2019 International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

筛选
英文 中文
Smart Sensor Node of WSNs for River Water Pollution Monitoring System 用于河流水污染监测系统的wsn智能传感器节点
E. A. Kadir, Apri Siswanto, S. Rosa, A. Syukur, H. Irie, M. Othman
{"title":"Smart Sensor Node of WSNs for River Water Pollution Monitoring System","authors":"E. A. Kadir, Apri Siswanto, S. Rosa, A. Syukur, H. Irie, M. Othman","doi":"10.1109/COMMNET.2019.8742371","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742371","url":null,"abstract":"Development of economic has impact by many industries operating along the river then create the pollution by industry waste as well as effected to river water. This research aims to develop a system to monitor river water quality in many parameters that safe for human as well as for ecosystem live in the river. Wireless Sensor Networks (WSNs) used in this design because of advantages WSNs system, a sensor node attached to many sensors such as water temperature, pH, dissolved oxygen (DO) and electricity conductivity. The river water monitoring system designed be able to monitor water level and flow rate for environmental and flooding alert. A sensor node customizes designed to fulfill water quality standard as well added others sensor for flooding alert, data collected by sensor node forward to WSNs sink node which embedded with a microcontroller unit and memory as local database before sending to backend system. Monitoring at backend system shows by some displays in order to easy monitoring by representative institution or local authority as well action will be taken if some case happen or abnormality reported by monitoring system. Prototype of WSNs node have been designed and tested, the results shows sensor node be able to detect polluted water parameter and water level as well flow rate. Furthermore, sensor node will be testing at actual site which is one of the river in Riau Province in Indonesia.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123414695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a distributed token based payment system using blockchain technology 基于区块链技术的分布式代币支付系统
Mouad Zouina, Benaceur Outtai
{"title":"Towards a distributed token based payment system using blockchain technology","authors":"Mouad Zouina, Benaceur Outtai","doi":"10.1109/COMMNET.2019.8742380","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742380","url":null,"abstract":"This paper presents a distributed payment system based on payment tokens using Blockchain technology; these payment tokens protect the consumer from identity theft by unauthorized usage of his payment card details (PAN,CVV), due to mismanagements from other parties of the payment system. Furthermore, a private Blockchain consortium consolidates the security and privacy of the proposed payment system; this consortium consists of a private Blockchain called Bank Authority that acts as the interoperability domain, in addition to two other private Blockchains, each serves as the acquirer Bank and the issuer Bank, respectively, the security of this payment system is reinforced by introducing special nodes that verify and validate transactions, in order to detect and block fraud attempts. Moreover, to keep the payment system confidentiality and protect the economic interests of all the Banks in the system, only the transaction hash is recorded in the consortium's Blockchain and only the Banks involved in a transaction will have access to its details.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PAPR Reduction in MIMO-OFDM Based on Polar Codes and Companding Technique 基于极化码和压缩技术的MIMO-OFDM中PAPR的降低
Brahim Bakkas, Idriss Chana, H. Ben-Azza
{"title":"PAPR Reduction in MIMO-OFDM Based on Polar Codes and Companding Technique","authors":"Brahim Bakkas, Idriss Chana, H. Ben-Azza","doi":"10.1109/COMMNET.2019.8742379","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742379","url":null,"abstract":"MIMO-OFDM is a method adopted by new highspeed communications technologies such as IEEE802.11, IEEE 802.16 and 4G. Among the advantages of MIMO-OFDM, its ability to increase the transmission rate, and its adaptation to multipath channel with fading. Unfortunately the signals modulated by the OFDM technique generate high values of Peak-to-Average Power Ratio (PAPR). To solve this major drawback, several techniques have been proposed in literature. Among others, we find those that combine coding and companding. In this context we propose and study a new method based on μ-Law companding type and Polar Codes to reduce PAPR values in a MIMO-OFDM system. In order to evaluate the performances of our method in terms of PAPR and BER, several simulations are performed taking into consideration parameters related to coding and companding rates, and the number of sub carriers. The plotted curves show that the results are very significant; indeed, firstly our method achieves a gain of 8 dB in terms of PAPR by ensuring a good compromise in term of BER thanks to the use of the Polar Codes. Secondly our method operates with less complexity and outperforms the most well-known methods.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MPBRP- Mobility Prediction Based Routing Protocol in VANETs VANETs中基于移动性预测的路由协议
Mao Ye, L. Guan, M. Quddus
