2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl...

13
2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013) Compiegne, France 28-30 October 2013 4 IEEE IEEE Catalog Number: ISBN: CFP1398K-POD 978-1-4799-1468-5

Transcript of 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl...

Page 1: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

2013 Eighth International

Conference on Broadband and

Wireless Computing,Communication and Applications

(BWCCA 2013)

Compiegne, France

28-30 October 2013

4 IEEE IEEE Catalog Number:

ISBN:

CFP1398K-POD

978-1-4799-1468-5

Page 2: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

2013 Eighth International

Conference on Broadband,Wireless Computing,

Communication

and Applications

BWCCA 2013

Table of Contents

BWCCA 2013: Message from the Conference

Organizers xv'i

BWCCA 2013: Message from the Workshop

Co-chairs xix

BWCCA 2013: Organizing Committee xx

BWCCA 2013: Program Committee xxiii

BWCCA 2013: Reviewers xxvii

BWCCA 2013: Editors of Proceedings. xxviii

BWCCA 2013: Sponsors and Logos xxix

BWCCA 2013: Keynotes xxxi

CWECS 2013: Message from the Workshop

Organizers xxxii

CWECS 2013: Organizing Committee xxxiii

CWECS 2013: Reviewers xxxiv

MAPWC 2013: Message from the Workshop

Organizers xxxv

MAPWC 2013: Organizing Committee xxxvi

MAPWC 2013: Reviewers xxxvii

MNSA 2013: Message from the Workshop

Co-chairs xxxviii

MNSA 2013: Organizing Committee xxxix

MNSA 2013: Reviewers xl

V

Page 3: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

NGWMN 2013: Message from the Workshop

Co-chairs x,i

NGWMN 2013: Organizing Committee xlii

NGWMN 2013: Reviewers xliii

NTCAA 2013: Message from the Workshop

Co-chairs •

xliv

NTCAA 2013: Organizing Committee xlv

NTCAA 2013: Reviewers xlvi

RI3C 2013: Message from the Workshop

Organizers xlvii

RI3C 2013: Organizing Committee xlviii

RI3C 2013: Reviewers xlvix

SCMAS 2013: Message from the Workshop

Organizers I

SCMAS 2013: Organizing Committee li

SCMAS 2013: Reviewers lii

BWCCA 2013

Session 1: Wireless and Mobile Networks

Optimized Handover Mechanism between eNBs and the Dynamic Network

of HeNBs in 3GPP LTE 1

Mohamed Emam Mohamed Fathy

Investigating Latency in GNU Software Radio with USRP Embedded Series

SDR Platform 9

Nguyen B. Truong and Chansu Yu

Proposal of Data Triage Methods for Disaster Information Network System

Based on Delay Tolerant Networking 15

Noriki Uchida, Noritaka Kawamura, Kazuo Takahata, Yoshitaka Shibata,

and Norio Shiratori

On Protected Traffic Routing in Wireless Networks with Partial Multiple Link

Failures 22

Michal Pidro, Dritan Nace, and Yoann Fouquet

vi

Page 4: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Session 2: Wireless Sensor Networks I

