor data to the cloud. It aims to explore how CoAP fits into the IoT ecosystem and what advantages it offers over other IoT protocols. A CoAP-based IoT architecture is proposed using a Raspberry Pi (RPi) and sensors acting as IoT endpoints. These endpoints will poll sensors (e.g. temperature and humidity) and using CoAP will send the latest data formatted as JavaScript Object Notation (JSON) to the ThingsBoard cloud endpoint at regular intervals. ThingsBoard can create real-time IoT Dashboards for sensors data visualization and share it with users.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}