{"title":"Analysis effect of discrete wavelet transform in multi carrier code division multiple access","authors":"Julika Givary, R. P. Astuti, L. Novamizanti","doi":"10.1109/APWIMOB.2016.7811447","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811447","url":null,"abstract":"Multi Carrier Code Division Multiple Access (MC-CDMA) has become options for high data rate systems in high mobility without reducing the interference robustness. Discrete Fourier Transform (DFT) MC-CDMA still has usual problem of Multi Carrier Modulation (MCM) that is high Peak to Average Power Ratio (PAPR), but this problem can be reduced by replacing fourier transform with wavelet transform. This paper will analyze the result of Discrete Wavelet Transform (DWT) MC-CDMA compared with DFT MC-CDMA. The simulation results showed that DWT MC-CDMA system has better quality than DFT MC-CDMA but DWT MC-CDMA has higher complexity than DFT MC-CDMA.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Hutabarat, Hendry Hendry, Jonathan Adiel Pranoto, Adi Kurniawan
{"title":"Human tracking in certain indoor and outdoor area by combining the use of RFID and GPS","authors":"D. Hutabarat, Hendry Hendry, Jonathan Adiel Pranoto, Adi Kurniawan","doi":"10.1109/APWIMOB.2016.7811433","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811433","url":null,"abstract":"A similar research experiment on the use of global positioning system (GPS) had successfully been published in 2014 [1]. In this paper, the research was continued by combining radio-frequency identification (RFID) and GPS in order to get better human tracking in both indoor and outdoor area. For indoor tracking, an RFID tag was carried by a user and continually read whenever he/she accessed a room while GPS was used mainly when the user was staying outdoor. GPS would be automatically activated whenever the user leaved the room 3 meters away. The accuracy of this tracking was 100% and the GPS could allocate the user every 3.27 meters. Thus this application is suitable to track the human position for both indoor and outdoor.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of channel allocation in wireless body area networks by means of reinforcement learning","authors":"Tauseef Ahmed, Faisal Ahmed, Y. Le Moullec","doi":"10.1109/APWIMOB.2016.7811445","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811445","url":null,"abstract":"We propose a novel algorithm for channel assignment in wireless body area networks. The proposed approach is based on the machine learning sub-domain known as reinforcement learning, and is named reinforcement learning — channel assignment algorithm (RL — CAA). RL — CAA interacts with the environment in an unsupervised way and selects the optimal frequency channel for the wireless sensor nodes. RL-CAA also takes into consideration the traffic load conditions and assigns the optimal number of channels to fulfill the minimum throughput requirement of the system. The algorithm is evaluated by means of a MATLAB simulator tool based on IEEE 802.15.6 specifications. It allows comparing our algorithm with classical static channel assignment algorithm. The proposed algorithm gives better error rate performance which is on average 30% better than static channel assignment. Since the error rate is reduced, the algorithm also proves better in terms of throughput by giving an average of 77.3 kbps over static channel assignment. Our proposed algorithm proves better in the terms of traffic load considerations and is more robust to the change in the load.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adika Bintang Sulaeman, F. A. Ekadiyanto, R. F. Sari
{"title":"Performance evaluation of HTTP-CoAP proxy for wireless sensor and actuator networks","authors":"Adika Bintang Sulaeman, F. A. Ekadiyanto, R. F. Sari","doi":"10.1109/APWIMOB.2016.7811451","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811451","url":null,"abstract":"One of the main challenges in integrating wireless sensor networks with the Internet is the need of an intermediary mechanism for interconnecting two different protocols, i.e. Hypertext Transfer Protocol (HTTP) and Constrained Application Protocol (CoAP), allowing users to access the sensors over standard the Unified Resource Locator (URL). Such mechanism can be implemented using a cross-protocol reverse proxy. This paper focuses on the design, implementation, and evaluation of the HTTP-CoAP proxy prototype for wireless sensor and actuator networks with HTTP-CoAP mapping and a caching mechanism. The designed proxy was able to handle 25 requests per second in real-time. The proxy had a linear increment of latency with respect to the number of clients by the scale of 23.667. The caching mechanism in the proxy was proven to effectively reduce the latency with the effective value of 5 to 20 seconds of the maximum age of the data in the cache. The obtained data may be used for building Internet of Things systems for the given system requirements.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"1120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122938157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing spam detection on mobile phone Short Message Service (SMS) performance using FP-growth and Naive Bayes Classifier","authors":"Dea Delvia Arifin, Shaufiah, M. Bijaksana","doi":"10.1109/APWIMOB.2016.7811442","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811442","url":null,"abstract":"SMS (Short Message Service) is still the primary choice as a communication medium even though nowadays mobile phone is growing with a variety of communication media messenger applications. However, nowadays along with the SMS tariff reduction leads to the increase of SMS spam, as used by some people as an alternative to advertise and fraud. Therefore, it becomes an important issue as it can bug and harm the users and one of its solution is with automatic SMS spam filtering. One of most challenging in SMS spam filtering is its accuracy. In this research we proposed to enhanced SMS spam filtering performance by combining two of data mining task association and classification. FP-growth in association is utilized for mining frequent pattern on SMS and Naive Bayes Classifier is used to classify whether SMS is spam or ham. Training data was using SMS spam collection from previous research. The result of using collaboration of Naive Bayes and FP-Growth performs the highest average accuracy of 98, 506% and 0,025% better than without using FP-Growth for dataset SMS Spam Collection v.1, and improves the precision score; thus, the classification result is more accurate.