Javier Garcia Rodrigo, R. P. Leal, Encarna Pastor Martín
Peer-to-Peer applications for real-time video and continuous media streaming, known as Peer-to-Peer IP Television, have become a common way to distribute contents via IP networks. This leads to a significant traffic increase produced by the fast expansion of these kinds of applications. The paper proposes a model and several scenarios to simulate a representative Peer-to-Peer IP Television mesh-pull like architecture in terms of functionality and users behaviour in open networks. Overlay and underlay networks simulations have been performed using Oversim and OMNet++ tools respectively. The results show an excess of bandwidth consumed by the dispersion of end users that is a critical problem because of unnecessary traffic burden in the network core.
{"title":"Peer-to-Peer IPTV Service Impact on Network Traffic","authors":"Javier Garcia Rodrigo, R. P. Leal, Encarna Pastor Martín","doi":"10.1109/ICDT.2010.32","DOIUrl":"https://doi.org/10.1109/ICDT.2010.32","url":null,"abstract":"Peer-to-Peer applications for real-time video and continuous media streaming, known as Peer-to-Peer IP Television, have become a common way to distribute contents via IP networks. This leads to a significant traffic increase produced by the fast expansion of these kinds of applications. The paper proposes a model and several scenarios to simulate a representative Peer-to-Peer IP Television mesh-pull like architecture in terms of functionality and users behaviour in open networks. Overlay and underlay networks simulations have been performed using Oversim and OMNet++ tools respectively. The results show an excess of bandwidth consumed by the dispersion of end users that is a critical problem because of unnecessary traffic burden in the network core.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115779190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the migration from analog systems to digital systems, video surveillance is widely used now in safety and security systems. The number of cameras is so high now that the operators surveying each video stream are not sufficient. Many companies currently propose systems that analyze the video stream for sending automatically event messages for intrusion, abnormal comportment or situation. We develop a framework with web services, enterprise Java Beans [6] and a complex event processor bean to manage all video event messages. This new framework allows the integration of new generation of video surveillance systems with more flexibility, scalability, interoperability and productivity.
{"title":"A Service Oriented Framework Architecture for Intelligent Video Surveillance Systems","authors":"D. Ravier","doi":"10.1109/ICDT.2010.30","DOIUrl":"https://doi.org/10.1109/ICDT.2010.30","url":null,"abstract":"With the migration from analog systems to digital systems, video surveillance is widely used now in safety and security systems. The number of cameras is so high now that the operators surveying each video stream are not sufficient. Many companies currently propose systems that analyze the video stream for sending automatically event messages for intrusion, abnormal comportment or situation. We develop a framework with web services, enterprise Java Beans [6] and a complex event processor bean to manage all video event messages. This new framework allows the integration of new generation of video surveillance systems with more flexibility, scalability, interoperability and productivity.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
this paper presents a novel multiwavelet-based stereo correspondence matching technique. A multiwavelet transform is first applied to a pair of stereo images to decorrelate the images into a number of approximation (baseband) and detail subbands. Information in the basebands is less sensitive to shift variability of the multiwavelet transform. Basebands of each input image carry different spectral content of the image. Therefore, using the basebands to generate the disparity map is likely to produce more accurate results. A global error energy minimization technique is employed to generate a disparity map for each baseband of the stereo pairs. Information in the resulting disparity maps is then combined using a Fuzzy algorithm to construct a dense disparity map. A filtering process is finally applied to smooth the disparity map and reduce its erroneous matches. Middlebury stereo test images are used to generate experimental results. Results show that the proposed technique produces smoother disparity maps with less mismatch errors compared to applying the same global error energy minimization technique to wavelet transformed image data.
