Proceedings of the International Conference on High Performance Compilation, Computing and Communications最新文献

筛选
英文 中文
Outage Users First Cell Outage Compensation Algorithm for Self-Organizing Networks 自组织网络的中断用户第一单元中断补偿算法
Chih-Hsiang Ho, Li-Sheng Chen, W. Chung, S. Kuo
{"title":"Outage Users First Cell Outage Compensation Algorithm for Self-Organizing Networks","authors":"Chih-Hsiang Ho, Li-Sheng Chen, W. Chung, S. Kuo","doi":"10.1145/3069593.3069600","DOIUrl":"https://doi.org/10.1145/3069593.3069600","url":null,"abstract":"In cellular communication networks, base stations experience cell outages for various reasons including hardware malfunctions, firmware upgrades, or problems in the network backhaul. During a cell outage, users serviced by a base station disconnect from the network without warning because of a lack of signal coverage. Cell outages affect consumer interests and results in substantial losses for the telecommunications operator. In this study, cell outages in base stations are examined by constructing system models. Wireless interference and base station load were key considerations in the proposed outage users first cell outage compensation (OUF-COC) algorithm. The algorithm restores signal coverage and connections to users in the outage area without affecting users outside of the outage area. Simulations showed that OUF-COC could restore connections for over 90% of outage users. Approximately 50% of these users and 70% of users outside of the outage area experienced data rates of 250Kbps or higher (i.e., a typical data rate for a 3G network). These results indicated that the OUF-COC algorithm could effectively maintain quality of service among regular users while restoring connections to outage users and enhancing their data rates.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Higher Sensitivity RF-DC Rectifier for Ultra-Low Power Semi-Active RFID Tags 用于超低功耗半有源RFID标签的高灵敏度RF-DC整流器
J. Sampe, T. Mohamad, D. Berhanuddin
{"title":"Higher Sensitivity RF-DC Rectifier for Ultra-Low Power Semi-Active RFID Tags","authors":"J. Sampe, T. Mohamad, D. Berhanuddin","doi":"10.1145/3069593.3069602","DOIUrl":"https://doi.org/10.1145/3069593.3069602","url":null,"abstract":"Radio frequency (RF) energy harvesting is the process where energy is captured from the radiated RF signals and converted it to electrical power to supply a very small amount of power to modern electronic devices. This paper presents a RF energy harvester for ultra-low power semi-active UHF radio frequency identification tag applications. The main objective is to solve the semi-active UHF RFID tag limited lifespan issues due to the need for batteries to power its circuitries.In this design, the energy from the radiated RF signals is converted to electrical power by a module known as RF-DC rectifier. The circuit is based on a cross-connected differential-drive CMOS rectifier topology which is implemented in 0.13 μm CMOS standard technology with the input RF power range from -20 dBm to -10 dBm operating in 915 MHz frequency band. To ensure a maximum output voltage is achieved, several simulations based on the optimized matching network components, the variation of transistor sizes and load resistance, and increases the number of rectifier stages are investigated. All the circuit designs and simulations are performed using Orcad Cadance software. The simulated results shown that the optimized impedance matching network and a six-stage cross-connected differential-drive CMOS rectifier circuit able to produces a 1.13 V DC output voltage with an input power of -10 dBm (100 μW) and 1 MΩ load resistance.The results obtained shows that the proposed design can extend the lifetime of semi-active UHF RFID tag, able to eliminate its dependency on battery and make it possible to achieve a batteryless tag. Therefore, can be used to supply electrical power continuously for RFID tag applications.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Minimum Cluster Degree and H-Extra Connectivity of Folded Hypercubes 折叠超立方体的最小聚类度和H-Extra连通性
Lili Li, Qiang Zhu
{"title":"Minimum Cluster Degree and H-Extra Connectivity of Folded Hypercubes","authors":"Lili Li, Qiang Zhu","doi":"10.1145/3069593.3069606","DOIUrl":"https://doi.org/10.1145/3069593.3069606","url":null,"abstract":"Extra connectivity is a special conditional connectivity, which is a generalization of classical connectivity and is an important measure parameter for the reliability of interconnection networks. In this paper, we explore the minimum -cluster degree and the -extra connectivity of folded hypercube network. Based on the investigation to the minimum -cluster degree of folded hypercube networks, we determine that the -extra connectivity of -dimensional folded hypercube is its minimum -cluster degree for","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Algorithm for Time Synchronization in Sensor Networks 一种传感器网络时间同步的节能算法
Neha Fotedar, P. Saini
