As a very attractive cryptographic primitive, the public key encryption with keyword search (PEKS) enables users to search on encrypted data, and hence is applicable to the setting of cloud computing. Although the existing PEKS schems can allow a user to search encrypted data confidentially, most of them failed to verify the searched result and the system did not specify the users who can make a request for encrypted data files stored on the cloud server. Recently, a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS) was proposed by Zheng. It allows a data user, whose credentials satisfy the data owner's access control policy, to search the encrypted data file and verify the searched result. However, the scheme exists an unrealistic assumption of secure channel as in the Boneh's scheme. In this paper, we propose a new scheme which "removes secure channel" and construct a novel method for verifying the searched result from the cloud server based on key policy attribute-based keyword search (KP-ABKS) of VABKS. It can be effectively to verify the correctness and integrity of the data file which the data user desired for. By our simulation for the verification, it proves that our scheme is more practical than VABKS.
{"title":"Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE","authors":"Pengliang Liu, Jianfeng Wang, Hua Ma, Haixin Nie","doi":"10.1109/BWCCA.2014.119","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.119","url":null,"abstract":"As a very attractive cryptographic primitive, the public key encryption with keyword search (PEKS) enables users to search on encrypted data, and hence is applicable to the setting of cloud computing. Although the existing PEKS schems can allow a user to search encrypted data confidentially, most of them failed to verify the searched result and the system did not specify the users who can make a request for encrypted data files stored on the cloud server. Recently, a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS) was proposed by Zheng. It allows a data user, whose credentials satisfy the data owner's access control policy, to search the encrypted data file and verify the searched result. However, the scheme exists an unrealistic assumption of secure channel as in the Boneh's scheme. In this paper, we propose a new scheme which \"removes secure channel\" and construct a novel method for verifying the searched result from the cloud server based on key policy attribute-based keyword search (KP-ABKS) of VABKS. It can be effectively to verify the correctness and integrity of the data file which the data user desired for. By our simulation for the verification, it proves that our scheme is more practical than VABKS.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115951082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Tokuyasu, Takuhiro Sato, S. Matsumoto, T. Kitawaki
In the field of cycling competition, cyclists commonly utilize binding pedals to maximize their competitive performance. The feature of binding pedals is to hold the sole of cycling shoe on the upper body of pedal, which enables a cyclist to not only push down the pedals but also pull up the pedals in one revolution of pedaling motion. Pedaling motion is implemented by the combination of muscle activities of lower extremity. The conversion efficiency from the physical strength of a cyclist to the propulsion power of a bicycle has been considered as the skill of pedaling exercise. By the way, neither effective instruments nor methods to accurately evaluate the pedaling skill have been established. Then, this study aims to extract the difference of physical motions between a skilled cyclist and a beginner by using the mechanical data of a bicycle and the electrophysiological data of a subject while pedaling exercise. This paper firstly introduces the experimental device and describes the protocol of measurement experiment. The measured data are statistically processed by using principal component analysis to extract the physical motions dictating the difference of pedaling skill between a skilled cyclist and a beginner.
{"title":"Extraction of Physical Motion Dictating the Difference between Skilled Cyclist and Beginner","authors":"T. Tokuyasu, Takuhiro Sato, S. Matsumoto, T. Kitawaki","doi":"10.1109/BWCCA.2014.109","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.109","url":null,"abstract":"In the field of cycling competition, cyclists commonly utilize binding pedals to maximize their competitive performance. The feature of binding pedals is to hold the sole of cycling shoe on the upper body of pedal, which enables a cyclist to not only push down the pedals but also pull up the pedals in one revolution of pedaling motion. Pedaling motion is implemented by the combination of muscle activities of lower extremity. The conversion efficiency from the physical strength of a cyclist to the propulsion power of a bicycle has been considered as the skill of pedaling exercise. By the way, neither effective instruments nor methods to accurately evaluate the pedaling skill have been established. Then, this study aims to extract the difference of physical motions between a skilled cyclist and a beginner by using the mechanical data of a bicycle and the electrophysiological data of a subject while pedaling exercise. This paper firstly introduces the experimental device and describes the protocol of measurement experiment. The measured data are statistically processed by using principal component analysis to extract the physical motions dictating the difference of pedaling skill between a skilled cyclist and a beginner.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116762858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Foreign Object Debris (FOD) on the runways or taxiways may damage airplanes and injure personnel in the airport. There are two main types of commercial FOD detection systems, i.e. Fixed and mobile. Nowadays, only one of these two main types of FOD detection systems is deployed in some airports. In this paper, we propose a total solution to support both of FOD detection system types based on Shanghai Hongqiao International Airport FOD prevention's requirements, i.e. Mobile Ad-Hoc Network (MANET) based FOD detection system. In this paper, a novel FOD detection system architecture is proposed. Then we study the feasibility of MANET applied to the proposed FOD detection system. In this proposed MANET, Wi-Fi and IEEE 802.11 are introduced to physical and MAC layer of wireless node, OLSR is used to provide network routing function, in addition, a novel multi-path data fusion mechanism is proposed to decrease the packet loss ratio.
