2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Reliable Data Delivery in Vehicular Ad Hoc Networks 车载自组织网络中的可靠数据传输
Mahantesh G. Kambalimath, S. Mahabaleshwar, S. Manvi
{"title":"Reliable Data Delivery in Vehicular Ad Hoc Networks","authors":"Mahantesh G. Kambalimath, S. Mahabaleshwar, S. Manvi","doi":"10.1109/BWCCA.2013.56","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.56","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are a specific type of Mobile ad hoc Networks (MANETs). Key characteristics of VANETs that distinguish from MANETs are time varying nature of vehicle density, high mobility, delay sensitive applications etc. Because of these constraints, data delivery in VANETS is a challenging task. In this paper, we propose the Reliable Data Delivery scheme for VANETs. Proposed scheme operates in the following two phases: (1) identification of forwarding zone and expected zone and (2) Establishing the connectivity between source and destination vehicle in the expected zone for the reliable data delivery. In the forwarding zone, the vehicle with high mobility is identified for carrying the data packet. If the destination vehicle is not found in the forwarding zone, the data packets are broadcasted in the expected zone until they reach the destination vehicle. In order to test the performance effectiveness, the proposed scheme is simulated to analyze the performance metrics in terms of delay, packet delivery ratio, route life time and control overhead.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of a Positioning Algorithm Using Raw Measurements Taken from a GPS Receiver 基于GPS接收机原始测量数据的定位算法性能分析
Alban Rakipi, Enik Shytermeja, S. Cakaj, Rozeta Miho, Bexhet Kamo
{"title":"Performance Analysis of a Positioning Algorithm Using Raw Measurements Taken from a GPS Receiver","authors":"Alban Rakipi, Enik Shytermeja, S. Cakaj, Rozeta Miho, Bexhet Kamo","doi":"10.1109/BWCCA.2013.31","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.31","url":null,"abstract":"The scope of this paper is the implementation of a positioning algorithm using the approach of post-processing the measurements taken from a real GPS receiver, in order to assess user's position and performance of the algorithm. Recently, there is an increase interest in positioning techniques based on Global Navigation Satellite Systems so we focus on the performance evaluation of a positioning algorithm. The current method of solving for GPS user's position is to linearize the pseudorange equations and calculate the user position iteratively, starting with a user provided initial position guess. We implement an Iterative Least Squares (ILS) algorithm by means of data structures and show that five iterations are required to obtain a convergent solution. The algorithm automatically combines all available GPS pseudorange measurements when more than four satellites are observed. Experimental results show that reliable absolute positioning is achieved by using the algorithm. By weighting each satellite's contribution in user position evaluation process by means of Carrier-to-noise-density ratio (C/No) is achieved an improvement on the position estimation mostly in the vertical component.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130567854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Health Management Support System Using Fuzzy Theory 基于模糊理论的健康管理支持系统
A. Koyama, Kanako Endo
{"title":"A Health Management Support System Using Fuzzy Theory","authors":"A. Koyama, Kanako Endo","doi":"10.1109/BWCCA.2013.52","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.52","url":null,"abstract":"In recent years, in Japan, the increasing of lifestyle-related diseases patients is becoming big problems in aging society. In this paper, to solve these problems, we propose a health management support system which aims own health management. The proposed system can provide health advice to user by adopting the Fuzzy Theory. As evaluation of the proposed system, we compared the proposed system with conventional system. Furthermore, we evaluated about an accuracy of advice. As the results, we could show usefulness of the proposed system.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134232581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Handover Scheme for LTE Wireless Networks under the Assistance of GPS GPS辅助下的LTE无线网络切换方案
Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, W. Chu
{"title":"A Handover Scheme for LTE Wireless Networks under the Assistance of GPS","authors":"Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, W. Chu","doi":"10.1109/BWCCA.2013.70","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.70","url":null,"abstract":"With the rising popularity of mobile devices, the requirements of accessing wireless networks through mobile devices have been significantly higher than before. Many researches try their best to develop different communication functions and services to serve users. On the other hand, up to present from 2008 Long Term Evolution (LTE for short) has still stayed in its spotlight. Also, the population of mobile users increases significantly in recent years. When a user equipment (UE for short) moves from an evolved Node B (eNB for short) to another, the LTE needs to perform handover to help the serving and target eNBs to manage the provided resources so as to maintain the connections connecting the UE and the eNBs. If handover incompletely performed, users will experience a longer transmission delay, or even the connections are disconnected. Currently, the factor that affects the time consumed by the handover procedure is still considered as the radio issue. However, it is insufficient if we only measure the strength of the radio that the UE receives from its serving eNB to determine whether UE needs to hand over or not since the UE's location, moving speed and moving direction are also the important factors that may affect the handover quality. In this study, we employs a GPS system to help the determination of handover of the LTE system so as to more accurately choose the most suitable target eNB and improve the performance of handover.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Framework for Solving the Configuration Problem in Wireless Sensor Networks 一种解决无线传感器网络配置问题的框架
A. Gogu, D. Nace, Y. Challal
{"title":"A Framework for Solving the Configuration Problem in Wireless Sensor Networks","authors":"A. Gogu, D. Nace, Y. Challal","doi":"10.1109/BWCCA.2013.18","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.18","url":null,"abstract":"Wireless Sensor Network Configuration Problem seeks to dimension a WSN while taking into account both the traffic pattern, data aggregation and the transmission range assignment. Regarding the objectives of the problem, we first intend to minimize the overall energy consumption of the network and next to guarantee node energy consumption fairness between the sensors. Previously, we discussed this problem for the linear network. Herein, we consider a two-dimensional network where sensors are uniformly placed in the target area. The network is divided into cells and the Network configuration problem has to determine the number of cells and their respective sizes such that the above objectives are met. A framework, based on the dynamic programming algorithm, is proposed to solve this problem. This framework provides optimal solution, is scalable and has a low computational complexity.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131152241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing a Coastal Sensors Network in a Nowcast-Forecast Information System 在临近预报信息系统中管理海岸传感器网络
