Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632127
M. Hasan, K. Arshad
ZigBee is a low-power, short range wireless technology for machine to machine communications and uses the IEEE802.15.4 standard. ZigBee networks are being widely used in applications such as home automation, automatic meter reading systems, sensor networks and home security systems. The orphan node problem is a well-known problem in ZigBee networks. In this paper, we develop a protocol to address the orphan node problem by integrating the concept of cognitive ZigBee nodes that are able to self-configure. Our proposed scheme works by quickly eliminating the failed nodes and then self-configuring the network in order to reconnect the orphan nodes in a cognitive manner. We evaluated the performance of our proposed scheme by conducting experiments at the Mobile and Wireless Research Laboratory (MWRL) based at the University of Greenwich.
{"title":"Robust home automation scheme using cognitive ZigBee network","authors":"M. Hasan, K. Arshad","doi":"10.1109/ICTEL.2013.6632127","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632127","url":null,"abstract":"ZigBee is a low-power, short range wireless technology for machine to machine communications and uses the IEEE802.15.4 standard. ZigBee networks are being widely used in applications such as home automation, automatic meter reading systems, sensor networks and home security systems. The orphan node problem is a well-known problem in ZigBee networks. In this paper, we develop a protocol to address the orphan node problem by integrating the concept of cognitive ZigBee nodes that are able to self-configure. Our proposed scheme works by quickly eliminating the failed nodes and then self-configuring the network in order to reconnect the orphan nodes in a cognitive manner. We evaluated the performance of our proposed scheme by conducting experiments at the Mobile and Wireless Research Laboratory (MWRL) based at the University of Greenwich.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632098
B. Batista, G. Campos, M. Fernandez
The OpenFlow architecture is a proposal from the Clean Slate initiative to define a new Internet architecture where the network devices are simple, and the control and management plane is performed by a centralized controller. The simplicity and centralization architecture makes it reliable and inexpensive. However enterprise network administrators are not familiar with this new concept of network management and there is a shortage of tools that simplify the task of manage a OpenFlow network using a simple interface. The concept of policies is easier to grasp than the concept of OpenFlow flows, because companies use policy to express employee rights and duties in a particular context. This paper proposes a Policy Based OpenFlow Network Management (PBONM) framework to manage the OpenFlow networks using the policies definition language like Ponder to define OpenFlow flows of easy way for the network administrators.
{"title":"A proposal of policy based OpenFlow network management","authors":"B. Batista, G. Campos, M. Fernandez","doi":"10.1109/ICTEL.2013.6632098","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632098","url":null,"abstract":"The OpenFlow architecture is a proposal from the Clean Slate initiative to define a new Internet architecture where the network devices are simple, and the control and management plane is performed by a centralized controller. The simplicity and centralization architecture makes it reliable and inexpensive. However enterprise network administrators are not familiar with this new concept of network management and there is a shortage of tools that simplify the task of manage a OpenFlow network using a simple interface. The concept of policies is easier to grasp than the concept of OpenFlow flows, because companies use policy to express employee rights and duties in a particular context. This paper proposes a Policy Based OpenFlow Network Management (PBONM) framework to manage the OpenFlow networks using the policies definition language like Ponder to define OpenFlow flows of easy way for the network administrators.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632138
Hichem Besbes, S. B. Rayana, G. R. Othman
In the case of memoryless MIMO channel and when the channel matrix is ill-conditioned, it is well known that performances of the Maximum Likelihood (ML) equalizer are well pronounced, compared to MMSE and ZF equalizers. In dispersive channels the conventional equalizer intends to cancel the inter-symbol interference, and did not take into the account the conditioning of the channel matrix. It intends to inverse the channel matrix somehow, which may cause noise enhancement and performances degradation. Using this fact and in order to overcome this issue, we propose in this paper a joint partial equalization and ML detection approach, where the equalizer is built based on a novel non-quadratic criterion. The proposed criterion ensures that the equalized channel matrix conserves its conditioning; which will be handled by the ML detector. Simulation results show that the improvement is well pronounced in cases where the channel matrix is ill-conditioned.
