Accepted Papers

  • Distance's quantification algorithm in AODV protocol
    Meryem Saadoune, Abdelmajid Hajami and Hakim Allali,University HASSAN 1st -FSTS / LAVETE,Morocco.
    ABSTRACT
    Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it comes to commercial applications, take as an example: the automotive networks that allow communication between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source and a destination node by initiating a route discovery process. Second, it maintains the active routes, which means finding alternative routes in a case of a link failure and deleting routes when they are no longer desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately. In this paper, we focused in the first point to enhance the local decision of each node in the network by the quantification of the mobility of their neighbors. Quantification is made around RSSI algorithm a well known distance estimation method.
  • Performance Analysis of Underlay Waveform in the Downlink of Asynchronous OFDM Based Cognitive Radio Transceivers
    Sonia Ben Issa and Moez Hizem,University of Carthage,Tunisia
    ABSTRACT
    In this paper, we investigate the impact of the asynchronism on the performance of a Cognitive Radio (CR) network, using the underlay paradigm. We focus on developing the theoretical aspect of interference analysis in the context of the orthogonal frequency division multiplexing (OFDM) technique. In different communication systems, the asynchronism can be harmful on the system's performance, and consequently can cause an asynchronous interference. Related works are evaluating the performance analytically either in terms of power allocation orof spectrum sensing, and if the interference evaluation is done,it is not in the context of a CR network. In our work, we perform a theoretical analysis of the asynchronous interference in terms of Bit Error Rate (BER) and Signal to Noise Ratio (SNR). Simulation results, compared to the theoretical approach,confirm the validity of our analysis.
  • BFDM Prototype for Cognitive Radio Systems
    Moez Hizem,Carthage University Tunis, Tunisia
    ABSTRACT
    In order to achieve better spectral efficiency, several prototypes has been suggested as a physical layer candidate for cognitive radio systems as OFDM (Orthogonal Frequency Division Multiplexing), SRRC (Square Root Raised Cosine) and others. In such models, we are confronted to problems of interference between the cognitive user and licensed users which degrade the performances of using models. In order to reduce the level of interference, we propose in this paper a candidate for cognitive radio systems naming Biorthogonal Frequency Division Multiplexing (BFDM) with localized time-frequency waveforms. We compare the proposed prototype with another prototype functions used in different multicarrier systems, in terms of power spectral density. Simulations results are provided to illustrate the interference power and show that BFDM has an attractive benefit over other prototypes functions.
  • Dual Band Semi Circular Disk Patch Antenna Loaded With L-Shaped Slot
    Amel Boufrioua,University Constantine 1,Algeria
    ABSTRACT
    In this paper, a dual frequency resonance antenna is analysed by introducing L-shaped slot in a semi circular patch, different parametric studies have allows and the results in terms of return loss and radiation pattern are given. It is observed that various antenna parameters are obtained as a function of frequency for different value of slot length and width; it is easy to adjust the upper and the lower band by varying these different antenna parameters. The coaxial feed is used to excite the patch antenna. Theoretical results using Matlab are compared with the simulated results obtained from Ansoft HFSS and shown to be in good agreement.
  • Low Altitude Airships for Seamless Mobile Communication in Air Travel
    Madhu D, Santhoshkumar M K, Swarnalatha Srinivas and Narendra Kumar G,UVCE,Bangalore University, India.
    ABSTRACT
    The Aviation Administration policy prohibits the use of mobile phones in Aircraft during transition for the reason it may harm their communication system due to Electromagnetic interference. In case the user wants to access cellular network at higher altitudes, base station access is a problem. Large number of channels are allocated to a single user moving at high speed by various Base Stations in the vicinity to service the request requiring more resources. Low Altitude Platforms (LAPs) are provided in the form of Base stations in the Airships with antennas projected upwards which has direct link with the Ground Station. LAPs using Long-Endurance Multi-Intelligence Vehicle (LEMVs) equipped with an engine for mobility and stable positioning against rough winds are utilized. This paper proposes a system that allows the passengers to use their mobiles in Aircraft using LAPs as an intermediate system between Aircraft and Ground station. As the Aircraft is dynamic, it has to change its link frequently with the Airships, MANETs using AODV protocol is established in the prototype using NS2 to provide the service and the results are encouraging.
  • Probabilistic Interference K-Barrier Coverage with Truth-Table Technique for Border Security in Wireless Sensor Networks (PIBC-TTT)
    Boualem Adda, Dahmani Youcef and Maatoug Abdelkader,Ibn Khaldoun University, Algeria
    ABSTRACT
    One of the most active research fields in wireless sensor networks (WSNs) is that of coverage. Intrusion detection is interesting application of sensor networks. When intruders cross into the boundary of a sensor field or are moving across the sensor field, they should be detected by the deployed sensors. S. Kumar and al have introduced the concept of Barrier Coverage, which deploys sensors in a narrow belt region or alongside the borders of this area to guarantee that any intrusion across the region would be detected. Besides, the intruders may perhaps be humans, animals, or other things, which have obviously diverse moving speeds. In this paper, we introduce the Techniques of the Truth Table for constructing the K-Barrier Coverage; we try with this protocol to guarantee the perfect coverage (K- Barrier Coverage), the Connectivity and extending the lifetime of the sensor network by reducing substantially the power consumption of the system by dynamic sleep scheduling of sensor nodes. We call this protocol Probabilistic Interference K-Barrier Coverage with Truth Table Technique (PIBC-TTT), by Simulation Computer; we evaluate and simulate our protocol to demonstrate their perfect efficiency level on the Barrier Coverage, the Connectivity between sensor nodes, and we show that PIBC-TTT can control substantially power consumption of the system with high reliability and simple architecture.
