2018 28th International Telecommunication Networks and Applications Conference (ITNAC)

21-23 Nov. 2018

Filter Results

Displaying Results 1 - 25 of 97
  • [Copyright notice]

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s):i - vii
    Request permission for reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • ITNAC 2018 Welcome

    Publication Year: 2018, Page(s):i - ii
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • ITNAC 2018 Technical Program Committee Welcome

    Publication Year: 2018, Page(s):i - ii
    Request permission for reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • ITNAC 2018 Committees

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2018, Page(s):i - iv
    Request permission for reuse | PDF file iconPDF (216 KB)
    Freely Available from IEEE
  • ITNAC 2018 Keynotes

    Publication Year: 2018, Page(s):i - v
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (53 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2018, Page(s):i - xxxiv
    Request permission for reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • ITNAC 2018 Technical Program Committee

    Publication Year: 2018, Page(s):i - v
    Request permission for reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2018, Page(s): i
    Request permission for reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • ITNAC 2018 Index

    Publication Year: 2018, Page(s):i - vi
    Request permission for reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Blockchain-Based Implementation for Financial Product Management

    Publication Year: 2018, Page(s):1 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    In order to decrease the delay of financial product information update among multi institutions, manage multi-dimensional and diversified financial product information, enhance the properties traceback ability, we propose a blockchain-based financial product management platform. It constructs a distributed network architecture for financial product information management which possess a tamper-res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Framework for analysis Of Energy Efficiency in massive MIMO With Hardware Impairments

    Publication Year: 2018, Page(s):1 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Apart from the benefits of large scale multiple-input-multiple-output (MIMO) systems such as high energy and spectral efficiencies, some issues also come along such as effects of hardware impairments on the antennas of base station (BS). These hardware impairments include mutual coupling, amplifier distortion etc. In this paper we prove graphically that these impairments have significant effect on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards SDN Fault Tolerance using Petri-Nets

    Publication Year: 2018, Page(s):1 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Software defined networking (SDN) depends on separating control and data planes. Vendors seek flexible and ease-for-use networks. SDN has introduced two main functions; centralized control and programmability which have become the pillars of SDN. In this paper we use SDN as a centralized architecture which is composed of a master-controller connected to a set of slave-controllers. Switches connect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Emptying Small Satellite Networks with In-Network Data Aggregation

    Publication Year: 2018, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Recently, small satellites have attracted much attention in both academia and industry. These satellites can form a swarm and communicate via Inter-Satellite Links (ISLs) and help each other download data to one or more Ground Stations (GSs). A key challenge is that each satellite has a short contact period with different GSs over time. Henceforth, this paper considers the following objective: min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel-based Rate Selection for Commodity RFID Networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    Backscatter communication has been an emerging research field in power-constrained and short-range wireless sensor networks. In RFID networks, sensors need to transfer masses of sensing data via backscatter communication. In order to meet this need, we propose a novel Channel-based Rate Selection framework (CRS). Specifically, we design a novel channel selection algorithm that covers each backscat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware and Energy-Efficient Protocol for the Distributed Wireless Sensor Networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Wireless sensor network (WSNs) are composed of a large number of battery-powered wireless sensors, which acquire and monitor physical data from their surroundings through self-organization. Sensors are deployed randomly in a target area where maintenance and battery replacement are difficult or even impossible. To effectively save energy and prolong network lifetimes, networks typically adopt clus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Mobile Edge Computing in Vehicular Ad-Hoc Networks

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1356 KB) | HTML iconHTML

    Vehicular Ad-Hoc Networks (VANETs) are an integral part of Intelligent Transportation Systems (ITS) and provide a means for vehicles to communicate with one another as well as to the Cloud and Internet. The recent push toward 5G networking has laid the foundation for a VANET architecture that can accommodate the high bandwidth, high speed, and high availability expected by consumers. Next-Generati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Applications Consolidation through Context Information and Heuristic optimization

    Publication Year: 2018, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1700 KB) | HTML iconHTML

    Resource consolidation has been proposed as an effective mechanism to save energy in data centers. Several algorithms have been developed for this purpose, which use the minimal number of servers and network switches, and power off unused equipment. Consolidation algorithms usually take into account static service constraints (Central Processing Unit - CPU, Random Access Memory – RAM, disk, bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Primary User Emulation Attack in Sensor Networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (883 KB) | HTML iconHTML

    In this paper, the spectrum sensing problem is solved using the localization defense model with proposed weighted least square algorithm. In this scheme, sensor nodes or secondary users cooperate together to detect and localize the attacker by comparing its location with the position of the primary user. Afterwards, the nonlinear output equations of localisation is linearised using the Taylor seri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced K-means Clustering Algorithm with Non-Orthogonal Multiple Access (NOMA) for MMC Networks

    Publication Year: 2018, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    In this paper, we address the need for motivating applications, such as sensor nodes, to operate under the Massive Machine to Machine Communication (MMC) mode in the future 5G cellular wireless network, while under constraints such as energy-efficiency, etc. It has been shown that the Random Access CHannel (RACH) in LTE-A cannot handle the possible simultaneous access of network resources by the b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Allocation and Outage Analysis for Cognitive Radio with Jamming Signal under Primary Secrecy Outage Constraint

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    In this paper, an optimal power allocation between information and jamming signals at a secondary user (SU) in cognitive radio is investigated. The power allocation is achieved to minimize SU’s outage probability while keeping a secrecy requirement at a primary user (PU). By sending jamming signals, SU contributes to improving PU’s secrecy outage, which in turn enables SU to find a vacant room of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Interference Mitigation in Heterogeneous Cellular Networks using Soft Frequency Reuse and Load Balancing

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    One of the promising solutions to meet the demands for ubiquitous coverage and high capacity in heterogeneous cellular networks (HCNets) is the co-deployment of small base stations (sBSs) inside the coverage region of a macro base station BS. Due to its high transmit power, most of the users get associated with BS. This results in imbalanced load distribution across the HCNets. To balance the load... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rescue Mission Enhancement through Ambulance-to- Vehicle Communications

    Publication Year: 2018, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Rescue missions are very crucial for live saving. The standard implementation of siren signal, such as siren light and sound, could be used to raise awareness of other non-emergency vehicles nearby during the rescue missions. However, there are several limitations of the siren signal. For example, it requires a line of sight to spot any approaching ambulances. However, the eyesight in driving envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Active Probing Extension for the ONOS SDN Controller

    Publication Year: 2018, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Network monitoring is a complex task and is always a trade-off between granularity of information and the performance impact of the monitoring itself on the network. SDN controllers, such as the ONOS SDN controller make this challenge easier as they can supply centralized information over the whole network. In our previous work, we analyzed the builtin detection mechanism of ONOS and revealed a la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.