Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266500
M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel
After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.
《图像处理在线期刊》(Image Processing On Line journal, IPOL)经过四年的发展,本文首次对其科技发展进行了分析和综述。从期刊一开始就遇到和克服的主要问题被描述为期刊的目的,重点是建立一个关于主要图像处理主题的艺术状态。本文还首先分析了作者/出版商对在线演示的批评,并提出了一种新的演示系统模块化架构的建议。
{"title":"IPOL: A new journal for fully reproducible research; analysis of four years development","authors":"M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel","doi":"10.1109/NTMS.2015.7266500","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266500","url":null,"abstract":"After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266497
João M. G. Duarte, E. Cerqueira, L. Villas
The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.
{"title":"Indoor patient monitoring through Wi-Fi and mobile computing","authors":"João M. G. Duarte, E. Cerqueira, L. Villas","doi":"10.1109/NTMS.2015.7266497","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266497","url":null,"abstract":"The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"87 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266480
G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin
This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.
{"title":"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)","authors":"G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin","doi":"10.1109/NTMS.2015.7266480","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266480","url":null,"abstract":"This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266469
Sana Tmar-Ben Hamida, B. Ahmed
An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.
{"title":"A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis","authors":"Sana Tmar-Ben Hamida, B. Ahmed","doi":"10.1109/NTMS.2015.7266469","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266469","url":null,"abstract":"An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266474
Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi
IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.
{"title":"Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks","authors":"Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi","doi":"10.1109/NTMS.2015.7266474","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266474","url":null,"abstract":"IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266484
M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar
Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.
{"title":"Design, implementation and evaluation of SDN-based resource management model","authors":"M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar","doi":"10.1109/NTMS.2015.7266484","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266484","url":null,"abstract":"Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266507
Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif
Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.
{"title":"Modeling information flow properties with UML","authors":"Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif","doi":"10.1109/NTMS.2015.7266507","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266507","url":null,"abstract":"Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266525
Kashif Habib, W. Leister
The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.
{"title":"Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures","authors":"Kashif Habib, W. Leister","doi":"10.1109/NTMS.2015.7266525","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266525","url":null,"abstract":"The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266470
Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho
A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.
{"title":"Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings","authors":"Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho","doi":"10.1109/NTMS.2015.7266470","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266470","url":null,"abstract":"A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-27DOI: 10.1109/NTMS.2015.7266491
Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang
The application of LTE to the machine-type communications (MTC) poses some serious challenges due to the large performance mismatch between the regular LTE user equipment and the MTC device, caused mainly by the physical limitations of MTC devices. This paper addresses these limitations and their implications to the communication signal's link performance and the corresponding link budget. The focus of this paper is on the downlink control channel design. We analyze the issues of the existing LTE control channels and propose an enhanced design specifically-tailored to overcome the limitations of MTC devices and the stringent link budget by applying repeated transmissions, frequency retuning, and the orthogonal spatial precoding based joint channel estimation, fully exploiting the time, frequency, as well as spatial diversities. The basic schemes proposed in this paper apply to other LTE channels as well, such as the uplink control channel, and the random access channel.
{"title":"Enhanced LTE physical downlink control channel design for machine-type communications","authors":"Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang","doi":"10.1109/NTMS.2015.7266491","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266491","url":null,"abstract":"The application of LTE to the machine-type communications (MTC) poses some serious challenges due to the large performance mismatch between the regular LTE user equipment and the MTC device, caused mainly by the physical limitations of MTC devices. This paper addresses these limitations and their implications to the communication signal's link performance and the corresponding link budget. The focus of this paper is on the downlink control channel design. We analyze the issues of the existing LTE control channels and propose an enhanced design specifically-tailored to overcome the limitations of MTC devices and the stringent link budget by applying repeated transmissions, frequency retuning, and the orthogonal spatial precoding based joint channel estimation, fully exploiting the time, frequency, as well as spatial diversities. The basic schemes proposed in this paper apply to other LTE channels as well, such as the uplink control channel, and the random access channel.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}