Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli, F. Xhafa, Bexhet Kamo
{"title":"Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge Scenarios Using BATMAN Routing Protocol","authors":"Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli, F. Xhafa, Bexhet Kamo","doi":"10.1109/BWCCA.2013.21","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.21","url":null,"abstract":"A set of wireless mobile terminals, which cooperate by forwarding packets to each other defines a Mobile Ad hoc Network (MANET). MANETs are attractive for their potential use in several fields such as collaborative computing and smart environments. Considering the limited bandwidth capabilities of the wireless links, communication of MANET nodes needs to be investigated. In this paper, we analyze the performance of our MANET testbed in an outdoor bridge environment considering multihop and vertical communication in mesh and linear topology. We implement two scenarios to evaluate the communication in terms of throughput and jitter. The nodes on the testbed use Better Approach to MANET (BATMAN) routing protocol. From experimental results, throughput decreases when the number of hops increases and it has the best performance in Central Bridge (CB) scenario and mesh topology. While jitter improves for less number of hops and linear topology, which avoids the interference of other nodes.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shinji Sakamoto, Elis Kulla, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa
{"title":"Performance Comparison for Different Communication Distances of Mesh Routers in WMN-SA Simulation System","authors":"Shinji Sakamoto, Elis Kulla, Tetsuya Oda, L. Barolli, Makoto Ikeda, F. Xhafa","doi":"10.1109/BWCCA.2013.54","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.54","url":null,"abstract":"One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost efficient broadband connectivity. There are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity and provide the best coverage in a set of uniformly distributed clients. From simulation results, we found that, for optimizing the size of Giant Component, the communication distance should be 70m or more. While, for optimizing the number of covered mesh clients, the communication distance should be 90m.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130424591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Protected Traffic Routing in Wireless Networks with Partial Multiple Link Failures","authors":"M. Pióro, D. Nace, Yoann Foquet","doi":"10.1109/BWCCA.2013.13","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.13","url":null,"abstract":"In this paper we study an optimization problem relevant for wireless networks. In such networks links are subject to capacity disruptions caused by changing weather/channel condition that force to adapt the modulation and coding schemes to the observed condition. To cope with this issue in network optimization, we propose a new strategy called the Flow Thinning Strategy. For traffic protection we assume (possibly) over-dimensioned normal path-flows (i.e., path-flows defined for the availability state with all links fully available, the so called normal state) that are thinned in a failure state-dependent way to adapt to fluctuating reduced capacity. What is important, the normal flows cannot be increased or restored in any way. Moreover, we assume that the demand volumes to be realized in states can be reduced as compared to the normal demands. To solve a link cost minimization problem corresponding to the above assumptions, we develop an original non-compact linear programming model together with its solution algorithm based on path generation. We also present a numerical study that compares the performance of the assumed flow-thinning routing with other routing strategies studied before. In the presented version, our model is applicable to wireless networks with non-interfering point-to-point links such as free space optical links or microwave links.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consistency Checking Rules of Variability in Software Product Lines","authors":"Jeong Ah Kim, Sehoon Kim","doi":"10.1109/BWCCA.2013.104","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.104","url":null,"abstract":"In product line, trace ability information is critical since product configuration is based on feature trace ability matrix. In this paper, we suggest consistency checking rules for verifying the trace ability information. With these rules, the correctness of product configuration can be improved.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM","authors":"J. Ryu, H. Yang, Yongho Seo","doi":"10.1109/BWCCA.2013.105","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.105","url":null,"abstract":"As smart devices become popular among people, there are many demands for handling these devices. Smart devices are different from desktop and laptop in that the smart devices cannot be used with user interface peripherals such as mouse and keyboard due to the nature of itself, portability. So here is our proposal, eye blinking detection algorithm for interacting with smart devices. This algorithm that we are going to suggest can replace the most important functions of mouse, \"clicking\". This is possible because \"Mouse Clicking\" can be easily replaced by \"Eye Blinking\". We focus on the fast detection algorithm for the real time performance. Current existing studies of eye blinking detection have not concerned about the detection speed while they have quite clear detection accuracy. In this paper, our algorithm is designed to achieve not only the detection accuracy but the rapid speed as well.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rashid Munir, Jules Pagna Disso, I. Awan, M. Mufti