  • On The Modeling of OpenFlow-Based SDNs: The Single Node Case
    Kashif Mahmood, Ameen Chilwan, Olav N. sterb and Michael Jarschel,Norwegian University of Science and Technology (NTNU),Norway
    ABSTRACT
    OpenFlow is one of the most commonly used protocols for communication between the controller and the forwarding element in a software defined network (SDN). A model based on M/M/1 queues is proposed in [1] to capture the communication between the forwarding element and the controller. Albeit the model provides useful insight, it is accurate only for the case when the probability of expecting a new flow is small.
    Secondly, it is not straight forward to extend the model in [1] to more than one forwarding element in the data plane. In this work we propose a model which addresses both these challenges. The model is based on Jackson assumption but with corrections tailored to the OpenFlow based SDN network. Performance analysis using the proposed model indicates that the model is accurate even for the case when the probability of new flow is quite large. Further we show by a toy example that the model can be extended to more than one node in the data plane.
  • An Efficient Handoff Scheme for WiMAX Networks with Load Balancing
    Mohammad Salamah and Mays Al-Sabah,Eastern Mediterranean University,Turkey
    ABSTRACT
    Handoff in WiMAX (IEEE802.16) and/or Mobile WiMAX (IEEE802.16e) is one of the most challenging issues nowadays. The efficiency of the mobile WiMAX network is affected by the handoff latency. In this paper, we propose a new handoff scheme for mobile WiMAX using the handoff predication table in order to minimize the handoff latency and also balance the load between base stations. The predication table is used to expect the next base station, so that the mobile station does not need to scan all neighboring base stations. The results show that the proposed scheme outperforms the standard and other recently proposed schemes.
  • TCP ArtaVegas: Improving the Fairness of TCP Vegas
    Nima Afraz1,1 Islamic Azad University Qazvin, Iran and Morteza Analoui2, 2Iran University of Science and Technology Tehran, Iran.
    ABSTRACT
    Despite the fact that delay based congestion control algorithms like TCP Vegas can achieve a higher performance compare to loss based algorithms, some issues including fairness have been identified with those. These issues are preventing delay based congestion control algorithms to be widely implemented on the internet. In this paper, we will tackle the fairness problem of TCP Vegas by modifying TCP Vegas's congestion avoidance mechanism. The strength of our Modified version of TCP Vegas, named TCP ArtaVegas, is that the modification just needs to be implemented in the end hosts. Simulation results show that TCP ArtaVegas significantly improves the fairness of bandwidth allocation in heterogeneous network topologies.
  • Research and Design of Network Security Coordinated Recovery System
    Xia Jie, Xue Jing, Jiao Litao and Zhao Saisai,Department of Automatic Control,China.
    ABSTRACT
    The article is a subsystem of the Network Cooperative Security System, which contents a high-performance, low cost multiple backup disaster recovery system in different place which can work together with other network security devices. The main design of the system includes monitoring and auditing of the system files, the code of network backup recovery, the backup and recovery for data, the technology design of data synchronization, the management of members and the maintenance, etc. The experiment proves that the system is effective.
  • Modified Distributed Power Control with Dynamic Target-SIR-Tracking in Wireless Networks
    Saeed Banizamani and Mohammad Javad Dehghani,Shiraz University Of Technology,Iran
    ABSTRACT
    Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data types. First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical soundness can be alleviated by this algorithm.
  • SoC Nanobased Integrated Wireless Sensor System
    Penghua Sun, Maher Rizkalla, and Mohamed El-Sharkawy,Purdue School of Engineering and Technology,USA
    ABSTRACT
    Smart nanotechnology materials have been recently utilized in sensing applications. Carbon nanotube (CNT) based SoC sensor systems have potential applications in various fields, including medical, energy, consumer electronics, computers, and HVAC (heating, ventilation, and air conditioning) among others. In this study, a nanotechnology multisensory system was designed and simulated using Labview Software. The mathematical models were developed for sensing three physical quantities: temperature, gas, and pressure. Four CNT groups on a chip (two for gas sensor, one for temperature, and a fourth one for pressure) were utilized in order to perform sensing multiple parameters. The proposed fabrication processes and the materials used were chosen to avoid the interference of these parameters on each other when detecting one of them. The simulation results were translated into analog voltage from Labview software, transmitted via Bluetooth network, and received on desktop computers within the vicinity of the sensor system. The mathematical models and simulation results showed as high as 95% accuracy in measuring temperature, and the 5% error was caused from the interference of the surrounding gas. Within 7% change in pressure was impacted by both temperature and gas interference..
