{"title":"Evaluation of communication system selection applying AHP algorithm in heterogeneous wireless networks","authors":"M. Sasaki, A. Yamaguchi, K. Yamazaki, Y. Imagaki","doi":"10.1109/COMCOMAP.2012.6154867","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154867","url":null,"abstract":"In this paper, we conducted an experiment using a PC to evaluate the proposed novel selection policy for a communication system in heterogeneous wireless networks. It entailed the use of an analytic hierarchy process (AHP) algorithm that took the mobility of the user terminals into account. In particular, the AHP algorithm demonstrated an excellent improvement in overall performance with existing wireless systems. We confirmed the performance improvement by applying the AHP under the conditions where Wi-Fi and WiMAX were operating in heterogeneous wireless networks. The experimental results showed that the proposed policy using AHP provided a total amount of uploaded data that was 1.3-fold higher than WiMAX, 1.28-fold higher than Wi-Fi and 1.14-fold higher than conventional modes. AHP also provided almost full connection duration.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wise tradeoff between parameters for minimizing correlations and for designing MIMO systems","authors":"I. Kolani, Jie Zhang","doi":"10.1109/COMCOMAP.2012.6154880","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154880","url":null,"abstract":"We define a common and global parameter in terms of the amount of correlation for the entire multiple-input multiple-output antenna (MIMO) channels models. This is possible if the MIMO systems (with different number of antennas) are surrounded by the same distribution of scatterers. We demonstrate also by simulation results the wise tradeoff which can be done between antennas parameters and the one-ring scattering model parameters in order to significantly decrease the amount of correlation. As application, the performances analysis of few MIMO systems associated with the orthogonal space-time block code (OSTBC) spreading over the one-ring scattering channel, are computed and they are shown to be close to those of uncorrelated channel.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. R. Islam, K. S. Mahmood, M. M. R. Farazi, M. F. T. Oshim, M. Nazim, I. Hasan
{"title":"Difference to sum ratio factor based min-sum decoding for Low Density Parity Check Codes","authors":"M. R. Islam, K. S. Mahmood, M. M. R. Farazi, M. F. T. Oshim, M. Nazim, I. Hasan","doi":"10.1109/COMCOMAP.2012.6154010","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154010","url":null,"abstract":"Low Density Parity Check Codes (LDPC) give groundbreaking performance which is known to approach Shannon's limits for sufficiently large block length. Historically and recently, LDPC have been known to give superior performance than concatenated coding. In the following paper, a proposal to modify the standard Min-Sum (MS) algorithm for decoding LDPC codes is presented. This is done by introduction of a difference to sum ratio factor, κ in the check to bit node updating process. The algorithm is further extended by implementing hard decision of the Bit-Flipping (BF) algorithm over the soft decision of MS algorithm. Simulation results demonstrate that the proposed algorithms are effective in imparting a better performance in terms of a lower bit error rate (BER) at medium to high signal to noise ratio (SNR) when compared to the traditional MS algorithm while adding fair amount of complexity.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel ID-based authentication framework with adaptive privacy preservation for VANETs","authors":"Huang Lu, Jie Li, M. Guizani","doi":"10.1109/COMCOMAP.2012.6154869","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154869","url":null,"abstract":"In Vehicular Ad hoc Networks (VANETs), authentication is a crucial security requirement to avoid attacks to both inter-vehicle and vehicle-roadside communication. Vehicles have to be prevented from the misuse of their private data and the attacks on their privacy. In this paper, we investigate the authentication and privacy issues in VANETs. We propose a novel ID-based authentication framework with adaptive privacy preservation for VANETs. In this framework, adaptive self-generated pseudonyms are used as identifiers instead of real-world IDs. The update of the pseudonyms depends on vehicular demands. The ID-Based Signature (IBS) scheme and the ID-Based Online/Offline Signature (IBOOS) scheme are used, for authentication between the Road Side Units (RSUs) and vehicles, as well as authentication among vehicles, respectively. System evaluation has been executed using efficient IBS and IBOOS schemes. It shows that, the proposed authentication framework with privacy preservation is suitable to the VANET environment.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133206971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Print-and-scan resilient watermarking through polarizing DCT coefficients","authors":"Chun-Hung Chen, Yuan-Liang Tang, W. Hsieh","doi":"10.1587/TRANSINF.E96.D.2208","DOIUrl":"https://doi.org/10.1587/TRANSINF.E96.D.2208","url":null,"abstract":"Digital watermarking techniques have been used to assert the ownerships of digital images. That is, the ownership information is embedded to an image as a watermark such that the owner of the image could be identified. However, there are also many attacks trying to break or remove the embedded watermark. Therefore, the watermark should be very robust against various kinds of attacks. Among them, the print-and-scan (PS) attack is very challenging because it not only alters the pixel values but also changes the positions of the original pixels. In this paper, we propose a watermarking system operating in the discrete cosine transform (DCT) domain. The polarities of the DCT coefficients are modified for watermark embedding. This is done by considering the properties of DCT coefficients under the PS attack. The proposed system is able to maintain the image quality after watermarking and the embedded watermark is very robust against the PS attack as well.