{"title":"Least square solver for wireless communication system","authors":"Vanita Pawar, Krishna Naik Karamtot","doi":"10.1109/ANTS.2016.7947764","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947764","url":null,"abstract":"In this paper a high performance least square solver is presented which use recursive Cholesky decomposition. Wireless communication systems require solving least square equations in order to obtain taps weights of the FIR filter. It is thus about to develop a fast and efficient algorithm for computation pseudo-inverse matrices. This paper also presents the recursive way to calculate the correlation matrices of receiving signal which is applied to blind channel estimation and for spectrum sensing. The recursive Cholesky algorithm is verified for the Rayleigh channel and the Basis expansion model for known as well as an unknown covariance matrix. The experimental results are very close to analytical results.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128012249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive link rates for burst based transmission towards the prosperity of green networks","authors":"N. Sowmiya, H. S. Hamead, T. T. Mirnalinee","doi":"10.1109/ANTS.2016.7947815","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947815","url":null,"abstract":"We have gone through the survey of state of art techniques for Green Networking. The two eminent techniques, Burst based transmission techniques (BTR) and Adaptive link rates (ALR) towards greening the Ethernet have been studied. We have analyzed the possibility of prospering more greenness, in sequence to that we proposed a new hybrid technique by combining adaptive link rates with TCP coalesced packet bursts. We have measured the link utilization and speculated the energy efficiency via projected power consumption in watts hour. We observed, the simulation results show that the proposed system would consume less energy than the existing techniques.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129143875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arunan Sivanathan, Daniel Sherratt, H. Gharakheili, V. Sivaraman, A. Vishwanath
{"title":"Low-cost flow-based security solutions for smart-home IoT devices","authors":"Arunan Sivanathan, Daniel Sherratt, H. Gharakheili, V. Sivaraman, A. Vishwanath","doi":"10.1109/ANTS.2016.7947781","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947781","url":null,"abstract":"The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration of network-level security solutions for IoT, by comparing flow-based monitoring with packet-based monitoring approaches. We conduct experiments with real attacks on real IoT devices to validate our flow-based security solution, and use the collected traces as input to simulations to compare its processing performance against a packet-based solution. Our results show that flow-based monitoring can achieve most of the security benefits of packet-based monitoring, but at dramatically reduced processing costs. Our study informs the design of future smart-home network-level security solutions.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mukesh Chaudhary, Narendra Kumar Meena, R. S. Kshetrimayum
{"title":"Local search based near optimal low complexity detection for large MIMO System","authors":"Mukesh Chaudhary, Narendra Kumar Meena, R. S. Kshetrimayum","doi":"10.1109/ANTS.2016.7947792","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947792","url":null,"abstract":"This paper presents a low complexity detection technique with near Maximum Likelihood (ML) performance for large multiple-input multiple-output (MIMO) systems. Large MIMO systems have gained popularity very soon because of high spectral efficiency and increased link reliability. ML based detection is known to give optimal result in terms of accuracy but due to extremely high computational complexity involved, detection time increases exponentially as the number of transmitter and receiver antennas increases. We propose an algorithm which gives near optimal performance along with much reduced computational complexity. Our results show that the proposed method outperforms linear detection technique named Zero Forcing (ZF) as well as heuristic based search algorithms named likelihood ascent search (LAS) and Reactive Tabu Search (RTS). Our algorithm finds the best solution restricted to a given Euclidean distance around initial solution. It searches all the neighbors of initial solution falling under dynamically calculated squared Euclidean distance based cost function value. As the number of antennas can vary in the range of tens to few thousands in large MIMO systems, this algorithm could be a substitute for ML based detection algorithm. We have considered Rayleigh fading channel for our simulations and assumed that perfect channel state information at the receiver (CSIR) is available.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error vector magnitude analysis for carrier aggregated OFDM signals with nonlinear HPA","authors":"Parag Aggarwal, A. Agarwal, V. Bohara","doi":"10.1109/ANTS.2016.7947866","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947866","url":null,"abstract":"This paper analyses the impact on the error vector magnitude (EVM) of the received carrier aggregated orthogonal frequency division multiplexing (OFDM) signal when it is passed through a nonlinear high power amplifier (HPA). This analysis will help to measure the quality of transceivers in modern communication systems, which are highly sensitive to nonlinear distortions caused by HPA. Specifically, the closed form expression of EVM is derived for dual band carrier aggregated OFDM signals with nonlinear HPA in the presence of multipath Rayleigh Fading channel. 2D generalized memory polynomial (GMP) model is used to characterize the nonlinearity caused by HPA. A good agreement between the simulation results and analytically obtained results is observed.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tunable synchronization in duty-cycled wireless sensor networks","authors":"Ravi Sharma, A. Sairam, Akash Yadav, A. Sikora","doi":"10.1109/ANTS.2016.7947782","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947782","url":null,"abstract":"In this work, we consider a duty-cycled wireless sensor network with the assumption that the on/off schedules are uncoordinated. In such networks, as all nodes may not be awake during the transmission of time synchronization messages, nodes will require to re-transmit the synchronization messages. Ideally a node should re-transmit for the maximum sleep duration to ensure that all nodes are synchronized. However, such a proposition will immensely increase the energy consumption of the nodes. Such a situation demands that there is an upper bound of the number of retransmissions. We refer to the time a node spends in re-transmission of the control message as broadcast duration. We ask the question, what should be the broadcast duration to ensure that a certain percentage of the available nodes are synchronized. The problem to estimate the broadcast duration is formulated so as to capture the probability threshold of the nodes being synchronized. Results show the proposed analytical model can predict the broadcast duration with a given lower error margin under real world conditions, thus demonstrating the efficiency of our solution.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Murali, Karun Mathew Verghese, Keerthana Ravi, Vamsi Krishna Tumuluru
