{"title":"Error-tolerant non-binary error correction code for low power wireless sensor networks","authors":"Yousef Qassim, M. Magaña","doi":"10.1109/ICOIN.2014.6799477","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799477","url":null,"abstract":"Wireless sensor networks have emerged as revolutionary technology, where hundreds or thousands of small sensor units are distributed over an environment to monitor a certain phenomenon and achieve a certain functionality. These small sensor nodes are capable of sensing, computing, and communicating. Even though their capabilities are limited, their overall behaviour is complex. For decades researchers all over the world have been working on realizing many applications for wireless sensor networks and trying to overcome their issues. As in any new technology several challenges stand as a barrier to the advancement of wireless sensor networks. One important challenge is power consumption since the expected life of a wireless sensor network is determined by the lifetime of its components. In this paper we propose a modification to the Reed-Solomon decoder algorithm in order to reduce its power consumption and thus improve the lifetime of wireless sensor networks. The proposed modification exploits the fact that there exist applications that tolerate errors without totally jeopardizing the integrity of the data. This opens the door for new type of error control codes, namely error-tolerant non-binary error correction codes. Here we explore the performance of the proposed algorithm in terms of bit error rate and symbol error rate in comparison to the original algorithm and uncoded data. Also we provide a power saving estimate resulting from implementing such an algorithm.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative cache sharing among ISPs for reducing inter-ISP transit cost in content-centric networking","authors":"Kazuhito Matsuda, G. Hasegawa, M. Murata","doi":"10.1109/ICOIN.2014.6799693","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799693","url":null,"abstract":"Content-Centric Networking (CCN) has an in-network caching mechanism, which can reduce the traffic volume along the route to the destination host. This traffic volume reduction can also decrease inter-ISP transit cost. However, the memory space for caching in CCN routers is relatively small for the amount of content. In addition, any initial access to the content requested by a user must use the transit link, even when a nearby CCN router outside the route has the cached content. In this paper, we propose a method of cooperative cache sharing among CCN routers in multiple ISPs. It aims to lead to further reduction in the inter-ISP transit cost by improving the cache hit ratio. In the proposed method, the CCN routers share the memory space for caching of non-overlapping content. We evaluate the proposed method by simulation experiments using the IP-level network topology of actual ISP, and show that the inter-ISP transit traffic can be reduced by up to 28% compared with normal caching behavior of CCN.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atchareeya Kongbuntad, M. Uthansakul, P. Uthansakul
{"title":"Improved beamforming code book for WiGig using Maximal Ratio Combining","authors":"Atchareeya Kongbuntad, M. Uthansakul, P. Uthansakul","doi":"10.1109/ICOIN.2014.6799675","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799675","url":null,"abstract":"IEEE 802.11ad standard, so called WiGig has been defined due to the increasing market demands for high data rate communications. The standard was approved at 60 GHz band employing a beam formation to mitigate interference signal. However, a signal loss is introduced at the intersection of two adjacent beams when employing original beamforming codebook, hence the systems provide low BER. Therefore, this paper proposes an extra codebook to avoid the signal drop at direction of beam intersection. The computer simulation reveals lower BER when employing the proposed beamforming codebook.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-hop communication scheme for FlashLinQ device-to-device communication system","authors":"S. Bae, Jaheon Gu, M. Chung","doi":"10.1109/ICOIN.2014.6799670","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799670","url":null,"abstract":"A new technology for D2D communication, called FlashLinQ (FLQ), is introduced by Qualcomm in order to enable effective D2D communications in OFDM based wireless networks. Through introducing a SIR-based link scheduling method, FLQ can more efficiently utilize the shared wireless medium than the existing technologies. In addition, newly designed single-tone analog signal in FLQ enables D2D devices to discover each other, establish D2D links, and coordinate medium access in much wider area compare with the existing technologies. Nevertheless, the signaling based on the single-tone signal cannot guarantee the minimum performance of the data transfer through multi-tone signals. In order to overcome the limitation, we propose a new two-hop communication scheme (THCS) that enables MAC-level multi-hop communications with minor overheads in FLQ. Through naturally evolving the existing link scheduling in FLQ, the proposed two-hop communication scheme enhances service coverage of D2D communications and improves the utilization of the newly designed single-tone signals. From simulations, it is shown that the proposed scheme promotes not only the overall throughput but also the reuse of the shared medium of FLQ networks.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network-based content identification system via content-based comics fingerprint","authors":"Jiwoo Kang, Taegeun Oh, Nakyeon Choi, Sang-Hoon Lee, Sanghoon Lee, Hogab Kang","doi":"10.1109/ICOIN.2014.6799705","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799705","url":null,"abstract":"Recently, the comic contents are widely spread due to the development of mobile devices and network-based distribution. Large-scale data of contents increases the work load of network, so that it is necessary to manage effectively these contents distribution via content identifiers. However, the illegal channels such as online storage service provide the comics without the identifier. In addition, these comics would violate the copyright. To prevent the copyright violation, the comic identification is very important. However, the comic identification is the beginning stage. Thus, we propose a novel content-based fingerprint for comic content. To reduce work load of network, the fingerprint are extracted in consumer's device with low computational complexity. The proposed method shows the reliable performance with the robustness and the efficiency for distorted comics identification.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi
