{"title":"A Novel Approach for Faulty Sensor Detection and Data Correction in Wireless Sensor Network","authors":"A. Farruggia, S. Vitabile","doi":"10.1109/BWCCA.2013.15","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.15","url":null,"abstract":"The main Wireless Sensor Networks purpose is represented by areas of interest monitoring. Even if the Wireless sensor network is properly initialized, errors can occur during its monitoring tasks. The present work describes an approach for detecting faulty sensors in Wireless Sensor Network and for correcting their corrupted data. The approach is based on the assumption that exist a spatio-temporal cross-correlations among sensors. Two sequential mathematical tools are used. The first stage is a probabilistic tools, namely Markov Random Field, for a two-fold sensor classification (working or damaged). The last stage is represented by the Locally Weighted Regression model, a learning techniques modelling each sensor on the basis of its neighbours. If the sensor is working, the approach actives a learning phase and the sensor model is trained, while if the sensor is damaged, a correction phase starts and the related corrupted data are replaced with the data produced by the learned model. The effectiveness of the proposed approach has been proved using real data obtained from the Intel Berkeley Research Laboratory, over which different classes of faults were artificially superimposed. The proposed architecture achieves satisfactory results, since it successfully corrects faulty data produced by sensors.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Method of New Digital Watermark Generation Using QR-Code","authors":"Dae-Jea Cho","doi":"10.1109/BWCCA.2013.102","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.102","url":null,"abstract":"In existing digital watermarking methods, images which have specific pattern images or sign images were used as digital watermarks. Additionally, binary data which were calculated with meaningless Pseudo noise sequences or chaotic functions were used as digital watermarks. However, this method has a limitation in watermark size to be inserted according to the size of original image. This paper suggested a method to generate QR-code which could take much information and use them as digital watermarks. QR-code not only can take much information in QR-code itself but also can include various information like web page when they are connected with links. Additionally, QR-code has a capability to soundly recover the saved data by correcting the errors even if the parts of the images are damaged. This paper used these strengths of QR-code. Suggested method in this paper can overcome the restricted storage limits because existing PN-sequences and Chaos sequences can be used instead and more information can be hidden in the original images, compared with existing method.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130390153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Makoto Ikeda, Taiki Honda, Evjola Spaho, M. Hiyama, L. Barolli
{"title":"Effect of Roadside APs in VANETs: A Comparison Study","authors":"Makoto Ikeda, Taiki Honda, Evjola Spaho, M. Hiyama, L. Barolli","doi":"10.1109/BWCCA.2013.57","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.57","url":null,"abstract":"In recent years, Vehicular Ad-hoc Networks (VANETs) have emerged as a unique type of MANETs. VANETs are an important component of the Intelligent Transportation Systems (ITS). They can been utilized to guarantee road safety, avoid potential accidents and create new forms of inter-vehicle communications. In this paper, we investigate the performance of OLSR protocol for video streaming application. The simulations are conducted in urban environment in two scenarios, where roadside Access Points (AP) are present and not present. We consider 802.11p standard and send multiple video streaming flows over UDP. We use throughput, delay and jitter as evaluation metrics. Based on simulation results, we noticed that transmission for streaming is improved when roadside AP are used.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128398353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Attar, M. Izadi, Maedeh Movahedian, Shantia Yarahmadian
{"title":"Coverage Estimation in Floorplan Visual Sensor Networks","authors":"A. Attar, M. Izadi, Maedeh Movahedian, Shantia Yarahmadian","doi":"10.1109/BWCCA.2013.32","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.32","url":null,"abstract":"The issue of Coverage in visual sensor networks (VSNs) has attracted considerable attention due to sensors unique directional sensing characteristic. It answers the question that how well the target field is monitored by a network of sensors with video/image capturing capability. In floor plan scenario the network is to monitor a plane parallel to the sensors' deployment plane. Coverage probability estimation based on both the sensors and the network related parameters is a fundamental issue in this field. For a large scale application in which the sensors' deployment is done by dropping sensors from an airplane, random sensors' placement and orientation according to their respective distribution is a practical assumption. Although some studies exist on the coverage problem of floor plan VSNs, none of them has derived a closed form solution for the coverage estimation, which is the main contribution of this paper. The Simulation results validated the proposed mathematical.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interferometric Coherence Optimization: A Comparative Study","authors":"S. Tahraoui, M. Ouarzeddine, B. Souissi","doi":"10.1109/BWCCA.2013.75","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.75","url":null,"abstract":"The Interferometric coherence measures the degree of similarity or the correlation between the radar signals corresponding to complex SAR images viewed from close angles. The strong dependence of the interferometric coherence to the polarization state can consider that there is a combination of polarization to achieve maximum interferometric coherence. The methods developed in this field are based on the combination of information derived from polarimetric channels of the interferometric couple and define new projection vectors that maximize the highest possible value of coherence. In this paper we investigated two interferometric coherence optimization methods. The first one is based on the selection of the best pair of projection vectors that maximizes the coherence. The corresponding algorithm leads to an eigenvectors / eigenvalues problem, where each vector represents a scattering mechanism used for view. The second method used an identical projection vector for the two images representing a unique scattering mechanism. To evaluate this work, we used a couple of interferometric airborne polarimetric data acquired on the Tapajos in Brazil, in the P band. Results compared to classical coherence reveals that both methods give better results than single acquisition, however, the first one is the best.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evjola Spaho, Makoto Ikeda, L. Barolli, F. Xhafa, Vladi Koliçi, Jiro Iwashige