{"title":"Stereo Correspondence Matching Using Multiwavelets","authors":"P. B. Zadeh, C. Serdean","doi":"10.1109/ICDT.2010.37","DOIUrl":"https://doi.org/10.1109/ICDT.2010.37","url":null,"abstract":"this paper presents a novel multiwavelet-based stereo correspondence matching technique. A multiwavelet transform is first applied to a pair of stereo images to decorrelate the images into a number of approximation (baseband) and detail subbands. Information in the basebands is less sensitive to shift variability of the multiwavelet transform. Basebands of each input image carry different spectral content of the image. Therefore, using the basebands to generate the disparity map is likely to produce more accurate results. A global error energy minimization technique is employed to generate a disparity map for each baseband of the stereo pairs. Information in the resulting disparity maps is then combined using a Fuzzy algorithm to construct a dense disparity map. A filtering process is finally applied to smooth the disparity map and reduce its erroneous matches. Middlebury stereo test images are used to generate experimental results. Results show that the proposed technique produces smoother disparity maps with less mismatch errors compared to applying the same global error energy minimization technique to wavelet transformed image data.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Demóstenes Zegarra, J. Sousa, Bruno H. C. Faria, Eduardo Costa Alfaia
Cellular network operators have as main objectives the personalization of the offered services to their subscribers in an individual way or for groups with the same preferences. In this paper a new Personalized Recommendation System Architecture based on the geographic localization of the cellular users is described over which different services or solutions can be offered. For the mechanism of the users data collection, the Cell Broadcast technology is used, forming groups of users with similar preferences according association algorithms. This system also considers different presence levels (available, busy and absent) of the cellular users as an additional decision factor for sending or not the recommendation message and using for this purpose a application server connected to IMS (IP Multimedia Subsystem). A feedback mechanism based on the user satisfaction degree is also considered, to improve the efficiency of the system.
{"title":"Recommendation System Based on Location and Presence Information of Users in a Mobile Network","authors":"Demóstenes Zegarra, J. Sousa, Bruno H. C. Faria, Eduardo Costa Alfaia","doi":"10.1109/ICDT.2010.25","DOIUrl":"https://doi.org/10.1109/ICDT.2010.25","url":null,"abstract":"Cellular network operators have as main objectives the personalization of the offered services to their subscribers in an individual way or for groups with the same preferences. In this paper a new Personalized Recommendation System Architecture based on the geographic localization of the cellular users is described over which different services or solutions can be offered. For the mechanism of the users data collection, the Cell Broadcast technology is used, forming groups of users with similar preferences according association algorithms. This system also considers different presence levels (available, busy and absent) of the cellular users as an additional decision factor for sending or not the recommendation message and using for this purpose a application server connected to IMS (IP Multimedia Subsystem). A feedback mechanism based on the user satisfaction degree is also considered, to improve the efficiency of the system.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fundamental operational principle of the Bit-Torrent protocol is based on peers sharing partial data. That is, peers download data they don’t have, while uploading data they have already downloaded. The protocol allows peers to get some data to get them started. Free-riders exploit such aspects of the protocol to maximize their downloads and minimize uploads, resulting in crippling the system and benefiting only themselves. This paper looks at free-riding in detail, and presents experimental results that show the benefits of an enhancement to mitigate free-riding.
{"title":"Mitigating Free-Riding on BitTorrent Networks","authors":"Tim Ge, S. Manoharan","doi":"10.1109/ICDT.2010.18","DOIUrl":"https://doi.org/10.1109/ICDT.2010.18","url":null,"abstract":"The fundamental operational principle of the Bit-Torrent protocol is based on peers sharing partial data. That is, peers download data they don’t have, while uploading data they have already downloaded. The protocol allows peers to get some data to get them started. Free-riders exploit such aspects of the protocol to maximize their downloads and minimize uploads, resulting in crippling the system and benefiting only themselves. This paper looks at free-riding in detail, and presents experimental results that show the benefits of an enhancement to mitigate free-riding.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work studies the effects of the prefilter bandwidth in the sequential symbol synchronizers based on pulse comparation at half rate.We consider three different prefilter bandwidth namely B1=•, B2=2.tx and B3=1.tx, where tx is the bit rate.We consider also four synchronizers, where two operate at the rate with versions manual (b-m) and automatic (b-a) and two operate at half rate with versions manual (b-m/2) and automatic (b-a/2).The objective is to study the synchronizers and evaluate the output jitter UIRMS (Unit Interval Root Mean Square) versus the input SNR (Signal Noise Ratio).