AM-DisCNT: Angular Multi-hop Distance Based Circular Network

Transmission Protocol for WSNs 29

A. Rao, M. Akbar, N. Javaid, S.N. Mohammad, and S. Sarfraz

A Novel Approach for Faulty Sensor Detection and Data Correction

in Wireless Sensor Network 36

Alfonso Farruggia and Salvatore Vitabile

DREEM-ME: Distributed Regional Energy Efficient Multi-hop Routing Protocol

Based on Maximum Energy in WSNs 43

N. Amjad, N. Javaid, A. Haider, A.A. Awan, and M. Rahman

OLDA: An Efficient On-Line Data Aggregation Method for Wireless Sensor

Networks 49

Meisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy, and Mahdi Fazeli

A Framework for Solving the Configuration Problem in Wireless Sensor

Networks 54

A. Gogu, D. Nace, and Y. Challal

Session 3: Wireless Mesh Networks

Mesh Router Node Placement in Wireless Mesh Networks Considering

Different Initial Router Placement Methods 61

Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Admir Barolli, Fatos Xhafa,

and Leonard Barolli

Effects of Selection Operators for Mesh Router Placement in Wireless Mesh

Networks Considering Weibull Distribution of Mesh Clients 68

Admir Barolli, Tetsuya Oda, Leonard Barolli, Evjola Spaho, Fatos Xhafa,

and Makoto Takizawa

Performance Comparison for Different Communication Distances of Mesh

Routers in WMN-SA Simulation System 74

Shinji Sakamoto, Elis Kulla, Tetsuya Oda, Leonard Barolli, Makoto Ikeda,

and Fatos Xhafa

Mesh Net Viewer: A Visualization System for Wireless Mesh Networks 80

Yuki Kumata and Akio Koyama

Session 4: Wireless Sensor Networks II

REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum

Energy Routing Protocol for WSNs 88

A. Haider, N. Javaid, N. Amjad, A.A. Awan, A. Khan, and N. Khan

vii

Page 5: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR

Protocol for Underwater Wireless Sensor Networks 93

M.R. Jafri, S. Ahmed, N. Javaid, Z. Ahmad, and R.J. Qureshi

LPCH and UDLPCH: Location-Aware Routing Techniques in WSNs 100

Y. Khan, N. Javaid, M.J. Khan, Y. Ahmad, M.H. Zubair, and S.A. Shah

Braided Disjoint Branch Routing Protocol for WSNs 106

Azeddine Attir, Yacine Challal, Abdelkrim Hadjidj, and Abdelmadjld Bouabdallah

Target Identification by Radar Sensor Networks with Variable-Interval

Sampling and Linear Interpolation 114

Jen-Shiun Chen

Session 5: Wireless Communication Systems

BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network

Surrounding a Building 120

Shinya Matsuo, Weihua Sun, Naoki Shibata, Tomoya Kitani, and Minoru Ito

ACK with Interference Detection Technique for ZigBee Network under Wi-Fi

Interference 128

Zhipeng Wang, Tianyu Du, Yong Tang, Dimitrios Makrakis, and Hussein T. Mouftah

A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate

Communications 136

Yingni Zhang, Xiaofeng Tao, and Dejian Xu

Performance Analysis of a Positioning Algorithm Using Raw Measurements

Taken from a GPS Receiver 141

Alban Rakipi, Enik Shytermeja, Shkelzen Cakaj, Rozeta Miho, and Bexhet Kamo

Session 6: Wireless Sensor Networks III

Coverage Estimation in Floorplan Visual Sensor Networks 146

Ahmad Movahedian Attar, M. Hamed Izadi, Maedeh Movahedian,

and Shantia Yarahmadian

Hierarchical Key Negotiation Technique for Transitory Master Key Schemes

in Wireless Sensor Networks 151

Cesare Celozzi, Filippo Gandino, and Maurizio Rebaudengo

MODLEACH: A Variant of LEACH for WSNs 158

D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A.M. Memon, and T. Zaman

M-GEAR: Gateway-Based Energy-Aware Multi-hop Routing Protocol

for WSNs 164

Q. Nadeem, MB. Rasheed, N. Javaid, Z.A. Khan, Y. Maqsood, andA. Din

viii

Page 6: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Session 7: Mobile Computing

A Power Control Mechanism Based on Priority Grouping for Small Cell

Networks 170

Antonios Alexiou, Dimitrios Billios, and Christos Bouras

Rapid Ray Tracing Analysis of Scattered Field from an Aircraft Model in SuperWide Area 177

Junichi Honda and Takuya Otsuyama

Context Aware Identity Management Using Smart Phones 184

Vamsi Paruchuri and Sriram Chellappan

Evaluation of a Hybrid Method of User Location Anonymization 191

Kenta Miura and Fumiaki Sato

Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge

Scenarios Using BATMAN Routing Protocol 199

Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli, Fatos Xhafa,

and Bexhet Kamo

Session 8: Body Area Sensor Networks

Distance Aware Relaying Energy-Efficient: DARE to Monitor Patients

in Multi-hop Body Area Sensor Networks 206

A. Tauqir, N. Javaid, S. Akram, A. Rao, and S.N. Mohammad

THE-FAME: THreshold Based Energy-Efficient FAtigue MEasurement

for Wireless Body Area Sensor Networks Using Multiple Sinks 214

S. Akram, N. Javaid, A. Tauqir, A. Rao, and S.N. Mohammad

SIMPLE: Stable Increased-Throughput Multi-hop Protocol for Link Efficiency

in Wireless Body Area Networks 221

Q. Nadeem, N. Javaid, S.N. Mohammad, M.Y. Khan, S. Sarfraz, and M. Gull

Measuring Fatigue of Soldiers in Wireless Body Area Sensor Networks 227

N. Javaid, S. Faisal, Z.A. Khan, D. Nayab, and M. Zahid

Non-invasive Induction Link Model for Implantable Biomedical Microsystems:Pacemaker to Monitor Arrhythmic Patients in Body Area Networks 232

