Eduard-Florentin Luchian, A. Taut, I. Ivanciu, G. Lazar, V. Dobrota
{"title":"Mobile wireless sensor network gateway: A raspberry Pi implementation with a VPN backend to OpenStack","authors":"Eduard-Florentin Luchian, A. Taut, I. Ivanciu, G. Lazar, V. Dobrota","doi":"10.23919/SOFTCOM.2017.8115561","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115561","url":null,"abstract":"The paper discusses a solution to allow permanent access to a cloud for the devices in mobile wireless sensor networks. Concepts like Dew Computing DC distributes the cloud infrastructure but has a lack of mobility. Seamless connectivity for applications and services is ensured by implementing a mobility system over different access technologies relying on dynamic context-based routing mechanism in edge nodes. The application scenario involves mobile wireless sensor networks gateways MWSNGs, designed to be installed in public transportation (mainly electric vehicles). The sensors are presumed to be scattered all around a smart city, monitoring environmental parameters and centralizing them through permanent Internet connectivity. The implemented cloud-based testbed includes a Raspberry PI acting as a Compute Node, allowing the deployment of the application in a virtualized manner.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of temperature inside open TEM-cell with thermal camera","authors":"K. Malaric, R. Malarić, Josip Herceg","doi":"10.23919/SOFTCOM.2017.8115560","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115560","url":null,"abstract":"Open TEM-cell can be used for calibration of small antennas as well as for exposing biomedical samples and small animals to the electromagnetic fields. Open TEM-cell is missing its sidewalls thus allowing easier access to equipment under test being less stressful for live test subjects at the same time. Less stress comes from the fact that there is light and air available without losing the cell electric properties. When exposing live tissue to RF radiation, it is always necessary to exclude the thermal effect. That is why it is important to measure temperature inside the TEM-cell. Open TEM-cell enables use of thermal camera which shows changes in temperature depending on the power coming from the RF generator.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Martinovic, M. Dadić, R. Malarić, Z. Martinovic
{"title":"Electromagnetic analysis of adiabatic coaxial line with applied air gap","authors":"Z. Martinovic, M. Dadić, R. Malarić, Z. Martinovic","doi":"10.23919/SOFTCOM.2017.8115530","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115530","url":null,"abstract":"Microwave power standard is significantly limited by thermostat quality (± 1 mK/h), bolometer load efficiency (absorbers) and characteristics of adiabatic line due frequency bandwidth. Several years ago, air gap was applied on coaxial adiabatic line in order to drive down heat effects. In this paper, the focus will be on further analysis of coaxial line with an applied air gap. With the finite element method tool, analysis of S — parameters for different air gap dimensions and flange radius will be carried out. The paper will present simulation model and achieved results as a first step in the development of microwave power standard at the University of Zagreb.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manel Elleuchi, Manel Boujeleben, M. Abid, M. BenSaleh
{"title":"Securing RPL-based Internet of Things applied for water pipeline monitoring","authors":"Manel Elleuchi, Manel Boujeleben, M. Abid, M. BenSaleh","doi":"10.23919/SOFTCOM.2017.8115580","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115580","url":null,"abstract":"In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the level of security in IoT applications. The majority of these applications are based on RPL as a routing protocol. RPL should have unmodified routing data to ensure integrity, and verify that routing data comes from authorized machines to validate the authenticity. In this paper, we propose a security scheme applied to RPL-based internet of things routing protocol. It is based on identity-based cryptography to distribute symmetric keys between communicating nodes, AES128 and SHA 256 to compute message authentication codes. As application, we consider the water pipeline monitoring while maintaining low power consumption. For simulation and performance evaluation, we use CONTIKI operating system and the simulation tool Cooja. We demonstrate that our scheme is lightweight and does not introduce high memory and energy overheads. Then, constrained IoT devices can support it while avoiding many routing attacks.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A formal model of cloud-deployed software and its application to workflow processing","authors":"E. Johnsen, Ka I Pun, S. L. T. Tarifa","doi":"10.23919/SOFTCOM.2017.8115501","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115501","url":null,"abstract":"Although insufficient software scalability and bad resource management can easily consume any potential savings from cloud deployment, the scalability of software executed on the cloud empowers the software designer, who can fully control the trade-offs between the incurred cost of running an application and the delivered quality-of-service. To capitalize on this control, the designer needs to be able to efficiently make deployment decisions in the software design, which are concerned with the chosen strategies for load balancing and scaling. By executable formal models and associated model-based analysis techniques, we explore and compare deployment strategies analytically in the laboratory during early design phases rather than empirically in the field after the code has been fully developed. We briefly survey ABS, a formal modeling language which integrates the design of services with the modeling of deployment decisions, and illustrate its use by an example of cloud-based workflow processing with autoscaling support.