Stephan Bernhart, E. Leitgeb, G. Hofbauer, Ulrich Feichter
{"title":"Rising edge detection used as TOA estimator for mode S signals with multipath propagation","authors":"Stephan Bernhart, E. Leitgeb, G. Hofbauer, Ulrich Feichter","doi":"10.23919/SOFTCOM.2017.8115591","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115591","url":null,"abstract":"Local area multilateration (LAM) systems installed at airports suffer from multipath propagation caused by reflections from objects such as buildings, hangars, masts or shelters. Receiving multiple overlapped signals from different radio propagation channels deteriorates the time of arrival (TOA) estimation. In this paper the edge detection algorithm is used to estimate the TOA of 1,090 MHz Mode S downlink signals with overlapping multipath. This algorithm is a fundamental tool in image processing, it detects the zero crossing of the Laplacian signal and is applied on the rising edge of the first pulse. Herein we have shown in a real-world example, that the edge detection leads to better results than the threshold detection algorithm in terms of TOA estimation accuracy when having multipath overlapping. In addition, the low-cost implementation is suitable for deployment in centralized or decentralized time-synchronized LAM systems and requires only one single receive stream.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116923389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Domenico Balsamo, G. Merrett, B. Zaghari, Yang Wei, S. Ramchurn, Sebastian Stein, A. Weddell, S. Beeby
{"title":"Wearable and autonomous computing for future smart cities: Open challenges","authors":"Domenico Balsamo, G. Merrett, B. Zaghari, Yang Wei, S. Ramchurn, Sebastian Stein, A. Weddell, S. Beeby","doi":"10.23919/SOFTCOM.2017.8115596","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115596","url":null,"abstract":"The promise of smart cities offers the potential to change the way we live, and refers to the integration of IoT systems for people-centred applications, together with the collection and processing of data, and associated decision making. Central to the realization of this are wearable and autonomous computing systems. There are considerable challenges that exist in this space that require research across different areas of electronics and computer science; it is this multidisciplinary consideration that is novel to this paper. We consider these challenges from different perspectives, involving research in devices, infrastructure and software. Specifically, the challenges considered are related to IoT systems and networking, autonomous computing, wearable sensors and electronics, and the coordination of collectives comprising human and software agents.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127050592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual data planes for easy creation and operation of end-to-end virtual networks","authors":"N. Oguchi, M. Sekiya","doi":"10.23919/SOFTCOM.2017.8115595","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115595","url":null,"abstract":"Today, it seems more and more required to create network slices dynamically and on-demand due to the emergence of cloud services, 5G wireless and IoT technology. It becomes possible to create virtual networks over physical networks easily by using such technology as Software Defined Networking (SDN) and Network Functions Virtualization (NFV). However, when creating end-to-end network slices over some infrastructures that are operated by different types of providers or companies, it is hard for system administrators who are not network experts to design such network slices, because those administrators have to understand virtual networks such as VPN and VXLAN for layer3 or layer2 tunnels between infrastructures. Therefore, we propose an architecture to create and operate network slices without awareness of complex virtual networks that are essential for inter- or intra-infrastructures, by creating abstraction layer (virtual network object), which intermediate between a logical network designed by a user and a virtual network overlaid on infrastructures.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127170057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining IOT, open data and messaging for prevention of MCI/frailty","authors":"N. D. Blas, P. Paolini, Giulia Plotti","doi":"10.23919/SOFTCOM.2017.8115515","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115515","url":null,"abstract":"The City4age project combines Internet of Things, data from smart cities and powerful schemes for sending messages, to develop sustainable prevention of MCI/Frailty in aging population. To do so, it combines detection (for early spotting of symptoms) and intervention (for suggesting positive changes of behavior).","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality-aware network dimensioning for the VoIP service","authors":"J. Klink, T. Uhl","doi":"10.23919/SOFTCOM.2017.8115576","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115576","url":null,"abstract":"Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over IP service. The authors discuss service quality measures in legacy circuit switched networks and the key performance indicators that influence the quality of telephone service in packet networks. The main contribution of the paper is the proposal of utilizing the blocking probability calculation, which is based on the B-Erlang model used in legacy systems, to estimate the average bandwidth needed to handle a number of sources generating voice traffic in IP networks. Taking into account the average bandwidth required to carry out a one voice conversation, the total network capacity was calculated. The authors made analytical calculations which were confirmed by simulation studies. The problem of using different codecs and their influence on bandwidth consumption and overall service quality experienced by a user were also discussed in the paper. At the end of the paper, the authors defined the directions of further research that should be carried out, i.e. the development of dimensioning methods for networks carrying multimedia services with particular attention paid to video transmission and reliable quality assessment.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhi-jun Wu, Liang Liu, Changcan Yan, Jia Xu, Jin Lei
