{"title":"Selected health and law issues regarding mobile communications","authors":"P. Mandl, P. Pezzei, David Veit, E. Leitgeb","doi":"10.23919/SOFTCOM.2017.8115581","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115581","url":null,"abstract":"Over the next years the demand of wireless communication will increase tremendously. More and more mobile end devices require a high data rate connection e.g. to a smart home (Internet of Things, IoT) or to the internet. The radiation power pattern of base stations and mobile end devices will completely change for the 5G technology. Therefore the electromagnetic exposure especially to human body will increase in the future, because most of the wireless connections are realized in RF technology. In this contribution two different measurement setups are presented. The first shows the electromagnetic radiation regarding a base station powered by a mobile phone provider over a timespan of a number of days. The second figures out the electromagnetic radiation of a handheld mobile end device to a human head in an area with very poor reception values. The results of those measurements where compared with legal and health limits. All measured and calculated results regarding the base stations were within the legal exposure limits. The calculated legal exposure limits of mobile devices were exceeded twice in areas within very poor reception values. Regarding the expected higher bandwidth and corresponding higher electromagnetic exposure to human bodies in future there have to be periodic measurements to comply with radiation limits.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kameswar Rao Vaddina, F. Brandner, G. Memmi, P. Jouvelot
{"title":"Experimental energy profiling of energy-critical embedded applications","authors":"Kameswar Rao Vaddina, F. Brandner, G. Memmi, P. Jouvelot","doi":"10.23919/SOFTCOM.2017.8115536","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115536","url":null,"abstract":"Despite recent advances that have greatly improved the performance of embedded systems, we still face many challenges with regard to energy consumption in energy-constrained embedded and communication platforms. Optimizing applications for energy consumption remains a challenge and thus is a compelling research direction, both on the practical and theoretical sides. This paper presents a new experimental bench for energy profiling of non-performance-critical embedded and mobile applications and reports preliminary results obtained on two embedded boards. The experiments are driven by an online energy monitoring mechanism using National Instruments' cDAQ and LabVIEW running on a host machine. The host monitors a target device, which runs a set of benchmarks. We describe the experience gained from using and modding two different target boards, namely an Nvidia Jetson TX1 and a TI AM572x evaluation module. In particular, we confirm, and thus further validate, the existence of the Energy/Frequency Convexity Rule for CPU-bound benchmarks. This rule states that there exists an optimal clock frequency that minimizes the CPU energy consumption for non-performance-critical applications. We also show that the gain of frequency scaling is highly dependent on workload characteristics. Any future energy-management approach should take these behavioral traits into consideration.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132272367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative experimental analysis of the quality-of-service and energy-efficiency of VMs and containers' consolidation for cloud applications","authors":"Ismael Cuadrado-Cordero, Anne-Cécile Orgerie, Jean-Marc Menaud","doi":"10.23919/SOFTCOM.2017.8115516","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115516","url":null,"abstract":"The consolidation of services is a widely accepted technique for IaaS Cloud providers to reducing energy consumption and improving the utilization of their resources. This technique is based on distributing all services in the minimum amount of servers. This way, the overall energy consumption of the datacenter is reduced, as less servers are needed to be active. Traditionally, research has focused on strategies for consolidation of Virtual Machines (VMs), but containers are changing the landscape of Cloud services. Containers are expected to optimize the consolidation of services by reducing the amount of needed resources, thus allocating more services using less servers. However, while multiple research works have been produced in the Energy Efficiency (EE) achieved through consolidation of VMs, there is yet no experimental work on how consolidation of containers affects EE, when assuming a given Quality-of-Service (QoS) to the user. In this paper we show an experimental analysis on the effects of consolidation of containers in the QoS and EE, compared to the consolidation of VMs. We demonstrate that the consolidation of containers is indeed more optimal than the one of VMs, both in terms of QoS and EE. Consecutively, we analyze how the degradation of the service is produced both in QoS and EE, and we show how QoS is the variable which is more affected by consolidation. This work provides the necessary scientific background on consolidation of two widely used virtualization technologies, and we believe it is useful for future works on the optimization of resources in datacenters.