Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866735
A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu
This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.
{"title":"A low-complexity bit error rate estimation algorithm for wireless digital receivers","authors":"A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu","doi":"10.1109/ICCOMM.2014.6866735","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866735","url":null,"abstract":"This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866767
V. Poenaru, S. Obreja, R. Badea, E. Borcoci
This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.
{"title":"A performance analysis for a resource manager of a content aware network","authors":"V. Poenaru, S. Obreja, R. Badea, E. Borcoci","doi":"10.1109/ICCOMM.2014.6866767","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866767","url":null,"abstract":"This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866751
Laurentiu Boicescu, Daniel Gheorghica, V. Croitoru
There is a multitude of simulators capable of modelling communication networks and algorithms with Petri Nets (PN), Queueing Networks (QN) or some of their extensions. This paper presents the implementation of a new type of simulator, one that combines PNs and QNs in the same models (designated hybrid models). The simulator allows users to describe communication mechanisms in a simple fashion and add high-level logic in the process.
{"title":"Proposed Hybrid Network Performance Simulator (HNPS) - General structure","authors":"Laurentiu Boicescu, Daniel Gheorghica, V. Croitoru","doi":"10.1109/ICCOMM.2014.6866751","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866751","url":null,"abstract":"There is a multitude of simulators capable of modelling communication networks and algorithms with Petri Nets (PN), Queueing Networks (QN) or some of their extensions. This paper presents the implementation of a new type of simulator, one that combines PNs and QNs in the same models (designated hybrid models). The simulator allows users to describe communication mechanisms in a simple fashion and add high-level logic in the process.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866706
Ayhan Akbas, Huseyin Ugur Yildiz, B. Tavlı
Wireless Sensor Networks (WSNs) comprising of battery-powered sensor nodes are being used in a wide range of applications. The feasibility of such applications is highly influenced by the longevity of these networks. In this work, we present a realistic WSN lifetime optimization framework where transmission power levels for both data and ACK packets are optimally selected (i.e., a complete link-layer handshaking cycle is modeled). Log-normal shadowing path loss model is employed to take into account the effects of path losses. We utilized the developed Mixed Integer Programming (MIP) based optimization framework to investigate the impact of data packet length on WSN lifetime. To quantify the effects of data packet length on network lifetime we explored the parameter space consisting of the number of nodes and node deployment density. Our results show that the optimal data packet length is the maximum allowed length.
{"title":"Data packet length optimization for Wireless Sensor Network lifetime maximization","authors":"Ayhan Akbas, Huseyin Ugur Yildiz, B. Tavlı","doi":"10.1109/ICCOMM.2014.6866706","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866706","url":null,"abstract":"Wireless Sensor Networks (WSNs) comprising of battery-powered sensor nodes are being used in a wide range of applications. The feasibility of such applications is highly influenced by the longevity of these networks. In this work, we present a realistic WSN lifetime optimization framework where transmission power levels for both data and ACK packets are optimally selected (i.e., a complete link-layer handshaking cycle is modeled). Log-normal shadowing path loss model is employed to take into account the effects of path losses. We utilized the developed Mixed Integer Programming (MIP) based optimization framework to investigate the impact of data packet length on WSN lifetime. To quantify the effects of data packet length on network lifetime we explored the parameter space consisting of the number of nodes and node deployment density. Our results show that the optimal data packet length is the maximum allowed length.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866712
M. Marinescu, C. Ilie
The paper presents a filter that has been specially designed to filter a previously known noise that occurred during recording a torque signal on a transmission shaft of a vehicle. At the beginning, the problem seemed to be simple. But it wasn't... Due to the mounting necessities, the balancing counterweights of the universal joint's shaft have been removed, thus a permanent noise have been introduced. Hence, the necessity to remove the noise. The problem of the filter was to determine the specific frequency and the noise's amplitude. The issue has been solved using the spectral analysis methods, provided by designated software. However, we could take advantage by the fact that we knew what the source of the noise was acting like.