A. Tauqir, S. Akram, A.H. Khan, N. Javaid, and M. Akbar

Session 9: Cloud and Cluster Computing

Modeling and Performance Analysis of Scalable Web Servers Deployed

on the Cloud 238

A.M.D. Aljohani, D.R.W. Holton, and I. Awan

The Evaluations of Energy Management Methods in Supersaturated Cloud 243

Yuichiro Takabe and Minoru Uehara

ix

Page 7: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Secure Medical Architecture on the Cloud Using Wireless Sensor Networks

for Emergency Management 248

Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, and Yacine Challal

Energy-Efficient Dynamic Clusters of Servers 253

Diawaer Douliku, Ailixier Aikebaier, Tomoya Nokido, and Makoto Takizawa

Known-Key Attack-Resilient Cluster Key Management 261

Gowun Jeong, Hyun S. Yang, Sang-Soo Yeo, and Yong-Ho Seo

Session 10: P2P and Health Technologies

SPTrust: Reputation Aggregation Method Based on Similarity to Reputation

Scores of Power Nodes in Unstructured P2P Networks 265

Sonoko Takeda, Hiroki Ushikubo, and Hiroshi Shigeno

Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer

Structured Botnets 273

Deepali Arora, Teghan Godkin, Adam Verigin, and Stephen W. Neville

An loT-Based System for Supporting Children with Autism Spectrum Disorder 282

Ardiana Sula, Evjola Spaho, Keita Matsuo, Leonard Barolli, Rozeta Miho,

and Fatos Xhafa

A Health Management Support System Using Fuzzy Theory 290

Akio Koyama and Kanako Endo

Session 11: MANETs and VANETs

Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed 296

Masahiro Hiyama, Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli,

and Makoto Takizawa

Performance Evaluation of AODV Routing Protocol in VANETs ConsideringMulti-flows Traffic 302

Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Wad/' Kolici,

and Jiro Iwashige

Efficient Coupling of Routing and Location-based Service for VANETs 308

Marwane Ayaida, Hacene Fouchal, Yacine Ghamri-Doudane, and Lissan Afilal

Reliable Data Delivery in Vehicular Ad Hoc Networks 316

Mahantesh G. Kambalimath, S.K. Mahabaleshwar, and S.S. Manvi

Effect of Buildings in VANETs Communication: Performance of OLSR Protocol

for Video Streaming Application 323

Taiki Honda, Makoto Ikeda, Evjola Spaho, Masahiro Hiyama, and Leonard Barolli

X

Page 8: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Session 12: Network Algorithms and SystemsLocal Search and Genetic Algorithms for Satellite Scheduling Problems 328

Vladi Kolici, Xavier Herrero, FatosXhafa, and Leonard Barolli

Differentiating the Starting Time of Processes in Energy-Efficient Redundant

Execution Algorithm 336

Tomoya Enokido, Ailixier Aikebaier, and Makoto Takizawa

Real-Time Hand Pose Recognition Based on a Neural Network UsingMicrosoft Kinect 344

Salvatore Sorce, Vito Gentile, and Antonio Gentile

Network Anomaly Detection for M-Connected SCADA Networks 351

Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, and Do-Eun Cho

Data Transfer in Delay-Tolerant Networks 355

Ronan Bocquillon and Antoine Jouglet

CWECS 2013

Session 1: Network Security, Health Care, and Robot

Emotions

A Secure Wireless Communication System Integrating PRNG

and Diffie-Hellman PKDS by Using a Data Connection Core 360

Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo,

and William Cheng-Chung Chu

A Software Security Requirement Quality Improvement Procedure to Increase

E-Commerce Security 366

Sen-Tarng Lai, Fang-Yie Leu, and William Cheng-Chung Chu

An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions -

Application of Bounded-Variable and Meta-frontier Data Envelopment

Analysis 372

Ching-Yu Chen, Jwu Rong Lin, Tso-Kwei Peng, and Ya-Han Yu

An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's

Senior Care Market: A Case Study of Fitness Equipment Industry 378

Sueming Hsu, Yalan Chan, Kai-I Huang, and Fang-Yie Leu

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic 382

Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang,

and William Cheng-Chung Chu

xi

Page 9: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Session 2: Data Security and Network Handover

A Secure Low Complexity Approach for Compression and Transmission of 3-D

Medical Images 387

Raffaele Pizzolante, