2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge Scenarios Using BATMAN Routing Protocol 基于BATMAN路由协议的中央网桥和v型网桥MANET测试平台评估
Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli, F. Xhafa, Bexhet Kamo
{"title":"Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge Scenarios Using BATMAN Routing Protocol","authors":"Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli, F. Xhafa, Bexhet Kamo","doi":"10.1109/BWCCA.2013.21","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.21","url":null,"abstract":"A set of wireless mobile terminals, which cooperate by forwarding packets to each other defines a Mobile Ad hoc Network (MANET). MANETs are attractive for their potential use in several fields such as collaborative computing and smart environments. Considering the limited bandwidth capabilities of the wireless links, communication of MANET nodes needs to be investigated. In this paper, we analyze the performance of our MANET testbed in an outdoor bridge environment considering multihop and vertical communication in mesh and linear topology. We implement two scenarios to evaluate the communication in terms of throughput and jitter. The nodes on the testbed use Better Approach to MANET (BATMAN) routing protocol. From experimental results, throughput decreases when the number of hops increases and it has the best performance in Central Bridge (CB) scenario and mesh topology. While jitter improves for less number of hops and linear topology, which avoids the interference of other nodes.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Comparison for Different Communication Distances of Mesh Routers in WMN-SA Simulation System WMN-SA仿真系统中不同通信距离网状路由器的性能比较
Shinji Sakamoto, Elis Kulla, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa
{"title":"Performance Comparison for Different Communication Distances of Mesh Routers in WMN-SA Simulation System","authors":"Shinji Sakamoto, Elis Kulla, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa","doi":"10.1109/BWCCA.2013.54","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.54","url":null,"abstract":"One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost efficient broadband connectivity. There are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity and provide the best coverage in a set of uniformly distributed clients. From simulation results, we found that, for optimizing the size of Giant Component, the communication distance should be 70m or more. While, for optimizing the number of covered mesh clients, the communication distance should be 90m.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130424591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Protected Traffic Routing in Wireless Networks with Partial Multiple Link Failures 部分多链路故障无线网络中受保护流量路由研究
M. Pióro, D. Nace, Yoann Foquet
{"title":"On Protected Traffic Routing in Wireless Networks with Partial Multiple Link Failures","authors":"M. Pióro, D. Nace, Yoann Foquet","doi":"10.1109/BWCCA.2013.13","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.13","url":null,"abstract":"In this paper we study an optimization problem relevant for wireless networks. In such networks links are subject to capacity disruptions caused by changing weather/channel condition that force to adapt the modulation and coding schemes to the observed condition. To cope with this issue in network optimization, we propose a new strategy called the Flow Thinning Strategy. For traffic protection we assume (possibly) over-dimensioned normal path-flows (i.e., path-flows defined for the availability state with all links fully available, the so called normal state) that are thinned in a failure state-dependent way to adapt to fluctuating reduced capacity. What is important, the normal flows cannot be increased or restored in any way. Moreover, we assume that the demand volumes to be realized in states can be reduced as compared to the normal demands. To solve a link cost minimization problem corresponding to the above assumptions, we develop an original non-compact linear programming model together with its solution algorithm based on path generation. We also present a numerical study that compares the performance of the assumed flow-thinning routing with other routing strategies studied before. In the presented version, our model is applicable to wireless networks with non-interfering point-to-point links such as free space optical links or microwave links.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Consistency Checking Rules of Variability in Software Product Lines 软件产品线可变性的一致性检查规则
Jeong Ah Kim, Sehoon Kim
{"title":"Consistency Checking Rules of Variability in Software Product Lines","authors":"Jeong Ah Kim, Sehoon Kim","doi":"10.1109/BWCCA.2013.104","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.104","url":null,"abstract":"In product line, trace ability information is critical since product configuration is based on feature trace ability matrix. In this paper, we suggest consistency checking rules for verifying the trace ability information. With these rules, the correctness of product configuration can be improved.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM 基于局部三元模式和支持向量机的实时眨眼检测
J. Ryu, H. Yang, Yongho Seo
{"title":"Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM","authors":"J. Ryu, H. Yang, Yongho Seo","doi":"10.1109/BWCCA.2013.105","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.105","url":null,"abstract":"As smart devices become popular among people, there are many demands for handling these devices. Smart devices are different from desktop and laptop in that the smart devices cannot be used with user interface peripherals such as mouse and keyboard due to the nature of itself, portability. So here is our proposal, eye blinking detection algorithm for interacting with smart devices. This algorithm that we are going to suggest can replace the most important functions of mouse, \"clicking\". This is possible because \"Mouse Clicking\" can be easily replaced by \"Eye Blinking\". We focus on the fast detection algorithm for the real time performance. Current existing studies of eye blinking detection have not concerned about the detection speed while they have quite clear detection accuracy. In this paper, our algorithm is designed to achieve not only the detection accuracy but the rapid speed as well.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Quantitative Measure of the Security Risk Level of Enterprise Networks 企业网络安全风险水平的定量度量