{"title":"A non-quadratic criterion for FIR MIMO channel equalization","authors":"Hichem Besbes, S. B. Rayana, G. R. Othman","doi":"10.1109/ICTEL.2013.6632138","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632138","url":null,"abstract":"In the case of memoryless MIMO channel and when the channel matrix is ill-conditioned, it is well known that performances of the Maximum Likelihood (ML) equalizer are well pronounced, compared to MMSE and ZF equalizers. In dispersive channels the conventional equalizer intends to cancel the inter-symbol interference, and did not take into the account the conditioning of the channel matrix. It intends to inverse the channel matrix somehow, which may cause noise enhancement and performances degradation. Using this fact and in order to overcome this issue, we propose in this paper a joint partial equalization and ML detection approach, where the equalizer is built based on a novel non-quadratic criterion. The proposed criterion ensures that the equalized channel matrix conserves its conditioning; which will be handled by the ML detector. Simulation results show that the improvement is well pronounced in cases where the channel matrix is ill-conditioned.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632139
Zebing Feng, Z. Feng, Qixun Zhang
Spectrum access is an important research topic in cognitive radio networks, in which secondary users (SUs) manage to utilize the licensed spectrum bands of primary users opportunistically. However, there is a tradeoff between the access opportunities for SUs and communication constraints from primary networks. Moreover, considering the interplay among SUs sharing the limited spatial access resources, how much the access opportunity a SU can derive become complex to determine. In this paper, to protect the primary users(PUs) from the interference caused by SUs, a location-aware discrete region model for spatial spectrum access opportunities of SUs is highlighted, in which the exact value of access opportunity is quantitative as the expected allowed-transmitting number (EATN) of SUs surrounding a PU. Considering the impact of SUs transmission probability and mobility, a probabilistic analysis and a finite-state Markov chain is undertaken. Simulation results show the change rules of SUs access opportunities with parameters of primary and secondary networks, which is full of conductive in determining the deployment and operation of secondary network.
{"title":"A location-aware discrete region approach for spatial access opportunity analysis in cognitive radio networks","authors":"Zebing Feng, Z. Feng, Qixun Zhang","doi":"10.1109/ICTEL.2013.6632139","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632139","url":null,"abstract":"Spectrum access is an important research topic in cognitive radio networks, in which secondary users (SUs) manage to utilize the licensed spectrum bands of primary users opportunistically. However, there is a tradeoff between the access opportunities for SUs and communication constraints from primary networks. Moreover, considering the interplay among SUs sharing the limited spatial access resources, how much the access opportunity a SU can derive become complex to determine. In this paper, to protect the primary users(PUs) from the interference caused by SUs, a location-aware discrete region model for spatial spectrum access opportunities of SUs is highlighted, in which the exact value of access opportunity is quantitative as the expected allowed-transmitting number (EATN) of SUs surrounding a PU. Considering the impact of SUs transmission probability and mobility, a probabilistic analysis and a finite-state Markov chain is undertaken. Simulation results show the change rules of SUs access opportunities with parameters of primary and secondary networks, which is full of conductive in determining the deployment and operation of secondary network.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"91 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632093
Mohammed Khalil, A. Adib
This paper deals with a new digital audio watermarking scheme based on Code Division Multiple Access (CDMA) technique. In digital communication, CDMA allows several users to share the same communication channel without interference from each other. The present work proposes to embed multiple watermarks in the same audio channel in order to increase the embedded information. Our main objective is to emphasize the impact of spreading codes on the performance of CDMA based watermarking system. This performance will be evaluated in terms of transparency, detection reliability of the watermark and its robustness against various disturbances.