{"title":"Performance Evaluation of AODV Routing Protocol in VANETs Considering Multi-flows Traffic","authors":"Evjola Spaho, Makoto Ikeda, L. Barolli, F. Xhafa, Vladi Koliçi, Jiro Iwashige","doi":"10.1109/BWCCA.2013.141","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.141","url":null,"abstract":"In this paper, we investigate the performance of AODV routing protocol in a Manhattan grid scenario when sending triple flow. We considered two different scenarios with three TCP flows (TCP1xTCP2xTCP3) and one UDP flow and two TCP flows (UDPxTCP1xTCP2) and data rates of 0.1 Mbps and 1 Mbps. For the simulations, we used SUMO to generate the vehicle movement and NS3 to analyze the network performance. We considered IEEE 802.11p standard and TwoRayGroundPropagationLossModel. We evaluate the network performance considering throughput and cwnd metrics. The simulation results show that TCP flows during the beginning phases of transmission performs good because of the slow-start mechanism. For TCP1xTCP2xTCP3 scenario and small data rates, there are some oshillations, but all TCP flows send data to destination almost all the simulation time. For UDPxTCP1xTCP2 scenario and small data rates, TCP flows after detecting congestion they send only few packets and UDP have priority. For UDPxTCP1xTCP2 scenario and big data rates, TCP and UDP have competing data flows going over the same intermediate nodes and UDP is more aggressive than TCP.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115766483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Power Control Mechanism Based on Priority Grouping for Small Cell Networks","authors":"A. Alexiou, Dimitrios Bilios, C. Bouras","doi":"10.1109/BWCCA.2013.36","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.36","url":null,"abstract":"Future mobile networks following Long Term Evolution (LTE) will be characterized by demanding services, in terms of bandwidth and delay, already dominant in wired networks, such as cloud-computing, High Definition of anything (HDOA) and highly-interactive online games. Small Cell technology is one of the key-technologies aiming to address the need for ultra-high performance in future mobile networks. This paper is focused on efficient power control in Small Cell Networks (SCNs). In particular, we propose a power control mechanism for efficient power allocation in SCNs. The proposed mechanism efficiently controls systems' interference while on the other hand guarantees home user QoS. We introduce the methodology of Priority Grouping, in which home users in the topology is assigned to one of the available groups with different priorities in terms of power requirements and requested traffic load. The mechanism dynamically updates the Home evolved Node B power setting based on the topology of the macro and home users in real time. Additionally, depending on the examined traffic scenario the mechanism can provide better protection (in terms of interference) either on macro users or on home users.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design of State Acquisition Function Using Range Image Sensor for 3D Symbiotic Space","authors":"T. Kawamura, Toru Abe, T. Suganuma","doi":"10.1109/BWCCA.2013.110","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.110","url":null,"abstract":"We are aiming for realization of a 3D symbiotic space system that supports effective interaction among users in a real space and avatars in a virtual space by fusing both spaces sensuously. As described in this paper, we explain the improved design of a state acquisition function for the 3D symbiotic space system, which acquires the states of real space users to synchronize the states of virtual space avatars with them. Specifically, we propose a method to acquire the detailed behavior of real space users using a range image sensor. Through quantitative and qualitative experiments, we demonstrate the effectiveness of our proposed method for improving sensations for a 3D symbiotic space system.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Lounis, Abdelkrim Hadjidj, A. Bouabdallah, Y. Challal
{"title":"Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management","authors":"A. Lounis, Abdelkrim Hadjidj, A. Bouabdallah, Y. Challal","doi":"10.1109/BWCCA.2013.142","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.142","url":null,"abstract":"Recently introduced, Attribute-based encryption (ABE) is a promising cryptographic method proposed by Sahai and Waters. This technique provides means for designing scalable and fine-grained access control. In ABE, data are encrypted with an access structure which is the logical expression of the access policy (eg: the data can be accessed by physician in cardiology division or by nurses). The cyphertext (encrypted data) can be decrypted by any user if his secret key has attributes that satisfy the access policy. The power of ABE is that we do not need to rely on the storage server for avoiding unauthorized data access since the access policy is embedded in the cyphertext itself. This makes ABE good solution to provide a fine-grained access control for medical applications, where data is outsourced on untrusted servers like the case of the Cloud. However, for emergency management, integrating ABE creates particular challenges for providing temporary access victims medical data when this is needed. In this paper we present our architecture for secure emergency management in healthcare area. We address the challenge of ABE integrating for providing temporary access victims medical data in emergency situation. In addition, we use wireless sensor network (WSN) technology to provide early emergency detection.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in Taiwan","authors":"I. Lin, Che-Min Lin, Chenglong Sun","doi":"10.1109/BWCCA.2013.69","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.69","url":null,"abstract":"Due to the flourishing development of mobile communications, Internet businesses, and mobile broadband, handheld mobile communications equipment is commonplace and the number of mobile phone users and fixed-line broadband users is growing rapidly every day. As the telecom industry stores massive amounts of users' personal Information, operators need to uphold users' trust in them, so users can enjoy the telecommunication services worry-free! Personal information security is of major concern in society today and also a social responsibility of enterprises. In response to the new Personal Information Protection Act in Taiwan, how carriers with imported information security management system can integrate the new Personal Information Protection Act to achieve their custodial responsibility must be discussed. Through the key management elements of ISO27001 & ISO27011 that correspond to the norms set to the appropriate security maintenance measures in Article 12 of the new Personal Information Protection Act Enforcement Rules in Taiwan, how carriers can strengthen management and educational training in compliance with the Act also requires discussion in Taiwan.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}