{"title":"A new fusion structure model for real-time urban traffic state estimation by multisource traffic data fusion","authors":"Pan Zhang, Lanlan Rui, Xue-song Qiu, Ruichang Shi","doi":"10.1109/APNOMS.2016.7737227","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737227","url":null,"abstract":"In order to meet the requirements of traffic data fusion for real-time urban traffic state estimation, a new kind of fusion structure model is proposed. This fusion model consists of both spatial fusion and temporal fusion. First we use the power average operator as spatial fusion method. Then we propose a temporal correlation based data compression (TCDC) algorithm, based on segment linear regression (SLR) algorithm. Extensive simulation results demonstrate the effectiveness and correctness of TCDC algorithm, as well as TCDC's advantage over SLR on overall performance.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Ling Fan, D. Huang, Pin-Chun Wang, Cheng-Hsin Hsu
{"title":"Interference-aware video streaming over crowded unlicensed spectrum","authors":"Ching-Ling Fan, D. Huang, Pin-Chun Wang, Cheng-Hsin Hsu","doi":"10.1109/APNOMS.2016.7737216","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737216","url":null,"abstract":"Video conferences over the Internet with multiple participants have to be wirelessly connected to improve the communication efficiency. However, video conferences are often held in places suffering from crowded wireless medium, such as offices and schools. This leads to many challenges on providing high video conferencing experience. In this paper, we study the problem of video streaming over crowded wireless networks considering the interference. We conducted extensive experiments to model the unlicensed spectrum activity and design, implement, and evaluate an interference-aware bandwidth estimation and rate adaptation algorithm. The experiment results show that our proposed solution (i) reduces the retransmission ratio to lower than 6.5%, (ii) reduces the packet loss rate to 0.5% on average, (iii) achieves higher throughput, and (iv) leads to higher video quality than others by at least 8.3 dB in video quality.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Dong-Kyu Lee, C. Hong
{"title":"Decentralized spectrum allocation in D2D underlying cellular networks","authors":"S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Dong-Kyu Lee, C. Hong","doi":"10.1109/APNOMS.2016.7737199","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737199","url":null,"abstract":"The proliferation of novel network access devices and demand for high quality of service by the end users are proving to be insufficient and are straining the existing wireless cellular network capacity. An economic and promising alternate to enhance the spectral efficiency and network throughput is device to device (D2D) communication. However, enabling D2D communication poses significant challenges pertaining to the interference management. In this paper, we address the resource allocation problem for underlay D2D pairs. First, we formulate the resource allocation optimization problem with an objective to maximizes the throughput of all D2D pairs by imposing interference constraints for protecting the cellular users. Second, to solve the underlying mixed-integer non linear resource allocation problem, we propose a stable, self-organizing and distributed solution using matching theory. Finally, we simulate our proposition to validate the convergence, cellular user protection, and network throughput gains achieved by the proposal. Simulation results reveal that D2D pairs can achieve significant throughput gains (i.e., up to 45 - 91%) while protecting the cellular users compared to the scenario in which no D2D pairs exist.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"4 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable aggregation-based packet forwarding in Content Centric Networking","authors":"Anselme Ndikumana, Saeed Ullah, C. Hong","doi":"10.1109/APNOMS.2016.7737265","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737265","url":null,"abstract":"Content Centric Networking (CCN) is one of the Future Internet architectures that aims at improving content distribution and retrieval, where content is requested by name rather than IP address. Each content is partitioned into small units, namely chunks. In CCN, the consumer sends Interest packet in order to get a chunk of Data. Upon successful reception of the requested chunk, the consumer sends the next Interest packet. This policy of send Interest, wait for the Data to reach and generate next Interest makes the situation worst in case of large sized content. The result is uplink underutilization. To overcome the above highlighted issue, we propose Interest forwarding in CCN, which is based on packet aggregation through combining multiple chunk requests in one Interest packet, and content name aggregation. The Interest packet aggregation will reduce the number of Interest packets need to be sent in the network and downsize Pending Interest Table (PIT), while organizing content based on aggregated name reduces Content Store (CS) entries. The simulation results show that our proposal achieves high performance with throughput improvement, reduced number of Interest packets in network, PIT and CS entries over other existing proposal in the literature.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuan-Hsin Tung, Sheng-Chen Lo, Jen-Feng Shih, H. Lin
{"title":"An integrated security testing framework for Secure Software Development Life Cycle","authors":"Yuan-Hsin Tung, Sheng-Chen Lo, Jen-Feng Shih, H. Lin","doi":"10.1109/APNOMS.2016.7737238","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737238","url":null,"abstract":"Hundreds of vulnerabilities and security defects are disclosed by hackers, developers, and users. The better way to improve software security is to enhance security process into SDLC processes. To keep software secure, security enhancement of the SDLC process involves lots of practices and activities to achieve goal of security. However, how to adopt these activities well to improve software security is an important problem. In this paper, we propose an integrated security testing framework for secure software development life cycle. In our proposed framework, we apply security activities and practices of SSDLC to generate security guidelines. Furthermore, we integrate security testing tools as a platform to provide testing service and converge testing results of tools to improve accurate of test. To evaluate our proposed framework, we construct the prototype system by referring phases of framework. Our system can integrate various security testing tools and support secure activities in each phase of SSDLC. We had applied our system to at least 50 software developing projects. The results indicate that our prototype system can provide quality and stable service.