{"title":"An evaluation of load distribution method on multi-source P2P sensor data stream delivery system","authors":"Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi","doi":"10.1109/ICOIN.2014.6799729","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799729","url":null,"abstract":"Due to the prevalence of sensors such as security cameras or environmental monitoring, sensor data stream delivery which means delivering the observed data continuously attracts great attention. Our researching team proposed methods to distribute communication loads in the case of delivering the sensor data stream that have different data delivery cycles. In the proposed methods, source nodes and destination nodes consist P2P overlay network, and communication loads are distributed by re-delivering the sensor data that have the same delivery time. In addition, we evaluated the proposed methods by simulation in an environment where specific source node delivers single sensor data stream. In this paper, we evaluated the existing methods by simulation in an environment which has multiple sensor data streams.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clickable and interactive video system using HTML5","authors":"Prima Dewi Purnamasari, Helen, Nadya Syifana","doi":"10.1109/ICOIN.2014.6799697","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799697","url":null,"abstract":"Interactive video aims to make users feel more involved in an information search, so that they will try to obtain deeper information without feeling forced. Therefore, interactive video is one of the appropriate approaches that can be used in information dissemination process. In this research, we have successfully made an interactive video system in the form of clickable video where user can click some parts of the video while the video is playing. This event links user to deeper information in a pop up area. Video streaming is conducted using HTTP streaming mechanism through a web browser that supports HTML5 without additional plug-in or video player. The clickable interactive video system was made using HTML5 and JavaScript. Canvas element in HTML5 is the main component used to make the video streaming clickable and interactive. The experiment demonstrates that the clickable video streaming in MP4 format can be successfully played on Chrome, Safari and Internet Explorer Web browser and it also shown that Google Chrome has the fastest video loading time.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks","authors":"Bruce Ndibanje, Hoon-Jae Lee","doi":"10.1109/ICOIN.2014.6799747","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799747","url":null,"abstract":"Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each other's identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than “classical” Diffe-Hellman key exchange which provides no authentication at all. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by CrypTool 2.0 to verify the feasibility and shared secret value sameness. The resultant shows that the protocol is practical and provably-secure in regards with standard cryptographic assumptions. Moreover, the value that would be exchanged can be used as secret key for further encrypted symmetric communication. The proposed method is awfully straightforward, valuable, and resilient to know attacks.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dookyoon Han, Munyoung Lee, Kideok Cho, T. Kwon, Yanghee Choi
{"title":"Publisher mobility support in content centric networks","authors":"Dookyoon Han, Munyoung Lee, Kideok Cho, T. Kwon, Yanghee Choi","doi":"10.1109/ICOIN.2014.6799694","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799694","url":null,"abstract":"As the high speed Internet and the smart devices become prevalent, it is expected that the traffic volume of the video conferencing/broadcasting on the mobile devices is increasing explosively. One of the promising solutions for the traffic explosion problem is the content centric networking (CCN), which solves the problem by focusing on the content instead of the location. Even though CCN can provide better delivery efficiency, robustness, security, and native subscriber mobility, little attention is paid to the publisher mobility problem, where the mobile devices produce the real-time traffic. In this paper, we propose PMC, a publisher mobility support protocol in CCN. By introducing two names and corresponding operations at the routers, PMC supports publisher mobility for the mobile video conferencing and broadcasting without violating the original CCN architecture. We believe that PMC is a validated and secured scheme following the philosophy of the CCN architecture to support mobile publisher.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seonghyun Kim, Sang-Hoon Lee, Taegeun Oh, Nakyeon Choi, Justin Daegull Ryu, Hogab Kang, Sanghoon Lee
{"title":"Copyright protection and distribution system for scanned books/comics","authors":"Seonghyun Kim, Sang-Hoon Lee, Taegeun Oh, Nakyeon Choi, Justin Daegull Ryu, Hogab Kang, Sanghoon Lee","doi":"10.1109/ICOIN.2014.6799703","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799703","url":null,"abstract":"The book scanning agency scans paper books, and converts them to e-book format. However those e-books are vulnerable to illegal copy, because they don't have any copyright protection technologies. In addition to the e-books, illegally scanned books and comics are distributed at commercial on-line storage site without any regulations. To resolve such problems, in this paper, we proposed a system of identification and copy protection for scanned books and comics.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}