{"title":"Multiple description coding for scalable video coding with redundant slice","authors":"Chunyu Lin, Yao Zhao, H. Bai, K. Goh","doi":"10.1109/ICON.2012.6506581","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506581","url":null,"abstract":"Scalable video coding(SVC) is designed to provide adaptable capability for heterogeneous network structures with its scalabilities. Due to the introducing of inter-layer prediction, SVC coded bitstream is much vulnerable to the channel error. To solve this problem, a lot of schemes are proposed. However, they are either not compatible with the standard or just focus on one of scalabilities in SVC. In this paper, we propose a multiple description scheme that is compatible with SVC standard and supports all the scalabilities. The proposed scheme is based on the redundant slice in the SVC standard, in which each layer is composed of primary slice and redundant slice by interleaving. To deal with the mismatch error and propagated error, the quantization step of redundant slice and the mode of each macroblock is tuned by considering the prediction path in the same layer and between different layers, as well as the channel packet loss rate. The experimental results show that the proposed scheme is efficient for the packet loss channel.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues of data reliability in indoor channel: Impact on the energy efficiency of battery powered wireless sensor nodes","authors":"D. Basu, G. S. Gupta, G. Moretti","doi":"10.1109/ICON.2012.6506602","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506602","url":null,"abstract":"Wireless sensors are constrained by a limited supply of energy when powered by batteries. They also have limited memory and limited computational power. The challenge of a network based on such constrained infrastructure is twofold; maintaining data reliability and energy efficiency. Availability of the instantaneous channel side or state information (CSI) at the transmitter can help it to set transmission parameters, such as power, data rate and encoding technique, to achieve optimum results. However in an indoor environment, when the movement of objects between a transmitter and a receiver is random, the estimated CSI may not be sufficient to obtain desired results. This paper evaluates the impact of channel fading on data reliability due to multipath transmission. Simulation results q the number of retransmissions required for an indoor fading channel and its impact on battery life. Although adaptive transmission techniques have been proposed and implemented to maximize throughput in several technologies including WIMAX, the primary focus of this paper is on research related to improve energy efficiency of sensor nodes rather than throughput. This is because sensors used for surveillance and monitoring are not designed for high data rates, but are meant to send data to the central station with a certain threshold bit error rate and acceptable latency. This paper proposes a transmission strategy to increase energy efficiency of fading radio channels for improved data reliability. It also emphasizes the need to introduce an opportunistic transmission strategy to meet these goals.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131681928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple-streaming method for SVC video by virtualization of network interface in wireless environment","authors":"S. Ahn, C. Yoo","doi":"10.1109/ICON.2012.6506584","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506584","url":null,"abstract":"In this paper, we propose a multiple streaming method based on network interface virtualization in order to improve video streaming performance via scalable video coding (SVC). In our method, a device having a virtualized network interface can communicate with multiple access points (APs), because it has several network interfaces in a wireless environment. We evaluate our method by performing a simple theoretical validation and simulation in a 802.11b environment.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Sum, Mingtuo Zhou, Liru Lu, R. Funada, F. Kojima, H. Harada
{"title":"IEEE 802.15.4m: The first low rate wireless personal area networks operating in TV white space","authors":"C. Sum, Mingtuo Zhou, Liru Lu, R. Funada, F. Kojima, H. Harada","doi":"10.1109/ICON.2012.6506578","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506578","url":null,"abstract":"This paper provides an overview on motivations and process behind the forming of the first low rate (LR) wireless personal area networks (WPAN) operating in the TV white space (TVWS), IEEE 802.15.4m. There are three main forces driving the LR-WPAN community to expand its operational band to the TVWS. First, the change in TVWS-related regulations that opens up new spectrum resources is the key triggering factor. Secondly, there are many potential applications addressed by LR-WPAN systems that are anticipated to benefit from the expansion of the spectrum. Thirdly, the emergence of multiple standardizations targeting on the same types of applications in the same conventional frequency bands, indicating potential congestion and heterogeneous coexistence issues, is also one of the main pushing factor. In this paper, a comprehensive summary of different regulations, list of potential usage models and interactions among conventional LR-WPAN system are presented. A general discussion on how these factors fall in place to realize the forming of IEEE 802.15.4m is given. Finally, the paper concludes with expected functional requirements for the IEEE 802.15.4m system.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE-driven cross-layer optimized video transmission scheme over MIMO-OFDM systems","authors":"Guofeng Lv, Yahui Hu, S. Ci, Hui Tang","doi":"10.1109/ICON.2012.6506585","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506585","url":null,"abstract":"In wireless communication systems, the combination of multiple-input multiple-output (MIMO) with orthogonal frequency division multiplexing (OFDM) is regarded as one promising techniques to support high data rate and high performance. In such a situation, wireless multimedia services have spread widely over MIMO-OFDM systems. How to provide user-satisfied multimedia services over MIMO-OFDM systems has attracted increasingly attentions. Quality of experience (QoE) is the key criteria for evaluating users' satisfaction with multimedia services in terms of mean opinion score (MOS). In this paper, we propose a QoE-driven cross-layer optimized video transmission scheme over MIMO-OFDM systems. No-reference QoE estimation model is applied to acquire the expected MOS taking account of video content type (CT), frame rate (FR), video sending bit rate (SBR) and packet error rate (PER). The aim of our proposed scheme is to achieve user-satisfied video quality by jointly optimizing video coding parameters at the application layer and modulation and coding scheme (MCS) at the physical layer. The problem is formulated to find the optimal combination of parameters to maximize expected MOS with constraint of maximum transmission delay, and solved by improved traversal algorithm. Experimental results have shown significant performance enhancement of the proposed system based on H.264/AVC and NS2.