R. Anggoro, T. Kitasuka, Ryoji Nakamura, M. Aritsugi
{"title":"Performance Evaluation of AODV and AOMDV with Probabilistic Relay in VANET Environments","authors":"R. Anggoro, T. Kitasuka, Ryoji Nakamura, M. Aritsugi","doi":"10.1109/ICNC.2012.47","DOIUrl":"https://doi.org/10.1109/ICNC.2012.47","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs). Since vehicles tend to move in a high speed, the network topology is rapidly changed. Thus vehicle's connectivity problem is one of the interesting issues in VANETs. Ad hoc on-demand multipath distance vector (AOMDV) is the extended version of ad hoc on-demand distance vector (AODV). AOMDV is designed to overcome a connectivity problem due to highly dynamic network topology. It provides multipath for data packets delivery from the source to the destination. Although AOMDV outperforms AODV in packet delivery ratio, AOMDV's multipath establishment and maintenance generate more control packets than AODV's unipath. However increasing the vehicle speed will degrade their performance. Thus in this paper, we added probabilistic relay, which enables adjacent vehicles to probabilistically relay unsuccessful data packet transmission, into IEEE 802.11 as a MAC standard model and combined AODV with probabilistic relay (AODV-PR) and AOMDV with probabilistic relay (AOMDV-PR). Based on our simulation result, the addition of probabilistic relay clearly helps those protocols to improve their performances especially in packet delivery ratio even under a high speed. Moreover, probabilistic relay adds beacons, but no additional routing overhead. Probabilistic relay, clearly solved connectivity problem in highly dynamic topology of VANETs. We evaluate those protocol performances based on packet delivery ratio, routing overhead, and average delivery delay under variation of vehicle speed.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nakajima, Takuji Hieda, Ittetsu Taniguchi, H. Tomiyama, H. Takada
{"title":"A Fast Network-on-Chip Simulator with QEMU and SystemC","authors":"K. Nakajima, Takuji Hieda, Ittetsu Taniguchi, H. Tomiyama, H. Takada","doi":"10.1109/ICNC.2012.55","DOIUrl":"https://doi.org/10.1109/ICNC.2012.55","url":null,"abstract":"Network-on-Chip (NoC) is considered as a promising interconnection scheme for many-core System-on-a-Chip (SoC) since it offers better scalability than traditional bus-based interconnection. In this work, we have developed a fast simulator of NoC architectures using QEMU and SystemC. QEMU is an open-source CPU emulator which is widely used in many simulation platforms such as Android Emulator. In the proposed simulator, each CPU core is emulated by a QEMU, and the network part including NoC routers is modeled with SystemC. The SystemC simulator and QEMUs are connected by TCP sockets on a host computer. Our simulator is fast because QEMUs run in parallel on a multi-core host computer or even multiple host computers. Also, our simulator is highly retarget able because QEMU provides a variety of CPU models and we use QEMU as is. In our experiments, our simulator successfully simulates a 108-core NoC in a practical time. We have also confirmed the scalability and retarget ability of our NoC simulator.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Route Planning for Milk-run Transport Logistics Using Model Checking","authors":"Takashi Kitamura, Keishi Okamoto","doi":"10.1109/ICNC.2012.44","DOIUrl":"https://doi.org/10.1109/ICNC.2012.44","url":null,"abstract":"We develop a specification framework for milk run transport logistics, applying model checking. The framework adopts LTL (Linear Temporal Logic) as a specification language for flexibly specifying complex delivery requirements in the setting of milk-run logistics. The framework defines the notion of goptimal truck routesh which satisfy given delivery requirements in a route map, by applying the bounded semantics of LTL. We develop an automated route planner based on the framework using the NuSMV model checker as an early implementation. We evaluate the feasibility of the implementation design by analyzing its computational complexity and showing experimental results.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Place Recommendation from Check-in Spots on Location-Based Online Social Networks","authors":"Hongbo Chen, Zhiming Chen, M. Arefin, Y. Morimoto","doi":"10.1109/ICNC.2012.29","DOIUrl":"https://doi.org/10.1109/ICNC.2012.29","url":null,"abstract":"With rapid growth of the GPS enabled mobile device, location-based online social network services become more and more popular, and allow their users to share life experiences with location information. In this paper, we considered a method for recommending places to a user based on spatial databases of location-based online social network services. We used a user-based collaborative filtering method to make a set of recommended places. In the proposed method, we calculate similarity of users' check-in activities not only their positions but also their semantics such as \"shopping\", \"eating\", \"drinking\", and so forth. We empirically evaluated our method in a real database and found that it outperforms the naive singular value decomposition collaborative filtering recommendation by comparing the prediction accuracy.