{"title":"MPBRP- Mobility Prediction Based Routing Protocol in VANETs","authors":"Mao Ye, L. Guan, M. Quddus","doi":"10.1109/COMMNET.2019.8742389","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742389","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) technology has been emerged as an important research topic in recent years. This is because the vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications are becoming more popular in the field of Intelligent Transportation System (ITS) so as to further enhance traffic efficiency, safety, emissions reduction and infotainment applications. Over the last few years, a number of routing protocols in VANETs have been developed. In particular, position-based routing protocols have attracted the most interest in VANETs as they are suitable for a frequently changeable network topology and highly dynamic nature of vehicular nodes. This paper develops a new Mobility Prediction Based Routing Protocol (MPBRP) for neighborhood detection, packet transmission and path recovery in VANETs by using driver's intention collected from the positioning systems. Several major contributions are made in the paper: (1) Combining both predictive forwarding strategy and recovery strategy to detect neighbors and transfer packets. (2) Utilizing the predicted position and angles in a pre-defined time with considering driver's intention to select the neighboring nodes and discover the transmission path. (3) Validating the effectiveness and feasibility of the proposed protocol by creating a unified simulation platform (Veins) and implementing it in real world scenarios. (4) Enhancing the overall performance as the proposed routing protocol achieved competitive improvement over existing protocols in terms of packet delivery ratio, end-to-end delay and average hops about 26.22%, 21.89% and 20.79% by average in grid-based scenario, and about 26.04%,23.14% and 18.51% by average in urban scenario respectively.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Receiver Design for Dual-Mode Index Modulation Aided OFDM 双模索引调制辅助OFDM接收机设计
Yusuf Acar, S. Çolak
{"title":"Receiver Design for Dual-Mode Index Modulation Aided OFDM","authors":"Yusuf Acar, S. Çolak","doi":"10.1109/COMMNET.2019.8742363","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742363","url":null,"abstract":"Nowadays, variants of Spatial Modulation (SM) are studied by a lot of researchers in order to increase Spectral Efficiency (SE) more. One of the important variants of SM is known as Orthogonal Frequency Division Multiplexing Index Modulation (OFDM-IM). In OFDM-IM, selection of active subcarriers is based on the idea of the selection of active antennas in the SM. Then, to take OFDM-IM a step further in terms of SE, Dual Mode OFDM-IM (DM-OFDM-IM) has been proposed that activates entire subcarriers unlike that of OFDM-IM. However, in all these studies same assumption is made, i.e., channel is perfectly known at the receiver. However, this assumption is not accurate for practical applications. For this reason, the presented simulation results and theoretical analysis without channel estimation cannot represent the real system performance. In this study, a pilot symbol aided channel estimation for DM-OFDM-IM scheme is considered. We investigate the effect on Bit Error Rate (BER) performance of five different interpolation techniques. The simulation results illustrate that, interpolation techniques perform similiar BER performance for low and moderate Signal-to-Noise Ratio (SNR) range. However, at the high SNR values (SNR> 30 dB), Low-Pass and SPLINE interpolation techniques give the highest performance among all considered techniques.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service 身份即服务中云应用的自动信任协商
T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell
{"title":"Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell","doi":"10.1109/COMMNET.2019.8742384","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742384","url":null,"abstract":"In recent years, enterprise applications migrate from a local hosting to a Software-as-a-Service Cloud provider and provide themselves as Cloud services. They may adapt their security infrastructures to a target Cloud provider and may establish a business-to-business relationship with each other manually. Migration of existing applications from a local hosting to a Cloud provider requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating application components with functional and nonfunctional aspects. However, none of them has focused so far on the adaptation of the required security infrastructure. In our previous work, we proposed to decouple the Authentication and Authorisation Infrastructure (AAI) from the business logic of the application as a manageable resource for Cloud providers to control its life cycle. In this paper, we present a novel trust model that enables a dynamic trust relationship between Cloud services. Also, we demonstrate the complete life cycle of the security infrastructure from the development to the migration across multiple Cloud providers. We evaluate the following aspects of Cloud migration: First, the trust relationship is adapted and preserved during the migration. Second, the security infrastructure is portable across Cloud providers as well as interoperable with the protected web service.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130233601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Multi-Objective Finite Control Set Model Predictive Control for Grid Connected Three-Level Neutral-Point Clamped Inverter 并网三电平中性点箝位逆变器的改进多目标有限控制集模型预测控制