{"title":"A Study on the Feasibility of Mobile Ad-Hoc Networks Applied to Foreign Objective Debris Detection System","authors":"Liangyou Wang, W. Ge, Haoyu Xu, Han Zhou","doi":"10.1109/BWCCA.2014.39","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.39","url":null,"abstract":"Foreign Object Debris (FOD) on the runways or taxiways may damage airplanes and injure personnel in the airport. There are two main types of commercial FOD detection systems, i.e. Fixed and mobile. Nowadays, only one of these two main types of FOD detection systems is deployed in some airports. In this paper, we propose a total solution to support both of FOD detection system types based on Shanghai Hongqiao International Airport FOD prevention's requirements, i.e. Mobile Ad-Hoc Network (MANET) based FOD detection system. In this paper, a novel FOD detection system architecture is proposed. Then we study the feasibility of MANET applied to the proposed FOD detection system. In this proposed MANET, Wi-Fi and IEEE 802.11 are introduced to physical and MAC layer of wireless node, OLSR is used to provide network routing function, in addition, a novel multi-path data fusion mechanism is proposed to decrease the packet loss ratio.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128194870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takako Otabe, Tomochika Kaneda, Makoto Yoshikai, T. Tokuyasu
Unpleasant memories arise from negative experiences and can have a detrimental impact on mental health. Psycho physiological recovery from such emotional damage is necessary to reestablish wellbeing. To understand the process of psycho physiological recovery is therefore of tremendous importance. Against this background, we focus on the process of psycho physiological recovery, in particular recovery from emotional damage by the process of recalling negative experiences. This study proposes an objective assessment for the process of psycho physiological recovery from psychological damage. We first develop an efficient protocol that assesses the physiological response to a series of stress stimulations that may engender recall of negative experiences. We use electroencephalogram (EEG) and electrocardiogram (ECG) to investigate the physiological responses to the stresses. Our first aim is to verify the reactions of EEG and ECG to recall of a negative experience, and to viewing images. In order to validate whether the proposed experimental protocol has the potential to assess psycho physiological recovery from emotional damage, a case study of EEG and ECG measurement using the proposed experimental protocol is presented.
{"title":"An Objective Assessment of Mental Condition Based on EEG and ECG","authors":"Takako Otabe, Tomochika Kaneda, Makoto Yoshikai, T. Tokuyasu","doi":"10.1109/BWCCA.2014.128","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.128","url":null,"abstract":"Unpleasant memories arise from negative experiences and can have a detrimental impact on mental health. Psycho physiological recovery from such emotional damage is necessary to reestablish wellbeing. To understand the process of psycho physiological recovery is therefore of tremendous importance. Against this background, we focus on the process of psycho physiological recovery, in particular recovery from emotional damage by the process of recalling negative experiences. This study proposes an objective assessment for the process of psycho physiological recovery from psychological damage. We first develop an efficient protocol that assesses the physiological response to a series of stress stimulations that may engender recall of negative experiences. We use electroencephalogram (EEG) and electrocardiogram (ECG) to investigate the physiological responses to the stresses. Our first aim is to verify the reactions of EEG and ECG to recall of a negative experience, and to viewing images. In order to validate whether the proposed experimental protocol has the potential to assess psycho physiological recovery from emotional damage, a case study of EEG and ECG measurement using the proposed experimental protocol is presented.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121346905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hina Nasir, N. Javaid, Hifsa Ashraf, S. Manzoor, Z. Khan, U. Qasim, M. Sher
Mission critical applications impose the requirements of reliability and network efficiency on Underwater Wireless Sensor Networks (UWSN). Innovative routing solutions are therefore required for efficient data forwarding. In this paper, we propose a cooperative routing scheme for UWSNs to enhance network performance. Many cooperative communication protocols are developed investigating physical and MAC layer aspects to improve link efficiency in harsh underwater environment, however, at network layer, it is still largely unexplored. In this paper, Cooperation is employed at network layer in existing non-cooperative routing protocol, Depth Based Routing (DBR), to increase its reliability and throughput. Potential relays are selected on the basis of depth information. Data from source node is cooperatively forwarded to the destination by relay nodes. The simulation results show that CoDBR gives 83% more throughput, 98% more packet acceptance ratio and 90 % less packet drop in the stable region as compared to non-cooperative scheme.
