By Topic

ICT Convergence (ICTC), 2013 International Conference on

Date 14-16 Oct. 2013

Filter Results

Displaying Results 1 - 25 of 290
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1089 KB)  
    Freely Available from IEEE
  • [Front matter]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (94 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (979 KB)  
    Freely Available from IEEE
  • Committees

    Page(s): 3 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (1049 KB)  
    Freely Available from IEEE
  • Message from the chairs

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (1052 KB)  
    Freely Available from IEEE
  • Technical paper sessions

    Page(s): 25 - 47
    Save to Project icon | Request Permissions | PDF file iconPDF (1251 KB)  
    Freely Available from IEEE
  • Venue

    Page(s): 49 - 52
    Save to Project icon | Request Permissions | PDF file iconPDF (1864 KB)  
    Freely Available from IEEE
  • Energy efficiency of a wireless communication transmitter with intensity modulation

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (811 KB) |  | HTML iconHTML  

    This paper describes a high speed optical wireless communication link that uses white-light-emitting diodes. We investigate the driving architecture about the energy efficiency of LED lightings and the spectral efficiency of communications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy efficient relay selection scheme with DRX mechanism in 3GPP LTE network

    Page(s): 6 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    As bandwidth scarcity problem is widely agreed, communication through high frequency band has been considered for future commercial cellular networks. However, according to its radio propagation property, out of service area will be increased. So, relay-based cooperative communication has been emerging as a promising solution. In relay-based cooperative communication, energy efficiency is crucial factor due to battery issue of relay stations. But, most of conventional relay selection schemes does not consider both energy efficiency and sleep operation of relay stations which can reduce power consumption. Thus, we construct Discrete Time Markov Chain (DTMC) model for the relay station which has DRX mechanism, and analyze that model. Also, we propose a novel energy efficiency metric called Relay Energy Efficiency (REE), and REE-based energy efficient relay selection scheme. Numerical results show that proposed relay selection scheme achieves higher energy efficiency than other conventional schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of power saving in an MPLS/IP network hosting a virtual router layer of a single service provider

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1364 KB) |  | HTML iconHTML  

    As a consequence of the rapid growth of Internet, the power consumption of the network equipment has increased significantly. This trend will continue in the next years and some strategies to contain the power used in the IP network are needed. Among the green networking strategies the virtualization class and in particular the deployment of virtual routers can lead to a high energy saving. In this paper we propose an heuristic for the migration of virtual routers among physical devices in order to turn off as many nodes as possible and save power according to the compliance with network node and link capacity constraints. We show that the 28% of nodes may be turn off when traffic percentage reduction of 80% occurs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient dynamic load distribution for heterogeneous access networks

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    In heterogeneous wireless access networks, it is important to achieve high variability of access resources. Bandwidth Aggregation (BAG) is considered to be a promising solution for this objective. However, power consumption has not been adequately addressed, although prolonging the battery life time of mobile devices with low power consumption has received attention lately. In this paper, we propose a novel dynamic energy-efficient load distribution algorithm for heterogeneous wireless networks. For the optimal load distribution, which is challenging combinatorial problem, we propose simple greedy load distribution algorithms that are inspired by the mathematical background of the Lagrangian algorithm. Furthermore, we propose another heuristic algorithm that extends the proposed algorithm when the retransmission scheme is hired for packet loss (e.g, TCP). Finally, an extensive Network Simulator 2 (NS2) simulation under various practical configurations demonstrates that the proposed algorithm could converge to the optimal distribution point with low complexity. Furthermore, it gives significantly increased the battery life time of mobile device with guarantee required Quality of Service (QoS) constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An FPGA based low power multiplier for FFT in OFDM systems using precomputations

    Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (271 KB) |  | HTML iconHTML  

    OFDM is considered to be the technology of choice for many wireless and wire-line transmission systems. OFDM is the standard for IEEE802.11, digital audio and video broadcast, and DSL broadband internet access. The generation of orthogonal frequencies in OFDM is done by using Inverse Fourier Transform and implemented as IFFT. IFFT (for transmission) and FFT (for receiving) are considered to be very computationally intensive applications. In this paper we introduce a new multiplier for performing FFT (since both FFT and IFFT require the same computation structure, we will use FFT to refer to both of them). First, we use fixed point FFT instead of floating point. The BER due to noise and multipath is studied as a function of the number of bits chosen to represent data in the system. Then, we introduce an FPGA based multiplier using precomputations to be used in FFT. Our proposed multiplier requires less energy and consumes less resources on the FPGA chip compared to a standard fixed point IP core by Xilinx. The proposed architecture is implemented on FPGA using Xilinx Spartan 6 architecture and compared to the traditional implementation of the FFT (IP multiplier by Xilinx). Our proposed multiplier shows a decrease of 50% energy consumption and uses less FPGA resources than a standard IP multiplier. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CMOS single-chip for 868 MHz and 915 MHz bands wireless sensor network applications

