By Topic

Consumer Communications and Networking Conference (CCNC), 2011 IEEE

Date 9-12 Jan. 2011

Filter Results

Displaying Results 1 - 25 of 288
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (17 KB)  
    Freely Available from IEEE
  • Committees

    Page(s): 1 - 26
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Technical program

    Page(s): 1 - 29
    Save to Project icon | Request Permissions | PDF file iconPDF (124 KB)  
    Freely Available from IEEE
  • Improvement of the sphere decoding complexity through an adaptive OSIC-SD system

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    Sphere decoding is a decoding technique able to achieve the maximum likelihood error performance in fading environments; nevertheless, it exhibits a high complexity, especially in poor channel conditions. In this paper, we present an adaptive hybrid algorithm which reduces the complexity of conventional sphere decoding without sacrificing its error performance. Through simulations, we prove that the proposed system maintains almost the same bit error rate of the conventional sphere decoding, and exhibits a lower, quasi-constant complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comprehensive WiMAX simulator

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (239 KB) |  | HTML iconHTML  

    The most challenging issue in WiMAX network planning is to measure and enhance the Quality of Service (QoS) of WiMAX networks. In this paper, a comprehensive WiMAX simulator is proposed to evaluate the performance of the system. The key parts of the simulator are described including end-to-end communication path, traffic generation, Medium Access Control (MAC) and Physical (PHY) layers, resource allocation, frame construction and configuration options such as Adaptive Modulation and Coding (AMC). Several experiments are conducted to assess different scenarios while varying one or more of the following: input traffic size, traffic load, presence of fragmentation and AMC. The results show the scalability of the system as it can support a large number of users while showing the real-life representation of the traffic models. The simulations also show the flexibility of implementing AMC schemes according to desired distributions. The high accuracy of the simulator is shown by comparing the simulator results to theoretical expected values. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error tolerance in wireless OFDM data transmission using signal quality driven symbol Re-mapping

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    In the consumer electronics market, the need for error tolerance in wireless systems is increasing especially from I-Q imbalances and non-linearity in RF front-end. In most applications such as encoded image transmission, not all bits are equally important. However, current error tolerance schemes give equal importance to all transmitted bits. In this paper, an OFDM data transfer methodology that has the least impact on image data in the presence of persistent bit errors due to I-Q imbalances and non-linear compression is proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiMAX physical layer: Specifications overview and performance evaluation

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (83 KB) |  | HTML iconHTML  

    The WiMAX technology has drawn enormous attentions from wireless communication industry in recent years. Its sophisticated physical layer (PHY) adopts such techniques as multiple-input and multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM), which are fundamentally different techniques from the previous 3G mobile system. To help the readers gain the knowledge of some key components of the WiMAX PHY before referring the lengthy standard documentation, we provide a brief overview of the physical layer of the WiMAX standard IEEE 802.16-2009. A simulation system with LDPC coded MIMO-OFDM is also established to evaluate the performance of the WiMAX transceiver. Simulations show that the iterative receiver structure can achieve good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Remote Nursing system

    Page(s): 13 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1698 KB) |  | HTML iconHTML  

    Demands for better health services have resulted in the enhancement of electronic health (eHealth) systems with newer concepts such as being patient-centric, easy to use, and having smarter interactions and more accurate decisions. While eHealth services aim to provide continuous medical and health services for both consumers and medical practitioners, access to allied healthcare experts such as nurses is still a challenge. In this paper, we propose a new framework, Virtual Remote Nursing (VRN) that provides a virtual nurse agent installed on the client's personal computer or smart phone to help manage the client's health condition continuously. With this approach, medical practitioners can assign different tasks to a virtual nurse using a generic task definition mechanism, where a task is defined as a combination of medical workflow, operational guidelines, and associated data. VRN is controlled by practitioners who decide on the patient's treatment. This allows a VRN to act as a personalized full-time nurse for its client, by performing practitioner support tasks, using data collected on the client's health condition. Such patient information could be obtained from an electronic Personal Health Record (ePHR) system such as Google Health or Microsoft Health Vault. We have developed a prototype system that enables traditional client applications and healthcare provider systems to collaborate using a VRN system. Finally, through a case study, we demonstrate how diabetic patients can take advantage of this system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized mobile monitor for assisted healthy-living

    Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2071 KB) |  | HTML iconHTML  

    The increased incidence of childhood obesity and the continued rise in the average body mass index in most western societies, with the resultant increase in body-fat related health problems across a wide spectrum of population groups, has promoted the need for maintaining healthy body weight to higher importance, greater significance and symbolic prominence in the myriad of current health issues. Prevention of individual accumulation of body fat can be accomplished by a combination of proper diets and daily exercise, however keeping up these twin recipes for healthy living, requires constancy of purpose and personal discipline that is well beyond most individual capacities. Hence a personalized non-invasive mobile device is proposed that provides surveillance function on the exercise regimen and eating habits of the user, proffers daily advice and recommended course of action in order to assist the user in maintaining a healthy lifestyle. It also provides large pool of data for further analysis in order to detect trends and signs of behavioral and health vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of false alarms in fall detection systems

    Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (207 KB) |  | HTML iconHTML  

    Falls are a major cause of hospitalization and injury-related deaths among the elderly population. The detrimental effects of falls, as well as the negative impact on health services costs, have led to a great interest on fall detection systems by the health-care industry. The most promising approaches are those based on a wearable device that monitors the movements of the patient, recognizes a fall and triggers an alarm. Unfortunately such techniques suffer from the problem of false alarms: some activities of daily living are erroneously reported as falls, thus reducing the confidence of the user. This paper presents a novel approach for improving the detection accuracy which is based on the idea of identifying specific movement patterns into the acceleration data. Using a single accelerometer, our system can recognize these patterns and use them to distinguish activities of daily living from real falls; thus the number of false alarms is reduced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards accelerometry based static posture identification

    Page(s): 29 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (179 KB) |  | HTML iconHTML  

    Human activity classification has wide-spread applications ranging from human computer interaction to disease progression studies. In this paper we propose a body posture model based on the Euler angles of the torso, arms and legs. The Euler angles are computed based on data streams originating from a wireless Body Sensor Network (BSN) comprising of nine accelerometers. Thereafter they are used to reconstruct different body postures based on an unsupervised learning and clustering algorithm. We validate our algorithm by implementing a classification engine in Matlab, capable of classifying subtle changes in posture with 97% accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a classification of Information Technology governance frameworks for the development of a IT GRC healthcare framework

    Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    The issues, opportunities and challenges of effectively governing an organization's Information Technology (IT) demands and resources have become a major concern of the Board and executive management in many organisations today. The Swiss healthcare is currently searching for methods and practices for the solution of operational planning and optimisation of IT processes. To make sure that the corporate hospital strategy leads to adequate business decisions an IT GRC Framework for Healthcare will be needed. This paper presents the first task-the classification of existing IT governance frameworks- within the development process. After the dissociation of IT management and corporate governance- a proposal for a classification scheme for IT governance frameworks is described and the application of the classification template is explained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-connection DCCP user-to-user video streaming over mobile WiMAX

    Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    The need to respond to congestion and channel loss over not one but two wireless links is an impediment to video streaming between one mobile user device and another via an intervening IP network. The result can be poor wireless channel utilization and interruptions to the streaming process. This paper proposes that multi-connection streaming will avoid the need for application-specific cross-layer intervention to address this problem. In considering IEEE 802.16e (mobile WiMAX), the paper demonstrates that multi-connection streaming is certainly necessary but only sufficient if an appropriately sized Time Division Duplex frame is selected. Received video quality will also depend on correct determination of the number of connections and the compression ratio of the video itself. The quality of the received video must be traded off against the time to stream the complete video sequence, which in term is determined by the number of connections. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restraining greedy TCP behavior by MAC frame control on wireless LAN

    Page(s): 44 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (165 KB) |  | HTML iconHTML  

    The technology of flow-based QoS control on wireless LANs is receiving a lot of attention. There are several QoS technologies that can provide bandwidth guarantees by using TCP congestion control (QoS-TCP) and MAC control (QoS-MAC). Unfortunately, since QoS-TCP runs on the end terminal, it is possible that QoS-TCP will attempt to guarantee bandwidth without the permission of the network administrator (e.g. a hotspot service provider). In such a case, it is possible that these flows compress the throughout of coexisting flows unfairly. That is, it is possible for a non-priority flow to claim to be a priority flow by using QoS-TCP without the permission of the network administrator. We call such flows greedy flows. The purpose of this study is restraining such greedy TCP flows by using QoS-MAC over the wireless LAN network. This study evaluates the performance of our proposal by using ns-2. Simulations show that the proposal can control the greedy flows by using a QoS-MAC. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HIP-TAG, a new paradigm for the Internet of Things

    Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    This paper presents a new approach for secure networking in the Internet of Things. To ensure privacy, we designed an adaptation of the recently IRTF standardized HIP protocol, for RFID communication. Tag identity is protected by a negotiated equation. Two approaches are discussed: brute force based on digest procedures, and hash tree. HIP-Tag concept has been recently adopted by the IRTF as a working group item. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A joint framework of passive monitoring system for complex wireless networks

