2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl...
Transcript of 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl...
2013 Eighth International
Conference on Broadband and
Wireless Computing,Communication and Applications
(BWCCA 2013)
Compiegne, France
28-30 October 2013
4 IEEE IEEE Catalog Number:
ISBN:
CFP1398K-POD
978-1-4799-1468-5
2013 Eighth International
Conference on Broadband,Wireless Computing,
Communication
and Applications
BWCCA 2013
Table of Contents
BWCCA 2013: Message from the Conference
Organizers xv'i
BWCCA 2013: Message from the Workshop
Co-chairs xix
BWCCA 2013: Organizing Committee xx
BWCCA 2013: Program Committee xxiii
BWCCA 2013: Reviewers xxvii
BWCCA 2013: Editors of Proceedings. xxviii
BWCCA 2013: Sponsors and Logos xxix
BWCCA 2013: Keynotes xxxi
CWECS 2013: Message from the Workshop
Organizers xxxii
CWECS 2013: Organizing Committee xxxiii
CWECS 2013: Reviewers xxxiv
MAPWC 2013: Message from the Workshop
Organizers xxxv
MAPWC 2013: Organizing Committee xxxvi
MAPWC 2013: Reviewers xxxvii
MNSA 2013: Message from the Workshop
Co-chairs xxxviii
MNSA 2013: Organizing Committee xxxix
MNSA 2013: Reviewers xl
V
NGWMN 2013: Message from the Workshop
Co-chairs x,i
NGWMN 2013: Organizing Committee xlii
NGWMN 2013: Reviewers xliii
NTCAA 2013: Message from the Workshop
Co-chairs •
xliv
NTCAA 2013: Organizing Committee xlv
NTCAA 2013: Reviewers xlvi
RI3C 2013: Message from the Workshop
Organizers xlvii
RI3C 2013: Organizing Committee xlviii
RI3C 2013: Reviewers xlvix
SCMAS 2013: Message from the Workshop
Organizers I
SCMAS 2013: Organizing Committee li
SCMAS 2013: Reviewers lii
BWCCA 2013
Session 1: Wireless and Mobile Networks
Optimized Handover Mechanism between eNBs and the Dynamic Network
of HeNBs in 3GPP LTE 1
Mohamed Emam Mohamed Fathy
Investigating Latency in GNU Software Radio with USRP Embedded Series
SDR Platform 9
Nguyen B. Truong and Chansu Yu
Proposal of Data Triage Methods for Disaster Information Network System
Based on Delay Tolerant Networking 15
Noriki Uchida, Noritaka Kawamura, Kazuo Takahata, Yoshitaka Shibata,
and Norio Shiratori
On Protected Traffic Routing in Wireless Networks with Partial Multiple Link
Failures 22
Michal Pidro, Dritan Nace, and Yoann Fouquet
vi
Session 2: Wireless Sensor Networks I
AM-DisCNT: Angular Multi-hop Distance Based Circular Network
Transmission Protocol for WSNs 29
A. Rao, M. Akbar, N. Javaid, S.N. Mohammad, and S. Sarfraz
A Novel Approach for Faulty Sensor Detection and Data Correction
in Wireless Sensor Network 36
Alfonso Farruggia and Salvatore Vitabile
DREEM-ME: Distributed Regional Energy Efficient Multi-hop Routing Protocol
Based on Maximum Energy in WSNs 43
N. Amjad, N. Javaid, A. Haider, A.A. Awan, and M. Rahman
OLDA: An Efficient On-Line Data Aggregation Method for Wireless Sensor
Networks 49
Meisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy, and Mahdi Fazeli
A Framework for Solving the Configuration Problem in Wireless Sensor
Networks 54
A. Gogu, D. Nace, and Y. Challal
Session 3: Wireless Mesh Networks
Mesh Router Node Placement in Wireless Mesh Networks Considering
Different Initial Router Placement Methods 61
Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Admir Barolli, Fatos Xhafa,
and Leonard Barolli
Effects of Selection Operators for Mesh Router Placement in Wireless Mesh
Networks Considering Weibull Distribution of Mesh Clients 68
Admir Barolli, Tetsuya Oda, Leonard Barolli, Evjola Spaho, Fatos Xhafa,
and Makoto Takizawa
Performance Comparison for Different Communication Distances of Mesh
Routers in WMN-SA Simulation System 74
