2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Performance analysis of pulse position based chirp spread spectrum technique for multiple access 基于脉冲位置的多址啁啾扩频技术性能分析
Ádám Knapp, L. Pap
{"title":"Performance analysis of pulse position based chirp spread spectrum technique for multiple access","authors":"Ádám Knapp, L. Pap","doi":"10.23919/SOFTCOM.2017.8115574","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115574","url":null,"abstract":"The paper presents a new wireless communication system using Chirp Spread Spectrum (CSS) transmission. The applied modulation scheme is extended with Pulse Position Modulation (PPM) to transmit data for multiple mobile terminals simultaneously. The proposed system is a Low-Power Wide-Area Network (LPWAN) providing very reliable and robust transmission, especially for terminals moving with high speeds or at long range, but has limited throughput. These features makes it a perfect candidate for such communication environments, where transmitting control or other critical information is necessary. The extensive analytical investigations are also presented regarding to the instantaneous and average symbol-error rate (SER) in Rayleigh fading channel. The numerical results show that the Pulse Position based Chirp Spread Spectrum for Multiple Access (PP-CSS-MA) technique is able to provide higher data rates comparing to the original CSS transmission, while only a slight increase of SNR is requied to achieve the same Symbol-Error Rate (SER). Furthermore, the average transmission power barely increases when applying higher data rates of PP-CSS-MA.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133372424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study 神经模糊和遗传模糊入侵检测方法的比较研究
I. Gaied, F. Jemili, O. Korbaa
{"title":"Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study","authors":"I. Gaied, F. Jemili, O. Korbaa","doi":"10.23919/SOFTCOM.2017.8115566","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115566","url":null,"abstract":"There is no standard solution we can use to completely protect against computer network intrusion. Every solution has its advantages and drawbacks. Soft computing is considered as a promising paradigm to cope with the dynamic evolution of networks. In previous works, we presented two soft computing approaches of intrusion detection. The first one is based on the neuro-fuzzy and the second one is based on the genetic fuzzy one. In this work, we elaborate an empirical comparative study to highlight the benefits of each method in intrusion detection and exploit their complementarities to enhance the detection rate of all types of attacks as well as decrease the false positives rate.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geospatial publish / subscribe systems for the Internet of Things 物联网的地理空间发布/订阅系统
I. Livaja, D. Škvorc, K. Pripužić
{"title":"Geospatial publish / subscribe systems for the Internet of Things","authors":"I. Livaja, D. Škvorc, K. Pripužić","doi":"10.23919/SOFTCOM.2017.8115542","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115542","url":null,"abstract":"The concept of the Internet of Things (IoT) describes the physical objects (smart mobile devices, various types of sensor devices) which have a range of sensors and are connected to the Internet. One of the main challenges for data processing in the Internet of things is to quickly and effectively provide the delivery of sensor data to interested parties in real time. Publish/subscribe systems are seen as appropriate for this purpose as they offer an infrastructure for almost immediate delivery of notifications to interested subscribers. In traditional publish/subscribe systems, subscriptions define content which is interesting to the user and that is usually a multidimensional interval of an attribute space in which the notifications are defined. This type of subscriptions is not appropriate to the Internet of things, where the sensor data, except for the value of the measured quantity, usually include a geospatial component (e.g. a point, line or polygon) which refers to the geographical area in which the measurement was made. Therefore, the subscription should also consist of a geospatial object that represents a geographic area of interest to subscribers and additional data in the form of traditional attribute space intervals that are used for continuous comparison with the upcoming notifications. This paper presents the existing centralized and distributed publish/subscribe systems, and proposes the idea of geospatial publish/subscribe systems.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132622662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of adaptive modulation in underwater visible light communications 水下可见光通信中自适应调制的性能分析
Imen Sahnoun, I. S. Ansari, M. Abdallah, K. Qaraqe
