2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

筛选
英文 中文
Adaptive QoS for data transfers using software-defined networking 使用软件定义网络进行数据传输的自适应QoS
J. Boley, Eun-Sung Jung, R. Kettimuthu
{"title":"Adaptive QoS for data transfers using software-defined networking","authors":"J. Boley, Eun-Sung Jung, R. Kettimuthu","doi":"10.1109/ANTS.2016.7947874","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947874","url":null,"abstract":"The research community has devoted much attention to the use of classic network technologies for advanced traffic engineering, but the use of software-defined networking (SDN) for this purpose, particularly in regards to Quality of Service (QoS) optimizations, remains relatively unexplored. We have developed a QoS framework that leverages SDN capabilities to achieve optimal throughputs for all QoS flows on a congested network. Specifically, we propose an approach that reassigns bandwidth unused by one or more flows to other flows in priority order, while simultaneously ensuring that QoS flows can reclaim their reassigned bandwidth whenever they are able to use that bandwidth. At the heart of our framework is the Adaptive Quality of Service (AQoS) algorithm, inspired by Integrated Services (IntServ) principles, which enables fine-tuned, real-time control over per-flow bandwidth allocations, combined with classic Differentiated Services (DiffServ) priority classes that determine how bandwidth is distributed. We evaluate and compare the results of the AQoS throughput optimizations to those achieved by several baseline algorithms common to both classic and SDN networks, with promising results.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of MapReduce over structured peer-to-peer overlay of underutilized resources MapReduce在未充分利用资源的结构化点对点覆盖上的实现
Shashwati Banerjea, M. Pandey, Ashish Kumar, R. Dugar, M. M. Gore
{"title":"Implementation of MapReduce over structured peer-to-peer overlay of underutilized resources","authors":"Shashwati Banerjea, M. Pandey, Ashish Kumar, R. Dugar, M. M. Gore","doi":"10.1109/ANTS.2016.7947816","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947816","url":null,"abstract":"The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured on a regular basis. On the other hand, a lot of computing resources in Institute labs, government offices etc. remain underutilized, since they are used for Internet and basic utilities. The aggregation of these underutilized resources can be more than handful to satisfy the computing needs of any large scale computation. This paper presents an approach of applying MapReduce framework on non-dedicated nodes. The target of this work is to efficiently use underutilized resources such as storage, processing power etc. on nodes to perform MapReduce applications. We have implemented a prototype of our model by forming a peer-to-peer (P2P) relationship among them and compared the performance with Hadoop, which is a popular large scale data processing framework under similar churn conditions.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis 利用主成分分析的降维方法提高基于异常的入侵检测系统性能
Basant Subba, S. Biswas, S. Karmakar
{"title":"Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis","authors":"Basant Subba, S. Biswas, S. Karmakar","doi":"10.1109/ANTS.2016.7947776","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947776","url":null,"abstract":"Anomaly based Intrusion Detection Systems (IDSs) are capable of detecting wide range of network attacks. However, they are characterized by high computational overhead due to large number of redundant or highly correlated features in the input data being analyzed by them. In this paper, we propose a model to minimize the computational overhead of anomaly based IDSs through dimensionality reduction technique called Principal Component Analysis (PCA). PCA reduces the high dimensional data using the dependencies between the input features to represent it in a more tractable, lower dimensional form, without losing any significant information contained in the original data. Experimental results on the benchmark NSL-KDD dataset shows that applying PCA can significantly reduce the dimensionality of the data being processed by anomaly based IDSs and thereby minimize their computational overhead without adversely affecting their performances.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Braille-8 — The unified braille Unicode system: Presenting an ideal unified system around 8-dot Braille Unicode for the braille users world-over braille -8 -统一的盲文Unicode系统:为全世界的盲文用户提供一个围绕8点盲文Unicode的理想统一系统
A. Garg
{"title":"Braille-8 — The unified braille Unicode system: Presenting an ideal unified system around 8-dot Braille Unicode for the braille users world-over","authors":"A. Garg","doi":"10.1109/ANTS.2016.7947839","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947839","url":null,"abstract":"Traditional Braille is a 6-dot code that can represent maximum 64 unique symbols with each braille cell. This is grossly insufficient to represent even ordinary English text (comprising 26 small letters, 26 capital letters, 10 digits, and 14 basic punctuations) — let alone math and science symbols. Thus a braille user has to enter 2 (and sometime 3 or 4) braille cells to enter one character or symbol. This makes braille writing very slow and tedious. Incidentally, 8-dot Braille Unicode was introduced to facilitate the Computer Braille that could represent all 95 computer characters with one braille cell itself. Since 8-dot braille can represent maximum 256 unique symbols, it has huge potential to provide the ultimate solution to all woes faced by braille users while writing texts (in English or in native languages) as well as mathematical and technical text. This paper presents a comprehensive unified braille Unicode system providing a detailed mapping of 8-dot braille Unicode pattern to represent the transcribing codes (in English or any other language) as well as the math, science, and computer symbols/characters — mostly with one braille cell itself.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"53 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security enhancement in tower monitoring system of oneM2M network oneM2M网络塔台监控系统的安全增强