{"title":"Impact of spreading codes on CDMA based audio watermarking system","authors":"Mohammed Khalil, A. Adib","doi":"10.1109/ICTEL.2013.6632093","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632093","url":null,"abstract":"This paper deals with a new digital audio watermarking scheme based on Code Division Multiple Access (CDMA) technique. In digital communication, CDMA allows several users to share the same communication channel without interference from each other. The present work proposes to embed multiple watermarks in the same audio channel in order to increase the embedded information. Our main objective is to emphasize the impact of spreading codes on the performance of CDMA based watermarking system. This performance will be evaluated in terms of transparency, detection reliability of the watermark and its robustness against various disturbances.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632131
M. Koca, H. Sari
We present a general upper bounding framework for the average bit error probability (ABEP) of generalized spatial modulation (G-SM) over correlated Rayleigh and Rician channels. Our approach is applicable to any multiple-input multiple-output (MIMO) configuration and linear modulation alphabet. The framework also incorporates possibly correlated Gaussian channel estimates. The ABEP with perfect channel state information (CSI) can be derived as a special case. This approach not only provides tight ABEP upper bounds but also serves as a performance optimization tool to choose the best transmit antenna group configuration. All theoretical results are validated by simulation results shown using phase shift keying (PSK) and quadrature amplitude modulation (QAM) constellations.
{"title":"Generalized spatial modulation over correlated fading channels: Performance analysis and optimization","authors":"M. Koca, H. Sari","doi":"10.1109/ICTEL.2013.6632131","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632131","url":null,"abstract":"We present a general upper bounding framework for the average bit error probability (ABEP) of generalized spatial modulation (G-SM) over correlated Rayleigh and Rician channels. Our approach is applicable to any multiple-input multiple-output (MIMO) configuration and linear modulation alphabet. The framework also incorporates possibly correlated Gaussian channel estimates. The ABEP with perfect channel state information (CSI) can be derived as a special case. This approach not only provides tight ABEP upper bounds but also serves as a performance optimization tool to choose the best transmit antenna group configuration. All theoretical results are validated by simulation results shown using phase shift keying (PSK) and quadrature amplitude modulation (QAM) constellations.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632080
Zhao Li, Jun Gu, Qin Liu
In this paper an interference alignment (IA) based dynamic spectrum sharing and user scheduling scheme for cognitive radio (CR) multi-input multi-output (MIMO) uplink system with multiple secondary users is proposed. The difference of spatial transmission performance originating from various channel matrices is exploited to implement appropriate user scheduling. Then by IA processing, cognitive transmission is confined to subspace orthogonal to the authorized signal subspace. Consequently, opportunistic interference-free sharing of idle spatial subchannel(s) licensed to the primary is achieved. Simulation results show that the proposed strategy could utilize idle spatial channel resource effectively and obtain multiuser diversity gain. On the premise that primary transmission is protected from disturbing, cognitive throughput is significantly improved.
{"title":"Dynamic spectrum sharing and user scheduling for CR-MIMO system based on interference alignment","authors":"Zhao Li, Jun Gu, Qin Liu","doi":"10.1109/ICTEL.2013.6632080","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632080","url":null,"abstract":"In this paper an interference alignment (IA) based dynamic spectrum sharing and user scheduling scheme for cognitive radio (CR) multi-input multi-output (MIMO) uplink system with multiple secondary users is proposed. The difference of spatial transmission performance originating from various channel matrices is exploited to implement appropriate user scheduling. Then by IA processing, cognitive transmission is confined to subspace orthogonal to the authorized signal subspace. Consequently, opportunistic interference-free sharing of idle spatial subchannel(s) licensed to the primary is achieved. Simulation results show that the proposed strategy could utilize idle spatial channel resource effectively and obtain multiuser diversity gain. On the premise that primary transmission is protected from disturbing, cognitive throughput is significantly improved.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632116
Yu Chen, I. Darwazeh
An Internet traffic trace over gigabit Ethernet contains information on arrival time and size of every packet over the collection period. An important problem is to model the latency and packet losses within the trace. The Lindley equation is a general form of describing the evolution of queueing delay processes and queue length processes, both of which are tightly associated with the latency and packet losses. We report on our use of the Lindley equation to analyse publicly-available link-layer data from a gigabit Ethernet gateway and discuss the performance of packet queueing delay and queue length based on the data.