Shinji Sakamoto, Elis Kulla, Tetsuya Oda, Leonard Barolli, Makoto Ikeda,
and Fatos Xhafa
Mesh Net Viewer: A Visualization System for Wireless Mesh Networks 80
Yuki Kumata and Akio Koyama
Session 4: Wireless Sensor Networks II
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum
Energy Routing Protocol for WSNs 88
A. Haider, N. Javaid, N. Amjad, A.A. Awan, A. Khan, and N. Khan
vii
AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR
Protocol for Underwater Wireless Sensor Networks 93
M.R. Jafri, S. Ahmed, N. Javaid, Z. Ahmad, and R.J. Qureshi
LPCH and UDLPCH: Location-Aware Routing Techniques in WSNs 100
Y. Khan, N. Javaid, M.J. Khan, Y. Ahmad, M.H. Zubair, and S.A. Shah
Braided Disjoint Branch Routing Protocol for WSNs 106
Azeddine Attir, Yacine Challal, Abdelkrim Hadjidj, and Abdelmadjld Bouabdallah
Target Identification by Radar Sensor Networks with Variable-Interval
Sampling and Linear Interpolation 114
Jen-Shiun Chen
Session 5: Wireless Communication Systems
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network
Surrounding a Building 120
Shinya Matsuo, Weihua Sun, Naoki Shibata, Tomoya Kitani, and Minoru Ito
ACK with Interference Detection Technique for ZigBee Network under Wi-Fi
Interference 128
Zhipeng Wang, Tianyu Du, Yong Tang, Dimitrios Makrakis, and Hussein T. Mouftah
A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate
Communications 136
Yingni Zhang, Xiaofeng Tao, and Dejian Xu
Performance Analysis of a Positioning Algorithm Using Raw Measurements
Taken from a GPS Receiver 141
Alban Rakipi, Enik Shytermeja, Shkelzen Cakaj, Rozeta Miho, and Bexhet Kamo
Session 6: Wireless Sensor Networks III
Coverage Estimation in Floorplan Visual Sensor Networks 146
Ahmad Movahedian Attar, M. Hamed Izadi, Maedeh Movahedian,
and Shantia Yarahmadian
Hierarchical Key Negotiation Technique for Transitory Master Key Schemes
in Wireless Sensor Networks 151
Cesare Celozzi, Filippo Gandino, and Maurizio Rebaudengo
MODLEACH: A Variant of LEACH for WSNs 158
D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A.M. Memon, and T. Zaman
M-GEAR: Gateway-Based Energy-Aware Multi-hop Routing Protocol
for WSNs 164
Q. Nadeem, MB. Rasheed, N. Javaid, Z.A. Khan, Y. Maqsood, andA. Din
viii
Session 7: Mobile Computing
A Power Control Mechanism Based on Priority Grouping for Small Cell
Networks 170
Antonios Alexiou, Dimitrios Billios, and Christos Bouras
Rapid Ray Tracing Analysis of Scattered Field from an Aircraft Model in SuperWide Area 177
Junichi Honda and Takuya Otsuyama
Context Aware Identity Management Using Smart Phones 184
Vamsi Paruchuri and Sriram Chellappan
Evaluation of a Hybrid Method of User Location Anonymization 191
Kenta Miura and Fumiaki Sato
Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge
Scenarios Using BATMAN Routing Protocol 199
Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli, Fatos Xhafa,
and Bexhet Kamo
Session 8: Body Area Sensor Networks
Distance Aware Relaying Energy-Efficient: DARE to Monitor Patients
in Multi-hop Body Area Sensor Networks 206
A. Tauqir, N. Javaid, S. Akram, A. Rao, and S.N. Mohammad
THE-FAME: THreshold Based Energy-Efficient FAtigue MEasurement
for Wireless Body Area Sensor Networks Using Multiple Sinks 214
S. Akram, N. Javaid, A. Tauqir, A. Rao, and S.N. Mohammad
SIMPLE: Stable Increased-Throughput Multi-hop Protocol for Link Efficiency
in Wireless Body Area Networks 221
Q. Nadeem, N. Javaid, S.N. Mohammad, M.Y. Khan, S. Sarfraz, and M. Gull
Measuring Fatigue of Soldiers in Wireless Body Area Sensor Networks 227