关键任务应用对水下无线传感器网络(UWSN)的可靠性和网络效率提出了要求。因此,需要创新的路由解决方案来实现高效的数据转发。本文提出了一种用于uwsn的协同路由方案,以提高网络性能。为了提高恶劣水下环境下的链路效率,从物理层和MAC层两个方面开发了许多协作通信协议,但在网络层,这方面的研究还很少。在现有的非合作路由协议DBR (Depth Based routing,深度路由)中,本文在网络层引入了协作机制,以提高DBR的可靠性和吞吐量。根据深度信息选择电位继电器。源节点的数据通过中继节点协同转发到目的节点。仿真结果表明,与非合作方案相比,CoDBR方案在稳定区域的吞吐量提高83%,数据包接受率提高98%,丢包率降低90%。
{"title":"CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks","authors":"Hina Nasir, N. Javaid, Hifsa Ashraf, S. Manzoor, Z. Khan, U. Qasim, M. Sher","doi":"10.1109/BWCCA.2014.45","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.45","url":null,"abstract":"Mission critical applications impose the requirements of reliability and network efficiency on Underwater Wireless Sensor Networks (UWSN). Innovative routing solutions are therefore required for efficient data forwarding. In this paper, we propose a cooperative routing scheme for UWSNs to enhance network performance. Many cooperative communication protocols are developed investigating physical and MAC layer aspects to improve link efficiency in harsh underwater environment, however, at network layer, it is still largely unexplored. In this paper, Cooperation is employed at network layer in existing non-cooperative routing protocol, Depth Based Routing (DBR), to increase its reliability and throughput. Potential relays are selected on the basis of depth information. Data from source node is cooperatively forwarded to the destination by relay nodes. The simulation results show that CoDBR gives 83% more throughput, 98% more packet acceptance ratio and 90 % less packet drop in the stable region as compared to non-cooperative scheme.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years of the field of robotics, various methods are developed for intimate relationship between people and robot. These methods include speech recognition as well as gesture-based interaction. This paper proposes a system that controls a mobile robot by recognizing the user gesture. The proposed system applies hidden Markov model (HMM) using inertial measurement unit and a single electromyography (EMG) sensor. HMM is known as the rich formula system, which can be applied to many applications including the gesture recognition. HMM is simply not only a gesture, but also can be applied to human robot interaction (HRI) very effectively. Thus, this paper uses the HMM to generate a familiar interaction between user and mobile robot. The body gesture is recognized using IMU sensor, which is easy to use for anyone. The mobile robot is then controlled according to the continuous incoming EMG command signal through Bluetooth, which is determined by the user gesture. Lastly, the HMM is applied as the method for determining the accuracy of user posture. In this way, more natural and intelligent gesture-based control system is implemented.
{"title":"Controlling Mobile Robot Using IMU and EMG Sensor-Based Gesture Recognition","authors":"Seong-Og Shin, Dong Han Kim, Yongho Seo","doi":"10.1109/BWCCA.2014.145","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.145","url":null,"abstract":"In recent years of the field of robotics, various methods are developed for intimate relationship between people and robot. These methods include speech recognition as well as gesture-based interaction. This paper proposes a system that controls a mobile robot by recognizing the user gesture. The proposed system applies hidden Markov model (HMM) using inertial measurement unit and a single electromyography (EMG) sensor. HMM is known as the rich formula system, which can be applied to many applications including the gesture recognition. HMM is simply not only a gesture, but also can be applied to human robot interaction (HRI) very effectively. Thus, this paper uses the HMM to generate a familiar interaction between user and mobile robot. The body gesture is recognized using IMU sensor, which is easy to use for anyone. The mobile robot is then controlled according to the continuous incoming EMG command signal through Bluetooth, which is determined by the user gesture. Lastly, the HMM is applied as the method for determining the accuracy of user posture. In this way, more natural and intelligent gesture-based control system is implemented.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. Sandhu, M. Akbar, M. Behzad, N. Javaid, Z. Khan, U. Qasim
Mobility models play a vital role on the accuracy of simulations in Wireless Body Area Networks (WBANs). In this paper, we propose a mobility model for the movement of nodes placed on the human body. During routine activities, body exhibits different postures like standing, sitting, laying, etc. We form a mathematical model for the movement of nodes according to the posture pattern. Postures change from one state to another depending upon probabilities. During movement, the distance between nodes and sink is changed which affects the energy consumption of nodes. We implement the proposed mobility model in multi-hop and forwarder based routing techniques and study their performance parameters.