{"title":"Performance analysis of adaptive modulation in underwater visible light communications","authors":"Imen Sahnoun, I. S. Ansari, M. Abdallah, K. Qaraqe","doi":"10.23919/SOFTCOM.2017.8115499","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115499","url":null,"abstract":"In optical wireless communication systems, the underwater visible light communication (UVLC) systems is becoming more and more popular. However, due to intrinsic properties of water body, the propagating optical channel can suffer from severe degrading effects, namely absorption, scattering, and turbulence. Here, we aim to improve the UVLC system performance. For this, we propose to utilize an adaptive modulation scheme at the optical transmitter based on the channel conditions. The performance of such system using different modulation schemes such as the pulse position modulation (PPM), the digital pulse interval modulation (DPIM) and the dual-header pulse interval modulation (DH-PIM), are demonstrated to prove the effectiveness of our adaptive UVLC systems.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133676616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison of free space, perfect ground and fresnel's equation models to determine electric field radiated by a base station antenna 确定基站天线辐射电场的自由空间、完美地面和菲涅耳方程模型的比较
Marin Galic, D. Poljak, V. Doric
{"title":"Comparison of free space, perfect ground and fresnel's equation models to determine electric field radiated by a base station antenna","authors":"Marin Galic, D. Poljak, V. Doric","doi":"10.23919/SOFTCOM.2017.8115517","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115517","url":null,"abstract":"The paper deals with the comparison of three different models for the assessment of the electric field radiated by a base station antenna system, thus featuring the Free Space Model (FS), Perfect Ground Model (PG) and Fresnel Reflection Coefficient Model (RC). The results obtained with mentioned approaches are compared to the results computed via Numerical Electromagnetics Code (NEC). Several variables have been varied to examine the accuracy of each calculation model. The calculations have been undertaken for the far field only. As many European countries performs the field estimation using the FS model, the final goal of this work is to come up with the most convenient model for the field calculation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122296844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of induced CRAH bypass for air-cooled data centers using computational fluid dynamics 基于计算流体动力学的气冷数据中心诱导CRAH旁路研究
H. Erden
{"title":"Investigation of induced CRAH bypass for air-cooled data centers using computational fluid dynamics","authors":"H. Erden","doi":"10.23919/SOFTCOM.2017.8115552","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115552","url":null,"abstract":"Previous studies investigated energy implications of computer room air handling (CRAH) unit bypass configuration and indicated significant energy saving potential for enclosed aisle data centers. These results were based on the thermodynamic modeling of the data center both at the room and cooling infrastructure levels coupled with the air flow network modeling (FNM) at room level. The contained structure of the enclosed aisle data centers allows FNM tools to have decent performance in predicting key air flow rates and fan power use in these configurations. However, any thermodynamic modeling tool to assess cooling energy consumption by the air-cooled data centers with CRAH bypass configuration needs to have more detailed quantitative information about the non-uniform temperature distribution among servers to ensure that none of the servers exceed recommended temperature limits for continuous operation. Furthermore, FNM cannot resolve complex air flow patterns in open aisle data centers, where some of the hot air recirculates back into the cold aisle and some of the cold air in the cold aisle bypasses racks and leaks into the room. We need more sophisticated tools such as computational fluid dynamics (CFD) to capture temperature non-uniformities at the rack surface; so that energy simulation tools utilize this information to assess the feasibility of CRAH bypass configuration primarily as an energy saving retrofit for air-cooled data centers. Here, we conduct a series of CFD simulations to extract critical information about the flow pattern and temperature non-uniformities of a specific data center layout with 1 MW IT load operating within a range of CRAH bypass fractions.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing GAMfIS: A generic attacker model for information security 介绍了一种通用的信息安全攻击模型GAMfIS
Daniel Fraunholz, S. D. Antón, H. Schotten