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving LTE throughput with iterative water-filling algorithm","authors":"B. D. Samekto, A. Muayyadi, I. Wahidah","doi":"10.1109/APWIMOB.2016.7811437","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811437","url":null,"abstract":"The frequency spectrum is an expensive and limited resource while the massive demand of telecommunication services both of data and number of connection continue to raise. The ordinary network becomes denser to meet the growing needs of the services. It can be done by introducing more cells in the network, with lower coverage than the ones that already exist or simply by splitting the existing cell, to allows a better spatial reuse of the spectrum. However, the introduction of more cells also leads to high-interference between cells (low values of Signal to Interference and Noise Ratios (SINRs)). In order to maximize the use of spectrum, it is necessary to study that behaviour and help to mitigate the interference. The research presented here focus on the use of the iterative water-filling algorithm to improve network cell throughput in LTE network. In the context of spectrum management, iterative water-filling is a technique to adjust power as needed according to the conditions in the environment of interference. The results show that the proposed method can increase the overall cell throughput about 7.56% and average UE throughput 9.53%.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deploying information centric networking in LTE mobile networks","authors":"Prakash Suthar, Milan Stolic","doi":"10.1109/APWIMOB.2016.7811432","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811432","url":null,"abstract":"Mobile networks using 2G, 3G, or Long Term Evolution (LTE) are complex, and managing mobility and seamless handover are the key characteristics which result in protocol heavy and very complex architecture. For delivery of multimedia contents to user devices, IP unicast streams are used from server to clients where each user gets separate stream. From bandwidth and routing perspective it is highly inefficient. Multicast and broadcast technologies have emerged recently but their deployments are very limited or experimental due to complex architecture and radio spectrum issues. Information Centric Networking (ICN) is a rapidly evolving technology for efficient multimedia contents delivery to end devices however majority of the research is focused on fixed network. This paper focuses using ICN in mobile networks for efficient content delivery to mobile devices. This paper discusses about different strategies and options for deploying ICN. This paper also discusses about ICN characteristics for mobile networks including protocols and technology gaps.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of a novel decentralised MAC protocol for cognitive radio networks","authors":"Wajdi Alhakami, Ali Mansour, G. A. Safdar","doi":"10.1109/APWIMOB.2016.7811439","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811439","url":null,"abstract":"Due to the demand of emerging Cognitive Radio (CR) technology to permits using the unused licensed spectrum parts by cognitive users (CUs) to provide opportunistic and efficient utilisation of the white spaces. This requires deploying a CR MAC with the required characteristics to coordinate the spectrum access among CUs. Therefore, this paper presents the design and implementation of a novel Medium Access Control (MAC) protocol for decentralised CRNs (MCRN). The protocol provides efficient utilisations of the unused licensed channels and enables CUs to exchange data successfully over licensed channels. This is based on the observation procedure of sensing the status of the Licensed Users (LUs) are ON or OFF over the licensed channels. The protocol is validated with the comparison procedure against two different benchmark protocols in terms of the network performance; communication time and throughput. Therefore, performance analysis demonstrated that the proposed MCRN perform better and achieve higher throughput and time benefits than the benchmarks protocols.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of stream cipher Salsa20 algorithm to secure voice on push to talk application","authors":"Diyana Afdhila, S. M. Nasution, Fairuz Azmi","doi":"10.1109/APWIMOB.2016.7811443","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811443","url":null,"abstract":"Currently, the development of technology is progressing very fast, as well as information on the media technologies such as Push to Talk. But the level of information security of voice data that is sent still not assured. Confidential information security should be increased. Because it is required by cryptography method to maintain data confidentiality of such information. This final research project will also design and make a Push to talk application. In this study, the authors will examine the security of voice data using Salsa20 as a stream cipher cryptography algorithms. This study aims to analyze the performance of the Stream Cipher Salsa20 Algorithm by parameters: encryption and decryption processing time, the avalanche effect. Encryption and decryption process are quite fast, it only takes 0–2 ms for one packet and from the result of avalanche effect testing, we can see that salsa20 has a good performance on data security because it has 52% bit changes.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User cooperation in a multi-hop network with multi-interface devices for energy efficiency","authors":"R. Jayadi, Y. Lai","doi":"10.1109/APWIMOB.2016.7811450","DOIUrl":"https://doi.org/10.1109/APWIMOB.2016.7811450","url":null,"abstract":"Battery-operated mobile devices may lose their freedom of mobility because of their dependence on being in close proximity to a power outlet as applications with higher computation and processing capabilities consume more energy and drain battery life faster. One of the techniques used to minimize energy consumption in battery-operated mobile devices is user cooperation at the time of wireless transmission. In this paper, we formulate minimization of energy consumption through user cooperation routing in mobile devices that have multiinterfaces under a multi-hop network. User cooperation optimization will be exploited by selecting a short-range wireless communication that has the lowest energy consumption as a proxy for establishing long-range wireless communication. Two algorithms are proposed to solve the problem. Simulation results show that both algorithms are able to solve this cooperation problem and optimize energy efficiency.","PeriodicalId":404990,"journal":{"name":"2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}