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (444 KB) |  | HTML iconHTML  

    Monitoring and analyzing wireless networks for network structure and behavior is a complex task. Such monitoring often requires creating extra traffic, dedicated hardware and a prior knowledge of the network components and structure. In this paper we present a novel approach for monitoring large and complex wireless networks, fast deployed which operate seamlessly and in real time. The suggested framework uses few passive sniffers in order to sample the WiFi communication in the "air" per packet and have an extended cover range due to overhearing abilities. This monitoring system requires no prior knowledge of the network structure. We have designed, implemented and deployed such a passive monitoring system and used it to monitor the campus WLAN network (Wi-Fi). Experimental results show that the suggested framework is highly applicable for unmanaged and partly managed wireless networks such as Ad-hoc, first responders, self deployed and any highly dynamic network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and optimization of live streaming for over the top video

    Page(s): 60 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Video has become an integral part of the Internet user content. The use of High Definition (HD) video content increases the bandwidth requirements of the Internet infrastructure. Moreover, rapid increase in the Over-the-Top (OTT) Internet video bandwidth consumption has major impact on the business models of the Internet Service Providers (ISP). To support the ever-growing demand for IP-based video, two major technologies are used: Peer-to-Peer (P2P) for live video and Multi-Layer Cache (MLC) for fully-stored video content. In this paper we focus on partial streaming, which is a `semi-live' form of video delivery of live events such as sports, concerts, and news in the Video-on-Demand (VOD) format. The VOD supports user control features such as Start Over, Pause, Rewind, and Forward. We suggest a new framework for optimizing partial streaming using MLC, which allows storing partial video content in the time-based chunks of data (that is, data packets) while forwarding these data chunks to the users at various levels of ISP networks. The suggested framework may be helpful for solving the OTT bottleneck caused be video streaming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast broadcast at the intersection in VANET

    Page(s): 65 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    Vehicular Ad-hoc Network(VANET) enables a wireless communication between vehicles to improve driver's safety. For the safety, a message including safety-related information is broadcast between vehicles and forwarded for farther vehicles. VANET poses challenges that broadcast attempts from many vehicles cause collisions between packets and result in packet drops. Many researches have concentrated on removing collisions in those excessive broadcasts. These approaches lead one vehicle to be selected as a rebroadcast vehicle. However, it makes difficult to forward the safety message to all directions at intersections. In this paper, we suggest an efficient way to broadcast a safety message to all directions at an intersection with a short delay and without a collision. Our simulation results show a coverage improvement of as much as 70% and a delay reduction of as much as 100msec. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On bounding information dissemination delay in vehicular networks

    Page(s): 70 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (113 KB) |  | HTML iconHTML  

    Supporting QoS for safety-critical applications for intelligent transportation systems accentuates the analytical modeling of delays in vehicular networks. Such analysis is, however, challenging due to the dynamics of such a network. We make progress by deriving lower- and upper-bounds for information dissemination delays in multi-hop vehicular networks using two different routing schemes. In particular, we determine the probability that a message m in a vehicular network will be delivered successfully to a participant at distance x from the source within t time units. Messages are broadcast at each hop after a MAC layer delay and nodes in the transmission neighborhood receive the message with some probability which represents the packet loss probability. Network density and inter-vehicle spacing are based on recent empirical studies of vehicular traffic. Simulation studies indicate that our model, and associated analysis, does capture the delay characteristics of vehicular networks. In addition, we observe a sharp threshold for message delivery in these networks, i.e., for a fixed distance x there exists a t* such that a message is delivered almost surely to a destination node that is at distance x from the source when the time allowed is greater than t* (And, it is almost surely not delivered if the time allotted is less than t*.) We believe that this is a promising step towards accurate characterization of communication delay in vehicular networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erasure coding for road-to-vehicle visible light communication systems

    Page(s): 75 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    In this paper, we focus on a road-to-vehicle visible light communication (VLC) system using LED traffic lights. In this system, an LED traffic light consists of a 2-dimensional LED array (2D LED array), and cars are equipped with high-speed 2-dimensional cameras (2D image sensors). An important issue of this system is frame loss. Sometimes, 2D image sensor in a car fails to get a frame. So as to mitigate the influence of frame loss, we propose to apply erasure coding to the road-to-vehicle VLC system. In the proposed system, a data sequence is encoded by LDPC code whose length is much longer than the size of 2D LED array. In addition, code synchronization is required for the proposed system. We also propose a code synchronization scheme, which makes use of error detection capability of LDPC code. We evaluate the performance of our proposed system, and show that it can recover frame loss for high SNR when less than 8 frames among total 18 frames are lost. In addition, we show that our proposed code synchronization scheme can ignore its errors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XL-based data link layer routing protocol for wireless mesh networks