{"title":"Quality of service (QoS) analysis of an Internet traffic trace over gigabit Ethernet","authors":"Yu Chen, I. Darwazeh","doi":"10.1109/ICTEL.2013.6632116","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632116","url":null,"abstract":"An Internet traffic trace over gigabit Ethernet contains information on arrival time and size of every packet over the collection period. An important problem is to model the latency and packet losses within the trace. The Lindley equation is a general form of describing the evolution of queueing delay processes and queue length processes, both of which are tightly associated with the latency and packet losses. We report on our use of the Lindley equation to analyse publicly-available link-layer data from a gigabit Ethernet gateway and discuss the performance of packet queueing delay and queue length based on the data.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125757103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632113
Mohammed Ridouani, A. Hayar
Cognitive radio is a promising technology that uses radio spectrum opportunistically and efficiently. In this paper, we propose a general scheme for enhancing the cognitive sources of data transmission to provide "Always Transmit" solution using mixed strategies in cognitive radio context. Indeed, we propose to combine underlay and interweave approaches depending on the activity of the primary system. We analyze the Ergodic Capacity of cognitive transmission under joint transmit power constraint and interference power constraint over Nakagami fading channels. We show the gain of our approach versus other approaches in literature. This framework accounts for most of the parameters that affect the performance and provides fundamental insights that may be of value to the transmission scenario, such as the spectrum sensing duration, spectrum hole detection, primary system bandwidth occupancy, transmit and interference power constraints, and fading.
{"title":"General scheme for always transmit solution in cognitive radio systems","authors":"Mohammed Ridouani, A. Hayar","doi":"10.1109/ICTEL.2013.6632113","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632113","url":null,"abstract":"Cognitive radio is a promising technology that uses radio spectrum opportunistically and efficiently. In this paper, we propose a general scheme for enhancing the cognitive sources of data transmission to provide \"Always Transmit\" solution using mixed strategies in cognitive radio context. Indeed, we propose to combine underlay and interweave approaches depending on the activity of the primary system. We analyze the Ergodic Capacity of cognitive transmission under joint transmit power constraint and interference power constraint over Nakagami fading channels. We show the gain of our approach versus other approaches in literature. This framework accounts for most of the parameters that affect the performance and provides fundamental insights that may be of value to the transmission scenario, such as the spectrum sensing duration, spectrum hole detection, primary system bandwidth occupancy, transmit and interference power constraints, and fading.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-05-06DOI: 10.1109/ICTEL.2013.6632126
Amine Mouafi, R. Benslimane, Aziza El ouaazizi
We present a novel approach for recovering the camera parameters and motion from the concept of coherence of a set of silhouettes of an object taken under circular motion. These parameters can be obtained by maximizing the total coherence between all silhouettes. For this purpose, we propose in this paper to use genetic algorithm instead the conventional optimization procedures. Genetic algorithm can correctly find the optimal solution without the need of initial values of parameters. The performance of the proposed method is shown in term of convergence and accuracy to recover camera parameters. The recovered parameters may be used for 3D image-based modeling to obtain high quality 3D reconstructions.
{"title":"A genetic algorithm for recovering camera parameters and motion from silhouettes","authors":"Amine Mouafi, R. Benslimane, Aziza El ouaazizi","doi":"10.1109/ICTEL.2013.6632126","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632126","url":null,"abstract":"We present a novel approach for recovering the camera parameters and motion from the concept of coherence of a set of silhouettes of an object taken under circular motion. These parameters can be obtained by maximizing the total coherence between all silhouettes. For this purpose, we propose in this paper to use genetic algorithm instead the conventional optimization procedures. Genetic algorithm can correctly find the optimal solution without the need of initial values of parameters. The performance of the proposed method is shown in term of convergence and accuracy to recover camera parameters. The recovered parameters may be used for 3D image-based modeling to obtain high quality 3D reconstructions.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}