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117128654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric multiprocessing techniques in smart devices: Application in a drone navigation system","authors":"L. Nao, Pierluigi Passaro, E. Gioia, M. Petracca","doi":"10.23919/SOFTCOM.2017.8115511","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115511","url":null,"abstract":"Smart devices can be considered an essential element of the Internet-of-Things (IoT) revolution. Devices able to gather and process data to provide high-level information to other nodes will enable advanced and effective smart applications in the near future. To let IoT objects to become smarter and smarter, advanced embedded architecture must be considered. In this direction, this paper exploits the use of heterogeneous Asymmetric MultiProcessing (AMP) techniques in the IoT scenario by considering a smart device in which real-time acquisition and processing capabilities are necessary: a drone. In the paper an AMP-based drone system is first presented, considering a System-on-Chip (SoC) solution based on microprocessors and microcontrollers. Then time performance in navigation parameters acquisition and processing is presented, considering a real-time operating system running on the core delegated to such task. Presented results show the benefits of the proposed approach in which high real-time constraints are satisfied in calculating navigation parameters, while other demanding IoT tasks can be executed simultaneously. Along with the selected use case, the proposed approach can be used in a wide range of smart devices in which higher computational performance are required.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128739257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-service testing OFDM error floor by constellation analysis","authors":"Adriana Lipovac, Sibila Isak-Zatega, Pamela Njemcevic","doi":"10.23919/SOFTCOM.2017.8115549","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115549","url":null,"abstract":"Residual BER — error floor is the ultimate metrics for the end-to-end transmission performance, but in practice can be assessed only by out-of-service tests, which network operators in particular try to avoid best they can, preferring in-service practical test methods. In this regard, constellation analysis is an excellent tool to not only identify and visualize various error generating analog impairments such as power amplifier compression, carrier lock angle and quadrature errors, but also enable in-service estimation of BER with OFDM transmission over multipath channel. In this paper, after reviewing concepts of constellation analysis, we relate the crucial constellation analysis parameter — closure to the delay dispersion standard describing parameter — mean delay spread, so modeling the multipath delay dispersion with the equivalent additive white Gaussian noise source that would produce the same degradation of the accordingly modified residual BER expression. For the exemplar test situation in the LTE downlink environment, very good matching was found between the in-service constellation — based and the predicted error floor values.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"62 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Mirai malicious software","authors":"Hamdija Sinanovic, S. Mrdović","doi":"10.23919/SOFTCOM.2017.8115504","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115504","url":null,"abstract":"This paper tries to shed more light on Mirai malware, with an aim to facilitate its easier detection and prevention. This malware was used in several recent high profile DDoS attacks. Mirai is used to create and control botnet of IoT devices. The code of this malware is analysed and explanation of its parts provided. Virtual environment for dynamic analysis of Mirai is created. Special settings that were needed to install, start and use Mirai in this environment are explained. Mirai CNC user environment with list of commands is presented. Controlled DDoS attack was successfully executed. Traffic generated during controlled attacks was used to generate signature for Mirai detection. Conclusion of static and dynamic analysis is given together with some mitigation advices.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Slow light and dynamic buffer capability in two different photonic crystal waveguides","authors":"Zaineb Gharsallah, M. Najjar, V. Janyani","doi":"10.23919/SOFTCOM.2017.8115584","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115584","url":null,"abstract":"In this paper, we investigated two designed structures for application in optical buffers with using photonic crystal technology. In the first structure, silicon slab is used with air holes in hexagonal lattice. However, in the second structure, we used Lithium Niobate slab with air holes. In the two cases, slow light criteria and optical buffering is demonstrated with bit length, delay time and buffer capacity equal to 7.5 μm, 166 ps, and 132 bits for silicon structure and 5.1 μm, 833 ps and 193 bits for Lithium Niobate structure, respectively. Moreover, we developed a dynamic buffer taking advantage of electro-optic effect. We show an external control of the buffer parameters for both structures. The simulations demonstrate that the bit length, the delay time and storage capacity change with the applied voltage and can reach as high as 9.1 μm, 116.6 ps and 125.4 bits for silicon structure and 6.9 μm, 833 ps and 193 bits for Lithium structure, respectively. These results prove that the suggested structures are promising for compact and high performance optical buffering application.