Abdiddaim Katkout, A. Essadki, T. Nasser
{"title":"An Improved Multi-Objective Finite Control Set Model Predictive Control for Grid Connected Three-Level Neutral-Point Clamped Inverter","authors":"Abdiddaim Katkout, A. Essadki, T. Nasser","doi":"10.1109/COMMNET.2019.8742372","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742372","url":null,"abstract":"This paper presents an improved multi-objective finite control set model predictive control (MO FCS-MPC) for grid connected three-level neutral-point clamped (3L-NPC) inverter. The FCS-MPC is based on the prediction of the grid current and DC-link capacitor voltage used the discrete-time model of 3L-NPC inverter. A cost function is defined to compromise the control objectives: control of grid current, balance the DC-link capacitor voltage and reduce the switching number. The cost function is evaluated each sampling period of all switching states (SSs) of the inverter (27 SSs of 3L-NPC) to select the optimal SS that will be applied in the next sampling period. The computational burden will increase exponentially with the system complexity. To overcome this issue, we proposed to select the sector of the inverter output voltage's reference using its angle. Consequently, the cost function is evaluated only 4 instead 27 and 6 times in the standard and efficient FCS-MPCs, respectively. Its performance improvements in comparison with the efficient MO FCS-MPC are validated with simulation results.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Traffic Monitoring and Analysis Using Packet Sniffer 使用数据包嗅探器的网络流量监控与分析
Apri Siswanto, A. Syukur, E. A. Kadir, Suratin
{"title":"Network Traffic Monitoring and Analysis Using Packet Sniffer","authors":"Apri Siswanto, A. Syukur, E. A. Kadir, Suratin","doi":"10.1109/COMMNET.2019.8742369","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742369","url":null,"abstract":"Traffic analysis using the internet is an activity to record data from user activities in using the Internet. This study aims to obtain data about the results of traffic in a graphical form so that it can find out the number of users who access the internet and use bandwidth. In this study, researchers also noted when the peak internet usage time in Telkom Vocational School Pekanbaru. The method used to get the results of the study is the packet sniffing method. Researchers can filter data packets from the http protocol application. Since, user activity is more dominant in finding and downloading sites on the Internet. The tool used is wireshark, this application is greatly helpful with features that are truly supportive and easy to analyze networks.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115158990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Physical-Layer Security over Generalized SIMO Multipath Fading Channels 广义SIMO多径衰落信道的物理层安全性
J. M. Moualeu, P. Sofotasios, D. B. D. Costa, W. Hamouda, U. Dias, S. Muhaidat
{"title":"Physical-Layer Security over Generalized SIMO Multipath Fading Channels","authors":"J. M. Moualeu, P. Sofotasios, D. B. D. Costa, W. Hamouda, U. Dias, S. Muhaidat","doi":"10.1109/COMMNET.2019.8742357","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742357","url":null,"abstract":"The present work investigates the physical layer security of wireless communication systems over non-homogeneous fading environments, which are typically encountered in realistic wireless transmission scenarios in the context of conventional and emerging communication systems. This is carried out in the context of a single-input multiple-output system that consists of a single-antenna transmitter, a multi-antenna legitimate receiver, and a multi-antenna active eavesdropper. To this end, novel exact analytic expressions are derived for the corresponding average secrecy capacity, which are corroborated by respective results from computer simulations that verify their validity. Capitalizing on the offered results, the physical layer security is quantified in terms of different parameters. This leads to the development of useful insights on the impact of non-homogeneous fading environment and the number of employed antennas on the achieved physical layer security levels of the considered set up.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Clustering-Based Approach to Speed up IaaS Service Discovery Process 基于集群的IaaS服务发现加速方法研究
Driss Riane, Ahmed Ettalbi
{"title":"Towards a Clustering-Based Approach to Speed up IaaS Service Discovery Process","authors":"Driss Riane, Ahmed Ettalbi","doi":"10.1109/COMMNET.2019.8742374","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742374","url":null,"abstract":"Cloud computing technology offers on-demand access to different cloud services over the Internet. The huge number of cloud providers that offer various services with different descriptions caused many problems, such as the complexity of multi-cloud service discovery and taking a lot of time to find candidates services that meets user's requirements. In this paper, we propose a new approach for composite infrastructure service discovery in multi-cloud environment. In our approach, we propose an indexing technique to facilitate virtual cloud resource discovery and their matching to user requirements.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114305760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信