WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 | 5 |   ...   | 37 |

«Computer Science & Information Technology 47 David C. Wyld Natarajan Meghanathan (Eds) Computer Science & Information Technology Seventh ...»

-- [ Page 1 ] --

Computer Science & Information Technology 47

David C. Wyld

Natarajan Meghanathan (Eds)

Computer Science & Information Technology

Seventh International Conference on Networks & Communications

(NETCOM - 2015)

Sydney, Australia, December 26~27, 2015

AIRCC Publishing Corporation

Volume Editors

David C. Wyld,

Southeastern Louisiana University, USA

E-mail: David.Wyld@selu.edu

Natarajan Meghanathan,

Jackson State University, USA

E-mail: nmeghanathan@jsums.edu

ISSN: 2231 - 5403

ISBN: 978-1-921987-44-1 DOI : 10.5121/csit.2015.51601 - 10.5121/csit.2015.51620 This work is subject to copyright. All rights are reserved, whether whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks.

Duplication of this publication or parts thereof is permitted only under the provisions of the International Copyright Law and permission for use must always be obtained from Academy & Industry Research Collaboration Center. Violations are liable to prosecution under the International Copyright Law.

Typesetting: Camera-ready by author, data conversion by NnN Net Solutions Private Ltd., Chennai, India Preface The Seventh International Conference on Networks & Communications (NETCOM 2015) was held in Sydney, Australia, during December 26~27, 2015. The Seventh International Conference on Network and Communications Security (NCS 2015), The Seventh International Conference on Wireless & Mobile Networks (WiMoNe 2015), The Second International Conference on Computer Science, Engineering and Information Technology (CSEIT 2015) and The Second International Conference on Signal, Image Processing and Multimedia (SPM 2015) were collocated with the NETCOM-2015. The conferences attracted many local and international delegates, presenting a balanced mixture of intellect from the East and from the West.

The goal of this conference series is to bring together researchers and practitioners from academia and industry to focus on understanding computer science and information technology and to establish new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in all areas of computer science and information technology.

The NETCOM-2015, NCS-2015, WiMoNe-2015, CSEIT-2015, SPM-2015 Committees rigorously invited submissions for many months from researchers, scientists, engineers, students and practitioners related to the relevant themes and tracks of the workshop. This effort guaranteed submissions from an unparalleled number of internationally recognized top-level researchers. All the submissions underwent a strenuous peer review process which comprised expert reviewers. These reviewers were selected from a talented pool of Technical Committee members and external reviewers on the basis of their expertise. The papers were then reviewed based on their contributions, technical content, originality and clarity. The entire process, which includes the submission, review and acceptance processes, was done electronically. All these efforts undertaken by the Organizing and Technical Committees led to an exciting, rich and a high quality technical conference program, which featured high-impact presentations for all attendees to enjoy, appreciate and expand their expertise in the latest developments in computer network and communications research.

In closing, NETCOM-2015, NCS-2015, WiMoNe-2015, CSEIT-2015, SPM-2015 brought together researchers, scientists, engineers, students and practitioners to exchange and share their experiences, new ideas and research results in all aspects of the main workshop themes and tracks, and to discuss the practical challenges encountered and the solutions adopted. The book is organized as a collection of papers from the NETCOM-2015, NCS-2015, WiMoNe-2015, CSEIT-2015, SPM-2015.

We would like to thank the General and Program Chairs, organization staff, the members of the Technical Program Committees and external reviewers for their excellent and tireless work. We sincerely wish that all attendees benefited scientifically from the conference and wish them every success in their research. It is the humble wish of the conference organizers that the professional dialogue among the researchers, scientists, engineers, students and educators continues beyond the event and that the friendships and collaborations forged will linger and prosper for many years to come.

–  –  –

Networks & Communications Community (NCC) Computer Science & Information Technology Community (CSITC) Digital Signal & Image Processing Community (DSIPC) Organized By

