2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Optimized Handover Mechanism between eNBs and the Dynamic Network of HeNBs in 3GPP LTE 3GPP LTE中enb与henb动态网络的优化切换机制
M. Fathy
{"title":"Optimized Handover Mechanism between eNBs and the Dynamic Network of HeNBs in 3GPP LTE","authors":"M. Fathy","doi":"10.1109/BWCCA.2013.10","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.10","url":null,"abstract":"This paper presents an optimized handover mechanism from eNodeBs (eNBs) to dynamic home eNodeBs (HeNBs) by introducing a proposed architecture for LTE femtocell network. In addition to that, showing how the dynamic network of femtocells can be established using the concepts of FFR (Fractional Frequency Reuse), ANR (Automatic Neighbor Relation) and the proposed feature of DNL (Dynamic Neighbor List). This gives the advantage of dynamism to HeNBs and so the chance to overcome on one of the most important challenges that face the femtocells, which is the ability of the subscribers to carry their own femtocells for use anywhere. Also, this paper explains a simple analytical model to compare between the standard architecture of LTE femtocell network and the proposed one. This comparison shows that the proposed architecture has a better performance through reducing the signaling load on core network.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Coupling of Routing and Location-based Service for VANETs vanet中路由和位置服务的有效耦合
Marwane Ayaida, H. Fouchal, Y. Ghamri-Doudane, L. Afilal
{"title":"Efficient Coupling of Routing and Location-based Service for VANETs","authors":"Marwane Ayaida, H. Fouchal, Y. Ghamri-Doudane, L. Afilal","doi":"10.1109/BWCCA.2013.55","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.55","url":null,"abstract":"The high node mobility in Vehicular Ad-hoc Networks (VANETs) leads to frequent topology changes and link breaks. Geographic routing protocols are more suitable for these networks where the use of position-to-position paradigm to forward data. We need to know the destination position usually given by an external service denoted as a location-based service. However, geographic routing protocols and location-based services are often implemented separately and are not gathered. In this paper, we discuss a coupling mechanism of geographic routing protocols and hierarchical location-based services. We have implemented this mechanism under the NS-2 simulator. We have shown the reduction of the location-based service overhead. In the meantime, the packet delivery ratio and the average end-to-end delay have been improved.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mesh Net Viewer: A Visualization System for Wireless Mesh Networks 网状网络查看器:无线网状网络的可视化系统
Yuki Kumata, A. Koyama
{"title":"Mesh Net Viewer: A Visualization System for Wireless Mesh Networks","authors":"Yuki Kumata, A. Koyama","doi":"10.1109/BWCCA.2013.22","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.22","url":null,"abstract":"Wireless Mesh Networks (WMN) consist of several Access Points (APs) of Wireless Local Area Networks (WLAN) interconnected through wireless link. Though the WMN are superior to scalability and flexibility, the network structure becomes complex with increasing of APs. As the results, it is difficult for network manager to grasp an equipment failure and performance degradation occurred in WMN quickly and accurately. In this paper, we propose a visualization system for WMN to realize the management of WMN intuitively. In the proposed system, it is possible to visualize some information in WMN, such as node configuration, network topology, communication route to gateway (GW), and captured packets. In order to evaluate the proposed system, we constructed WMN and implemented the system. We showed the effectiveness of the proposed system by verifying the information collection time for the number of hops and the number of nodes.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127376702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Evaluations of Energy Management Methods in Supersaturated Cloud 过饱和云环境下能量管理方法的评价
Yuichiro Takabe, M. Uehara
{"title":"The Evaluations of Energy Management Methods in Supersaturated Cloud","authors":"Yuichiro Takabe, M. Uehara","doi":"10.1109/BWCCA.2013.46","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.46","url":null,"abstract":"The cost of cloud is proportional to the degree of aggregation of servers. We propose supersaturated cloud which has higher degree of aggregation than conventional clouds and apply the supersaturated cloud to educational cloud. Here, we define super saturation of cloud as allocating much more logical resource than physical resource. Supersaturated cloud degrades the performance a little but improves the cost performance drastically, From the viewpoint of energy saving, the supersaturated cloud consumes less energy than conventional clouds because it contains a smaller number of running nodes. In this paper, we propose Cloud Energy Management System (CEMS) in order to decrease energy consumption of supersaturated cloud. In CEMS, we can select the policy of instance allocation methods such as performance first and energy first. We have evaluated them by comparing with each other via simulation. By predicting the life time of an instance, the best method will be chosen.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Plausible Solution to SCADA Security Honeypot Systems SCADA安全蜜罐系统的可行解决方案
Jules Pagna Disso, K. Jones, Steven Bailey
{"title":"A Plausible Solution to SCADA Security Honeypot Systems","authors":"Jules Pagna Disso, K. Jones, Steven Bailey","doi":"10.1109/BWCCA.2013.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.77","url":null,"abstract":"The need to urgently address the security issues related to SCADA system remains high. Contrary to regular IT systems, most successful SCADA attacks can have serious consequences on the nation's economy, stability and, worse affect people's live directly. In this paper, we analyse the use of honey pot systems as a plausible solution to SCADA security problems. We start by analysing the threat landscape of SCADA systems and discuss the comparative differences between standard IT security and the required security for SCADA systems. After analysis of, various honey pots features in relation to SCADA security, we setup an experimental but realistic honey pot SCADA environment. We then test the suitability of honey pots in protecting SCADA systems and the efficiency of ``anti-honey pot'' techniques. Our results show, that when used properly, a high interaction honey pot can greatly enhance SCADA system security, and in some cases better than any other security system. We conclude by discussing our future work related to honey pots.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Residential Energy Consumption Controlling Techniques to Enable Autonomous Demand Side Management in Future Smart Grid Communications 住宅能耗控制技术在未来智能电网通信中实现自主需求侧管理