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The monitoring system of Business support system with emergency prediction based on machine learning approach","authors":"Jen-hao Chen, Chao-Wen Huang, Chien-Wei Cheng","doi":"10.1109/APNOMS.2016.7737239","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737239","url":null,"abstract":"When Business support systems (BSS) suffer poor performance, the system administrator has to spot the problem of BSS as soon as possible. The monitoring system is a great help to quickly gain insight of the system from all sides. By the monitoring system, the administrator can evaluate various metrics on the different fields in one single arranged page and understands the whole picture of current system status from brief reports. Although this kind of problem solving flow does well in certain circumstance, it may still be too late for some critical BSS. To further improve the speed of trouble-shooting, administrator sets the thresholds to each performance metric. Those thresholds are set based on knowledge and experience of administrator. If the performance metric collected from the system is over the set threshold, monitoring system will send alerts to administrator to inform current BSS status, and he can check the system status in advance before the situation get worse. This kind of traditional approach finds the problem about ten minutes before the emergency break out. In our work, we leverage a machine learning approach to determine emergency earlier. The machine learning model we developed can predict the healthy status of the system before the emergency an hour with average 14 points error.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced registration procedure with NAV for mitigated contentions in M2M communications","authors":"N. Shahin, L. Tann, Young-Tak Kim","doi":"10.1109/APNOMS.2016.7737198","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737198","url":null,"abstract":"In Machine-to-Machine (M2M) communications based on IEEE 802.11ah protocol, a single access point (AP) should support up to 8000 stations within a coverage range of 1 Km using relatively low sub-1GHz wireless communication channel. The registrations of a large number of stations at network initialization or at any reboot of AP after a power failure, usually take more than 1 minute that prohibits agile cognitive sensing and adaptive control. In this paper, we propose an enhanced registration procedure for M2M communications based on IEEE 802.11ah with mitigated contention. In the proposed registration procedure, the authentication request/response and association request/response messages are extended to carry network allocation vector (NAV) to allocate the communication channel for combined processing of authentication and association to minimize contentions generated by massive wireless channel accesses from up to 8000 stations. We also analyze the optimal configuration of parameters of authentication control threshold (ACT)-based contention mitigations in registrations. The simulation experiments show that the proposed registration procedure with combined authentication and association reduces more than 15% of registration time for 8000 stations compared to currently existing solutions.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards task scheduling in a cloud-fog computing system","authors":"Xuan-Qui Pham, E. Huh","doi":"10.1109/APNOMS.2016.7737240","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737240","url":null,"abstract":"In recent years, with the advent of the Internet of Things (IoT), fog computing is introduced as a powerful complement to the cloud to handle the IoT's data and communications needs. The interplay and cooperation between the edge (fog) and the core (cloud) has recently received considerable attention. In this paper, we consider task scheduling in a cloud-fog computing system, where a fog provider can exploit the collaboration between its own fog nodes and the rented cloud nodes for efficiently executing users' large-scale offloading applications. We first formulate the task scheduling problem in such cloud-fog environment and then propose a heuristic-based algorithm, whose major objective is achieving the balance between the makespan and the monetary cost of cloud resources. The numerical results show that our proposed algorithm achieves better tradeoff value than other existing algorithms.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint base station association and power control for uplink cognitive small cell network","authors":"Tuan LeAnh, Seonhyeok Kim, C. Hong","doi":"10.1109/APNOMS.2016.7737194","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737194","url":null,"abstract":"In this paper, we propose a framework to jointly optimize user association and power control for the uplink cognitive small cell network (CSN). In the considered CSN, small cell base stations (SBSs) are deployed to serve a set of small cell user equipments (SUEs) by sharing the same licensed spectrum with a macrocell base station. The problem of joint user association and power allocation is formulated as an optimization problem, in which the goal is to maximize the overall uplink throughput while guaranteeing the SINR requirements of the served SUEs and MBS protection. To solve this problem, a distributed framework based on dual decomposition is proposed to find sub-optimal solution of the user association and transmit power in distributed manner. Moreover, distributed frameworks to achieve suboptimal solutions with low-computation complexity are also proposed. Simulation results show that the proposed approaches obtain suboptimal solutions with a small number of iterations.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124038166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Maritime Traffic Route from AIS network","authors":"Po-Ruey Lei, Tzu-Hao Tsai, Wen-Chih Peng","doi":"10.1109/APNOMS.2016.7737223","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737223","url":null,"abstract":"The recent build-up network of Automatic Identification System (AIS) equipped on vessels provides a rich source of vessel movement information. AIS is originally designed for automatically exchanging navigation information, such as their unique identification, position, course, and speed, with nearby vessels and terrestrial receivers to affect collision avoidance and safety control. The collected sequences of AIS logs can be considered as maritime trajectory data, i.e., the sequences of location points with timestamps. This vast amount of AIS trajectory data can be collected and employed to achieve an awareness of maritime traffic knowledge. This paper is devoted to discovery of maritime traffic route from trajectory data generated by AIS networks. However, AIS trajectory data discovery is a challenging task because of the trajectory data is available with uncertainty. Furthermore, unlike the vehicles' movements are constrained by road networks, there is no such a sea route for vessels to follow in marine areas. To overcome the challenges, we propose a framework of Maritime Traffic Route Discovery (abbreviated as MTRD) to generate pattern-aware routes to achieve an effective understanding of maritime traffic awareness. The proposed framework is evaluated on real AIS data and the experimental results shows that the proposed MTRD is able to extract the marine traffic route effectively and provides a cornerstone of maritime traffic knowledge for traffic management, anomaly detection, and conflict analysis in the future.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"2833 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124758855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}