N. Javaid, S. Faisal, Z.A. Khan, D. Nayab, and M. Zahid
Non-invasive Induction Link Model for Implantable Biomedical Microsystems:Pacemaker to Monitor Arrhythmic Patients in Body Area Networks 232
A. Tauqir, S. Akram, A.H. Khan, N. Javaid, and M. Akbar
Session 9: Cloud and Cluster Computing
Modeling and Performance Analysis of Scalable Web Servers Deployed
on the Cloud 238
A.M.D. Aljohani, D.R.W. Holton, and I. Awan
The Evaluations of Energy Management Methods in Supersaturated Cloud 243
Yuichiro Takabe and Minoru Uehara
ix
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks
for Emergency Management 248
Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, and Yacine Challal
Energy-Efficient Dynamic Clusters of Servers 253
Diawaer Douliku, Ailixier Aikebaier, Tomoya Nokido, and Makoto Takizawa
Known-Key Attack-Resilient Cluster Key Management 261
Gowun Jeong, Hyun S. Yang, Sang-Soo Yeo, and Yong-Ho Seo
Session 10: P2P and Health Technologies
SPTrust: Reputation Aggregation Method Based on Similarity to Reputation
Scores of Power Nodes in Unstructured P2P Networks 265
Sonoko Takeda, Hiroki Ushikubo, and Hiroshi Shigeno
Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer
Structured Botnets 273
Deepali Arora, Teghan Godkin, Adam Verigin, and Stephen W. Neville
An loT-Based System for Supporting Children with Autism Spectrum Disorder 282
Ardiana Sula, Evjola Spaho, Keita Matsuo, Leonard Barolli, Rozeta Miho,
and Fatos Xhafa
A Health Management Support System Using Fuzzy Theory 290
Akio Koyama and Kanako Endo
Session 11: MANETs and VANETs
Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed 296
Masahiro Hiyama, Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli,
and Makoto Takizawa
Performance Evaluation of AODV Routing Protocol in VANETs ConsideringMulti-flows Traffic 302
Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Wad/' Kolici,
and Jiro Iwashige
Efficient Coupling of Routing and Location-based Service for VANETs 308
Marwane Ayaida, Hacene Fouchal, Yacine Ghamri-Doudane, and Lissan Afilal
Reliable Data Delivery in Vehicular Ad Hoc Networks 316
Mahantesh G. Kambalimath, S.K. Mahabaleshwar, and S.S. Manvi
Effect of Buildings in VANETs Communication: Performance of OLSR Protocol
for Video Streaming Application 323
Taiki Honda, Makoto Ikeda, Evjola Spaho, Masahiro Hiyama, and Leonard Barolli
X
Session 12: Network Algorithms and SystemsLocal Search and Genetic Algorithms for Satellite Scheduling Problems 328
Vladi Kolici, Xavier Herrero, FatosXhafa, and Leonard Barolli
Differentiating the Starting Time of Processes in Energy-Efficient Redundant
Execution Algorithm 336
Tomoya Enokido, Ailixier Aikebaier, and Makoto Takizawa
Real-Time Hand Pose Recognition Based on a Neural Network UsingMicrosoft Kinect 344
Salvatore Sorce, Vito Gentile, and Antonio Gentile
Network Anomaly Detection for M-Connected SCADA Networks 351
Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, and Do-Eun Cho
Data Transfer in Delay-Tolerant Networks 355
Ronan Bocquillon and Antoine Jouglet
CWECS 2013
Session 1: Network Security, Health Care, and Robot
Emotions
A Secure Wireless Communication System Integrating PRNG
and Diffie-Hellman PKDS by Using a Data Connection Core 360
Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo,
and William Cheng-Chung Chu
A Software Security Requirement Quality Improvement Procedure to Increase
E-Commerce Security 366
Sen-Tarng Lai, Fang-Yie Leu, and William Cheng-Chung Chu
An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions -
Application of Bounded-Variable and Meta-frontier Data Envelopment
Analysis 372
