{"title":"Outage Users First Cell Outage Compensation Algorithm for Self-Organizing Networks","authors":"Chih-Hsiang Ho, Li-Sheng Chen, W. Chung, S. Kuo","doi":"10.1145/3069593.3069600","DOIUrl":"https://doi.org/10.1145/3069593.3069600","url":null,"abstract":"In cellular communication networks, base stations experience cell outages for various reasons including hardware malfunctions, firmware upgrades, or problems in the network backhaul. During a cell outage, users serviced by a base station disconnect from the network without warning because of a lack of signal coverage. Cell outages affect consumer interests and results in substantial losses for the telecommunications operator. In this study, cell outages in base stations are examined by constructing system models. Wireless interference and base station load were key considerations in the proposed outage users first cell outage compensation (OUF-COC) algorithm. The algorithm restores signal coverage and connections to users in the outage area without affecting users outside of the outage area. Simulations showed that OUF-COC could restore connections for over 90% of outage users. Approximately 50% of these users and 70% of users outside of the outage area experienced data rates of 250Kbps or higher (i.e., a typical data rate for a 3G network). These results indicated that the OUF-COC algorithm could effectively maintain quality of service among regular users while restoring connections to outage users and enhancing their data rates.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Higher Sensitivity RF-DC Rectifier for Ultra-Low Power Semi-Active RFID Tags","authors":"J. Sampe, T. Mohamad, D. Berhanuddin","doi":"10.1145/3069593.3069602","DOIUrl":"https://doi.org/10.1145/3069593.3069602","url":null,"abstract":"Radio frequency (RF) energy harvesting is the process where energy is captured from the radiated RF signals and converted it to electrical power to supply a very small amount of power to modern electronic devices. This paper presents a RF energy harvester for ultra-low power semi-active UHF radio frequency identification tag applications. The main objective is to solve the semi-active UHF RFID tag limited lifespan issues due to the need for batteries to power its circuitries.In this design, the energy from the radiated RF signals is converted to electrical power by a module known as RF-DC rectifier. The circuit is based on a cross-connected differential-drive CMOS rectifier topology which is implemented in 0.13 μm CMOS standard technology with the input RF power range from -20 dBm to -10 dBm operating in 915 MHz frequency band. To ensure a maximum output voltage is achieved, several simulations based on the optimized matching network components, the variation of transistor sizes and load resistance, and increases the number of rectifier stages are investigated. All the circuit designs and simulations are performed using Orcad Cadance software. The simulated results shown that the optimized impedance matching network and a six-stage cross-connected differential-drive CMOS rectifier circuit able to produces a 1.13 V DC output voltage with an input power of -10 dBm (100 μW) and 1 MΩ load resistance.The results obtained shows that the proposed design can extend the lifetime of semi-active UHF RFID tag, able to eliminate its dependency on battery and make it possible to achieve a batteryless tag. Therefore, can be used to supply electrical power continuously for RFID tag applications.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum Cluster Degree and H-Extra Connectivity of Folded Hypercubes","authors":"Lili Li, Qiang Zhu","doi":"10.1145/3069593.3069606","DOIUrl":"https://doi.org/10.1145/3069593.3069606","url":null,"abstract":"Extra connectivity is a special conditional connectivity, which is a generalization of classical connectivity and is an important measure parameter for the reliability of interconnection networks. In this paper, we explore the minimum -cluster degree and the -extra connectivity of folded hypercube network. Based on the investigation to the minimum -cluster degree of folded hypercube networks, we determine that the -extra connectivity of -dimensional folded hypercube is its minimum -cluster degree for","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient Algorithm for Time Synchronization in Sensor Networks","authors":"Neha Fotedar, P. Saini","doi":"10.1145/3069593.3069601","DOIUrl":"https://doi.org/10.1145/3069593.3069601","url":null,"abstract":"The time synchronization is a well-known challenge in wireless ad hoc networks. The paper introduces an algorithm for time synchronization in wireless sensor networks. It aims to conserve the battery power of sensors to be utilized for synchronization among the nodes in the network. The proposed synchronization approach is topology driven. In the existing literature, a wide range of protocols use flooding as the basic mechanism to create a topology. However, our method is based on the clustering of nodes with minimum hop distance from the cluster head and the chaining of cluster heads in order to create an energy-efficient topology. Also, it results in substantial reduction in the total transmission overhead. Further, it restricts the energy consumption in synchronizing the nodes of the network. Moreover, the approach avoids the loss of network coverage by electing a new cluster head in the event of cluster head failure. Finally, the simulation results exhibits that the proposed approach has significant energy savings as compared to many popular algorithms.