{"title":"Optimized Handover Mechanism between eNBs and the Dynamic Network of HeNBs in 3GPP LTE","authors":"M. Fathy","doi":"10.1109/BWCCA.2013.10","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.10","url":null,"abstract":"This paper presents an optimized handover mechanism from eNodeBs (eNBs) to dynamic home eNodeBs (HeNBs) by introducing a proposed architecture for LTE femtocell network. In addition to that, showing how the dynamic network of femtocells can be established using the concepts of FFR (Fractional Frequency Reuse), ANR (Automatic Neighbor Relation) and the proposed feature of DNL (Dynamic Neighbor List). This gives the advantage of dynamism to HeNBs and so the chance to overcome on one of the most important challenges that face the femtocells, which is the ability of the subscribers to carry their own femtocells for use anywhere. Also, this paper explains a simple analytical model to compare between the standard architecture of LTE femtocell network and the proposed one. This comparison shows that the proposed architecture has a better performance through reducing the signaling load on core network.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marwane Ayaida, H. Fouchal, Y. Ghamri-Doudane, L. Afilal
{"title":"Efficient Coupling of Routing and Location-based Service for VANETs","authors":"Marwane Ayaida, H. Fouchal, Y. Ghamri-Doudane, L. Afilal","doi":"10.1109/BWCCA.2013.55","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.55","url":null,"abstract":"The high node mobility in Vehicular Ad-hoc Networks (VANETs) leads to frequent topology changes and link breaks. Geographic routing protocols are more suitable for these networks where the use of position-to-position paradigm to forward data. We need to know the destination position usually given by an external service denoted as a location-based service. However, geographic routing protocols and location-based services are often implemented separately and are not gathered. In this paper, we discuss a coupling mechanism of geographic routing protocols and hierarchical location-based services. We have implemented this mechanism under the NS-2 simulator. We have shown the reduction of the location-based service overhead. In the meantime, the packet delivery ratio and the average end-to-end delay have been improved.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mesh Net Viewer: A Visualization System for Wireless Mesh Networks","authors":"Yuki Kumata, A. Koyama","doi":"10.1109/BWCCA.2013.22","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.22","url":null,"abstract":"Wireless Mesh Networks (WMN) consist of several Access Points (APs) of Wireless Local Area Networks (WLAN) interconnected through wireless link. Though the WMN are superior to scalability and flexibility, the network structure becomes complex with increasing of APs. As the results, it is difficult for network manager to grasp an equipment failure and performance degradation occurred in WMN quickly and accurately. In this paper, we propose a visualization system for WMN to realize the management of WMN intuitively. In the proposed system, it is possible to visualize some information in WMN, such as node configuration, network topology, communication route to gateway (GW), and captured packets. In order to evaluate the proposed system, we constructed WMN and implemented the system. We showed the effectiveness of the proposed system by verifying the information collection time for the number of hops and the number of nodes.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127376702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Evaluations of Energy Management Methods in Supersaturated Cloud","authors":"Yuichiro Takabe, M. Uehara","doi":"10.1109/BWCCA.2013.46","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.46","url":null,"abstract":"The cost of cloud is proportional to the degree of aggregation of servers. We propose supersaturated cloud which has higher degree of aggregation than conventional clouds and apply the supersaturated cloud to educational cloud. Here, we define super saturation of cloud as allocating much more logical resource than physical resource. Supersaturated cloud degrades the performance a little but improves the cost performance drastically, From the viewpoint of energy saving, the supersaturated cloud consumes less energy than conventional clouds because it contains a smaller number of running nodes. In this paper, we propose Cloud Energy Management System (CEMS) in order to decrease energy consumption of supersaturated cloud. In CEMS, we can select the policy of instance allocation methods such as performance first and energy first. We have evaluated them by comparing with each other via simulation. By predicting the life time of an instance, the best method will be chosen.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Plausible Solution to SCADA Security Honeypot Systems","authors":"Jules Pagna Disso, K. Jones, Steven Bailey","doi":"10.1109/BWCCA.2013.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.77","url":null,"abstract":"The need to urgently address the security issues related to SCADA system remains high. Contrary to regular IT systems, most successful SCADA attacks can have serious consequences on the nation's economy, stability and, worse affect people's live directly. In this paper, we analyse the use of honey pot systems as a plausible solution to SCADA security problems. We start by analysing the threat landscape of SCADA systems and discuss the comparative differences between standard IT security and the required security for SCADA systems. After analysis of, various honey pots features in relation to SCADA security, we setup an experimental but realistic honey pot SCADA environment. We then test the suitability of honey pots in protecting SCADA systems and the efficiency of ``anti-honey pot'' techniques. Our results show, that when used properly, a high interaction honey pot can greatly enhance SCADA system security, and in some cases better than any other security system. We conclude by discussing our future work related to honey pots.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ullah, N. Javaid, Ilyas Khan, A. Mahmood, M. U. Farooq