–  –  –

The Seventh International Conference on Networks & Communications (NETCOM - 2015) Implementation of Joint Network Channel Decoding Algorithm for Multiple Access Relay Channel Based on Convolutional Codes………………..………... 01 - 08 Youssef Zid, Sonia Zaibi Ammar and Ridha Bouallègue Spectrum Sensing in Cognitive Radio Networks : QoS Considerations……..... 09 - 19 Nabil Giweli, Seyed Shahrestani and Hon Cheung A Method of Target Tracking and Prediction Based on Geomagnetic Sensor Technology………..……………………………………………………..…….…... 21 - 37 Xinmin Tang, Shangfeng Gao, Songchen Han, Zhiyuan Shen, Liping Di and Binbin Liang Medium Access Control with Scheduled Group Contention for Massive M2M Devices………………………………………………………………..…..………... 39 - 49 Joo Rak Kang and Tae-Jin Lee Haarvested Energy-Adaptive MAC Protocol for Energy Harvesting IOT Networks……………………………………………………………...…..………... 51 - 58 Hyeong-Kyu Lee, MinGyu Lee and Tae-Jin Lee Table-Based Identification Protocol of Computational RFID Tags……….…... 59 - 67 Yunmin Kim, Ji Hyoung Ahn and Tae-Jin Lee SOTM : A Self Organized Trust Management System for VANET…………... 69 - 81 Amel Ltifi, Ahmed Zouinkhi and Mohamed Salim Bouhlel Reducing Latency in African NRENS Using Performance-Based LISP/SDN Traffic Engineering……………………………………………….……..………... 83 - 98 Josiah Chavula, Melissa Densmore and Hussein Suleman The Seventh International Conference on Network and Communications Security (NCS 2015) Limiting Self-Propagating Malware Based on Connection Failure Behavior…………………………………………………………………………... 99 - 114 Yian Zhou, You Zhou, Shigang Chen and O. Patrick Kreidl Selective Opening Secure Functional Encryption…………………...………... 115 - 130 Yuanyuan Ji, Haixia Xu and Peili Li Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments……………………………………………...…..………... 131 - 150 Ali Gholami and Erwin Laure Security Analysis of Mobile Authentication Using QR-Codes………..……... 151 - 160 Siwon Sung, Joonghwan Lee, Jinmok Kim, Jongho Mun and Dongho Won The Seventh International Conference on Wireless & Mobile Networks (WiMoNe 2015) Application-Based QoS Evaluation of Heterogeneous Networks……..……... 161 - 172 Farnaz Farid, Seyed Shahrestani and Chun Ruan BLE-Based Accurate Indoor Location Tracking for Home and Office…….. 173 - 181 Joonghong Park, Jaehoon Kim and Sungwon Kang An Adaptive Remote Display Framework to Improve Power Efficiency….... 183 - 193 Dong Hyun, Jo and Dae Young, Kim The Second International Conference on Computer Science, Engineering and Information Technology (CSEIT 2015) Higher Educational Empowerment, Its Ideal Parameters and Their Co-Relation with Economy…………….………………………………..……... 195 - 201 Mohit Satoskar and Anuprita Satoskar Real Human Face Detection for Surveillance System Using Heterogeneous Sensors……..………………………………………………………………..…... 203 - 210 Yoon-Ki Kim, Doo-Hyun Hwang and Chang-Sung Jeong Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment……………………………………………………………...……... 211 - 218 Du-Hyun Hwang, Yoon-Ki Kim and Chang-Sung Jeong The Second International Conference on Signal, Image Processing and Multimedia (SPM 2015) Robust Human Tracking Method Based on Appearance and Geometrical Features in Non-Overlapping Views…………….…………….………..……... 219 - 235 Binbin Liang, Songchen Han, Yan Zhu and Liping Di A Generalized Sampling Theorem Over Galois Field Domains for Experimental Design…………….………………...……………………..……... 237 - 247 Yoshifumi Ukita

IMPLEMENTATION OF JOINT NETWORK





CHANNEL DECODING ALGORITHM FOR

MULTIPLE ACCESS RELAY CHANNEL

BASED ON CONVOLUTIONAL CODES

Youssef Zid1, Sonia Zaibi Ammar1 and Ridha Bouallègue2 1 SysCom Laboratory, National Engineering School of Tunis, Tunisia 2 Innov’COM Laboratory, Higher School of Communications of Tunis, Tunisia ABSTRACT In this paper, we consider a Joint Network Channel Decoding (JNCD) algorithm applied to a wireless network consisting to M users. For this purpose M sources desire to send information to one receiver by the help of an intermediate node which is the relay. The Physical Layer Network Coding (PLNC) allows the relay to decode the combined information being sent from different transmitters. Then, it forwards additional information to the destination node which receives also signals from source nodes. An iterative JNCD algorithm is developed at the receiver to estimate the information being sent from each transmitter. Simulation results show that the Bit Error Rate (BER) can be decreased by using this concept comparing to the reference one which doesn’t consider the network coding.

