{"title":"Dynamic CoMP configuration for OFDMA networks under different user traffic scenarios","authors":"Yapeng Wang, Xu Yang, Liang Yang","doi":"10.1109/SOFTCOM.2015.7314084","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314084","url":null,"abstract":"In OFDMA based LTE and LTE-A systems, cell-edge users suffer from Inter-Cell Interference (ICI). To mitigate ICI, Coordinated Multi-Point (CoMP) is proposed to improve cell-edge users' performance. In CoMP mode, base stations need to reserve same frequencies for these CoMP users. However, mobile communication network is a dynamic network. Users distribution are always changing, therefore it will be beneficial to configure CoMP dynamically. In this study, an intelligent algorithm is designed and implemented to dynamically adjust CoMP configuration to optimize system performance. In the algorithm, base stations cooperatively divide CoMP and Non CoMP users according to user traffic scenarios and cooperatively adjust configuration of CoMP users. Genetic Algorithm is coupled to the proposed algorithm to optimize CoMP division. Cell edge users' SINR and throughput performance are significantly improved by our algorithm.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of QoS-CAODV, CAODV routing protocol in Cognitive Radio ad-hoc network","authors":"Yosra Mallat, Aymen Ayari, M. Ayadi, S. Tabbane","doi":"10.1109/SOFTCOM.2015.7314112","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314112","url":null,"abstract":"A large number of routing protocols for Cognitive Radio (CR) have been recently proposed to improve the efficiency of spectrum utilization. As an example, we can find the Cognitive Ad hoc On demand Distance Vector (CAODV). This protocol is based on AODV one and uses an on-demand approach for finding routes to which the principals of regions activity avoidance of the Primary User (PU) has been added during the packet transfer. The main drawback of this protocol is that it doesn't support the Quality of Service (QoS) mechanisms. In this paper, we propose to develop, implement and test a new protocol that integrate the QoS adaption mechanism in cognitive on demand routing protocol. The new protocol, called QoS-CAODV, is a combination of QoS-AODV and CAODV. The performances of QoS-CAODV protocol have been evaluated by numerical simulations (OPNET 14.5). We have observed from results that the QoS-CAODV protocol provides better performance in term of average throughput, end-to-end delay and gives the smallest number of dropped packets.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125896762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Berrahal, Jong-Hoon Kim, S. Rekhis, N. Boudriga, Deon Wilkins, Jaime Acevedo
{"title":"Unmanned aircraft vehicle assisted WSN-based border surveillance","authors":"S. Berrahal, Jong-Hoon Kim, S. Rekhis, N. Boudriga, Deon Wilkins, Jaime Acevedo","doi":"10.1109/SOFTCOM.2015.7314129","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314129","url":null,"abstract":"We develop in this paper a novel border surveillance solution, composed of a Wireless Sensor Network (WSN) deployed terrestrially to detect and track trespassers, and a set of lightweight unmanned a quadcopters that interact with the deployed WSN to improve the border surveillance, the detection and investigation of network failures, the maintenance of the network, and the response to hostage situations. In this paper, together with the design of the proposed VTail quadcopter, we develop powerless techniques to accurately locate terrestrial sensors using RFID technology, compute the optimal positions of the new sensors to drop, relay data between isolated islands of nodes, and wake up sensors to track intruders. A simulation is conducted to evaluate the proposal.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134558895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust distributed beamforming design in amplify-and-forward relay systems with multiple user pairs","authors":"Pei-Wen Hsieh, Ying-Tsung Lin, Sau-Gee Chen","doi":"10.1109/SOFTCOM.2015.7314121","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314121","url":null,"abstract":"In this work, a signal-to-interference-plus-noise ratio (SINR)-based robust distributed beamforming scheme is proposed for one-way amplify-and-forward (AF) relay systems with multiple user pairs. The proposed scheme obtains its optimal beam vectors by utilizing convex semi-definite programming (SDP) optimization with newly derived bounds for signal and interference powers. Compared with existing works, the proposed scheme has much higher probability of obtaining the optimal solution than schemes applying approximate bounds exploiting Cauchy-Swartz (CS) inequality. In addition, in terms of transmit power consumption, the proposed scheme requires less transmit power than existing works while still satisfying the SINR constraints. Simulation results also demonstrate that the proposed SDP-based method outperforms the existing SDP-based methods.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCORM-MPEG: An ontology of interoperable metadata for multimedia and e-Learning","authors":"Marcelo Correia Santos, Y. Iano","doi":"10.1109/SOFTCOM.2015.7314122","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314122","url":null,"abstract":"The convergence of digital media offers an integration of ICT focused on telecommunications and multimedia domain (under responsibility of the Moving Picture Experts Group, ISO/IEC JTC1 SC29) and the ICTE (the ICT for Education), managed by the ISO/IEC JTC1 SC36, highlighting the MPEG standards, employees as content and metadata to the multimedia Digital TV and the technologies applied to e-Learning. Regarding this, there is the problem of developing an interoperable matching for normative bases, achieving an innovative proposal in the convergence between digital telecommunications and applications for e-Learning, also essentially multimedia. To reach this purpose it is proposed to create a standard ontology of interoperable metadata for web, digital TV and extensions for mobile devices based on the integration between MPEG-21 and SCORM metadata standards. The methodology used consists on building an ontology MPEG-21 SCORM which can be achieved on making a correspondence through the XPath language, managed by the W3C. The employ of the XPath language is desirable for matching and mapping both metadata schema patterns - integrating MPEG-21 (mostly Digital Item Declaration Language) and SCORM metadata schema. The practical purpose is the creation and storage of objects for use in digital telecommunications as Digital Television, in an interoperable way with the e-Learning industry, here as description metadata for all sorts of media and hypermedia to create learning objects.