Rashid Munir, Jules Pagna Disso, I. Awan, M. Mufti
{"title":"A Quantitative Measure of the Security Risk Level of Enterprise Networks","authors":"Rashid Munir, Jules Pagna Disso, I. Awan, M. Mufti","doi":"10.1109/BWCCA.2013.76","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.76","url":null,"abstract":"Along with the tremendous expansion of information technology and networking, the number of malicious attacks which cause disruption to business processes has concurrently increased. Despite such attacks, the aim for network administrators is to enable these systems to continue delivering the services they are intended for. Currently, many research efforts are directed towards securing network further whereas, little attention has been given to the quantification of network security which involves assessing the vulnerability of these systems to attacks. In this paper, a method is devised to quantify the security level of IT networks. This is achieved by electronically scanning the network using the vulnerability scanning tool (Nexpose) to identify the vulnerability level at each node classified according to the common vulnerability scoring system standards (critical, severe and moderate). Probabilistic approach is then applied to calculate an overall security risk level of sub networks and entire network. It is hoped that these metrics will be valuable for any network administrator to acquire an absolute risk assessment value of the network. The suggested methodology has been applied to a computer network of an existing UK organization with 16 nodes and a switch.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal by Metallic Pillars 二维方形晶格光子晶体中金属柱腔的共振
H. Maeda, K. Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata
{"title":"Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal by Metallic Pillars","authors":"H. Maeda, K. Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata","doi":"10.1109/BWCCA.2013.74","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.74","url":null,"abstract":"Measurement of cavity in two-dimensional square-lattice photonic crystal structure composed of metallic pillars was done to investigate its fundamental resonance characteristics. Implementation of the resonance based on another measurement of phase and wavelength along with the propagation axis could explain the behavior clearly.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions -- Application of Bounded-Variable and Meta-frontier Data Envelopment Analysis 老年人福利机构运营效率分析——基于有界变量和元前沿数据包络分析的应用
Ching-Yu Chen, Jwu-Rong Lin, T. Peng, Yanxi Yu
{"title":"An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions -- Application of Bounded-Variable and Meta-frontier Data Envelopment Analysis","authors":"Ching-Yu Chen, Jwu-Rong Lin, T. Peng, Yanxi Yu","doi":"10.1109/BWCCA.2013.65","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.65","url":null,"abstract":"This research aims at studying the operating efficiency of senior citizen welfare institutions in Taiwan. We evaluate technical efficiency (TE), technology gap ratio (TGR), and meta-frontier technical efficiency (MTE) by bounded-variable and meta-frontier data envelopment analysis. In the empirical study, we examine 91 welfare institutes for senior citizens in Taiwan. We also apply Tobit regression to study influences of relevant factors on operating efficiency.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123021070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate Communications MIMO合作通信中一种新的增强反馈协调方法
Yingni Zhang, Xiaofeng Tao, Dejian Xu
{"title":"A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate Communications","authors":"Yingni Zhang, Xiaofeng Tao, Dejian Xu","doi":"10.1109/BWCCA.2013.30","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.30","url":null,"abstract":"Multiple-Input Multiple-Output (MIMO) technique is applied in 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE) to enhance system throughput. Moreover, aiming to improve performance of the cell edge user, Cooperative Multi-Point Joint Transmission (CoMP JT), one of the key technologies in LTE-Advanced, utilizes multiple cells to transmit the user data. This paper presents a novel SU/MUCoMP JT scheme based on enhanced CQI (Channel Quality Index) feedback. The implementation of the proposed scheme is described in detail and its performance is verified by system level simulations. The paper demonstrates how downlink CoMP MIMO JT can be supported by an enhanced feedback method with reasonable feedback overhead, and how the current users transmission points are determined. Finally the improvement in system throughput brought by this method is verified.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design and Development of an On-Line 3DCG Builder for Multi-player 多人在线3dg生成器的设计与开发
Ningping Sun, Kousei Hayata
{"title":"The Design and Development of an On-Line 3DCG Builder for Multi-player","authors":"Ningping Sun, Kousei Hayata","doi":"10.1109/BWCCA.2013.97","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.97","url":null,"abstract":"Recently with the popularization of the smart phone and computer tablet terminal, the development of the efficient CG software application becomes more and more attractive. We have developed an interactive 3DCG builder and tried to apply it on internet environment for on-line multi-player. In this paper, we shall provide our design idea and development process.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信