{"title":"Residential Energy Consumption Controlling Techniques to Enable Autonomous Demand Side Management in Future Smart Grid Communications","authors":"M. Ullah, N. Javaid, Ilyas Khan, A. Mahmood, M. U. Farooq","doi":"10.1109/BWCCA.2013.94","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.94","url":null,"abstract":"This paper presents an overview of home appliances scheduling techniques to implement demand side management in smart grid. Increasing demand of consumers have affected the power system badly as power generation system faces a number of challenges both in quality and quantity. Economical generation and efficient consumption can solve this problem in future smart grid as it is integrated with information and communication technologies. Smart grid has opportunities to employ different pricing schemes which help also in increasing the efficiency of appliances scheduling techniques. Optimal energy consumption scheduling minimizes the energy consumption cost and reduces the Peak-to-Average Ratio (PAR) as well as peak load demand. In this work, we discuss different energy consumption scheduling schemes that schedule the household appliances in real-time to achieve minimum energy consumption cost and reduce peak demand to shape the load curve.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shin Matsuo, Weihua Sun, N. Shibata, T. Kitani, Minoru Ito
{"title":"BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surrounding a Building","authors":"Shin Matsuo, Weihua Sun, N. Shibata, T. Kitani, Minoru Ito","doi":"10.1109/BWCCA.2013.28","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.28","url":null,"abstract":"Aiming at fast establishment of a wireless network around a multi-level building in a disaster area, we propose an efficient method to determine the locations of network nodes in the air. Nodes are attached to balloons outside a building and deployed in the air so that the network can be accessed from anywhere in the building. In this paper, we introduce an original radio propagation model for predicting path loss from an outdoor position to a position inside a building. In order to address the three-dimensional deployment problem, the proposed method optimizes an objective function for satisfying two goals: (1) guarantee the coverage: the target space needs to be covered by over a certain percentage by wireless network nodes, (2) minimize the number of network nodes. For solving this problem, we propose an algorithm based on a genetic algorithm. To evaluate the proposed method, we compared our method with three benchmark methods, and the results show that the proposed method requires fewer nodes than other methods.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise","authors":"Mai Iwamoto, S. Oshima, T. Nakashima","doi":"10.1109/BWCCA.2013.100","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.100","url":null,"abstract":"The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall R adopting the complexity as the detection standard and the precision P adopting the complete token sequence for exercise programs submitted by students.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Scenario-Based Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares","authors":"J. Cho","doi":"10.1109/BWCCA.2013.107","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.107","url":null,"abstract":"First investigate an integrated architecture for supporting interoperability among heterogeneous middle wares under home network. We then propose a scenario-based user-oriented integrated architecture for efficient home automation. HOMI(Home network Middleware for Interoperability) architecture proposed in this dissertation provides interfaces that assist users with designing and modifying desirable scenarios using a script language called HOMIL(HOMI Language). Different from existing integrated middleware architectures, HOMI improves efficiency and convenience of interoperation between heterogeneous appliances for home automation allowing users to construct and organize scenarios through these interfaces. HOMI classifies interoperation services into time context, synchronization context, and a synchronization context and helps to execute next services considering contexts when a specific event occurs. Applying modified scenarios immediately to home network environment, HOMI assists users with receiving seamless services without installing new applications, updating the server, or rebooting in order to adapt new scenarios. Lastly, distributing agents into multiple devices, we reduce the overhead occurred in a centralized the integrated middleware architecture.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path Loss Estimation for Analytically Expressed Inhomogeneous Random Rough Surface","authors":"K. Uchida, M. Takematsu, J. Honda","doi":"10.1109/BWCCA.2013.73","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.73","url":null,"abstract":"This paper is concerned with the propagation characteristics of electromagnetic (EM) waves propagating along inhomogeneous random rough surfaces (RRSs) with power spectral density functions of Uniform, Gaussian and Exponential types of spectra. According to the convolution method, RRS generation is performed by the convolution of Gaussian pulses with a weighting function derived from the Fourier transform of an appropriate amplitude spectral density function. Since the weighting functions for the above mentioned three types of spectra are derived analytically, we can generate inhomogeneous RRSs only through changing the standard deviation of height dv and the correlation length cl arbitrarily from point to point. Using the least squares method (LSM) based on the 1-ray model, we estimate numerically the modification factor alpha and propagation order of distance beta with respect to EM wave propagation along inhomogeneous RRSs. We also show some numerical examples in order to demonstrate the influence of the in homogeneity of RRS to the propagation characteristics.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}