{"title":"Probe-fed rectangular patch antenna for wireless communication","authors":"T. Alam, M. Faruque, M. Islam","doi":"10.1109/NSysS.2015.7043529","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043529","url":null,"abstract":"This paper presents a new multiband antenna is proposed for Wireless communication. Commercially available software High Frequency Structural Simulator (HFSS) and Computer Simulation Technology (CST) microwave studio was adopted in this investigation. The presented antenna consists of a slotted rectangular patch with a rectangular ground plane. The antenna exhibits four resonates at 2.05 GHz, 2.45GHz, 3.54GHz and 4.23 GHz. The antenna has been printed on FR-4 (lossy) Substrate with 4.6 of relative Permittivity and 1.6 mm of thickness. In addition, the specific absorption rate (SAR) analysis has been analyzed for the proposed antenna.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayon Sen, A. S. M. S. Islam, Md Yusuf Sarwar Uddin
{"title":"MARQUES: Distributed multi-attribute range query solution using space filling curve on DTHs","authors":"Ayon Sen, A. S. M. S. Islam, Md Yusuf Sarwar Uddin","doi":"10.1109/NSysS.2015.7043516","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043516","url":null,"abstract":"This paper proposes a distributed peer-to-peer data lookup technique on DHTs in order to serve range queries over multiple attributes. The scheme, MARQUES, uses space filling curves to map multi-attribute data points to a one-dimensional key space and thus effectively converts multi-attribute range queries into a consecutive series of one-dimensional keys. These keys are then used to place or lookup data objects over a DHT. Space filling curves preserve locality of attribute values and thus helps greatly in facilitating range queries in terms of the number of nodes to be searched to serve a given range query. MARQUES, although can be instrumented with any space filling curve, has been implemented with two curves, namely Z-order curve and Hilbert curve, and uses a multi-level variant of Chord, a popular DHT, as its underlying overlay. Simulation results on OMNET++ show that MARQUES successfully answers range queries with significant efficiency in terms of message overhead and query latency.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Saquib, M. T. I. Papon, I. Ahmad, Ashikur Rahman
{"title":"Measurement of heart rate using photoplethysmography","authors":"N. Saquib, M. T. I. Papon, I. Ahmad, Ashikur Rahman","doi":"10.1109/NSysS.2015.7043525","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043525","url":null,"abstract":"Heart rate, or pulse, is one of the vital signs used to measure basic functions of human body. Heart rate is the number of times one's heart beats per minute. The method that has been used to measure heart rate in this project is widely known as photoplethysmography (PPG). The constructed device can be used to find out the heart rate of a person and to analyze readings using existing software. Theoretically, any body part can be used to measure heart rate through the sensor of the device, although fingertips and earlobes are commonly targeted.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"714 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. T. I. Papon, I. Ahmad, N. Saquib, Ashikur Rahman
{"title":"Non-invasive heart rate measuring smartphone applications using on-board cameras: A short survey","authors":"M. T. I. Papon, I. Ahmad, N. Saquib, Ashikur Rahman","doi":"10.1109/NSysS.2015.7043533","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043533","url":null,"abstract":"The rapid improvement in smartphone technology has produced many medical applications [1]. Cellular phones now offer several advantages over desktop or laptop computers in tele-monitoring applications like individual's fitness, instant diagnosing and systems for monitoring an individual's medical conditions. Heart rate is one of the most important vital signs of human body. Although cellular phones in combination with other sensing devices (like ECG meters) are able to capture heart rates, there exist a myriad of applications that use only smart phone and its associated accessories (such as on-board camera) to detect heart rates within acceptable accuracy limit. Theoretically, any body part can be used to measure heart rate, although fingertips are commonly used. The fundamental technique of measuring heart rate through smartphone applications is based on image or video processing. In this short survey, we discuss the basic mechanism of heart rate measurement using only smartphone cameras and compare the performance of some notable state-of-the-art smartphone applications available for such purpose. Our experiments show that most of the applications are able to capture heart rate with acceptable accuracy under various body conditions such as normal and waking up after sleep.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rizvi, Shamir Ahmed, Minhajul Bashir, Md Yusuf Sarwar Uddin
{"title":"MediaServ: Resource optimization in subscription based media crowdsourcing","authors":"A. Rizvi, Shamir Ahmed, Minhajul Bashir, Md Yusuf Sarwar Uddin","doi":"10.1109/NSysS.2015.7043527","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043527","url":null,"abstract":"In this paper we propose resource optimization for subscription based media content crowdsourcing. In this form of crowdsourcing, interested entities (we refer to them as Campaigners) announce their `interests' expressing what media content (such as pictures, audio, and videos) they want to receive from participant users whereas mobile users subscribe to those interests as an intention to serve content satisfying the respective interests. Campaigners solicit content generated by users by mentioning explicit criteria that the media content should satisfy, for example a `noise pollution' campaigner who wants to measure noise level of a city neighborhood, may ask potential users for audio clips recorded at a certain location at peak hours of weekdays. Subscribed users voluntarily or on paid terms generate content against those interests. Given that a user may subscribe to different campaign interests and its generated content may satisfy different interests in varying degree of accuracy, we propose methods to evaluate contents based on the degree of satisfaction against the subscribed interests, and then develop techniques for delivering those contents to the campaign end points so that it optimizes the user's resource utilization, such as energy and bandwidth.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda, Mohammad Sohel Rahman