Ching-Yu Chen, Jwu Rong Lin, Tso-Kwei Peng, and Ya-Han Yu
An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's
Senior Care Market: A Case Study of Fitness Equipment Industry 378
Sueming Hsu, Yalan Chan, Kai-I Huang, and Fang-Yie Leu
The Simulation of a Robot with Emotions Implemented with Fuzzy Logic 382
Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang,
and William Cheng-Chung Chu
xi
Session 2: Data Security and Network Handover
A Secure Low Complexity Approach for Compression and Transmission of 3-D
Medical Images 387
Raffaele Pizzolante, Bruno Carpentieri, and Arcangelo Castiglione
A Study on the Integration of ISO 27001 & 27011 and the New Personal
Information Protection Act in the Telecom Enterprises in Taiwan 393
l-Long Lin, Che-Min Lin, and Che-Jui Sun
A Handover Scheme for LTE Wireless Networks under the Assistance of GPS 399
Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang,
and William Cheng-Chung Chu
Improve Two Remote User Authentication Scheme Using Smart Card 404
Chin-Ling Chen, Wei-Chen Tasi, and Fang-Yie Leu
MAPWC 2013
Session 1: Methods, Analysis, and Protocols for Wireless
Communication
Diffracted Fields in Buildings and Wedges: A Comparison Study 408
Jiro Iwashige, Leonard Barolli, Saki Kameyama, and Motohiko Iwaida
Path Loss Estimation for Analytically Expressed Inhomogeneous Random
Rough Surface 414
Kazunori Uchida, Masafumi Takematsu, and Junichi Honda
Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal
by Metallic Pillars 422
Hiroshi Maeda, Kiyotoshi Yasumoto, Kazuya Tomiura, Chen Huili,
and Daichi Ogata
Interferometric Coherence Optimization: A Comparative Study 427
Sofiane Tahraoui, Mounira Ouarzeddine, and Boularbah Souissi
Effect of Roadside APs in VANETs: A Comparison Study 432
Makoto Ikeda, Taiki Honda, Evjola Spaho, Masahiro Hiyama, and Leonard Barolli
MNSA2013
Session 1: Secure and Renewable Systems
A Quantitative Measure of the Security Risk Level of Enterprise Networks 437
Rashid Munir, Jules Pagna Disso, Irian Awan, and Muhammad Rafiq Mufti
A Plausible Solution to SCADA Security Honeypot Systems 443
Jules Pagna Disso, Kevin Jones, and Steven Bailey
xii
CMMI Security Model for Cloud Manufacturing System's Network 449
Anna Kang, Jong Hyuk Park, Leonard Barolli, and Hwa Young Jeong
Metabolic Ring: Tape Based Renewable System 453
Minoru Uehara and Hideki Mori
Session 2: Multimedia Applications
A Survey of Home Energy Management Systems in Future Smart Grid
Communications 459
N. Javaid, I. Khan, M.N. Ullah, A. Mahmood, and M.U. Farooq
Very High Resolution Satellite Images Filtering 465
Assia Kourgliand YoucefOukil
Classification of Dayas Formations on Landsat TM Imagery Using
Morphological Profiles 471
Akila Kemmouche and Nassim Atmani
Image Medical Diagnostic Using Dynamic Programming 476
Minh Hoan Pham, Andrei Doncescu, and Sebastien Regis
Session 3: Parallel and Distributed Systems
Parallel Greedy Randomized Adaptive Search Procedure with Delayand Delay Variation for RP Selection in PIM-SM Multicast Routing 481
Youssef Baddi, Mohamed Dafi, and Ech-Cherif El Kettani
Default Logic for Diagnostic of Discrete Time System 488
Tan Le, Andrei Doncescu, and Pierre Siegel
Group Communication Protocols Based on Hybrid Types of Logical
and Physical Clocks 494
Diawaer Doulikun, Ailixier Aikebaier, Tomoya Nokido, and Makoto Takizawa
Design and Implementation of a Cache-less P2P Web Proxy 500
Masashi Nishimine and Kazunori Ueda
NGWMN 2013
Session 1: Wireless Sensor Networks and Geo-location
Systems
Dynamic Data Forwarding in Wireless Sensor Networks 506