{"title":"Filtering the signal of a measured mechanical parameter","authors":"M. Marinescu, C. Ilie","doi":"10.1109/ICCOMM.2014.6866712","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866712","url":null,"abstract":"The paper presents a filter that has been specially designed to filter a previously known noise that occurred during recording a torque signal on a transmission shaft of a vehicle. At the beginning, the problem seemed to be simple. But it wasn't... Due to the mounting necessities, the balancing counterweights of the universal joint's shaft have been removed, thus a permanent noise have been introduced. Hence, the necessity to remove the noise. The problem of the filter was to determine the specific frequency and the noise's amplitude. The issue has been solved using the spectral analysis methods, provided by designated software. However, we could take advantage by the fact that we knew what the source of the noise was acting like.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866660
V. Sipal, D. Gaetano, P. McEvoy, M. Ammann
Wireless Body Area Networks (BANs) present an exciting opportunity for further growth in wireless connectivity. In this paper, an investigation on how the fading properties for wireless BAN on-body channels scale with bandwidth is made, thereby filling the unexplored gap between fading in narrowband and extremely wideband channels. The fading is found to scale similarly to indoor channels, but the dominance of the first path means that the wideband channel properties are achieved already for bandwidths in excess of 100 MHz. Furthermore, fading in footwear centric and in waist centric system is compared. It is concluded that the footwear centric architecture has similar fading properties for all bandwidths and for all nodes except for the node on the back, where it significantly outperforms the waist centric system.
{"title":"Bandwidth scaling of fading properties of on-body wireless channel in Body Area Networks","authors":"V. Sipal, D. Gaetano, P. McEvoy, M. Ammann","doi":"10.1109/ICCOMM.2014.6866660","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866660","url":null,"abstract":"Wireless Body Area Networks (BANs) present an exciting opportunity for further growth in wireless connectivity. In this paper, an investigation on how the fading properties for wireless BAN on-body channels scale with bandwidth is made, thereby filling the unexplored gap between fading in narrowband and extremely wideband channels. The fading is found to scale similarly to indoor channels, but the dominance of the first path means that the wideband channel properties are achieved already for bandwidths in excess of 100 MHz. Furthermore, fading in footwear centric and in waist centric system is compared. It is concluded that the footwear centric architecture has similar fading properties for all bandwidths and for all nodes except for the node on the back, where it significantly outperforms the waist centric system.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866723
Raluca Boia, Alessandra Bandrabur, C. Florea
In this paper we address the challenging problem of logo recognition. As logos appear in various scales, colors and with illuminations coming from source lights of various intensities, positions or colors, their recognition is a tedious task. The typical approach stands within Bag-of-Words (BoW) framework with SIFT (Scale Invariant Feature Transform) based features. To increase the accuracy, we rely on the recently introduced feature of the complete rank transform, which we extend for a multi-scale description. The system's performance is verified on the FlickrLogos-32 database.
{"title":"Local description using multi-scale complete rank transform for improved logo recognition","authors":"Raluca Boia, Alessandra Bandrabur, C. Florea","doi":"10.1109/ICCOMM.2014.6866723","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866723","url":null,"abstract":"In this paper we address the challenging problem of logo recognition. As logos appear in various scales, colors and with illuminations coming from source lights of various intensities, positions or colors, their recognition is a tedious task. The typical approach stands within Bag-of-Words (BoW) framework with SIFT (Scale Invariant Feature Transform) based features. To increase the accuracy, we rely on the recently introduced feature of the complete rank transform, which we extend for a multi-scale description. The system's performance is verified on the FlickrLogos-32 database.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121774501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866700
R. Niemiec, C. Brousseau, K. Mahdjoubi, O. Emile, A. Menard
The use of electromagnetic waves bearing orbital angular momentum in the radio frequency range is a growing subject, as well as the design of antennas enable to produce such waves. The aim of this paper is to present the characterization in an anechoic chamber, of a new type of antenna using a flat plate, designed to generate an electromagnetic wave bearing orbital angular momentum in the millimeter frequency band.