    Page(s): 80 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (95 KB) |  | HTML iconHTML  

    We present a simple link-state routing protocol called DLL-XL that provides packet routing at the link layer for ad-hoc 802.11s-based networks. DLL-XL can be considered as a deployment of the Approximate Link state algorithm XL proposed by Levchenko et al. By building upon the XL algorithm, the DLL-XL routing protocol achieves routing efficiency by suppressing flooding of link-cost changes when appropriate to tradeoff between message flooding overhead and path costs. The correctness of DLL-XL is inherited from the formal correctness of the XL algorithm. We evaluate the performance of DLL-XL by simulation using the ns-2 network simulator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of the VANET connectivity by percolation theory

    Page(s): 85 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB) |  | HTML iconHTML  

    As deploying Vehicular Ad Hoc NETworks (VANETs) costs large amounts of resources, it is crucial that governments and companies make a thorough estimation and comparison of the benefits and the costs. The network connectivity is an important factor we should take care of, because it can greatly affect the performance of VANETs and further affect how much we can benefit from VANETs. We use percolation theory to analyze the connectivity of VANETs. Through theoretical deduction, we discover the quantitative relationship among network connectivity, vehicle density and transmission range. We show that there is a jump of the network connectivity when vehicle density or transmission range is big enough. Simulations conducted in a large scenario validate our theoretical results. Our results have great meanings in the deployment of VANETs in real world. Given vehicle density, our theorem can be used to calculate the minimum transmission range to achieve good network connectivity. As a large transmission range can cause serious collisions in wireless links, it is a tradeoff to choose a proper transmission range. Our analysis can give a hand to this tradeoff and guide the deployment of VANETs in real world. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • uSink: Smartphone-based moible sink for wireless sensor networks

    Page(s): 90 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    This paper presents a cross-platform solution of smartphone-based mobile sink for wireless sensor networks, named uSink. With a cross-platform SD card, named uSD card, any smartphone with SD interface can be empowered with the capability to communicate with wireless sensor nodes. Furthermore, a middleware on mobile phone, named uSinkWare, is also designed to provide a typical mobile sink's functionalities, including sensor detection, topology monitoring, routing, sensor data collection and sensor control, etc. Thanks to Qt, uSinkWare can also work on many popular mobile platforms, such as Symbian, Maemo, Windows mobile and embedded Linux. uSink has been implemented, and its performance has been verified by experiments. The experiment results show that current high-end smartphones have enough capabilities to work as mobile sinks, and uSink can be regarded as an attempt on this aspect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PR-RAM: The Page Rank Routing Algorithm Method in Ad-hoc wireless networks

    Page(s): 96 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (110 KB) |  | HTML iconHTML  

    This paper presents the Page Rank Routing Algorithm Method (PR-RAM), which is the Ad-hoc wireless networks routing protocol using Page Rank algorithm. Page Rank is the link analysis algorithm used by the Google internet engine that assigns a numerical weighting to each element of World Wide Web (WWW) with the purpose of measuring its relative importance within the WWW. If any web page has a higher rank than other web page, it means that this web page is more important than other web page. In order to measure the relative importance of mobile node in wireless network environments, this paper uses the Page Rank algorithm in Ad-hoc wireless networks. Mobile node's Page Rank means how many routing paths are included to this node. This paper also uses available every multiple minimum hop-count routing paths to be more efficient on view of variance of entire mobile nodes energy. PR-RAM is guaranteed the access fairness of source node to Access Point (AP) in Ad-hoc networks environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility-aware protocol for Wireless Sensor Networks in Health-care monitoring

    Page(s): 101 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    Health-care monitoring with Wireless Sensor Networks (WSN) has become a major interest during the last few years. The use of efficient communication protocols is crucial in minimizing transmission delay and energy consumption of sensor nodes. In a heterogeneous WSN context, we propose, efficient mobility aware mechanisms which may be implemented in large three-tier WSN. These mechanisms must be designed to be optimal. The aim of this paper addresses common sensor behavior such as data exchange meanwhile responding to the mobility issue in the fore mentioned context. The mechanisms are based on two main protocols: topology creation and data collection in intra- and inter-tiers. Our mechanisms minimize collisions and optimize the duty-cycle of each node. Furthermore, a performance evaluation study detailed by an analytical model is presented in order to validate the designed protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.