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved performance of four dimensional 8-PSK-TCM using fractional Fourier transform","authors":"Emna Ben Slimane, S. Jarboui, A. Bouallègue","doi":"10.1109/COMCOMAP.2012.6154803","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154803","url":null,"abstract":"We introduce and evaluate the performance of reliable fractional Fourier transform (FRFT) blocks both in the emitter and the receiver side for the four-dimensional 8-PSK-TCM previously designed for the NASA CCSDS standard. This new FRFT block makes use of weak inter correlation observed between signal and Gaussian noise in a particular FRFT plane and consequently allows near-optimal MMSE filtering. In addition, four orthogonal FRFT planes are also wisely chosen for attenuating the inter-symbols interference and create effective spatial multidimensionality instead of simple symbol concatenation used in conventional multi-dimensional TCM. Complex impulse shape functions are no longer needed since simple rectangle function can supply for the need of band limited spectral density. Simulation result shows 8 dB coding gain for BER= 10-4 by comparison to the standard four-dimensional 8-PSK-TCM. In addition, the method is as complex as the well known FFT.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and implementation of CARAS algorithm for automatic annotation, visualization, and GenBank submission of chloroplast genome sequences","authors":"Yankai Li, Huan Li, Yingjie Zhu, Zhoujun Li, Chuntao Yin, Xiaohan Lin, Chang Liu","doi":"10.1109/COMCOMAP.2012.6154863","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154863","url":null,"abstract":"We present CARAS, a web server that allows the automatic annotation of a chloroplast genome sequence, and the visualization and editing of the annotation results interactively and in real-time. CARAS accepts a complete chloroplast genome sequence as input. First, it accurately predicts protein-coding sequences and exon-intron structures by combining the results from two types of annotation approaches: ab initio prediction algorithms and similarity based methods. Second, tRNA genes and inverted repeats are identified using tRNAscan and vmatch. Using 220 chloroplast genome sequences as test, we show that CARAS outperforms a similar application DOGMA overall. Third, the annotation results are presented as a circular map that includes the name, location, orientation, and length of the various features. A Flex-based module is implemented, allowing the users to add, delete, and edit the features on-line. The results are stored on the server and can be retrieved from a given URL. Users also have options to download the annotation results in GFF3 format for further analyses in other third party software tools or in JPEG format for publication. Finally, CARAS can be used to create a Sequin file for GenBank submission of the annotated genome sequence. CARAS is freely available at http://caras.bicoup.com, and it will significantly facilitate research work involving chloroplast genomes.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor WPAN communication system using 2-dimensional array antenna in 60GHz frequency band","authors":"HuiKyu Lee, Junyeong Bok, B. Jo, G. Baek, H. Ryu","doi":"10.1109/COMCOMAP.2012.6154769","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154769","url":null,"abstract":"2-dimensional antenna beamforming is studied in this paper. Beamforming technique can reduce interferences signals to increase SNR. Because of this advantage, beamforming technique was adapted for WPAN (wireless personal area network) using 60GHz band. Since this 60GHz band signal has a characteristic of low diffraction, it is good for indoor communication environment. In this paper, we analyze 60GHz frequency band characteristics such as reflection coefficient, path loss. Also, we propose a 3-dimensional tracking system with MUSIC algorithm. After simulation, one result shows that this system can track DOA (direction of arrival) using proposed method. Another result shows how many antenna numbers are suitable for indoor communication environment. As those two results, it can be adapted in 60GHz frequency band indoor communication.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheduling mechanism for multiple MapReduce jobs in a workflow application (position paper)","authors":"Dongjin Yoo, K. Sim","doi":"10.1109/COMCOMAP.2012.6154882","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154882","url":null,"abstract":"MapReduce is currently an attractive model for data intensive application due to easy interface of programming, high scalability and fault tolerance capability. It is well suited for applications requiring processing large data with distributed processing resources such as web data analysis, bio informatics, and high performance computing area. There are many studies of job scheduling mechanism in shared cluster for MapReduce. However there is a need for scheduling workflow service composed of multiple MapReduce tasks with precedence dependency in multiple processing nodes. The contribution of this paper is proposing a scheduling mechanism for a workflow service containing multiple MapReduce jobs. The workflow application has precedence dependency constraints among multiple tasks, represented as directed acyclic graph (DAG). Also, for less data transfer cost in limited bisection bandwidth, data dependency criterion should be considered for scheduling multiple map-reduce jobs in a workflow. The proposed scheduling mechanism provides 1) scheduling MapReduce tasks regarding precedence constraints and 2) pre-data placement method considering data dependency constraints for saving data transfer cost over network.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real swing extraction for video indexing in golf practice video","authors":"P. Chotimanus, N. Cooharojananone, S. Phimoltares","doi":"10.1109/COMCOMAP.2012.6154885","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154885","url":null,"abstract":"This paper describes a method that extracts the start of every real golf swing in golf practice video recorded from face-on camera angle for video indexing. This new method accelerates and improves the process of golf swing analysis by allowing golfer to quickly navigate to the starting point of each real swing. Real swing is the most important part of golf practice video because it truly shows the problem of golfer's swing. Each start of real swing is extracted by detecting takeaway action at the start of the swing. The system consists of five main processes which are golf club head detection, golf ball detection, takeaway detection, takeaway validation and hit detection. First the golf club shaft is detected by using frame difference, morphological operation, canny edge detection and Hough line transform respectively. After that golf club head is extracted and in order to detect takeaway action accurately, the system also detects golf balls position using HSV color space to extract near white color. Then the information of detected golf clubs and golf balls are used to identify the start of each real swing. The result of experiments on golf practice video with different camera setups and light conditions shows that this method can efficiently extract the beginning of real swings.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}