{"title":"An Energy Efficient Algorithm for Time Synchronization in Sensor Networks","authors":"Neha Fotedar, P. Saini","doi":"10.1145/3069593.3069601","DOIUrl":"https://doi.org/10.1145/3069593.3069601","url":null,"abstract":"The time synchronization is a well-known challenge in wireless ad hoc networks. The paper introduces an algorithm for time synchronization in wireless sensor networks. It aims to conserve the battery power of sensors to be utilized for synchronization among the nodes in the network. The proposed synchronization approach is topology driven. In the existing literature, a wide range of protocols use flooding as the basic mechanism to create a topology. However, our method is based on the clustering of nodes with minimum hop distance from the cluster head and the chaining of cluster heads in order to create an energy-efficient topology. Also, it results in substantial reduction in the total transmission overhead. Further, it restricts the energy consumption in synchronizing the nodes of the network. Moreover, the approach avoids the loss of network coverage by electing a new cluster head in the event of cluster head failure. Finally, the simulation results exhibits that the proposed approach has significant energy savings as compared to many popular algorithms.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Steganography 采用加密和隐写术的集成方法保护物联网中的数据传输
Ria Das, Punyasha Chatterjee
{"title":"Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Steganography","authors":"Ria Das, Punyasha Chatterjee","doi":"10.1145/3069593.3069605","DOIUrl":"https://doi.org/10.1145/3069593.3069605","url":null,"abstract":"Propelled by the ongoing advancements in mobile communication and wireless technologies, the internet has transformed into Internet of Things (IoT) which refers to a global, dynamic network infrastructure of smart devices coupled with a common pool of self-configuring capabilities that employ seamless integration of intelligent interfaces into information network. Yet it brings forth a new dimension of complexity in terms of many potential challenges specifically in areas of data security comprising data confidentiality and integrity aspects during data transfer phases in IoT. In order to promote secure data transfer in smart IoT environment, a security scheme is advocated in this paper which addresses both the aforesaid issues, employing a combined approach of lightweight Cryptography and Variable LSB Substitution Steganography technique. Further a comparative study is conducted between Simple LSB & Variable LSB Substitution algorithm where it can be concluded that the Variable LSB Substitution scheme offers better security than its Simple LSB Substitution counterpart.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116475895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Dynamic Contention MAC Protocol for Wireless Sensor Networks 无线传感器网络的动态竞争MAC协议
A. Patro, S. Chinara, Manu Elapila
{"title":"A Dynamic Contention MAC Protocol for Wireless Sensor Networks","authors":"A. Patro, S. Chinara, Manu Elapila","doi":"10.1145/3069593.3069604","DOIUrl":"https://doi.org/10.1145/3069593.3069604","url":null,"abstract":"Research in the area of Wireless Sensor Networks has taken tremendous growth due to its wide applications spanning from health monitoring, environmental monitoring and tactical systems. The tiny nodes equipped with low batter power and computation power collaborate to sense the parameters and communicate to the base station. The contention in the channel demands the design of efficient MAC protocols that can save the battery power and reduce the data loss during transmission while are used in various fields. Medium Access Control (MAC) Protocols, are at the lower layers of WSNs' protocol stack. They have a greater influence on performance and energy consumption of the network. Sensor MAC (SMAC) is one of the oldest and most widely used MAC protocol for WSN. There exists few variations of SMAC, but still the research is going on to modify this protocol in order to support real time traffic while making it more energy efficient. The current work plans to find the drawbacks of SMAC and to make it more energy efficient.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quality of Service Evaluation of IaaS Modeler Allocation Strategies on Cloud Computing Simulator 云计算模拟器上IaaS建模器分配策略的服务质量评价
Law Siew Xue, Nazatul Aini Abd Majid, E. Sundararajan
{"title":"Quality of Service Evaluation of IaaS Modeler Allocation Strategies on Cloud Computing Simulator","authors":"Law Siew Xue, Nazatul Aini Abd Majid, E. Sundararajan","doi":"10.1145/3069593.3069607","DOIUrl":"https://doi.org/10.1145/3069593.3069607","url":null,"abstract":"Cloud computing is becoming popular among application developers nowadays. With the advent of cloud, application developers can use computing resources that are cost effective with almost zero hardware maintenance worries. Many Simulators for Cloud platform has been developed to better understand the behavior of this platform and one of the commonly used simulator is CloudSim. The Cloud simulator (CloudSim) is a tool that provides an environment for investigating and understanding the federation of cloud entities and events. The effect of variation in parameters such as number of host, host MIPS, host RAM (MB) size, host storage, host bandwidth and VM and cloudlet completion time in IaaS modeler has been studied in this work. The scheduling policy for allocating processing cores to virtual machines has also been studied. We introduce an approach using PCA and clustering technique that is expected to perform better compared to the existing FCFS method for the allocation strategy.","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the International Conference on High Performance Compilation, Computing and Communications 高性能编译、计算和通信国际会议论文集
{"title":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","authors":"","doi":"10.1145/3069593","DOIUrl":"https://doi.org/10.1145/3069593","url":null,"abstract":"","PeriodicalId":383937,"journal":{"name":"Proceedings of the International Conference on High Performance Compilation, Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信