    Page(s): 30 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1137 KB) |  | HTML iconHTML  

    This paper presents the design and experimental results of low power CMOS single-chip for 868 MHz and 915 MHz bands wireless sensor network applications based on IEEE 802.15.4 standard; especially RF transceiver part. Single-chip radio consists of RF transceiver section and digital baseband section. Implemented in a 0.18 μm CMOS technology the receiver shows sensitivity of -100dBm and -93 dBm in BPSK and OQPSK modulation schemes, respectively, and dynamic range of 80 dB. The transmitter path shows a maximum of +10 dBm output power with EVM of less than 6.8% RMS and 12% RMS in BPSK and OQPSK modulation schemes, respectively. The RF transceiver consumes 16 mA in receive mode and 24.5 mA in transmit mode under supply voltage of 1.8 V in which 5 mA of frequency synthesizer is included. The implemented single-chip occupies 16 mm2 silicon area in which 10 mm2 is used for the RF transceiver section. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grouped device-to-device communication underlaying cellular networks

    Page(s): 36 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (447 KB) |  | HTML iconHTML  

    In this paper, we analyze a resource allocation method for device-to-device (D2D) communication underlaying cellular networks. A novel algorithm is proposed to form a number of D2D groups such that a group of D2D pairs can reuse the downlink resource of one cellular user (CU) while guaranting the SINR at both D2D receivers and CUs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytics framework to detect compromised IoT devices using mobility behavior

    Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (964 KB) |  | HTML iconHTML  

    Certain security mechanisms assume that the end device is secured. In an IoT network, the IoT device itself could be compromised. An attacker could steal the device, gain access to it and use this for more damaging attacks. I propose an analytical framework where I specify certain mobility behavior indicators that are computed at network nodes and optionally at IoT devices. These are communicated to an analytics server using lightweight protocol enhancements specified here. IoT user specifies expected behavior using these indicators. Analytics server analyzes expected and observed values of these indicators and informs if it detects some unusual activity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-centric intelligence provisioning in web-of-objects based IoT service

    Page(s): 44 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (823 KB) |  | HTML iconHTML  

    The advancing research of the Internet of Things brings wide spread of services to the environment where things collaborate each other and social environment that are applicable to any objects. Currently the technological progress defines the usage of IoT that can support essential community for human. This paper proposes a feature that can provide intelligent objects according to the service composition provided by WoO in IoT service. The composition service is enabled by the semantic ontology based on the predefined and recognition of integrated information. The approach of WoO environment has the user-centric IoT service that uses ontology models to relate various data through objectification process and service composition. The features of log record is also defined for user historical records that could lead integration of data, location and other possible services like advertising, emergency notification and service information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-defined-networking for M2M services

    Page(s): 50 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (343 KB) |  | HTML iconHTML  

    Machine-to-Machine(M2M) services are thriving enormously recently, considered as a key feature for upcoming era. However there are several problems for wider deployment, such as network management. Software-Defined Networking (SDN) is a possible solution for this by separating control and forwarding, which enables new kinds of network management. In this paper, we suggest an improved scheme for M2M services using SDN for more flexible and dynamic control. We conduct a simulation on dynamic routing in SDN-based network and analyze the performance compared to the legacy network. It showed that there are visible enhancements in the performance when we use SDN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for gait rehabilitation training using EMG fatigue analysis

    Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (681 KB) |  | HTML iconHTML  

    Although physical exercise of patients is very important for their quality of life, the guide line for physical movement considering muscle fatigue is not insufficient. In this study, we propose an easy detection algorithm for muscle fatigue estimation. EMG signals of five healthy volunteers were measured at the quadriceps femoris muscle and the tibialis anterio in order to estimate muscle fatigue. RMMV (ratio between maximum and minimum value) of median frequency components of EMG is proposed as a muscle fatigue parameter. With our proposed parameter, muscle fatigue state was detected easily. It is expected that our method could be used for a parameter that recommend exercise intensity during gait rehabilitation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust methodology for heartbeat detection in imaging photoplethysmography

    Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (499 KB) |  | HTML iconHTML  

    The purpose of this study is to provide a new methodology for acquiring physiological features that c an b e applied to IPPGs, and will enable a IPPG to acquire more robust and reliable features data, enabling the production of new features sequences that can be used in heart rate variability (HRV) analysis or pulse rate variability (PRV) analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finger vein identification using polydirectional local line binary pattern

    Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (539 KB) |  | HTML iconHTML  

    Local line binary pattern (LLBP), an improved version of local binary pattern (LBP), has the limitation that it can only extract horizontal and vertical line patterns, so that the effective information in an image may not be extracted and fully utilized. In this paper, we propose an extended LLBP method for finger vein identification, which is named polydirectional local line binary pattern (PLLBP). PLLBP can extract line pattern in any orientation. Hence, to extract line patterns with the most discriminative ability and effectively utilize them, we analyze the discriminative ability of LLBP histograms from different orientations. Then, a matching score-level fusion using sum rule is applied to achieve the final matching score for the last recognition. Experimental results demonstrate the proposed PLLBP method provides matching accuracy of 99.21%, which outperforms LLBP and the existing LBP-based methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User centric multi-purpose messaging framework

    Page(s): 66 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (813 KB) |  | HTML iconHTML  

    The changing demography requires new kinds of support for elderly people. Technical assistance systems could allow (aged) people to stay longer in well-known neighborhoods. While utilizing familiar media usage habits, the acceptance rate of a technical assistance system will be increased. Therefore, as many as possible potential communication methods between users and the assistance system are required. This paper describes a communication middleware for an assistance system which was originally designed and developed within the finished research project called “WEITBLICK”. The middleware has been continuously enhanced independently from the research project. Further, the paper will discuss two use cases and two demonstration applications which are utilizing the described communication middleware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs

    Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (857 KB) |  | HTML iconHTML  

    Ubiquitous Technologies in eHealthcare systems are playing a vital role to perform a non-stop monitoring of patients' health in hospitals or outpatient. The application of eHealthcare System towards wireless sensor networks such as ECG, voice over IP and audio/video conferencing, location-aware and ambient intelligence require the support of mobile nodes or node groups. Furthermore, medical staff moves close to patients and collects their monitoring body parameters through their wireless devices. Thus, in such situation, the lack of network connectivity is not admissible or should at least be time bounded, e.g. mobile nodes cannot be disconnected from the rest of the WSN for an undefined period of time. In this paper, we propose a hybrid and fast authentication protocols that support fast handoff for real-time applications aforementioned. The proposed protocol is based on RSS measurement and on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy. The performance analysis shows that our proposed authentication protocols are efficient and resilient to various kinds of attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fountain codes-based hybrid P2P and cloud storage system

    Page(s): 78 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    In this paper, we present a novel fountain code-based hybrid storage system that combines cloud storage with P2P storage. In the cloud storage system, all the data are consistently stored at server clusters but the data may be exposed to others accessing server clusters. On the other hand, in the P2P storage system, the data are distributed to a group of participating peers but the data retrievability may be significantly degraded. The proposed hybrid system is designed to provide the desired data retrievability with a short upload time and maintain the privacy to avoid other users from reading the contents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration time experimental evaluation in a Quagga based-software router

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (857 KB) |  | HTML iconHTML  

    We illustrate an experimental test-bed to evaluate the routing plane migration time based on QUAGGA routing software. The operation mode correctness of the OSPF routing protocol is also verified. The realized test-bed allows for an evaluation of the migration time as a function of the number of nodes of an emulated network. We show that even when the network links are loaded with data traffic, the migration time is low and the migration does not degrade the performance of the OSPF routing protocol. For instance the migration time is less than 12 ms in the case of an emulated network of 500 nodes and when the links are 70% loaded. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol detection under multi-path fading environments for ZigBee receiver

    Page(s): 84 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    In this paper, we propose a symbol detection method for ZigBee receiver. Main advantage of the proposed method is robustness under multi-path fading environments. The proposed method can be applied by correlation function of complex signals. It does not need equalization, as well as conventional demodulation and bit-level despreading. We simulate a symbol error probability performance to verify improved method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.