S.M. Iddalagi and S.K. Mahabaleshwar
Energy-Efficient Routing Based on Geo-location for Heterogeneous Sensor
Networks 512
Usama Iqbal and Muhammad Mohsin Rahmatullah
xiii
Managing a Coastal Sensors Network in a Nowcast-Forecast Information
System 518
Joao Gomes, Maria Rodrigues, Alberto Azevedo, Gongalo Jesus,
Joao Rogeiro, and Anabela Oliveira
The Accuracy Enhancement of GPS Track in Google Map 524
Jen-Yung Lin, Bo-Kai Yang, Juan Ann Do, and Hsing-Chung (Jack) Chen
Session 2: MANETs and Smart Grids
Analysis and Modeling of Network Connectivity in Routing Protocols
for MANETs and VANETs 528
S.N. Mohammad, M.J. Ashraf, S. Wasiq, S. Iqbal, and N. Javaid
Modeling Probability of Path Loss for DSDV, OLSR and DYMO above 802.11
and 802.11p 534
S.N. Mohammad, S. Wasiq, W. Arshad, N. Javaid, S. Khattak, and M.J. Ashraf
A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks 539
Hsing-Chung (Jack) Chen and Jen-Yung Lin
Residential Energy Consumption Controlling Techniques to Enable
Autonomous Demand Side Management in Future Smart Grid
Communications 545
M.N. Ullah, N. Javaid, I. Khan, A. Mahmood, and M.U. Farooq
NTCAA 2013
Session 1: Network Applications
Bring Your Own Calendar: A CalDAV-Based Virtual Calendar System 551
Yoshinari Nomura, Yuya Murata, Hideo Taniguchi, Masakazu Urata,
and Shinyo Muto
Development of Lecture Videos Delivery System using HTML5 Video Element 557
Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, and Kenzi Watanabe
The Design and Development of an On-Line 3DCG Builder for Multi-player 560
Ningping Sun and Kousei Hayata
Session 2: Network Security and Detection
Development of Network User Authentication System Using OpenFlow 566
Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani,
and Kenzi Watanabe
Performance Evaluation of Information Theoretic Secure Multi-channel
Transmission on Multihop Wireless Network 570
Wataru Tsuda, Yoshiaki Hori, and Kouichi Sakurai
xiv
A Token-based Illicit Copy Detection Method Using Complexity for a Program
Exercise
Mai Iwamoto, Shunsuke Oshima, and Takuo Nakashima
,575
RI3C 2013
Session 1: Image Processing and Support Systems
Foreground Extraction Algorithm Using Depth Information for Image
Segmentation 581
Sang-Wook Lee, Hyun S. Yang, and Yong-Ho Seo
Study on Method of New Digital Watermark Generation Using QR-Code 585
Dae-Jea Cho
An Integrated System of Robot, SmartBox and RFID as an Approachfor Internet of Things 589
Evjola Spaho, Ardiana Sula, Keita Matsuo, Leonard Barolli, Fatos Xhafa,
and Jiro Iwashige
Consistency Checking Rules of Variability in Software Product Lines 595
Jeong Ah Kim and Sehoon Kim
Session 2: Robotics Applications
Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM 598
Jong Bin Ryu, Hyun S. Yang, and Yong-Ho Seo
Design of Cursive Handwriting Characters with Nonlinear Typeface Reshaping
Transformation 602
Hirotsugu Matsukida and Hiroyuki Fujioka
Design of Scenario-Based Architecture for Supporting Interoperability
among Heterogeneous Home Network Middlewares 608
Jae-Hyuk Cho
SCMAS 2013
Session 1: Architecture and Advanced Applicationsof Symbiotic ComputingSurveillance Architecture of Evolutional Agent System on Repository-Based
Agent Framework 614
Takahiro Uchiya and Tetsuo Kinoshita
A Method to Configure Autonomous Sensor Nodes 618
Hideki Hara
XV
A Design of State Acquisition Function Using Range Image Sensor for 3D
Symbiotic Space 622
Takuya Kawamura, Torn Abe, and Takuo Suganuma
Autonomous Control Method Using Al Planning for Energy-Efficient Network
Systems 628
Kouta Awahara, Satoru Izumi, Torn Abe, and Takuo Suganuma
Author Index 634
xvi