KEYWORDS Joint network/channel decoding, network coding, wireless network.

1. INTRODUCTION In the last years, researchers focused on cooperative communications [6][7] via relay. Then, by using this concept, the spatial diversity gain can be achieved. The principle task of the relay is firstly to combine information from different transmitters by using network coding [1]. Then, this mechanism, i.e. network coding, performs the gains on bandwidth especially [2][3]. In the next stage, the relay forwards the resulting signal to the destination node. In order to improve the throughput of wireless networks, the destination node receives the signals from different source nodes in the direct links, and eventually the one from the relay. In literature, This scheme is called Multiple Access Relay Channel [8] (MARC). The relay model in such scheme has been widely exploited. So, it was shown in [9][10] that several relaying architectures may be used like Amplify And Forward (AAF), Decode And Forward (DAF) and Compress And Forward (CAF).

Indeed, authors proposed in [8] a joint network channel coding based on turbo codes for the MARC scheme with two transmitters.

David C. Wyld et al. (Eds) : NETCOM, NCS, WiMoNe, CSEIT, SPM - 2015 pp. 01–08, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51601 2 Computer Science & Information Technology (CS & IT) In a real case, the mentioned scheme cannot always be applied even it gives an improvement in throughput of wireless networks. So, practically,a real network can contain more than two senders. Several algorithms are used at the relay to improve the performance of such scheme. In this case, the classical network coding at the relay, which consist to the XOR operation of signals from source nodes, cannot be applied. Authors presented in [11] a joint network channel coding for the MARC scheme with two senders based on distributed turbo code for the relay channel.

They compared the proposed system to the one using separate network channel coding and proved that the use of joint network channel coding is necessary to exploit in a good way the redundant signal provided by the relay. Then, if the network and channel coding are treated separately, some performance loss is expected since the network decoder can’t use the soft information computed by the channel decoder. Similarly, the channel code cannot exploit the redundant information of the network code. This concept is supported in [12][13][4] where authors proved that capacity can be achieved by conceiving channel and network coding as a single non-separated data processing stage. In addition, there are several joint channel network coding scheme like time division decode and forward MARC model presented in [5] in which authors proposed distributed regular LDPC codes as the joint network channel code at the relay.

The same concept is proposed in [11] by using turbo-code-based joint channel network coding scheme.

In this paper, we propose a JNCD algorithm applied to the MARC scheme with large source nodes. The proposed scheme contains also one relay and one destination. We refer to [11] and we modify the joint network channel coding used at the relay. The redundant information provided at the relay is transmitted to the destination which receives eventually information from source nodes. An iterative decoding algorithm is presented at the destination to estimate the information being sent from each source.

This paper is organized as follows: the next section presents the considered MARC system model. In section III, a joint network channel coding algorithm is presented, then, a detailed description of the channel coding and network coding process is done. In section IV, an iterative joint network channel decoding algorithm is presented to estimate the source information’s being sent from the transmitters. The section V presents the reference scheme. In section VI, the performance of the proposed decoding algorithm are evaluated and compared to the classic scheme which doesn’t consider network coding.



Pages:   || 2 | 3 | 4 | 5 |   ...   | 37 |


Similar works:

«To get an actual hard copy of the book, with a real cover and everything, you can do so by contacting orders@fourwallseightwindows.com (royalties of which go to the Abbie Hoffman Activist Foundation) it's only ten bucks (plus shipping). Also, it should be noted that this book is copyrighted © 1996 Johanna Lawrenson. ISBN 9781568582177 [ instinct.org's note: I'm not sure why it's worth noting that. considering the book's title, how does copyright matter? this was stolen from...»

«Getting Serious About Casual Play A Retailer’s Guide to Hosting, Nurturing, and Leveraging Casual Gaming WPN.Wizards.com Getting Serious about Casual Play: A Retailer’s Guide to Hosting, Nurturing, and Leveraging Casual Gaming ©2015 wizards of the coast llc. This book is protected under the copyright laws of the United States of America. Any reproduction or unauthorized use of the material or artwork contained herein is prohibited without the express written permission of wizards of the...»

«This is chapter 10 in Spiritual Disciplines for the Christian Life (NavPress, 1991). Silence and Solitude... For The Purpose Of Godliness My favorite short story is The Bet by Anton Chekhov, a Russian writer of the last half of the nineteenth century. The plot involves a wager between two educated men regarding solitary confinement. A wealthy, middle-aged banker believed that the death penalty was a more humane penalty than solitary confinement because, An executioner kills at once, solitary...»