J. Gomes, M. Rodrigues, A. Azevedo, G. Jesus, J. Rogeiro, Anabela Oliveira
{"title":"Managing a Coastal Sensors Network in a Nowcast-Forecast Information System","authors":"J. Gomes, M. Rodrigues, A. Azevedo, G. Jesus, J. Rogeiro, Anabela Oliveira","doi":"10.1109/BWCCA.2013.89","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.89","url":null,"abstract":"This paper presents a study on the integration of heterogeneous sensor nodes into a wireless sensor network and its use in providing real-time information about water conditions, contributing to water resources management. The work focuses on presenting the methodology used to automatically communicate, parse and store the sensor network data and its application to a real case study. The development of a new platform for efficient management and analysis of the gathered data and its use for automatic assertion of real-time model forecasts quality against stored data is also presented. On-going work on the development of a mobile application for real-time data access in mobile devices is also anticipated.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"24 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context Aware Identity Management Using Smart Phones 基于智能手机的上下文感知身份管理
V. Paruchuri, S. Chellappan
{"title":"Context Aware Identity Management Using Smart Phones","authors":"V. Paruchuri, S. Chellappan","doi":"10.1109/BWCCA.2013.38","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.38","url":null,"abstract":"Cell phones are personal devices that are seldom used by more than one individual. Today's smart phone not only serves as the key computing and communication mobile device of choice, but it also comes with a rich set of embedded sensors. In other words, smart phones can be considered less of a \"phone\" in the traditional sense and more of an identity management device. Furthermore the unique array of sensors on a smart phone can communicate its owner's identity to the world. Smart phones are pervasive computing devices that ubiquitously accompany humans and must adapt accordingly. In this paper, we propose architecture to fully leverage the capabilities to achieve a seamless identity management system. We use the sensor data from the smart phone to generate the context and identify the user to the outside world.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed 在MANET测试台上研究OLSR HELLO有效时间的影响
M. Hiyama, Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli
{"title":"Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed","authors":"M. Hiyama, Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli","doi":"10.1109/BWCCA.2013.53","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.53","url":null,"abstract":"Recently, Mobile Ad-hoc Networks (MANETs) have an increased interest in applications for covering rural areas due to the possibility of usage of low-cost and high-performance mobile terminals, without having to depend on the network infrastructure. Because the terminals are mobile, the routes change dynamically, so routing algorithms are an important issue for operation of MANETs. In this paper, we investigate the behavior of OLSR Routing Protocol for different values of HELLO validity time. We conduct experiments in a MANET testbed. We design and implement two experimental scenarios in our academic environment and investigate their performance behaviour for different number of hops.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":" 765","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131977941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a Hybrid Method of User Location Anonymization 一种用户位置匿名化混合方法的评价
Kenta Miura, Fumiaki Sato
{"title":"Evaluation of a Hybrid Method of User Location Anonymization","authors":"Kenta Miura, Fumiaki Sato","doi":"10.1109/BWCCA.2013.39","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.39","url":null,"abstract":"Recently, highly accurate positioning devices enable us to provide various types of location based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Lots of different techniques for securing the location privacy have been proposed, for instance the concept of Silent period, the concept of Dummy node, and the concept of Cloaking-region. However, many of these researches have a problem that quality of the LBS (QoS) decreased when anonymity is improved, and anonymity falls down when QoS is improved. In this paper, we present a node density-based location anonymization scheme which can provide location privacy by utilizing hybrid concept of Dummy node and Cloaking-region. Simulation is conducted to evaluate our proposed method in the view point of the location error in LBS and the probability of tracking of a target node. Simulation results show that the probability of tracking of a target node by an adversary is reduced and the QoS of LBS is also improved.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127315920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Network Anomaly Detection for M-Connected SCADA Networks m连接SCADA网络的网络异常检测
Si-Jung Kim, Bonghan Kim, Sang-Soo Yeo, Do-Eun Cho
{"title":"Network Anomaly Detection for M-Connected SCADA Networks","authors":"Si-Jung Kim, Bonghan Kim, Sang-Soo Yeo, Do-Eun Cho","doi":"10.1109/BWCCA.2013.61","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.61","url":null,"abstract":"In the current national critical infrastructures, SCADA systems and networks are playing very important roles. Unfortunately, most of closed-network SCADA systems have been considered as very secure against cyber-attacks. Because they use their own operating systems and communication/ network protocols, and their private networks are physically isolated from the public networks and the Internet. However, in case the closed SCADA system has m-connected status due to its maintenance, updates, and patches, it is no longer perfectly secure against cyber-attacks. This paper analyzes vulnerabilities of m-connected SCADA networks and proposes a novel security model for detecting network anomalies. The proposed model is based on an intrusion detection system using the network-based pattern reference method, which has two kinds of rule sets - one is the base rule set, and the other is dynamically produced rule set. The basic rule set can be set with pre-known intrusion patterns, and a dynamically produced new rule set can be set by detecting network anomalies under specific threshold values. Such new rule set would be adapted to the pattern reference model in its next execution time. Therefore, the proposed security model can identify abnormal command execution more effectively and efficiently.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"12 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114000765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信