{"title":"Introducing GAMfIS: A generic attacker model for information security","authors":"Daniel Fraunholz, S. D. Antón, H. Schotten","doi":"10.23919/SOFTCOM.2017.8115550","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115550","url":null,"abstract":"Since the employment of digital technologies in more and more domains, such as finance, industry, government, health and many more, the amount of data stored digitally has vastly increased. This offers new opportunities to malicious adversaries who, for financial, ethical or political reasons, want to access or modify this data. In order to enable owners of IT-systems to assess threats and risks, we propose an attacker model named GAMfIS that groups types of attackers by their motivations, skills and resources. We compared GAMfIS to existing models, allowing for a comprehensive evaluation. In addition to that, we applied our model to a simplified risk assessment of a current use case to demonstrate the capabilities of GAMfIS. We conclude our work by highlighting the perks of GAMfIS.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
IoT and smart city services to support independence and wellbeing of older people 物联网和智慧城市服务支持老年人的独立和福祉
Nicola Bryant, Nikki Spencer, A. King, P. Crooks, J. Deakin, Stuart Young
{"title":"IoT and smart city services to support independence and wellbeing of older people","authors":"Nicola Bryant, Nikki Spencer, A. King, P. Crooks, J. Deakin, Stuart Young","doi":"10.23919/SOFTCOM.2017.8115553","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115553","url":null,"abstract":"Over the next 20 years there will be demographic shift from predominantly younger populations to older ones. Current models of care and pathways require transforming to become more citizen focused and support greater community resilience and sustainability. This will require different approaches to innovation to improve quality of life for people as they age, reduce onset of frailty as well as support those better with long term conditions around self-management and prevention strategies. Health and social care providers are looking at how they augment traditional clinical health related services with the use of IoT technologies and smart city services. This paper describes the on-going work of the Birmingham City4Age pilot, managed by the local authority, Birmingham City Council and funded by the Horizon 2020 Programme of the European Commission focused on the unobtrusive collection of data via wearable devices, outdoor sensors and other smart city systems that aims to help reduce the onset of frailty of older people. Locality and contextual data is being captured on individuals' behaviours with increased frequency that aims to help in detecting early changes in daily living — physical activity and social patterns and develop technology based interventions to help reduce the risk of frailty. The proposed systems architecture is being validated in two distinct neighbourhoods with contrasting demographics in Birmingham, UK adopting an iterative user design approach designed to support independence.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124414453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cooperative localization based on an evolved variational message passing algorithm 基于改进变分消息传递算法的协同定位
Kaouther Hedhly, M. Laaraiedh, F. Abdelkefi, M. Siala
{"title":"Cooperative localization based on an evolved variational message passing algorithm","authors":"Kaouther Hedhly, M. Laaraiedh, F. Abdelkefi, M. Siala","doi":"10.23919/SOFTCOM.2017.8115521","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115521","url":null,"abstract":"In this paper, we propose a novel algorithm for cooperative localization in Wireless Networks where relative node distances are available. The proposed algorithm is an evolved version of Variational Message Passing (VMP) algorithm. It has the advantage to avoid the simultaneous update of the position estimate done in parallel by all the nodes. This parallel update is the original cause of the VMP positioning errors. Compared to the others VMP algorithms, the enhanced VMP algorithm presents better localization accuracy for lower complexity and cost. This is supported by simulations and measurements which illustrate a very important improvement in positioning accuracy.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On outage probability of two-way relaying data transmission and energy harvesting 关于双向中继数据传输和能量收集的中断概率
N. Dahi, N. Hamdi
{"title":"On outage probability of two-way relaying data transmission and energy harvesting","authors":"N. Dahi, N. Hamdi","doi":"10.23919/SOFTCOM.2017.8115568","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115568","url":null,"abstract":"This paper addresses accurate outage performances of a two-way relaying network with wireless power transfer. The wireless power transfer or energy harvesting is a well known scheme for reducing energy consumption of low power devices by harvesting energy received from high power equipments. In this work sources are considered high power equipments and relays are the low power devices. In this context, the signal to noise and power gain are obtained and used to accurately derive outage probability (OP) for a two-way relaying system in amplify-and-forward conguration, with energy harvesting at relays. The impact of energy harvesting period is shown for low-rate and high-rate regimes. This enabled the OP to join asymptotically a zero bound.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122157007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信