{"title":"Radio resource management: The vital subject for evolution to 5G","authors":"A. Ali, M. Nazir","doi":"10.1109/ISWSN.2017.8250043","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250043","url":null,"abstract":"In this article, we will discuss radio resource management (RRM) as one of the major techniques for 5G networks. RRM involves sharing of the scarce spectrum among all users of the system. It includes performance gains in terms of efficient energy usage, higher throughput, lower delays, and decreased packet loss. We can take full advantage from RRM by efficient design strategies, fair resource allocation and competent packet scheduling. The goal of this paper is to present a comprehensive overview along with algorithms for RRM techniques that majorly focus on 1) efficient power utilization, 2) delay reduction and 3) throughput maximization. In this paper we will discuss various potential techniques for efficient resource planning in terms of power, throughput and delay. Some findings are also discussed to illuminate the shift towards the next generation networks.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Iqbal, Syed Shaheryar Ahmed, M. Tauqeer, Ali Sultan, S. G. Abbas
{"title":"Design of multifunctional autonomous car using ultrasonic and infrared sensors","authors":"A. Iqbal, Syed Shaheryar Ahmed, M. Tauqeer, Ali Sultan, S. G. Abbas","doi":"10.1109/ISWSN.2017.8250023","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250023","url":null,"abstract":"The daily routine problems that common man faces on roads while commuting are becoming a serious problem with each passing day. People get late and meet accidents. The model of autonomous car presented in this research paper aims to solve these issues by taking humans off the wheels, so that they do not have to drive anymore and the risk of accidents, getting late and traffic congestions can be reduced to a minimum. This car is able to follow the track, overtake other cars, detect obstacles, take sharp bends and turns, follow traffic signals and turn on its lights under low light conditions. Circuit diagrams for performing all these functions have been presented and the mechanical model of the car has also been shown in the paper, which is practically implemented and successfully run by the authors.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126357706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirement based transform coefficient coding architecture for DCT/DST for HEVC","authors":"Zahra Rauf Saleemi, G. Raja","doi":"10.1109/ISWSN.2017.8250029","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250029","url":null,"abstract":"This paper proposes a Transform Coefficient Coding (TCC) architecture for High Efficiency Video Coding (HEVC) by using Selective Implementation Patterns. The architecture developed targets to exploit the benefits of tradeoffs between number of cycles and complexity depending upon the requirements, hence reducing the execution time. The input configuration to be sent in parallel, semi parallel and serial manner, efficiently implements the design. The so- called method of Pipelining is the key to selection of different pixel combinations of input video signal, allowing to give maximum flexibility to compute the integral part of TCC, the One Dimensional Discrete Cosine Transform (1D-DCT) and Two-Dimensional Discrete Cosine Transform (2D-DCT). Furthermore, with a slight modification, the same design can be used for computing Discrete Sine Transform (DST) as well. Coding in Verilog HDL and Implementation in Spartan 3 FPGA Kit enhances the adaptability of the proposed scheme. By evaluating the best available option, lowest hardware complexity, with 11 Look Up Tables (LUTs) and 7 registers, is achieved. The idea is to introduce selectivity and reuse in architecture in Video Coding technique so that the hardware cost and computational time can be reduced.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of detecting and overcoming black hole attacks in MANET: A review","authors":"Danista Khan, M. Jamil","doi":"10.1109/ISWSN.2017.8250039","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250039","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Waqas Ali, H. Farooq, A. Khalid, A. Raza, N. Tanveer
{"title":"Single phase GSM based wireless energy metering with user notification system","authors":"Waqas Ali, H. Farooq, A. Khalid, A. Raza, N. Tanveer","doi":"10.1109/ISWSN.2017.8250030","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250030","url":null,"abstract":"The automation is now becoming necessary almost in every field including distribution, control and monitoring of electrical energy. However, in Pakistan the situation is very poor, and the country is facing the severe energy crisis because of outdated power system infrastructure. Even the energy monitoring and metering system for billing is still based on conventional electro-mechanical type meters; which are now being replaced by electronic type digital energy meters in many sub-divisions of Pakistan. However, the collection of energy meter readings data from these meters is being conducted manually which opens the doors of corruption in the form of overbilling which is a major challenge for the current government together with the electricity theft. Although; some steps, including the deployment of mobile based meter reading process using android phones, have been taken to solve this issue but the problem still persists. This is mainly because of the traditional manual meter reading method, which is obsolete, outmoded, inefficient and time consuming. So, this paper presents the simple, efficient, and inexpensive design of an automatic single phase energy meter reading system based on GSM wireless network which also has the provision for user notification. This system uses the short messaging service to transmit the energy meter readings data to utility for billing as well as to update the consumers about their energy usage on regular basis. Moreover, this paper also discusses the potential impacts of this system usage both for utilities and consumers especially in Pakistan.