{"title":"FGPGA: An efficient genetic approach for producing feasible graph partitions","authors":"Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda, Mohammad Sohel Rahman","doi":"10.1109/NSysS.2015.7043513","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043513","url":null,"abstract":"Graph partitioning, a well studied problem of parallel computing has many applications in diversified fields such as distributed computing, social network analysis, data mining and many other domains. In this paper, we introduce FGPGA, an efficient genetic approach for producing feasible graph partitions. Our method takes into account the heterogeneity and capacity constraints of the partitions to ensure balanced partitioning. Such approach has various applications in mobile cloud computing that include feasible deployment of software applications on the more resourceful infrastructure in the cloud instead of mobile hand set. Our proposed approach is light weight and hence suitable for use in cloud architecture. We ensure feasibility of the partitions generated by not allowing over-sized partitions to be generated during the initialization and search. Our proposed method tested on standard benchmark datasets significantly outperforms the state-of-the-art methods in terms of quality of partitions and feasibility of the solutions.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on combining power management and power control for wireless sensor networks","authors":"Md. Mosiur Rahman Lunar, A. Islam","doi":"10.1109/NSysS.2015.7043528","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043528","url":null,"abstract":"Two power saving schemes namely power management and power control have been investigated in isolation for addressing power constraint of wireless sensor networks, which is known to be the most prominent limitation in road to successful deployment of wireless sensor networks. However, combining the power saving schemes is yet to be investigated in the literature. Therefore, in this paper, we propose a power saving scheme combining power management and power control simultaneously for wireless sensor networks. We perform real testbed experiments to evaluate the performance of the proposed power saving scheme. Experimental results demonstrate that we can reduce power consumption of sensor nodes using the proposed scheme at an expense of marginal decrease in delivery ratio.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sahan Ahmad, K. R. Alam, Habibur Rahman, S. Tamura
{"title":"A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets","authors":"Sahan Ahmad, K. R. Alam, Habibur Rahman, S. Tamura","doi":"10.1109/NSysS.2015.7043532","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043532","url":null,"abstract":"This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards empirical study based mathematical modeling for throughput of MANETs","authors":"Novia Nurain, M. Mostakim, A. Islam","doi":"10.1109/NSysS.2015.7043524","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043524","url":null,"abstract":"Mathematical modeling for throughput of MANETs considering the impact of different layers in the protocol stack in addition to that of different network parameters remains unexplored till now even though such modeling is considered as the fastest and the most cost-effective tool for evaluating the performance of a network. Therefore, in this paper, we attempt to develop a mathematical model for throughput of MANETs considering both of the aspects. In addition, we also focus on developing mathematical models for delivery ratio and drop ratio, these metrics limit the maximum throughput of a network. In our analysis, we perform rigorous simulation utilizing ns-2 to capture the performance of MANETs under diversified settings. Our rigorous empirical study reveals that we need to develop cross-layer mathematical models for throughput, delivery ratio, and drop ratio to represent the performance of MANETs and such mathematical models need to resolve higher-order polynomial equations. Consequently, our study uncovers a key finding that mathematical modeling of MANETs considering variation in all parameters is not feasible.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incentive model design for participatory sensing: Technologies and challenges","authors":"Shaolin Zaman, Nafeez Abrar, Anindya Iqbal","doi":"10.1109/NSysS.2015.7043526","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043526","url":null,"abstract":"Participatory sensing is a crowd-sourcing technique for exploring interesting aspects of the world ranging from personal to community. Recently participatory sensing has attracted considerable attention of research community with a number of open issues and challenges. Motivating people to participate in sensing the phenomena around and report those to dedicated servers is the key factor for the success of this system. Different incentive mechanisms have been proposed to increase the participation rate of users in this context. This paper presents a brief survey of these techniques identifying their respective limitations and finally reports the issues yet to be addressed to develop an widely acceptable incentive model.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}