M. Ullah, N. Javaid, Ilyas Khan, A. Mahmood, M. U. Farooq
{"title":"Residential Energy Consumption Controlling Techniques to Enable Autonomous Demand Side Management in Future Smart Grid Communications","authors":"M. Ullah, N. Javaid, Ilyas Khan, A. Mahmood, M. U. Farooq","doi":"10.1109/BWCCA.2013.94","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.94","url":null,"abstract":"This paper presents an overview of home appliances scheduling techniques to implement demand side management in smart grid. Increasing demand of consumers have affected the power system badly as power generation system faces a number of challenges both in quality and quantity. Economical generation and efficient consumption can solve this problem in future smart grid as it is integrated with information and communication technologies. Smart grid has opportunities to employ different pricing schemes which help also in increasing the efficiency of appliances scheduling techniques. Optimal energy consumption scheduling minimizes the energy consumption cost and reduces the Peak-to-Average Ratio (PAR) as well as peak load demand. In this work, we discuss different energy consumption scheduling schemes that schedule the household appliances in real-time to achieve minimum energy consumption cost and reduce peak demand to shape the load curve.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surrounding a Building 气球网:建筑物周围三维无线网络的部署方法
Shin Matsuo, Weihua Sun, N. Shibata, T. Kitani, Minoru Ito
{"title":"BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surrounding a Building","authors":"Shin Matsuo, Weihua Sun, N. Shibata, T. Kitani, Minoru Ito","doi":"10.1109/BWCCA.2013.28","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.28","url":null,"abstract":"Aiming at fast establishment of a wireless network around a multi-level building in a disaster area, we propose an efficient method to determine the locations of network nodes in the air. Nodes are attached to balloons outside a building and deployed in the air so that the network can be accessed from anywhere in the building. In this paper, we introduce an original radio propagation model for predicting path loss from an outdoor position to a position inside a building. In order to address the three-dimensional deployment problem, the proposed method optimizes an objective function for satisfying two goals: (1) guarantee the coverage: the target space needs to be covered by over a certain percentage by wireless network nodes, (2) minimize the number of network nodes. For solving this problem, we propose an algorithm based on a genetic algorithm. To evaluate the proposed method, we compared our method with three benchmark methods, and the results show that the proposed method requires fewer nodes than other methods.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise 一种基于令牌的非法复制检测方法,使用程序练习的复杂性
Mai Iwamoto, S. Oshima, T. Nakashima
{"title":"A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise","authors":"Mai Iwamoto, S. Oshima, T. Nakashima","doi":"10.1109/BWCCA.2013.100","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.100","url":null,"abstract":"The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall R adopting the complexity as the detection standard and the precision P adopting the complete token sequence for exercise programs submitted by students.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of Scenario-Based Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares 支持异构家庭网络中间件互操作性的基于场景的体系结构设计
J. Cho
{"title":"Design of Scenario-Based Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares","authors":"J. Cho","doi":"10.1109/BWCCA.2013.107","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.107","url":null,"abstract":"First investigate an integrated architecture for supporting interoperability among heterogeneous middle wares under home network. We then propose a scenario-based user-oriented integrated architecture for efficient home automation. HOMI(Home network Middleware for Interoperability) architecture proposed in this dissertation provides interfaces that assist users with designing and modifying desirable scenarios using a script language called HOMIL(HOMI Language). Different from existing integrated middleware architectures, HOMI improves efficiency and convenience of interoperation between heterogeneous appliances for home automation allowing users to construct and organize scenarios through these interfaces. HOMI classifies interoperation services into time context, synchronization context, and a synchronization context and helps to execute next services considering contexts when a specific event occurs. Applying modified scenarios immediately to home network environment, HOMI assists users with receiving seamless services without installing new applications, updating the server, or rebooting in order to adapt new scenarios. Lastly, distributing agents into multiple devices, we reduce the overhead occurred in a centralized the integrated middleware architecture.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path Loss Estimation for Analytically Expressed Inhomogeneous Random Rough Surface 解析表示非齐次随机粗糙表面的路径损失估计
K. Uchida, M. Takematsu, J. Honda
{"title":"Path Loss Estimation for Analytically Expressed Inhomogeneous Random Rough Surface","authors":"K. Uchida, M. Takematsu, J. Honda","doi":"10.1109/BWCCA.2013.73","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.73","url":null,"abstract":"This paper is concerned with the propagation characteristics of electromagnetic (EM) waves propagating along inhomogeneous random rough surfaces (RRSs) with power spectral density functions of Uniform, Gaussian and Exponential types of spectra. According to the convolution method, RRS generation is performed by the convolution of Gaussian pulses with a weighting function derived from the Fourier transform of an appropriate amplitude spectral density function. Since the weighting functions for the above mentioned three types of spectra are derived analytically, we can generate inhomogeneous RRSs only through changing the standard deviation of height dv and the correlation length cl arbitrarily from point to point. Using the least squares method (LSM) based on the 1-ray model, we estimate numerically the modification factor alpha and propagation order of distance beta with respect to EM wave propagation along inhomogeneous RRSs. We also show some numerical examples in order to demonstrate the influence of the in homogeneity of RRS to the propagation characteristics.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信