{"title":"Efficient route discovery using channel adaptive probabilistic broadcasting in Zigbee wireless sensor networks","authors":"H. Adarbah, Shakeel Ahmad","doi":"10.23919/SOFTCOM.2017.8115528","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115528","url":null,"abstract":"Low-Rate Wireless Sensor Networks (LR-WSNs) has become an active area of research in recent decades. ZigBee is a wireless standard based on IEEE 802.15.4 for LR-WSNs. Since in Zigbee networks energy is one of the most vital issues, the routing protocols must be energy efficient. By default, ZigBee uses an Ad hoc On-Demand Distance Vector (AODV) routing protocol. In AODV, broadcasting is the backbone of the route discovery process. Pure flooding is the simplest and most common broadcasting technique for route discovery in AODV routing. The obvious drawback of pure flooding is excessive redundant traffic that degrades the system performance. This is commonly known as broadcast storm problem (BSP). Several schemes have been proposed to address BSP, one of them is the Channel Adaptive Probabilistic Broadcast (CAPB) scheme that adapts the rebroadcast probability dynamically to the current Signal to Interference plus Noise Ratio (SINR) and node density in the neighbourhood. This paper evaluates the CAPB scheme in LR-WSNs based on the IEEE 802.15.4/ZigBee. The CAPB scheme is implemented in the standard AODV routing protocol to replace the pure flooding based broadcast. Extensive ns-2 simulation results show that the CAPB scheme outperforms the standard AODV and the fixed probabilistic broadcasting scheme significantly in terms of routing overhead, throughput, end-to-end delay and energy consumption in noisy LR-WSNs.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symptoms investigation by means of formal concept analysis for enhancing medical diagnoses","authors":"C. Săcărea, Diana Sotropa, Diana Troanca","doi":"10.23919/SOFTCOM.2017.8115588","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115588","url":null,"abstract":"Pattern extraction is one of the major topics in Knowledge Discovery. Out of numerous data mining techniques we propose to use a new approach: Formal Concept Analysis (FCA) together with Graph Databases with the implementation Neo4j. FCA is a prominent field of applied mathematics using maximal clusters of object-attribute relationships to discover and represent knowledge structures. The use of FCA gained much importance in many research domains in recent years. Despite the similarity of the graph representation between FCA and Neo4j, the structure and relations among the elements are represented differently and can offer a different perspective on the analysis. This paper gives more insight into how patterns can be extracted from medical data and interpreted by means of FCA and Neo4j in order to help medical staff improve the accuracy of diagnoses. We examine the factors related to patients' symptoms and diagnostics and then compare the results with the ones provided by a medical care center. We apply knowledge discovery techniques and conceptual landscapes paradigm in order to obtain an in-depth and high qualitative knowledge representation of medical data. By making use of the effectiveness and the graphical representation of conceptual hierarchies we extract valuable knowledge from medical data sets through which we solve the knowledge discovery, processing and representation task in Electronic Health Record systems.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maja Skiljo, Z. Blažević, A. Grbavac, M. Kevo, M. Marović, K. Topic
{"title":"Multiple-folded antenna design for maximizing power transfer efficiency at 6.78 MHz","authors":"Maja Skiljo, Z. Blažević, A. Grbavac, M. Kevo, M. Marović, K. Topic","doi":"10.23919/SOFTCOM.2017.8115563","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115563","url":null,"abstract":"In this paper, we present the transmitter and receiver multiple-folded design for maximizing power transfer efficiency (PTE) for wireless power transfer (WPT) systems at 6.78 MHz. Using this design, it is possible to achieve higher PTE than the one obtained with square loops provided in the standard. The multiple-folded antennas are designed and tested with numerical electromagnetic software in free space, their quality factors are calculated and compared, and the problem of transmitter and receiver misalignment is investigated. The proposed transmitter and receiver are fabricated and proof-of-concept WPT measurements are performed using vector network analyzer.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128980408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo
{"title":"Exploiting an IoT local middleware for the orchestration of mobile device sensors to detect outdoor and indoor user positioning","authors":"Adriana Caione, A. Fiore, L. Mainetti, Luigi Manco, R. Vergallo","doi":"10.23919/SOFTCOM.2017.8115538","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115538","url":null,"abstract":"Thanks to the proliferation of mobile technologies that enable devices to use the network for providing (publish) or requiring (subscribe) information according to specific applications aims, the Internet of Things (IoT) can be considered as the biggest challenge that the industry is currently facing. During the last years several application domains for IoT have emerged and among these the Smart Cities. In effect, the IoT is redrawing the Smart Cities in a promising way from the technological, economic, and social perspectives. This represents the background of the work described in the present paper that deals with an Ambient Assisted Living (AAL) mobile system able to detect outdoor and indoor user positioning, acquiring data through sensors in an unobtrusive way. Our system exploits an IoT middleware, called WoX (Web of Topics) and its local counterpart L-WoX (Local-Web of Topics). Thanks to its model-driven approach, it is able to allow the communication between mobile applications and a set of heterogeneous sensors, orchestrating access services and communication protocols in a very abstract way.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart home medication reminder system","authors":"Milan Ramljak","doi":"10.23919/SOFTCOM.2017.8115585","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115585","url":null,"abstract":"The reality is that many of us will need assistance in our later years. In some cases, people need nothing more than occasional visits from a home nurse, some light housekeeping, meals on wheels, and visitors willing to talk and notify about pills. While there is a movement to make aging at home possible for more people, it is not always an option. Dementia and other illnesses can require around the clock medical care and monitoring, things often more easily given in a professional facility than at home. On the other end, increasing number of smart systems opens area where medical treatment can be utilized to completely new level. In this paper we show a working solution how a smart home can be utilized to help people with medication related remainders. Proposed flow starts when a new medication prescription is taken from the doctor. eHealth system generates QR code which is then delivered as part of prescription, holding set of information, such as medications treatment, duration, next visit and similar. This set of information is used by the expert system which handles all the notifications generated by prescription. In used system, three types of notifications are used, smart phone notifications, home voice and video notifications.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biljana Risteska Stojkoska, I. Kosovic, Tomislav Jagušt