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114491045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On channel adaptation in IEEE 802.15.4 mobile body sensor networks: What can be Gained?","authors":"E. T. Yazdi, A. Willig, K. Pawlikowski","doi":"10.1109/ICON.2012.6506567","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506567","url":null,"abstract":"One of the main problems affecting reliable transmission in wireless body sensor networks based on IEEE 802.15.4 is interference caused by sharing the unlicensed 2.4 GHz ISM band with other technologies such as Wifi. One possible approach to deal with this problem is to allow a body sensor network to change its operating frequency in response to changes in the observed interference. We assess the potential performance gains of different frequency channel adaptation schemes, both idealistic and realistic ones, in a scenario where a human carrier of a body sensor network walks through an area with scattered Wifi interferers, for example in densely populated urban areas. Our results show that substantial gains in delivery rate can be achieved by frequency adaptation. Furthermore, relatively simple “realistic” schemes are able to achieve the performance of an “ideal” adaptation scheme.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation algorithm based on social relation for video streaming services over P2P network","authors":"Donghyeok Ho, Hwangjun Song","doi":"10.1109/ICON.2012.6506556","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506556","url":null,"abstract":"In this paper, we propose an effective resource allocation algorithm based on social relation for video streaming services over Peer-to-Peer network. Our algorithm assigns limited peer resources to other participating peers. Efficient control of the limited resources is necessary because video streaming services need significantly more network bandwidths than traditional non-real-time data services. In addition to video quality, our algorithm is designed to take into account the user's social relation. We define novel sociability and trust models based on social relations obtained by analyzing Social Networking Services. Our proposed resource allocation algorithm allocates peer resources based on these models. Experimental results are presented to demonstrate the performance of our proposed algorithm.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intrusion tolerant system for improving availability in smart grid control centers","authors":"Maryam Tanha, F. Hashim","doi":"10.1109/ICON.2012.6506597","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506597","url":null,"abstract":"In this paper, we propose an intrusion tolerant security system for crucial components in the SCADA systems and control centers of smart grid. Due to the widespread and dramatic social and economic effects of the failure, power outage or malfunction of the smart grid, likely cyber security threats need to be dealt with vigilantly. The level of security required for ICT which is an integral part of the smart grid does not suffice for the critical operation of the smart grid. Thus, intrusion tolerant approach plays an important role for hardening smart grid to achieve the goal of survivability and continuity of service in the presence of malicious attacks and can be considered as a complementary solution to the conventional security mechanisms. Availability analysis of the proposed intrusion tolerant system demonstrates enhanced availability in comparison with the other two known existing intrusion tolerant architectures.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126099542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos","authors":"I. Hakala, S. Laine","doi":"10.1109/ICON.2012.6506534","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506534","url":null,"abstract":"When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that appear similar in a networklevel may cause very different responses in an application level, and the other way round. In this article, we study how Windows Media Server's log files can be used to evaluate the QoS of video transmission, and we also examine the application level performance based on the log files. The level of QoS affects user satisfaction and thus QoE, although the relationship between them may be complicated. Understanding how the application responds to deteriorated network conditions gives tools to evaluate also QoE. The examination is limited to on-demand streaming sessions in which UDP is used as a transport protocol.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient video coding using difference expansion and histogram modification","authors":"R. Farrugia","doi":"10.1109/ICON.2012.6506582","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506582","url":null,"abstract":"Recent advances in multimedia technology have paved the way to the development of several applications, including digital TV broadcasting, mobile TV, mobile gaming and telemedicine. Nonetheless, real time multimedia services still provide challenges as reliable delivery of the content cannot be guaranteed. The video compression standards incorporate error resilient mechanisms to mitigate this effect. However, these methods assume a packet-loss scenario, where corrupted slices are dropped and concealed by the decoder. This paper presents the application of reversible watermarking techniques to facilitate the detection of corrupted macroblocks. A variable checksum is embedded within the coefficient levels and motion vectors, which is then used by the decoder to detect corrupted macroblocks which are concealed. The proposed method employs difference expansion to protect the level values while histogram modification was employed to protect the motion vectors. Unlike previous published work by the same author, this scheme does not need the transmission of side information to aid the recovery of the original level and motion vector values. Simulation results have indicated that significant gains in performance can be achieved over the H.264/AVC standard.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125329858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}