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A protocol extension for selective reprogramming of WSNs","authors":"Emanuel Lima, P. Carvalho, Ó. Gama","doi":"10.1109/SOFTCOM.2015.7314064","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314064","url":null,"abstract":"Wireless sensor networks (WSNs) are expected to operate for long time periods, often in places of difficult access. Thus, the ability to reprogram remotely and selectively sensor nodes becomes crucial in the maintenance and management of these networks. From the operating systems mostly used in WSNs, only TinyOS supports natively a reprogramming protocol (Deluge). The epidemic nature of Deluge, without supporting selective reprogramming, compromises the potentially vast application of WSNs. This paper proposes a new protocol as an extension of Deluge, allowing selective reprogramming of sensor nodes based on the platform type or node identifier. Aspects such as robustness and efficiency are taken into account in the protocol design and implementation, while assuring backward compatibility with Deluge. This new reprogramming protocol provides the required flexibility for deploying versatile WSNs, comprising heterogeneous nodes and applications.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low power methodology for an ASIC design flow based on high-level synthesis","authors":"F. Muslim, Affaq Qamar, L. Lavagno","doi":"10.1109/SOFTCOM.2015.7314103","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314103","url":null,"abstract":"Power management in system-on-chip (SoC) design has become very important in modern nanometric technologies. It is desirable to consider power optimization at the system-level for maximum power savings due to its higher level of abstraction. Clock gating and power gating are two well-known techniques for dynamic and leakage power reduction respectively. They can even be integrated to get maximum power reduction by using the same signal to control both. This work presents a methodology using both these techniques to save power of an inverse discrete cosine transform (IDCT) design when the register transfer level (RTL) is generated automatically by high-level synthesis (HLS). Power gating is implemented by capturing the power intent using common power format (CPF). This work mainly highlights the prospects of integrating CPF with automatically generated RTL using HLS flow. Saving in dynamic power by a factor of around 10× is obtained through clock gating while more than 50% saving in static power is obtained through power gating. Power gating also results in some area overhead.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Zouari, Iness Ahriz, R. Zayani, A. Dziri, R. Bouallègue
{"title":"Relevant CIR parameters selection for fingerprinting based location algorithm","authors":"R. Zouari, Iness Ahriz, R. Zayani, A. Dziri, R. Bouallègue","doi":"10.1109/SOFTCOM.2015.7314117","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314117","url":null,"abstract":"This paper investigates the relevance of Channel Impulse Response (CIR) parameters for fingerprint based localization algorithm. We consider in this study a WLAN environment where a Multi-Layer Neural Network (MLNN) learns off-line the location from the location-dependent parameters of the CIR. Then, it calculates on-line the accurate position of a mobile station from given fingerprints. More importantly, an advanced study is conducted to identify the relevant parameters of CIR to be used as fingerprints which offer lower complexity and high location accuracy.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enrique Chirivella-Perez, J. Gutiérrez-Aguado, J. A. Calero, J. M. Claver
{"title":"Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures","authors":"Enrique Chirivella-Perez, J. Gutiérrez-Aguado, J. A. Calero, J. M. Claver","doi":"10.1109/SOFTCOM.2015.7314126","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314126","url":null,"abstract":"Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration between the SDN controller and the control plane of the cloud computing stack. The proposed architecture has been implemented using reference implementations such as OpenStack cloud infrastructures and FloodLight SDN controllers. A number of experiments have been executed in the prototype to validate the suitability and performance of the proposed architecture.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"15 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133238458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Mainetti, V. Mighali, L. Patrono, Piercosimo Rametta
{"title":"A novel rule-based semantic architecture for IoT building automation systems","authors":"L. Mainetti, V. Mighali, L. Patrono, Piercosimo Rametta","doi":"10.1109/SOFTCOM.2015.7314063","DOIUrl":"https://doi.org/10.1109/SOFTCOM.2015.7314063","url":null,"abstract":"The ever growing number of smart devices connected to the Internet of Things is giving users the chance to sense data from surrounding environment and act upon it. However, interpreting raw data coming from heterogeneous sensors and applying control algorithms to actuators is not a simple task for the common end-user who wants to create applications for smart environments. For these reasons, this work deals with the definition of a novel rule-based semantic architecture for the implementation of building automation applications in an IoT context. Sensor data are abstracted at a high semantic level related to the properties they are associated to and interactions with actuators are driven by high-level desired actions. Applications have the form of an Event-Condition-Action (ECA) rule and the layered architecture separates high-level semantic reasoning aspects from low-level execution details. The proposed architecture is also compared with main state-of-the-art solutions and some suitable technologies for its implementation are suggested.","PeriodicalId":264787,"journal":{"name":"2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}