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Augmentation Problem with Diameter Requirements","authors":"Toshimasa Ishii","doi":"10.1109/ICNC.2012.75","DOIUrl":"https://doi.org/10.1109/ICNC.2012.75","url":null,"abstract":"In communication networks, the distance between two nodes is one measure of transfer delay between them. Thus, it is required that the diameter of the network, which is defined as the maximum distance between every two nodes in it, is relatively small. This paper surveys the computational results on graph augmentation problems which model network design problems with diameter requirements, initiated in [F. R. K. Chung and M. R. Garey, \"Diameter bounds for altered graphs,\" J. Graph Theory, vol. 8, pp. 511-534, 1984].","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"796 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The K Computer and its Application","authors":"M. Yokokawa","doi":"10.1109/ICNC.2012.13","DOIUrl":"https://doi.org/10.1109/ICNC.2012.13","url":null,"abstract":"The K computer is a distributed memory super-computer system with 82,944 compute nodes and 5,184 I/O nodes that was jointly developed by RIKEN and Fujitsu as a Japanese national project. Its development began in 2006 and was completed in June, 2012. By achieving the LINPACK performance of 10.51 peta-FLOPS, the K computer ranked first for two consecutive TOP500 list in June and November 2011. During its adjustment, part of the K computer was served, gradually increasing computing resources, to experts in computational science as a trial and was used for performance optimization of users' application codes.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Agent Creation Mechanism for Service Collection and Dissemination in Heterogeneous MANETs","authors":"Shuhei Ishizuka, T. Ohta, Y. Kakuda","doi":"10.1109/ICNC.2012.60","DOIUrl":"https://doi.org/10.1109/ICNC.2012.60","url":null,"abstract":"A Mobile Ad hoc Network (shortly, MANET) that consists of mobile nodes (shortly, nodes) is one of autonomous decentralized networks. Since the network topology changes frequently due to the node mobility in MANETs, it is difficult for each node to grasp the service in MANETs. In order to solve this problem, we use mobile agents for service informations dissemination. In heterogeneous MANETs, mobile agents can migrate between different MANETs only through Network Gateways(shortly, NwGWs). In this paper, we propose a mobile agent creation mechanism for service collection and dissemination in heterogeneous MANETs. In addition, we conducted the simulation experiments to evaluate the proposed scheme.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Complexity Analysis and Algorithm Design for Combinatorial Optimization Problems","authors":"Toshimasa Watanabe","doi":"10.1109/ICNC.2012.12","DOIUrl":"https://doi.org/10.1109/ICNC.2012.12","url":null,"abstract":"The paper shows summary of the author's research subjects from 1973 through 2012. Additional explanation on these subjects and related references are omitted because of space limitation. They will be given at presentation.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127212356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Evaluation of Modular Multiplication Based on Coarsely Integrated Operand Scanning","authors":"Satoru Tamura, Chikatoshi Yamada, S. Ichikawa","doi":"10.1109/ICNC.2012.65","DOIUrl":"https://doi.org/10.1109/ICNC.2012.65","url":null,"abstract":"RSA encryption is widely used in public crypto systems. However, according to recent development of computer processing, decipher can be executed in 512-bit key length. Therefore, it has been recommended to move to RSA 2048 from RSA 1024. However, as key length increases, the amount of computation is increased for encryption. Consequently, we consider hardware implementation of processing units. In hardware implementation, the processing speed and circuit size is a trade-off relationship. In embedded devices as the IC card reader, severe resource constraints will be imposed. In this paper, based on Coarsely Integrated Operand Scanning, which is one of Montgomery multiplication, we suggest the modular multiplication circuit architecture for adjusting the trade-off processing speed and circuit size. We design modular multiplication circuit using the proposed architecture at 4-radix. Utilization for the circuit as follows: 146 slices, 461 registers, 685 look-up tables, which allows a compact implementation on the FPGA with Spartan-6 XC6SLX45T. As results, maximum operating frequency is 213.022[MHz], processing time is 41.47[μs], it was achieved 30 times faster compared with software processing.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Implementations of the Approximate String Matching on the Memory Machine Models","authors":"K. Nakano","doi":"10.1109/ICNC.2012.43","DOIUrl":"https://doi.org/10.1109/ICNC.2012.43","url":null,"abstract":"The Discrete Memory Machine (DMM) and the Unified Memory Machine (UMM) are theoretical parallel computing models that capture the essence of the shared memory access and the global memory access of GPUs. The approximate string matching for two strings X and Y is a task to find a sub string of Y most similar to X. The main contribution of this paper is to show efficient implementations of approximate string matching on the memory machine models. Our best implementation for strings X and Y with length m and n (m≤n), respectively, runs in O(mn/w + ml) time units using n threads both on the DMM on the UMM with width w and latency l.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}