{"title":"Characterization of a flat plate antenna for OAM generation in the millimeter frequency band","authors":"R. Niemiec, C. Brousseau, K. Mahdjoubi, O. Emile, A. Menard","doi":"10.1109/ICCOMM.2014.6866700","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866700","url":null,"abstract":"The use of electromagnetic waves bearing orbital angular momentum in the radio frequency range is a growing subject, as well as the design of antennas enable to produce such waves. The aim of this paper is to present the characterization in an anechoic chamber, of a new type of antenna using a flat plate, designed to generate an electromagnetic wave bearing orbital angular momentum in the millimeter frequency band.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866683
Mihai-Lica Pura, Didier Buchs
Ad hoc networks represent a very modern technology for providing communication between devices without the need of any prior infrastructure set up, and thus in an “on the spot” manner. But there is a catch: so far there isn't any security scheme that would suit the ad hoc properties of this type of networks and that would also accomplish the needed security objectives. The most promising proposals are the self-organized schemes. This paper presents a work in progress aiming at developing a new self-organized key management scheme that uses identity based cryptography for making impossible some of the attacks that can be performed over the schemes proposed so far, while preserving their advantages. The paper starts with a survey of the most important self-organized key management schemes and a short analysis of the advantages and disadvantages they have. Then, it presents our new scheme, and by using informal analysis, it presents the advantages it has over the other proposals.
{"title":"A self-organized key management scheme for ad hoc networks based on identity-based cryptography","authors":"Mihai-Lica Pura, Didier Buchs","doi":"10.1109/ICCOMM.2014.6866683","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866683","url":null,"abstract":"Ad hoc networks represent a very modern technology for providing communication between devices without the need of any prior infrastructure set up, and thus in an “on the spot” manner. But there is a catch: so far there isn't any security scheme that would suit the ad hoc properties of this type of networks and that would also accomplish the needed security objectives. The most promising proposals are the self-organized schemes. This paper presents a work in progress aiming at developing a new self-organized key management scheme that uses identity based cryptography for making impossible some of the attacks that can be performed over the schemes proposed so far, while preserving their advantages. The paper starts with a survey of the most important self-organized key management schemes and a short analysis of the advantages and disadvantages they have. Then, it presents our new scheme, and by using informal analysis, it presents the advantages it has over the other proposals.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866664
V. Greu, P. Ciotirnae, F. Popescu, M. G. Burgos, I. Sima
The massive use of IEEE 802.11 networks/devices together with the technological progress on spectrum monitoring processing devices/software generate premises to search for improved techniques of mitigating the interference consequences. Many works approached co-channel and adjacent interference between IEEE 802.11/WiFi networks/devices, but few include non-WiFi interference sources, which sometimes strongly could influence performance when operating the same (2.4 GHz) ISM band. Our paper considered WiFi networks both internal and environmental interference sources, using available passive monitoring COTS (commercial off-the-shelf) devices/software and adding new analysis and optimization algorithms and features, in order to propose an integrated system, based on a general model and algorithm, for the estimation of internal/environmental interference influence and improvement of IEEE 802.11/WiFi networks performance/health.
{"title":"Model and algorithm for the estimation of internal/environmental interference influence and improvement of IEEE 802.11/WiFi networks performance, using passive monitoring","authors":"V. Greu, P. Ciotirnae, F. Popescu, M. G. Burgos, I. Sima","doi":"10.1109/ICCOMM.2014.6866664","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866664","url":null,"abstract":"The massive use of IEEE 802.11 networks/devices together with the technological progress on spectrum monitoring processing devices/software generate premises to search for improved techniques of mitigating the interference consequences. Many works approached co-channel and adjacent interference between IEEE 802.11/WiFi networks/devices, but few include non-WiFi interference sources, which sometimes strongly could influence performance when operating the same (2.4 GHz) ISM band. Our paper considered WiFi networks both internal and environmental interference sources, using available passive monitoring COTS (commercial off-the-shelf) devices/software and adding new analysis and optimization algorithms and features, in order to propose an integrated system, based on a general model and algorithm, for the estimation of internal/environmental interference influence and improvement of IEEE 802.11/WiFi networks performance/health.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130101076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}