{"title":"How much can we trust RSSI for the IoT indoor location-based services?","authors":"Biljana Risteska Stojkoska, I. Kosovic, Tomislav Jagušt","doi":"10.23919/SOFTCOM.2017.8115543","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115543","url":null,"abstract":"One of the key challenges in the ever-changing ubiquitous computing environment of Internet of Things is accurate determination of each of its' elements location. Indoor localization for smartphones has been in line with this research initiatives in the last decade, along with the inherited background from wireless sensor networks perspective. Therefore, most of the algorithms from the literature are based on distance measurements obtained from radio signal strength ranging technique and evaluated mostly through simulations. In this paper, we experimentally evaluated a well-known technique for localization based on multidimensional scaling, using different models of smartphones. Additionally, we analyzed the behavior of the signal strength measured by the smartphones under different field condition. From our results, we concluded that radio signal strength indicator should be combined with more accurate ranging techniques into hybrid solutions to be used for indoor localization of smartphones.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vuković, Damjan Katusic, Renato Soic, Mario Weber
{"title":"Rule-based system for data leak threat estimation","authors":"M. Vuković, Damjan Katusic, Renato Soic, Mario Weber","doi":"10.23919/SOFTCOM.2017.8115578","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115578","url":null,"abstract":"User data has become a backbone of today's ICT services and applications, where various providers compete to provide better services to their users based on a personalized content. However, user data is simultaneously becoming a tempting target for malicious individuals who try to get the data and exploit it for their own financial gain. The necessity for high-quality data loss prevention is obvious to protect the users and to comply with new regulations of the European Union, specifically General Data Protection Regulation (GDPR) which imposes strict restrictions regarding manipulation of user data. There are various solutions available that try to monitor sensitive user data, identify it, and prevent such data from exiting the service or application domain. This paper proposes a stand-alone system for data leak detection and prevention based on a rule-engine and threat estimation. Unlike the most of the widely used solutions, the proposed system can be customized to a specific purpose, where each service provider can select which type of data should be monitored and blocked if a leak is suspected.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low complexity rate compatible puncturing patterns design for LDPC codes","authors":"F. Babich, Matteo Noschese, A. Soranzo, F. Vatta","doi":"10.23919/SOFTCOM.2017.8115558","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115558","url":null,"abstract":"In contemporary digital communications design, two major challenges should be addressed: adaptability and flexibility. The system should be capable of flexible and efficient use of all available spectrums and should be adaptable to provide efficient support for the diverse set of service characteristics. These needs imply the necessity of limit-achieving and flexible channel coding techniques, to improve system reliability. Low Density Parity Check (LDPC) codes fit such requirements well, since they are capacity-achieving. Moreover, through puncturing, allowing the adaption of the coding rate to different channel conditions with a single encoder/decoder pair, adaptability and flexibility can be obtained at a low computational cost. In this paper, the design of rate-compatible puncturing patterns for LDPCs is addressed. We use a previously defined formal analysis of a class of punctured LDPC codes through their equivalent parity check matrices. We address a new design criterion for the puncturing patterns using a simplified analysis of the decoding belief propagation algorithm, i.e., considering a Gaussian approximation for message densities under density evolution, and a simple algorithmic method, recently defined by the Authors, to estimate the threshold for regular and irregular LDPC codes on memoryless binary-input continuous-output Additive White Gaussian Noise (AWGN) channels.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Patrono, P. Primiceri, Piercosimo Rametta, Ilaria Sergi, P. Visconti
{"title":"An innovative approach for monitoring elderly behavior by detecting home appliance's usage","authors":"L. Patrono, P. Primiceri, Piercosimo Rametta, Ilaria Sergi, P. Visconti","doi":"10.23919/SOFTCOM.2017.8115547","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115547","url":null,"abstract":"Detecting how elderly people interact with their surrounding environment, especially with domestic electrical appliances, is an important parameter to assess Mild Cognitive Impairments and frailty issues. This paper proposes an innovative approach for monitoring elderly behavior by detecting home appliance's usage. It is based on an unobtrusive smart meter that periodically measures the global power consumption in the house, associated with some smart plugs for punctually monitoring specific electrical devices. This infrastructure has been implemented and validated within the Personal Data Capturing System of the City4Age Platform, where, joined with other provided monitoring systems, can feed risk detection algorithms with more accurate data. Summarizing, implemented system, although simple and at low cost, is able to combine data provided by designed power meter with those of smart meter plugs and, by means of implemented algorithms, to detect unusual elder behavior, moreover resulting reliable and accurate.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of blockchain and IoT in recruiting participants for digital clinical trials","authors":"Fabio Angeletti, I. Chatzigiannakis, A. Vitaletti","doi":"10.23919/SOFTCOM.2017.8115590","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115590","url":null,"abstract":"Our personal data is now more valuable than ever. The uncontrolled growth of internet-centered services has led us to accept many compromises about how we share it. In the era of Internet of Things, personal data is collected continuously. Now, more than ever, we are in need of privacy-preserving applications where users always retain control of their personal data. In this paper, we present a secure way to control the flow of personal data in the specific case of the recruitment of participants for clinical trials. We take special care to protect the interests of both parties: the individual can keep its data private until an agreement is reached, and the Clinical Research Institute can be assured that it is acquiring useful and authentic data. We provide a proof-of-concept implementation and study its performance based on a real-world evaluation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121052353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}