A wireless sensor network (WSN) in its simplest form can be defined as a network of sensors denoted as nodes that blankets a region and provides information about it. They can sense the environment and communicate the data gathered from the monitored field through wireless links. Processing is done at the sensor level. WSN have numerous applications ranging from indoor deployment scenarios in the home and office to outdoor deployment scenarios in natural and military settings. In some of these scenarios, lives may depend on the timelines and correctness of the sensor data obtained from dispersed sensor nodes. The analysis aims at employing WSN for one of its industrial application, i.e. “For Monitoring HVAC Systems”. Significant advances in computer technology have made it possible to develop a wireless sensor network (WSN) capable of monitoring and operating a scheduling system for heating, ventilation, and air- conditioning (HVAC). The proposed system includes features such as monitoring, measurement, networking, and control. This system provides an energy efficient solution to the monitoring and controlling of a HVAC system. This design enables users to make cost-effective energy decisions with no interaction with the HVAC system.
{"title":"Implementation of HVAC System Through Wireless Sensor Network","authors":"Sana Sultan, T. Khan, Sairah Khatoon","doi":"10.1109/iccsn.2010.64","DOIUrl":"https://doi.org/10.1109/iccsn.2010.64","url":null,"abstract":"A wireless sensor network (WSN) in its simplest form can be defined as a network of sensors denoted as nodes that blankets a region and provides information about it. They can sense the environment and communicate the data gathered from the monitored field through wireless links. Processing is done at the sensor level. WSN have numerous applications ranging from indoor deployment scenarios in the home and office to outdoor deployment scenarios in natural and military settings. In some of these scenarios, lives may depend on the timelines and correctness of the sensor data obtained from dispersed sensor nodes. The analysis aims at employing WSN for one of its industrial application, i.e. “For Monitoring HVAC Systems”. Significant advances in computer technology have made it possible to develop a wireless sensor network (WSN) capable of monitoring and operating a scheduling system for heating, ventilation, and air- conditioning (HVAC). The proposed system includes features such as monitoring, measurement, networking, and control. This system provides an energy efficient solution to the monitoring and controlling of a HVAC system. This design enables users to make cost-effective energy decisions with no interaction with the HVAC system.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115219127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this insight, an empirical study on MANET is being conducted. Some of the technical challenges MANET poses are also presented. The paper points out some of the key research issues to promote the development and accelerate the commercial applications of the MANET technology. A special attention is paid on to highlight the integration of MANET with the significant features of IPv6 such as integrated security, end-to-end communication. This paper also briefs and focuses the research directions towards the IPv6 based MANET which is the most essential for growing mobile population.
{"title":"IPv6 MANET: An Essential Technology for Future Pervasive Computing","authors":"J. Jayanthi, S. Rabara, A. Rex, Macedo Arokiaraj","doi":"10.1109/ICCSN.2010.117","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.117","url":null,"abstract":"In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this insight, an empirical study on MANET is being conducted. Some of the technical challenges MANET poses are also presented. The paper points out some of the key research issues to promote the development and accelerate the commercial applications of the MANET technology. A special attention is paid on to highlight the integration of MANET with the significant features of IPv6 such as integrated security, end-to-end communication. This paper also briefs and focuses the research directions towards the IPv6 based MANET which is the most essential for growing mobile population.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131212598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new method which combines blind equalization and morphology based image-processing to identify MQAM signals in multipath environment. The advantage of our approach is that, by using image-processing, only 128×128 bits data is required to be stored. Furthermore, even the eye diagram of equalized signal for 64QAM is not opened enough, it can still be used to classify. Computer simulations are made to evaluate the performance and result shows that the new approach can reach better classification accuracy than the existing methods.