P. K. Dalela, Anurag Yadav, V. Tyagi
{"title":"Security enhancement in tower monitoring system of oneM2M network","authors":"P. K. Dalela, Anurag Yadav, V. Tyagi","doi":"10.1109/ANTS.2016.7947871","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947871","url":null,"abstract":"Machine to Machine (M2M) communication is about devices connected to each other, communicating with each other and accessible by different users simultaneously. Since many devices are interconnected, there arises concern pertaining to security of data access and control access of devices. This access cannot be given to an unauthorized person, hence security measures are important in M2M. Centre for Development of Telematics (CDOT) developed Tower Monitoring System (TMS) which monitors the power status of telecom towers. Since CDOT developed TMS devices are of different type and capability based on their usage, we need different security implementation for different devices. Some devices may require and support one security method to be implemented whereas other may require other methods. In this paper we have shown how different security measures stated in oneM2M standard, which is a standard body of M2M, can be implemented in CDOT's TMS. Apart from oneM2M security measures we have implemented some other protocols as required in TMS. This approach is an algorithmic solution to the problem of integrating different security measures more so we are here implementing new security protocols that are still not part of any standard of M2M. So this algorithmic solution will not only help CDOT's TMS devices to be part of oneM2M architecture but our integrated algorithmic approach will help oneM2M standard based device to use new security protocols in their network which are still not part of standard. This paper presents an integrated algorithmic way to implement oneM2M recommended transport layer security protocols in CDOT's TMS network. This paper also suggest new security protocols that can be incorporated in oneM2M standard. So above two problems have been solved in this paper.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Crash failure immune offloading framework 崩溃失败免疫卸载框架
Sayanti Mondal, C. Chowdhury, Sarbani Roy, Sumanta K. Deb, S. Neogy
{"title":"Crash failure immune offloading framework","authors":"Sayanti Mondal, C. Chowdhury, Sarbani Roy, Sumanta K. Deb, S. Neogy","doi":"10.1109/ANTS.2016.7947860","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947860","url":null,"abstract":"Offloading or cyber foraging is a technique to overcome resource constraints of mobile devices by migrating heavy computation to remote more resourceful surrogates (such as PDAs, desktop PCs). Many research works have been done so far on the architecture of offloading systems, what to offload (partitioning of offloadable code) and when to offload (based on energy constraint, execution time). However, only a few works can be found on fault detection and tolerance. So this paper concentrates on designing a robust offloading framework that can survive a surrogate crash through the notion of redundancy and rollback recovery. Fault prevention can be achieved by using historical data while selecting suitable surrogate at a familiar neighborhood. We have evaluated this framework using a real application named ‘Π-calculator’ based on resource utilization and energy consumption. The mechanism is implemented using different Tabs and smartphone as offloadee and 3 HP laptops as surrogates. Fault tolerant offloading is found to be efficient in terms of energy consumption and resource utilization.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126472385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A reconfigurable microstrip cross parasitic patch antenna with two-dimensional beam scanning capability 具有二维波束扫描能力的可重构微带交叉寄生贴片天线
Vikas V. Khairnar, C. K. Ramesha, L. Gudino
{"title":"A reconfigurable microstrip cross parasitic patch antenna with two-dimensional beam scanning capability","authors":"Vikas V. Khairnar, C. K. Ramesha, L. Gudino","doi":"10.1109/ANTS.2016.7947831","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947831","url":null,"abstract":"A reconfigurable planar cross parasitic patch antenna is designed and simulated to achieve continuous two-dimensional beam scanning at 2.45 GHz. The antenna realizes complete azimuthal beam scanning with a maximum elevation angle of 34°. This antenna consists of a central driven element and four hexagonal slotted tunable parasitic patches placed on each side of the driven element. The effective electrical size of the parasitic element is changed with respect to the driven element, by varying the capacitance of varactor diodes loaded in the hexagonal slot. The reflector and director properties of the tunable parasitic elements are used to tilt the main beam of antenna away from the broadside direction. The antenna achieves continuous beam scanning from θ = 0° to 34° for φ = 45°, 90°, 135°, 225°, 270° and 315° planes. The advantage of the antenna is that the design is simple and it maintains a common impedance bandwidth from 2.42–2.47 GHz in all configurations. The two-dimensional beam scanning capability of the proposed antenna can be effectively used in the next generation wireless communication networks.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Geo-intelligence based automatic verification and optimization of manual field survey for OFC network planning 基于地理智能的OFC网络规划人工野外调查自动验证与优化