{"title":"A Quantitative Measure of the Security Risk Level of Enterprise Networks","authors":"Rashid Munir, Jules Pagna Disso, I. Awan, M. Mufti","doi":"10.1109/BWCCA.2013.76","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.76","url":null,"abstract":"Along with the tremendous expansion of information technology and networking, the number of malicious attacks which cause disruption to business processes has concurrently increased. Despite such attacks, the aim for network administrators is to enable these systems to continue delivering the services they are intended for. Currently, many research efforts are directed towards securing network further whereas, little attention has been given to the quantification of network security which involves assessing the vulnerability of these systems to attacks. In this paper, a method is devised to quantify the security level of IT networks. This is achieved by electronically scanning the network using the vulnerability scanning tool (Nexpose) to identify the vulnerability level at each node classified according to the common vulnerability scoring system standards (critical, severe and moderate). Probabilistic approach is then applied to calculate an overall security risk level of sub networks and entire network. It is hoped that these metrics will be valuable for any network administrator to acquire an absolute risk assessment value of the network. The suggested methodology has been applied to a computer network of an existing UK organization with 16 nodes and a switch.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Maeda, K. Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata
{"title":"Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal by Metallic Pillars","authors":"H. Maeda, K. Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata","doi":"10.1109/BWCCA.2013.74","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.74","url":null,"abstract":"Measurement of cavity in two-dimensional square-lattice photonic crystal structure composed of metallic pillars was done to investigate its fundamental resonance characteristics. Implementation of the resonance based on another measurement of phase and wavelength along with the propagation axis could explain the behavior clearly.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions -- Application of Bounded-Variable and Meta-frontier Data Envelopment Analysis","authors":"Ching-Yu Chen, Jwu-Rong Lin, T. Peng, Yanxi Yu","doi":"10.1109/BWCCA.2013.65","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.65","url":null,"abstract":"This research aims at studying the operating efficiency of senior citizen welfare institutions in Taiwan. We evaluate technical efficiency (TE), technology gap ratio (TGR), and meta-frontier technical efficiency (MTE) by bounded-variable and meta-frontier data envelopment analysis. In the empirical study, we examine 91 welfare institutes for senior citizens in Taiwan. We also apply Tobit regression to study influences of relevant factors on operating efficiency.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123021070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate Communications","authors":"Yingni Zhang, Xiaofeng Tao, Dejian Xu","doi":"10.1109/BWCCA.2013.30","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.30","url":null,"abstract":"Multiple-Input Multiple-Output (MIMO) technique is applied in 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE) to enhance system throughput. Moreover, aiming to improve performance of the cell edge user, Cooperative Multi-Point Joint Transmission (CoMP JT), one of the key technologies in LTE-Advanced, utilizes multiple cells to transmit the user data. This paper presents a novel SU/MUCoMP JT scheme based on enhanced CQI (Channel Quality Index) feedback. The implementation of the proposed scheme is described in detail and its performance is verified by system level simulations. The paper demonstrates how downlink CoMP MIMO JT can be supported by an enhanced feedback method with reasonable feedback overhead, and how the current users transmission points are determined. Finally the improvement in system throughput brought by this method is verified.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Development of an On-Line 3DCG Builder for Multi-player","authors":"Ningping Sun, Kousei Hayata","doi":"10.1109/BWCCA.2013.97","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.97","url":null,"abstract":"Recently with the popularization of the smart phone and computer tablet terminal, the development of the efficient CG software application becomes more and more attractive. We have developed an interactive 3DCG builder and tried to apply it on internet environment for on-line multi-player. In this paper, we shall provide our design idea and development process.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}