{"title":"Modulation Classification of MQAM Signals in Multipath Environment Using Mathematical Morphology","authors":"B. Lan, Bingbing Li, M. Huang","doi":"10.1109/ICCSN.2010.48","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.48","url":null,"abstract":"This paper proposes a new method which combines blind equalization and morphology based image-processing to identify MQAM signals in multipath environment. The advantage of our approach is that, by using image-processing, only 128×128 bits data is required to be stored. Furthermore, even the eye diagram of equalized signal for 64QAM is not opened enough, it can still be used to classify. Computer simulations are made to evaluate the performance and result shows that the new approach can reach better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124274465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Rate-Compatible Punctured Convolutional (RCPC)-encoded Vertical Bell Laboratories Layered Space-Time (V-BLAST) MIMO system to provide a robust wireless communication link is proposed. The V-BLAST detection is based on Minimum Mean-Squared Error (MMSE) criterion, to alleviate the noise enhancement commonly found in the original V-BLAST scheme based on Zero Forcing criterion. Different code rates and transmit powers are allocated to data streams emitted from the multiple transmit antennas, according to the attenuation levels of the subchannels. This scheme is efficient in terms of transmit power and bandwidth usage, as the data stream entering a destructive subchannel is given low transmit power and high code rate. Simulations show that the proposed system can attain good performance at a reasonably low Eb/No.
{"title":"RCPC-Encoded V-BLAST MIMO with MMSE-Based Detection","authors":"L. Sari, G. Wibisono, D. Gunawan","doi":"10.1109/ICCSN.2010.21","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.21","url":null,"abstract":"A Rate-Compatible Punctured Convolutional (RCPC)-encoded Vertical Bell Laboratories Layered Space-Time (V-BLAST) MIMO system to provide a robust wireless communication link is proposed. The V-BLAST detection is based on Minimum Mean-Squared Error (MMSE) criterion, to alleviate the noise enhancement commonly found in the original V-BLAST scheme based on Zero Forcing criterion. Different code rates and transmit powers are allocated to data streams emitted from the multiple transmit antennas, according to the attenuation levels of the subchannels. This scheme is efficient in terms of transmit power and bandwidth usage, as the data stream entering a destructive subchannel is given low transmit power and high code rate. Simulations show that the proposed system can attain good performance at a reasonably low Eb/No.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-commerce is seen as one of the key services of modern information society. The idea of automating e-commerce transactions attracted a lot of interest during the last years. Multi-agent systems are claimed to be one of promising software technologies for achieving this goal. Rules constitute a very promising approach to describing negotiation processes. We suggest ECA rule-based approaches to automated negotiations. The experimental scenario considers multiple buyer and seller agents that are performed in parallel.
{"title":"ECA Rule-Based Negotiation Agent in E-commerce","authors":"F. Mahan, A. Isazadeh, L. M. Khanli","doi":"10.1109/ICCSN.2010.63","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.63","url":null,"abstract":"E-commerce is seen as one of the key services of modern information society. The idea of automating e-commerce transactions attracted a lot of interest during the last years. Multi-agent systems are claimed to be one of promising software technologies for achieving this goal. Rules constitute a very promising approach to describing negotiation processes. We suggest ECA rule-based approaches to automated negotiations. The experimental scenario considers multiple buyer and seller agents that are performed in parallel.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haijun Zhang, X. Wen, Bo Wang, Wei Zheng, Yong Sun
The femtocell networks that use Home eNodeB and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. It is also of interest to minimize operational effort by introducing self-optimizing mechanisms, and the optimization of the Home eNodeB involved handover is an important goal of LTE-Advanced. Since the different network architecture and functionality between Home eNodeB and LTE eNodeB, the handover procedure between the femtocell and macrocell should be modified in LTE network. In this paper, modified signaling procedure of handover is presented in the Home eNodeB gateway based femtocell network architecture. A new handover algorithm based on the UE’s speed and QoS is proposed. The comparison between the proposed algorithm and the traditional handover algorithm shows that the algorithms proposed in this paper have a better performance in the reducing of unnecessary handovers and the number of handovers.