{"title":"Scheduling of resource blocks for Device-to-Device communications in LTE-Advanced networks","authors":"D. Murali, Karun Mathew Verghese, Keerthana Ravi, Vamsi Krishna Tumuluru","doi":"10.1109/ANTS.2016.7947841","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947841","url":null,"abstract":"Device-to-Device (D2D) communication is seen as an important step in the LTE-A networks to improve spectral efficiency through reuse of resource blocks (RBs). In a scenario without D2D communication, the base station (referred in LTE-A network as eNB) allocates the RBs to the user equipments (UEs) (i.e., client devices in LTE-A network) based on the Signal-to-Noise Ratio (SNR) reported by them. However, if the RBs are to be reused for D2D communications then the signal-to-interference-plus-noise ratio (SINR) at each device (eNodeB included) sharing those RBs would decrease thereby deteriorating the network performance. To control the SINR violation the network operator may have to set target SINR values for all devices. The focus of this paper is to simultaneously allocate resource blocks for D2D communication and for the uplink (i.e., UE to eNodeB). First, an optimization problem is formulated to perform the scheduling of the RBs. But since the optimization problem is NP hard, an iterative heuristic resource block allocation algorithm (which respect the constraints of the optimization problem) is proposed. The proposed algorithm is compared with a modified version of an existing algorithm. The simulation results give important inferences which can help a network operator to select the desired target SINR for a given system setting.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CSS: Cautious Slow Start algorithm to minimize packet drop rate","authors":"C. Swapna, M. Tahiliani","doi":"10.1109/ANTS.2016.7947825","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947825","url":null,"abstract":"Slow Start algorithm helps the TCP flows to quickly ramp up their congestion window (cwnd) by employing an exponential increase pattern. This pattern of increasing cwnd leads to consecutive loss of packets in bulk, and hence, results in large number of packets being re-transmitted. Recently, the limitations of this approach have become apparent as many Internet applications are becoming more sensitive to packet loss and latency. In this paper, we propose a Cautious Slow Start (CSS) algorithm which aims to mitigate the bulk packet losses that occur with the traditional Slow Start algorithm. This is achieved by increasing the cwnd cautiously, instead of doubling it. We validate the effectiveness of CSS algorithm by simulating a variety of Internet like scenarios in ns-2, and comparing its performance with that of the traditional Slow Start algorithm. CSS algorithm successfully mitigates the bulk packet losses, without affecting the overall link and buffer utilization.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133076070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlating centralities of social networks","authors":"Neelaabh Gupta, Anagh Narain, Akshat Arora, Dolly Sharma","doi":"10.1109/ANTS.2016.7947779","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947779","url":null,"abstract":"Centrality is an important measure to identify the most important actors in a network. This paper discusses the various Centrality Measures used in Social Network Analysis. These measures are tested on complex real-world social network data sets such as Video Sharing Networks, Social Interaction Network and Co-Authorship Networks to examine their effects on them. We carry out the correlation analysis of these centralities and plot the results to recommend when to use those centrality measures. Additionally, we introduce a new centrality measure — Cohesion Centrality based on the cohesiveness of a graph, develop its sequential algorithm and further devise a parallel algorithm to implement it.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116559667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel scheduling algorithm to maximize the D2D spatial reuse in LTE networks","authors":"B. Akilesh, V. Sathya, A. Ramamurthy, T. B. Reddy","doi":"10.1109/ANTS.2016.7947814","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947814","url":null,"abstract":"In order to offload base station (BS) traffic and to enhance efficiency of spectrum, operators can activate many Device-to-Device (D2D) pairs or links in LTE networks. This increases the overall spectral efficiency because the same Resource Blocks (RBs) are used across cellular UEs (CUEs) (i.e., all UEs connected to BS for both C-Plane and D-plane communication) and D2D links (i.e., where the UEs are connected to BS only for C-plane communication). However, significant interference problems can be caused by D2D communications as the same RBs are being shared. In our work, we address this problem by proposing a novel scheduling algorithm, Efficient Scheduling and Power control Algorithm for D2Ds (ESPAD), which reuses the same RBs and tries to maximize the overall network throughput without affecting the CUEs throughput. ESPAD algorithm also ensures that Signal to Noise plus Interference Ratio (SINR) for each of the D2D links is maintained above a certain predefined threshold. The aforementioned properties of ESPAD algorithm makes sure that the CUEs do not experience very high interference from the D2Ds. It is observed that even when the SINRdrop (i.e., maximum permissible drop in SINR of CUEs) is as high as 10 dB, there is no drastic decrease in CUEs throughput (only 3.78%). We also compare our algorithm against other algorithms and show that D2D throughput improves drastically without undermining CUEs throughput.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}