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takumi Harada, H. Ujikawa, Manabu Yoshino, N. Oota, Ken-ichi Suzuki, A. Otaka
{"title":"Dynamic software updating of OLTs without service interruption","authors":"Takumi Harada, H. Ujikawa, Manabu Yoshino, N. Oota, Ken-ichi Suzuki, A. Otaka","doi":"10.23919/SOFTCOM.2017.8115525","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115525","url":null,"abstract":"Network Function Virtualization (NFV) is expected to be a key enabler as regards both system cost reduction and rapid service deployment. In the context of NFV, network functions are assumed to be implemented as software modules on cloud server clusters, which results in a disaggregation from dedicated hardware. However, these assumptions differ in access networks where Network Equipment (NE) is typically deployed without redundancy in terms of economic efficiency. Additionally, some time-critical functions should be implemented on NE to satisfy the stringent Quality of Service (QoS) requirements. Therefore, in realizing rapid service deployment, software updating has a fundamental issue in that it causes Optical Line Terminals (OLT), which are NE in access networks, to reboot and this interrupts network services. Updating in-service OLT software without any service interruption is a key challenge for NFV in access networks. Recently, Dynamic Software Updating (DSU) technologies, have been developed, which update running software without interrupting the process in which the software is engaged. In this paper, we propose a way of applying DSU to OLTs and demonstrate in-service software updating without service interruption by using a prototype OLT. We also evaluate the performance of the proposed DSU technique for time-critical OLT applications. The proposed method shows the potential to update running OLT applications without interrupting services.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hayfa Ben Thameur, B. Gal, N. Khouja, F. Tlili, C. Jégo
{"title":"Low complexity ADMM-LP based decoding strategy for LDPC convolutional codes","authors":"Hayfa Ben Thameur, B. Gal, N. Khouja, F. Tlili, C. Jégo","doi":"10.23919/SOFTCOM.2017.8115500","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115500","url":null,"abstract":"A node-wise (NS) schedule has been recently proposed for decoding LDPC codes with the linear programming (LP) decoding approach, based on the alternate direction method of multipliers (ADMM). It improves the error correction performances as well as the convergence speed of the ADMM-LP decoder. However, it suffers from a high computational complexity resulted from residuals calculation. In this paper, a new formulation of the ADMM-LP algorithm with a modified computational scheduling is proposed for decoding LDPC convolutional codes. Simulations show that it reduces the computational complexity while improving the error correction performances and speeding up the decoding process. The decoding complexity is further reduced when considering the NS-ADMM approximation which allows savings up to 70% of the residuals calculation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of AdaBoost classifier in recognition of superposed modulations for MIMO TWRC with physical-layer network coding","authors":"Wassim Ben Chikha, S. Chaoui, R. Attia","doi":"10.23919/SOFTCOM.2017.8115498","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115498","url":null,"abstract":"Modulation recognition algorithms have recently received a great deal of attention in academia and industry. In addition to their application in the military field, these algorithms found civilian use in reconfigurable systems, such as cognitive radios. Most previously existing algorithms are focused on recognition of a single modulation. However, a multiple-input multiple-output two-way relaying channel (MIMO TWRC) with physical-layer network coding (PLNC) requires the recognition of the pair of sources modulations from the superposed constellation at the relay. In this paper, we propose an algorithm for recognition of sources modulations for MIMO TWRC with PLNC. The proposed algorithm is divided in two steps. The first step uses the higher order statistics based features in conjunction with genetic algorithm as a features selection method, while the second step employs AdaBoost as a classifier. Simulation results show the ability of the proposed algorithm to provide a good recognition performance at acceptable signal-to-noise values.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}