{"title":"A Novel Handover Mechanism Between Femtocell and Macrocell for LTE Based Networks","authors":"Haijun Zhang, X. Wen, Bo Wang, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.91","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.91","url":null,"abstract":"The femtocell networks that use Home eNodeB and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. It is also of interest to minimize operational effort by introducing self-optimizing mechanisms, and the optimization of the Home eNodeB involved handover is an important goal of LTE-Advanced. Since the different network architecture and functionality between Home eNodeB and LTE eNodeB, the handover procedure between the femtocell and macrocell should be modified in LTE network. In this paper, modified signaling procedure of handover is presented in the Home eNodeB gateway based femtocell network architecture. A new handover algorithm based on the UE’s speed and QoS is proposed. The comparison between the proposed algorithm and the traditional handover algorithm shows that the algorithms proposed in this paper have a better performance in the reducing of unnecessary handovers and the number of handovers.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.
{"title":"Virtual Password Using Runge-Kutta Method for Internet Banking","authors":"S. Mohammadi, Saeede Zare Hosseini","doi":"10.1109/ICCSN.2010.118","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.118","url":null,"abstract":"Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a soft computing technique PSIM is used for the performance simulation of the BLDC motor. With the help of its user friendly approach and some basic theories, the corresponding PSIM models for the BLDC can easily be constructed. The simulation results of BLDC motor performance can critically evaluate under various input parameters in the PSIM environment. The accuracy of this approach can also be verified by comparing the simulation results in PSIM with the response obtained from the BLDC motor established results.
{"title":"Modeling and Simulation of BLDC Motor Using Soft Computing Techniques","authors":"R. Saxena, Y. Pahariya, A. Tiwary","doi":"10.1109/ICCSN.2010.121","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.121","url":null,"abstract":"In this paper a soft computing technique PSIM is used for the performance simulation of the BLDC motor. With the help of its user friendly approach and some basic theories, the corresponding PSIM models for the BLDC can easily be constructed. The simulation results of BLDC motor performance can critically evaluate under various input parameters in the PSIM environment. The accuracy of this approach can also be verified by comparing the simulation results in PSIM with the response obtained from the BLDC motor established results.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Breadth First Search (BFS) can calculate the shortest path for un-weighted graphs very efficiently but when it comes to non-negative weighted graphs it fails at a point when a successor updates a predecessor. Such nodes are being referred as Culprit nodes in this research. These Culprit nodes are the ones that cause error in shortest path in an algorithm that traverses like BFS. This research targets on recognizing and marking Culprit nodes to disengage them until they are properly and completely updated. Processing through such nodes is postponed until all possible updates are made on these nodes nullifying all possible chances of errors. As nodes are being traversed in BFS fashion with few violations and additions promising a O(k(|V| + |E|)) time algorithm where 0
{"title":"Two Phase Shortest Path Algorithm for Non-negative Weighted Undirected Graphs","authors":"M. Qureshi, M. Hassan, S. Safdar, R. Akbar","doi":"10.1109/ICCSN.2010.97","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.97","url":null,"abstract":"Breadth First Search (BFS) can calculate the shortest path for un-weighted graphs very efficiently but when it comes to non-negative weighted graphs it fails at a point when a successor updates a predecessor. Such nodes are being referred as Culprit nodes in this research. These Culprit nodes are the ones that cause error in shortest path in an algorithm that traverses like BFS. This research targets on recognizing and marking Culprit nodes to disengage them until they are properly and completely updated. Processing through such nodes is postponed until all possible updates are made on these nodes nullifying all possible chances of errors. As nodes are being traversed in BFS fashion with few violations and additions promising a O(k(|V| + |E|)) time algorithm where 0","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the paper, we study the RB-HARQ and the degree reliability using IEEE802.16e LDPC codes. The retransmission bits according to soft-decision output and degree in LDPC codes. We can select the bits with small absolute value of soft-decision output and the small degree has the priority to retransmit. To improve the efficiency of retransmission based on RB-HARQ using LDPC codes.
{"title":"Efficient Retransmission of RB-HARQ with LDPC Codes","authors":"Chia-Sheng Tsai, C. Shih","doi":"10.1109/ICCSN.2010.109","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.109","url":null,"abstract":"In the paper, we study the RB-HARQ and the degree reliability using IEEE802.16e LDPC codes. The retransmission bits according to soft-decision output and degree in LDPC codes. We can select the bits with small absolute value of soft-decision output and the small degree has the priority to retransmit. To improve the efficiency of retransmission based on RB-HARQ using LDPC codes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}