P. K. Dalela, Saurabh Basu, Anurag Yadav, S. Majumdar, N. Kushwaha, Arun Yadav, P. Bansal, V. Tyagi
{"title":"Geo-intelligence based automatic verification and optimization of manual field survey for OFC network planning","authors":"P. K. Dalela, Saurabh Basu, Anurag Yadav, S. Majumdar, N. Kushwaha, Arun Yadav, P. Bansal, V. Tyagi","doi":"10.1109/ANTS.2016.7947859","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947859","url":null,"abstract":"Manual field survey (with odometer) is the common practice for planning of a new Optical Fiber Cable (OFC) network from Central Office (CO) and Customer Premises (CP) location information collection (e.g. Latitude, Longitude, and Identity Tag) to OFC laying route selection. As 80–90% cost for the deployment of an OFC network goes in OFC laying [1] so the (optimization of complete OFC network is of utmost important [2] and for optimization accurate mapping of OFC routes and the component in Geographical Information System (GIS) is indispensable for OFC Technological planning.) It has been observed that in some cases, 1. There are errors in collected data and 2. Proposed routes are not optimized (specific to technology) in field survey. In this paper we have proposed a Geo-Intelligence based solution that automatically verifies the collected data during the field survey, if the collected data does not comply with the desired format then proposed algorithm correct and rectify it up to some extent. It generates GIS compliant optimized OFC routes (specific to technology) along with finding errors in manual surveyed routes. The proposed solution works in Client Server Model. The server dynamically fetches the submitted survey data from database and forwards it to the one of available client present in the network and on receiving service request, the client i.e. Computer System verifies collected surveyed data and compare the generated optimized routes with the recorded surveyed routes. Then it sends the comparison report back to server for acceptance of the surveyed routes. This study is extremely useful as it a) optimizes the OFC route if possible b) reduce processing time for parallel processing c) reduces chances of error as it's an automated approach d) eliminates human intervention for client server approach.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132881641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint spectral shaping and power loading for OFDM-based cognitive radio 基于ofdm的认知无线电联合频谱整形与功率加载
M. R. Bharti, D. Ghosh
{"title":"Joint spectral shaping and power loading for OFDM-based cognitive radio","authors":"M. R. Bharti, D. Ghosh","doi":"10.1109/ANTS.2016.7947765","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947765","url":null,"abstract":"In this paper, we propose joint spectral shaping and power allocation for an orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR). The objective is to maximize its downlink transmission rate subject to the constraint on the interference introduced to the primary user (PU) spectrum band that coexists side-by-side in overlay approach. Considering that the CR transmitter (base station) is operating in an interference limited rather than the power limited scenario, we develop an optimal power allocation scheme that is augmented with active interference cancellation (AIC)-based spectral shaping and investigate its performance. We also propose an AIC-based suboptimal scheme which is computationally less complex and offers performance very close to the AIC-based optimal scheme. For a given interference threshold prescribed by the PU system, experimental results show that the proposed AIC-based optimal as well as the suboptimal schemes can offer much higher transmission rates for the CR user compared to the conventional schemes available in the literature for the same problem under similar scenario.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Opportunistic and cooperative hybrid spectrum access protocol for cognitive radio network 认知无线网络的机会合作混合频谱接入协议
Shubha Sharma, V. Bohara, Mansi Peer
{"title":"Opportunistic and cooperative hybrid spectrum access protocol for cognitive radio network","authors":"Shubha Sharma, V. Bohara, Mansi Peer","doi":"10.1109/ANTS.2016.7947852","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947852","url":null,"abstract":"This paper presents a hybrid opportunistic spectrum access (OSA) and cooperative spectrum sharing (CSS) protocol for cognitive radio networks. In the proposed protocol, secondary (i.e. cognitive) network (SN) switches its mode between OSA and CSS based on the state of primary network (PN). The activity status of PN is modeled as a two state discrete time Markov chain model in which steady state probabilities of PN are used to derive the outage probability of the hybrid system. Due to hybrid nature of the protocol, SN is always benefited since it can communicate either via OSA or CSS mode. In CSS mode, we analyze a two-phase hierarchical spectrum sharing protocol based on cooperative decode and forward relay transmission wherein it is assumed that the secondary system is equipped with multiple antennas. Closed form expressions for outage probability have been derived for both SN and PN. Through the theoretical and simulation results, the effect of network parameters, such as steady state probability of primary transmitter (PT), the distance between primary and secondary nodes, the transmit power at secondary transmitter (ST), has been shown on the performance of SN. The performance of the proposed scheme has also been validated by comparing it with conventional OSA. The numerical results show that the hybrid approach outperforms the conventional OSA.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信