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Steganography","authors":"Ria Das, Punyasha Chatterjee","doi":"10.1145/3069593.3069605","DOIUrl":"https://doi.org/10.1145/3069593.3069605","url":null,"abstract":"Propelled by the ongoing advancements in mobile communication and wireless technologies, the internet has transformed into Internet of Things (IoT) which refers to a global, dynamic network infrastructure of smart devices coupled with a common pool of self-configuring capabilities that employ seamless integration of intelligent interfaces into information network. Yet it brings forth a new dimension of complexity in terms of many potential challenges specifically in areas of data security comprising data confidentiality and integrity aspects during data transfer phases in IoT. In order to promote secure data transfer in smart IoT environment, a security scheme is advocated in this paper which addresses both the aforesaid issues, employing a combined approach of lightweight Cryptography and Variable LSB Substitution Steganography technique. Further a comparative study is conducted between Simple LSB & Variable LSB Substitution algorithm where it can be concluded that the Variable LSB Substitution scheme offers better security than its Simple LSB Substitution counterpart.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Contention MAC Protocol for Wireless Sensor Networks","authors":"A. Patro, S. Chinara, Manu Elapila","doi":"10.1145/3069593.3069604","DOIUrl":"https://doi.org/10.1145/3069593.3069604","url":null,"abstract":"Research in the area of Wireless Sensor Networks has taken tremendous growth due to its wide applications spanning from health monitoring, environmental monitoring and tactical systems. The tiny nodes equipped with low batter power and computation power collaborate to sense the parameters and communicate to the base station. The contention in the channel demands the design of efficient MAC protocols that can save the battery power and reduce the data loss during transmission while are used in various fields. Medium Access Control (MAC) Protocols, are at the lower layers of WSNs' protocol stack. They have a greater influence on performance and energy consumption of the network. Sensor MAC (SMAC) is one of the oldest and most widely used MAC protocol for WSN. There exists few variations of SMAC, but still the research is going on to modify this protocol in order to support real time traffic while making it more energy efficient. The current work plans to find the drawbacks of SMAC and to make it more energy efficient.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Law Siew Xue, Nazatul Aini Abd Majid, E. Sundararajan
{"title":"Quality of Service Evaluation of IaaS Modeler Allocation Strategies on Cloud Computing Simulator","authors":"Law Siew Xue, Nazatul Aini Abd Majid, E. Sundararajan","doi":"10.1145/3069593.3069607","DOIUrl":"https://doi.org/10.1145/3069593.3069607","url":null,"abstract":"Cloud computing is becoming popular among application developers nowadays. With the advent of cloud, application developers can use computing resources that are cost effective with almost zero hardware maintenance worries. Many Simulators for Cloud platform has been developed to better understand the behavior of this platform and one of the commonly used simulator is CloudSim. The Cloud simulator (CloudSim) is a tool that provides an environment for investigating and understanding the federation of cloud entities and events. The effect of variation in parameters such as number of host, host MIPS, host RAM (MB) size, host storage, host bandwidth and VM and cloudlet completion time in IaaS modeler has been studied in this work. The scheduling policy for allocating processing cores to virtual machines has also been studied. We introduce an approach using PCA and clustering technique that is expected to perform better compared to the existing FCFS method for the allocation strategy.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","authors":"","doi":"10.1145/3069593","DOIUrl":"https://doi.org/10.1145/3069593","url":null,"abstract":"","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}