{"title":"Prefilter Bandwidth Effects in Sequential Symbol Synchronizers Based on Pulse Comparation at Half Rate","authors":"A. Reis, J. F. Rocha, A. Gameiro, J. P. Carvalho","doi":"10.1109/ICDT.2010.38","DOIUrl":"https://doi.org/10.1109/ICDT.2010.38","url":null,"abstract":"This work studies the effects of the prefilter bandwidth in the sequential symbol synchronizers based on pulse comparation at half rate.We consider three different prefilter bandwidth namely B1=•, B2=2.tx and B3=1.tx, where tx is the bit rate.We consider also four synchronizers, where two operate at the rate with versions manual (b-m) and automatic (b-a) and two operate at half rate with versions manual (b-m/2) and automatic (b-a/2).The objective is to study the synchronizers and evaluate the output jitter UIRMS (Unit Interval Root Mean Square) versus the input SNR (Signal Noise Ratio).","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Z. Rodríguez, R. L. Rosa, Pedro Hélio Medeiros de Lima
The increasing use of mobile devices in wireless environments led to many studies about power-aware algorithms and protocols to improve the lifetime of device’s battery. This paper studies the implementation and testing of a new power-aware algorithm, PSWA, associated with a Cache System, and tested with the WRP routing protocol, in a Mobile Ad hoc Network scenario. A scheme that does not use the sleep schedule for the nodes it was used, nodes automatically fall asleep if they do not deal with data and routes. In the simulation scenario the WRP was chosen because it has a better performance in real-time traffic, and this type of traffic is commonly used today. The simulation results show an important decrease in energy consumption close to 10% with the association of the new power-aware algorithm.
{"title":"New Cache System-Based Power-Aware Algorithm in MANET","authors":"D. Z. Rodríguez, R. L. Rosa, Pedro Hélio Medeiros de Lima","doi":"10.1109/ICDT.2010.24","DOIUrl":"https://doi.org/10.1109/ICDT.2010.24","url":null,"abstract":"The increasing use of mobile devices in wireless environments led to many studies about power-aware algorithms and protocols to improve the lifetime of device’s battery. This paper studies the implementation and testing of a new power-aware algorithm, PSWA, associated with a Cache System, and tested with the WRP routing protocol, in a Mobile Ad hoc Network scenario. A scheme that does not use the sleep schedule for the nodes it was used, nodes automatically fall asleep if they do not deal with data and routes. In the simulation scenario the WRP was chosen because it has a better performance in real-time traffic, and this type of traffic is commonly used today. The simulation results show an important decrease in energy consumption close to 10% with the association of the new power-aware algorithm.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131663497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personal Network (PN) is a person-centric network, which creates a distributed environment of a person and provides access to personal resources and services regardless the location of the person. A Federation of Personal Networks (Fednet) is a group-oriented network of PNs. Since behind each PN there is a person, i.e., the PN owner, the cooperation of the PNs reflects the social behavior of the PN owners and therefore a Fednet can be seen as a social network of PNs. In this paper, we look at the Fednets from the ‘social’ angle and discuss how the Fednets can benefit from using reputation. We propose a reputation-based framework for Fednets and present ideas on applying reputation information for service management and reward mechanisms in Fednets to improve the quality of cooperation between the PNs.