{"title":"The approach of SWIM data sharing based on multi-dimensional data encryption","authors":"Zhi-jun Wu, Liang Liu, Changcan Yan, Jia Xu, Jin Lei","doi":"10.23919/SOFTCOM.2017.8115587","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115587","url":null,"abstract":"System Wide Information Management (SWIM) is an information sharing mechanism for Next Generation Air Transportation System (NGATS). Based on the network technology, SWIM provides a platform for airlines, airports, air traffic management bureaus (ATMB) and so on, ensuring that related units of the civil aviation can share the data safely, effectively and timely. According to the characteristics of SWIM data, a data grading method based on its urgency and importance is proposed in this paper. In order to reach the required security level, this paper adopts multidimensional encryption algorithm to realize the security of data-sharing. Experiments show that this scheme can provide effective grade protection for SWIM shared data to ensure it's real-time and confidentiality.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129023238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs","authors":"Marko Zec, M. Mikuc","doi":"10.23919/SOFTCOM.2017.8115575","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115575","url":null,"abstract":"Over the past two decades, implementing routing lookups in dedicated hardware has been accepted as an undisputable gold standard in core Internet routers due to ever increasing performance requirements and unabated global routing table growth. Several recent proposals depart from that line of thinking and suggest that software algorithms running on commodity multi-core CPUs might (again) become well suited for the task. In this article we describe a refined implementation of the DXR routing lookup scheme and subject it to a series of synthetic tests using BGP table snapshots from major Internet exchange points. Our measurements show that the algorithm scales nearly linearly on contemporary multi-core microprocessors, while the achieved peak aggregate throughput of almost 2.5 billion lookups per second presents an over a threefold increase over previously published results. Our experiments show that the aggregate throughput of a software routing lookup algorithm running on a modern commodity microprocessor can outperform a state-of-the-art ASIC chip by more than an order of magnitude, with reasonable expectations that this gap could easily double on the emerging 32- and 36-thread commodity CPUs.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130838704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time localization and visualization of a sound source for virtual reality applications","authors":"A. Kose, A. Tepljakov, S. Astapov","doi":"10.23919/SOFTCOM.2017.8115577","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115577","url":null,"abstract":"In this paper, we present our findings related to the problem of localization and visualization of a sound source placed in the same room as the listener. This is a part of a larger research effort devoted to studying the effects of synesthesia—the act of experiencing one sense modality as another, e.g., sound as flashes of colors—in virtual reality. Towards that end, we apply a series of recently developed methods for detecting sound source in a three-dimensional space around the listener. We also apply a Kalman filter to smooth out the perceived motion. Further, we transform the audio signal into a series of visual shapes, such that the size of each shape is determined by the loudness of the sound source, and its color is determined by the dominant spectral component of the sound. The developed prototype is verified in real time. The prototype configuration is described and some initial experimental results are reported and discussed. Some ideas for further development are also presented.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131764933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electric field radiated by a dipole antenna above a lossy half space: Comparison of plane wave approximation with the modified image theory approach","authors":"A. Šušnjara, D. Poljak, V. Doric","doi":"10.23919/SOFTCOM.2017.8115529","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115529","url":null,"abstract":"The paper deals with the comparison between the two approaches to account for the presence of a two media configuration when calculating the electric field radiated by the dipole antenna. The first approach features the well-known Fresnel reflection/transmission coefficient approximation which, beside the electric properties of two media, considers also the incidence angle at the interface. On the other hand, the Modified Image Theory (MIT) approach uses the approximation of a normal incidence, thus neglecting the refraction of the wave in the lower medium. The MIT approach thus simplifies the formulation thus providing the analytical solution and the derivation of the time domain computation. In this paper the frequency domain formulation is used. It is based on the Pocklington's integro-differential equation which is solved numerically using the Galerkin Bubnov scheme of Boundary Element Method. The results obtained by both approaches are compared and conclusions are given regarding the limitations and strengths of the MIT approach with respect to the Fresnel coefficients approximation. The comparison undertaken in this work can serve as a benchmark for the analytical solution modeling and time domain modeling.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gain analysis of cooperative broadcast in two-dimensional wireless networks","authors":"Keyvan Gharouni Saffar, M. Khabbazian","doi":"10.23919/SOFTCOM.2017.8115540","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115540","url":null,"abstract":"Energy accumulation is an approach to reducing the power consumption of broadcast. In conventional approaches, a node can decode the message if the received power from a single transmission is above a threshold. In contrast, in the cooperative approach based on energy accumulation, a node can decode the message if the sum of the received powers from any set of transmissions exceeds the threshold. An important question is how much energy can be saved in broadcast if energy accumulation is employed. Since employing energy accumulation adds extra design complexities, answering this question can help in deciding whether or not it should be implemented. Previously, it was shown that this saving is limited in linear wireless networks, irrespective of the network size, and the location of the nodes in the network. In this work, however, we show that this saving can increase with the network size in two-dimensional networks. Also, despite the fact that both problems of cooperative and non-cooperative broadcast with minimum energy are NP-hard, we establish a bound on the maximum saving that can be obtained.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}