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link level performance prediction of MIMO PIC receivers through QR decomposition of channel matrix","authors":"Asif Khan, A. Khan, I. Ullah, S. Khattak","doi":"10.23919/SOFTCOM.2017.8115557","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115557","url":null,"abstract":"In this paper, an accurate QR decomposition based link level performance abstraction technique for a multi-input multi-output iterative receiver is proposed. The post-detection SNR values for an iterative receiver are estimated using QR decomposition of the channel matrix. The effect of channels on the received SNR is realized by scaling the signal in accordance with the leading diagonal elements of the R matrix. Both mutual and exponential mapping functions have been used for data compression. The proposed link level performance abstraction strategy employs a single lookup table without having to do the complex link level simulations. It is independent of the channel conditions and depends only on the type of the receiver used and the modulation and coding scheme adopted. The resulting link level performance prediction shows a good approximation of the simulated performance at different modulation and coding scheme.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On wind turbine impedance analysis via different approaches","authors":"A. Šunjerga, F. Rachidi, D. Poljak","doi":"10.23919/SOFTCOM.2017.8115546","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115546","url":null,"abstract":"Lightning is one of the main causes of damage to wind turbines. The continuous increase in the wind turbine heights makes these structures even more vulnerable against lightning. As a result, the design of proper lightning protection system is of high importance. The paper deals with the determination of the transient impedance of wind turbines via different approaches. The analysis is carried out in the frequency domain using a transmission line model and a full wave approach via NEC4 commercial simulation tool. First, a simple tower conguration is considered and then a more complex case including tower with blades is considered. Coupling between blades and tower are taken into account by means of the full wave approach. To evaluate coupling effects, different angles of blades are considered. The approximation of a perfectly conducting (PEC) ground is assumed.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptual graphs based modeling and querying of XML data","authors":"Andrea Éva Molnár, V. Varga, C. Săcărea","doi":"10.23919/SOFTCOM.2017.8115519","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115519","url":null,"abstract":"Conceptual Graphs (CGs) are a knowledge representation language based on the existential graphs of Ch. S. Peirce and the semantic networks of Artificial Intelligence. CGs are also a modeling and design language, which is human readable and computer tractable. This makes CGs suitable for a large variety of applications. The novelty of this paper, is a new approach to XML data modeling based on Conceptual Graphs and a query designer based also on CGs. We underline that the expressive power of Conceptual Graphs helps us to understand, analyze and present the structure of semi-structured data in a form which is also accessible for non-experts.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Rebaya, Imen Amari, Kaouther Gasmi, S. Hasnaoui
{"title":"Core number optimization based scheduler to order/map hardware/software applications","authors":"Asma Rebaya, Imen Amari, Kaouther Gasmi, S. Hasnaoui","doi":"10.23919/SOFTCOM.2017.8115522","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115522","url":null,"abstract":"Over these last years, the number of cores witnessed a spectacular increase in digital signal and general use processors. Concurrently, significant researches are done to get benefit from the high degree of parallelism. Indeed, these researches are focused to provide an efficient scheduling from hardware/software systems to multicores architecture. The scheduling process consists on statically choose one core to execute one task and to specify an execution order for the application tasks. In this paper, we describe an efficient scheduler that calculates the optimal number of cores required to schedule an application, gives a heuristic scheduling solution and evaluates its cost. Our proposal results are evaluated and compared with Preesm scheduler results and we prove that ours achieves better scheduling in terms of latency and number of cores.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of 60 GHz MIMO antenna by adding ground stub to reduce mutual coupling for WPAN applications","authors":"Syrine Lahmadi, J. B. Tahar","doi":"10.23919/SOFTCOM.2017.8115497","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115497","url":null,"abstract":"In this paper a novel 60 GHz printed antenna with defected ground structure is proposed for MIMO application. The antenna consists of a pairs of folded L-shaped strips patch printed on silicon subtract for wireless personal area network (WPAN) at 60 GHz. The two radiating elements are separated by distance equal to 1.25 mm. The performance of the proposed antenna has been evaluated after adding the cone ground stub especially the mutual coupling. Proposed antenna is resonating at 60 GHz. Return loss of −17.85 dB is achieved for 60 GHz band. The mutual coupling is less than −15 dB throughout the bandwidth (56 GHz–64 GHz). The simulation results indicate that the antenna can provide spatial diversity and enhance isolation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}