{"title":"Mobility Model for WBANs","authors":"M. M. Sandhu, M. Akbar, M. Behzad, N. Javaid, Z. Khan, U. Qasim","doi":"10.1109/BWCCA.2014.60","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.60","url":null,"abstract":"Mobility models play a vital role on the accuracy of simulations in Wireless Body Area Networks (WBANs). In this paper, we propose a mobility model for the movement of nodes placed on the human body. During routine activities, body exhibits different postures like standing, sitting, laying, etc. We form a mathematical model for the movement of nodes according to the posture pattern. Postures change from one state to another depending upon probabilities. During movement, the distance between nodes and sink is changed which affects the energy consumption of nodes. We implement the proposed mobility model in multi-hop and forwarder based routing techniques and study their performance parameters.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a language-learning support system using an interactive whiteboard on a mobile touch device. Using this system, a teacher and learner participate in an online language class by sharing voice and handwriting information. Each lesson is recorded as movie-like content in a cloud server, and the learner can review the lesson immediately or later by re-playing the recorded lesson content. In this study, we incorporate the scalable vector graphics (SVG) format to represent handwritten information for sharing during the online lesson. We also examine the basic network performance of our method using a prototype system with several experiments.
{"title":"A Language-Learning Support System with a Handwriting-Based Communication Interface","authors":"Shu Li, Masato Kasahara, Kosuke Takano, K. F. Li","doi":"10.1109/BWCCA.2014.98","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.98","url":null,"abstract":"In this paper, we present a language-learning support system using an interactive whiteboard on a mobile touch device. Using this system, a teacher and learner participate in an online language class by sharing voice and handwriting information. Each lesson is recorded as movie-like content in a cloud server, and the learner can review the lesson immediately or later by re-playing the recorded lesson content. In this study, we incorporate the scalable vector graphics (SVG) format to represent handwritten information for sharing during the online lesson. We also examine the basic network performance of our method using a prototype system with several experiments.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"88 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WEB service matching is of great significance in automatic composition and intelligent dynamic composition of services and the service matching algorithm is the key factor determining efficient and fast service matching. Most of the traditional service matching algorithms are syntax-based service matching and are lack of the description of semantics, which will seriously affect the precision and recall rate of service matching. And on the basis of the semantic annotation of service descriptions and semantic-based three-stage service matching models, this paper designs a three-stage matching algorithm framework. And through examples analysis and verification, the proposed matching algorithm is of great significance to improve precision and recall rate of service matching and has important research significance for the follow-up part of the Semantic Web Services such as service selection, service composition, service execution, etc.
{"title":"The Study on Three-Stage Matching Algorithm Framework of Semantic Similarity","authors":"Chijun Zhang, Na Huang, Y. Liu, Zhanwei Du","doi":"10.1109/BWCCA.2014.42","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.42","url":null,"abstract":"WEB service matching is of great significance in automatic composition and intelligent dynamic composition of services and the service matching algorithm is the key factor determining efficient and fast service matching. Most of the traditional service matching algorithms are syntax-based service matching and are lack of the description of semantics, which will seriously affect the precision and recall rate of service matching. And on the basis of the semantic annotation of service descriptions and semantic-based three-stage service matching models, this paper designs a three-stage matching algorithm framework. And through examples analysis and verification, the proposed matching algorithm is of great significance to improve precision and recall rate of service matching and has important research significance for the follow-up part of the Semantic Web Services such as service selection, service composition, service execution, etc.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli, S. Caballé, F. Xhafa
One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost-efficient broadband connectivity. There are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity and user coverage in a set of uniformly distributed clients. From the simulation results, we conclude that, when the number of mesh clients is small, a small number of mesh routers are needed in order to optimize the size of Giant Component (GC) and number of covered mesh clients (NCMC). However, some of mesh routers can not cover the clients. On the other hand, when the number of mesh clients is big, many mesh routers are needed to optimize the GC and the NCMC. In this case, a mesh router can cover more than one mesh clients.
{"title":"Optimization of Number of Mesh Routers in WMNs Using WMN-SA System Considering Uniform Distribution for Different Number of Mesh Clients","authors":"Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli, S. Caballé, F. Xhafa","doi":"10.1109/BWCCA.2014.141","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.141","url":null,"abstract":"One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost-efficient broadband connectivity. There are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this work, we consider the router node placement problem in WMNs. We want to find the optimal distribution of router nodes in order to provide the best network connectivity and user coverage in a set of uniformly distributed clients. From the simulation results, we conclude that, when the number of mesh clients is small, a small number of mesh routers are needed in order to optimize the size of Giant Component (GC) and number of covered mesh clients (NCMC). However, some of mesh routers can not cover the clients. On the other hand, when the number of mesh clients is big, many mesh routers are needed to optimize the GC and the NCMC. In this case, a mesh router can cover more than one mesh clients.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122263787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}