«Alice Gadler Principles Matter: Humanitarian Assistance to Civilians under IHL Supervisor: Dr. Marco Pertile Advisor: Prof. Roberto Belloni October 2013 PhD Programme in International Studies 2 Abstract The provision of relief to civilians in armed conflict is a sensitive activity, subject to specific regulation in IHL treaties. Challenges emerged on the ground have questioned the comprehensive nature of this legal framework and generated debate on the concept of humanitarian assistance itself,...»

«MEMORANDUM DECISION FILED Pursuant to Ind. Appellate Rule 65(D), this Memorandum Decision shall not be May 31 2016, 9:49 am regarded as precedent or cited before any CLERK Indiana Supreme Court court except for the purpose of establishing Court of Appeals and Tax Court the defense of res judicata, collateral estoppel, or the law of the case.ATTORNEY FOR APPELLANT ATTORNEYS FOR APPELLEE Bruce W. Graham Gregory F. Zoeller Lafayette, Indiana Attorney General of Indiana Kathrine Modesitt Cooper...»

«Driving Lessons Megan K. Williams “If you want a hope in hell of passing the exam, forget everything 87 you see happening out there.” Like a warning out of Dante, these words are delivered in the poorly lit, sparsely furnished backroom of my neighbourhood driving school in Rome. Wearing a tight T-shirt and an expression so jaded it would make your average cop appear credulous, our instructor Leo points his finger to the front door, out towards the circus of illegality that is Roman...»

«City and County of Denver 201 West Colfax Ave., Dept. 705 • Denver, Colorado 80202 • 720-913-5000 • FAX 720-913-5247 www.denvergov.org/auditor Dennis J. Gallagher Auditor Prevailing Wage/Certified Payroll Overview What is the basis for Prevailing Wage? It's the Law: Prevailing Wage is covered under Section 20-76 of the Revised Municipal Code of the City and County of Denver. The law declares that any contractor or subcontractor at any tier who performs construction, alteration,...»

«ALSO BY CHRIS JERICHO AND PETER THOMAS FORNATALE: A Lion’s Tale: Around the World in Spandex Undisputed: How to Become the World Champion in 1,372 Easy Steps GOTHAM BOOKS Published by the Penguin Group Penguin Group (USA) LLC 375 Hudson Street New York, New York 10014 USA | Canada | UK | Ireland | Australia | New Zealand | India | South Africa | China penguin.com A Penguin Random House Company Copyright © 2014 by Chris Jericho All photographs courtesy of Chris Jericho unless otherwise...»

«Issue RB267 – 23 05 15 Issue 190 – 23 June 2015 Welcome to the Weekly Regional Bulletin which is issued every Tuesday and designed to make sure staff have regular access to all key Trust information in one place. If any staff members have any comments or feedback they would like to share with the team, please feel free to get in touch by emailing: nwas.communications@nwas.nhs.uk.NWAS PARAMEDIC RECEIVES QUEEN’S HONOUR Paramedic, Frederick Lawrence is amongst the most recent recipients of...»

«Copyright 1997 Society of Photo-Optical Instrumentation Engineers. This paper was published in the SPIE Technologies for Synthetic Environments: Hardware-in-theLoop Testing II Proceedings, Volume 3084 21-23 April 1997 and is made available as an electronic reprint with permission of SPIE. Single print or electronic copies for personal use only are allowed. Systematic or multiple reproduction, or distribution to multiple locations through an electronic listserver or other electronic means, or...»

«THAILAND Executive Summary The constitution and other laws and policies protect religious freedom and, in practice, the government generally respected religious freedom, although it restricted the activity of some groups. The government did not demonstrate a trend toward either improvement or deterioration in respect for and protection of the right to religious freedom. There were some reports of societal abuses based on religious affiliation, belief or practice. In the southernmost border...»

«THE ARGUMENTS FOR PROTECTION The importance of SERIES forest protected areas to drinking water RunningPure A research report by the World Bank / WWF Alliance for Forest Conservation and Sustainable Use Running Pure Running Pure: The importance of forest protected areas to drinking water A research report for the World Bank / WWF Alliance for Forest Conservation and Sustainable Use Written and edited by Nigel Dudley and Sue Stolton With major research and contributions by Rachel Asante Owusu,...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.