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical achievements on throughput improvement in real networks","authors":"Mohammad Rasoul Tanhatalab, Seyed Majid Jafari Joor Jadeh, Amirhossein Orouji Esfahani","doi":"10.1109/ISWSN.2017.8250037","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250037","url":null,"abstract":"Throughput is one of the major performance metrics for mobile networks. Higher throughput is crucially important for subscribers and service providers (operators); it helps subscribers to save time and enables them to use applications and services requiring higher throughput. The increase in data usage for subscribers experiencing higher throughput is evidenced by existing operators. This recurring revenue boost and also more efficient utilization of spectrum and infrastructure investments make higher throughput more and more attractive for operators. In this paper, we will show some practical solutions which are deployed for throughput improvement in a live mobile network consisting multi-vendor equipment — Ericsson, Nokia, HUAWEI and ZTE — and also different technologies; 2G, 3G and LTE.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of key technologies for IoT and associated security challenges","authors":"Maryam Daud, Quratulain H. Khan, Y. Saleem","doi":"10.1109/ISWSN.2017.8250042","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250042","url":null,"abstract":"There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132961335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahad Khalil Paracha, Sheeraz Ahmed, N. Saleem, Nisar Ahmed Qureshi, M. S. Sana, Z. Khan
{"title":"Estimation and equalization of sparse underwater communication channels","authors":"Fahad Khalil Paracha, Sheeraz Ahmed, N. Saleem, Nisar Ahmed Qureshi, M. S. Sana, Z. Khan","doi":"10.1109/ISWSN.2017.8250017","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250017","url":null,"abstract":"Multipath channels with sparse impulse response arise in various communication scenarios. Multipath channel impulse response is depicted by a very few significant nonzero taps that are widely separated in time. In this paper, different estimation and equalization techniques are discussed which exploit sparse nature of radio communication channels. Various channel estimation techniques are implemented and a comprehensive comparative analysis is presented for sparse multipath channels. The implemented estimation algorithm/techniques include, Least Square (LS), Least Mean Square (LMS), Normalized Least Mean Square (NLMS), Variable Step Size Least Mean Square (VSSLMS), and Matching Pursuit (MP).","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of IR sensors in thru-beam and diffuse-reflective modes for obstacle detection","authors":"Asfa Javed, H. Tariq, Abdullah Khalid","doi":"10.1109/ISWSN.2017.8250013","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250013","url":null,"abstract":"The field of obstacle detection is very popular and vast these days. Lot of technologies has been developed for obstacle-detection phenomenon in recent years. Sensors are the main entity in these technologies. Systems' ability to detect an object, sensitivity, range, cost and quality, all are dependent on the fact that which type of sensors are being used is these systems. So intensive understanding for working of these detectors is mandatory to choose the best sensor according to the application-design. For this purpose, it is very necessary to understand the electronic and physical build of the sensors. Infrared sensors are most often used sensors in obstacle and motion detector systems. This study accounts for understanding the implementation of infrared sensors by using two photoelectric phenomena, Thru-beam and Diffuse- Reflection, to analyzing their function and suitability with respect to different applications. Proteous ISIS 7 is used for simulations. Practically measured results are also shown. Both simulation and experimental results are found in good agreement with theoretical knowledge.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bahrul Amin, Najeeb Ullah, Sheeraz Ahmed, M. Taqi, AbdullahAbdul Hanan
{"title":"Path-Loss and Energy Efficient Model (PLEEM) for wireless body area networks (WBANs)","authors":"Bahrul Amin, Najeeb Ullah, Sheeraz Ahmed, M. Taqi, AbdullahAbdul Hanan","doi":"10.1109/ISWSN.2017.8250018","DOIUrl":"https://doi.org/10.1109/ISWSN.2017.8250018","url":null,"abstract":"Recently research in the area of WBAN focusing on energy preservation, routing protocol and channel modeling. Considering less for path-loss. In this research a Path-loss and Energy Efficient Model (PLEEM) scheme is proposed to minimize path-loss for both on-body and off-body communications. To minimize the path-loss when the body is in movement, two off-body relays are utilized. Direct communication for regular needed data and indirect communication for normal data is employed. Cost function is calculated on the basis of residual energy of the nodes and minimum distance to sink. Simulation results show that the proposed model enhances the stability period, life time of network, residual energy and throughput. Profound results in term of path-loss for both on-body and off-body communication are found compared to its variants.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}