个人网络(PN)是一个以人为中心的网络,它创造了一个分布式的个人环境,并提供了对个人资源和服务的访问,而不管这个人在哪里。个人网络联盟(Federation of Personal Networks, Fednet)是一种面向群体的pn网络。由于每个PN的背后都有一个人,即PN的所有者,因此PN的合作反映了PN所有者的社会行为,因此Fednet可以看作是PN的社会网络。在本文中,我们从“社会”的角度来看待联邦储备银行,并讨论联邦储备银行如何从使用声誉中受益。我们提出了一个基于声誉的联邦网点框架,并提出了将声誉信息应用于联邦网点的服务管理和奖励机制的想法,以提高各网点之间的合作质量。
{"title":"Reputation-Based Service Management and Reward Mechanisms in Fednets to Improve the Quality of Cooperation between Personal Networks","authors":"Malohat Ibrohimovna, S. Groot","doi":"10.1109/ICDT.2010.26","DOIUrl":"https://doi.org/10.1109/ICDT.2010.26","url":null,"abstract":"Personal Network (PN) is a person-centric network, which creates a distributed environment of a person and provides access to personal resources and services regardless the location of the person. A Federation of Personal Networks (Fednet) is a group-oriented network of PNs. Since behind each PN there is a person, i.e., the PN owner, the cooperation of the PNs reflects the social behavior of the PN owners and therefore a Fednet can be seen as a social network of PNs. In this paper, we look at the Fednets from the ‘social’ angle and discuss how the Fednets can benefit from using reputation. We propose a reputation-based framework for Fednets and present ideas on applying reputation information for service management and reward mechanisms in Fednets to improve the quality of cooperation between the PNs.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131533144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As communications services are evolving, users are increasingly faced with a confusion of devices, subscriptions and numbers. Consumers are growing to expect ubiquitous, constant connectivity and access to all manner of information applications. Service providers, large and small, must simultaneously find ways to offset the declines in traditional sources of revenues while drive top-line growth. Fixed Mobile Convergence (FMC) solutions are promising to offers advantages for both consumers and service providers and is gaining momentum in the marketplace as operators are realizing the market opportunities for creating new revenue-generating services. FMC solutions are promising to deliver the long awaited hand off of calls/calling features between wire-line and wireless networks. This article first defines the concept of FMC and it then several prominent concepts in the fixed mobile-convergence are analyzed. The article l addresses the business model, architecture, competitive and technological issues and summarizes the progress being made toward this network evolution.
{"title":"FMC: The Convergence of Networks, Devices and Services","authors":"A. Yarali, Anna Cherry, B. Ahsant","doi":"10.1109/ICDT.2010.20","DOIUrl":"https://doi.org/10.1109/ICDT.2010.20","url":null,"abstract":"As communications services are evolving, users are increasingly faced with a confusion of devices, subscriptions and numbers. Consumers are growing to expect ubiquitous, constant connectivity and access to all manner of information applications. Service providers, large and small, must simultaneously find ways to offset the declines in traditional sources of revenues while drive top-line growth. Fixed Mobile Convergence (FMC) solutions are promising to offers advantages for both consumers and service providers and is gaining momentum in the marketplace as operators are realizing the market opportunities for creating new revenue-generating services. FMC solutions are promising to deliver the long awaited hand off of calls/calling features between wire-line and wireless networks. This article first defines the concept of FMC and it then several prominent concepts in the fixed mobile-convergence are analyzed. The article l addresses the business model, architecture, competitive and technological issues and summarizes the progress being made toward this network evolution.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ring Road NoC (R2NoC), which was motivated by smooth flow of traffic in interconnected ring roads, is the base for this paper. Router design and routing algorithm for R2NoC is much simpler. In this paper we have developed the R2NOC's algorithm of routing in two ways. One of them is finding the shortest way between source and destination (θ algorithm) and as the second improvement, when we have a congestion or a link is broken, the CR (Congestion Resistant) algorithm will find another way to send the packet and we maintain that this way is shortest safe way and because of that, our algorithm is congestion resistant.
{"title":"Congestion resistant routing algorithm for a congestion resistant ring road network on chip","authors":"A. M. Shafiee, P. Sadr, F. Dehghani","doi":"10.1109/ICDT.2010.11","DOIUrl":"https://doi.org/10.1109/ICDT.2010.11","url":null,"abstract":"Ring Road NoC (R2NoC), which was motivated by smooth flow of traffic in interconnected ring roads, is the base for this paper. Router design and routing algorithm for R2NoC is much simpler. In this paper we have developed the R2NOC's algorithm of routing in two ways. One of them is finding the shortest way between source and destination (θ algorithm) and as the second improvement, when we have a congestion or a link is broken, the CR (Congestion Resistant) algorithm will find another way to send the packet and we maintain that this way is shortest safe way and because of that, our algorithm is congestion resistant.","PeriodicalId":322589,"journal":{"name":"2010 Fifth International Conference on Digital Telecommunications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}