  • Adaptive Routing In Autonomous Networked Robots
    Samiha Rebiai, Kamal Eddine Melkemi and Mohamed Rida Abdessemed,Batna University, Algeria
    ABSTRACT
    The high mobility, often makes the routing process hard in MANETs; because it resulting of connectivity problems. However, restrict nodes mobility to maintaining connectivity is not available solution in all scenarios. At the same time, Delay Tolerant Networking (DTN) protocols are considered as the most suitable to use in networks with frequent disconnections. This, motivate us to suggest an adaptive protocol idea allowing to switch between the MANET and DTN protocols, according to the connectivity situation of a particular MANET (Robot Adhoc Network or RANET). Several results are given, in this context, and interpreted to show the efficiency of our proposition in such situations.
  • TriBASim : a novel TriBA On Chip Network Simulator based on systemC
    Gao Yu Jin,Daniel Gakwaya,Gombaniro Jean Claude and Niyigena Jean Pierre,Beijing Institute of Thechnology ,Beijing.
    ABSTRACT
    In this paper, wedevelop a simulator for the Triplet Based (TriBA)Network On Chip processorarchitecture.TriBA(Triple-based Architecture) is a multiprocessor architecture whose basic idea is to bundle together the object programming basic philosophy and hardware multicore systems[4] .In TriBA ,nodes are connected in recursive triplets .TriBA network topology performance analysis have been carried out from different perspectives [1] and routing algorithms have been developed[2][3]but the architecture still lacks a simulator that the researcher can use to run simple and fast behavioral analysis on the architecture based on common parametersin the Network On Chip arena. Wepresent TriBASim in this paper ,a simulator for TriBA ,based on systemc[6].TriBASim will lessen the burden on researchers on TriBA ,by giving them something to just plug in desired parameters and have nodes and topology set up ready for analysis.
  • Central Locker System for shopping mall using NFC Based Smartphone
    Siddarth Poddar,SSamsung R&D Institute India (SRI-B) Bangalore,India
    ABSTRACT
    Depositing purchased item at each store's locker system and carrying a token in hand for the assigned locker while entering a store in a shopping mall as well as collecting the item back while exiting the store is a time consuming exercise and even long delayed if the token is lost. The time would even multiply visiting multiple numbers of stores in a mall. Sometimes waiting in a long queue for depositing item at the store is an irritating hassle and everyone wants to skip this hassle. This paper introduces a novel solution using NFC enabled Smartphone and NFC reader located at each checkout counter of the store which provides an easy and convenient way to immediately keep your purchased things safe at the centrally located locker system and move around openly. Locker number would be generated at the store checkout counter after purchasing the item and just a tap of smartphone on NFC reader save the locker number information on NFC application installed on smartphone, which is used to retrieve the item back while exiting the mall. With the proposed solution, usage of extra space for each store's locker system and the corresponding staff can be eliminated, leading to cost reduction, promote efficiency and enhance customer service experience.
  • Correlation Investigations on an LTE Reference Antenna System for Band 13 using ECC
    Bernhard Auinger, Michael Gadringer, Adam Tankielun, Christoph Gagern and Wolfgang Bosch,Graz University of Technology,Austria
    ABSTRACT
    This document presents the investigations on two coupled reference antennas for LTE Band 13 (uplink 777MHz to 787MHz, downlink 746MHz to 756 MHz). An important figure of merit to quantify coupling effects in Multiple Input Multiple Output (MIMO) antenna systems is the Envelope Correlation Coefficient (ECC). The single antenna element is presented with radiation pattern and scattering parameters. It is a planar device, easy to be etched or milled as dimensions are given. The ECC investigations were done by measurement and simulation, the results are presented and compared. A good agreement between the simulated and the measured ECC can be recognized.
  • Validating OTA Measurements for MIMO enabled Devices using the decomposition method
    Bernhard Auinger, Michael Gadringer, Adam Tankielun, Christoph Gagern and Wolfgang Bosch,Graz University of Technology,Austria
    ABSTRACT
    In this document a numerical validation of the decomposition method is presented. This is a powerful method to split OTA (Over the Air) MIMO (multiple input multiple output) enabled UE (user equipment) tests in a radiated and a conducted part to save measurement time. The concept and fundamental properties of this procedure are introduced. The aim is to show the validity under certain circumstances of this concept by simulation.The chosen path is to employ a 22 MIMO transmission system. Stochastic and deterministic channel models are used, as Rayleigh channels with no line of sight components (NLOS) and identity matrices. Receiving antenna setups with different characteristics were investigated. Also the practical behaviour of the method using CTIA (The Wireless Association) LTE (Long Term Evolution) reference antennas has been examined. Therefore the distributions of the antenna condition number and of the deviation between the results are provided.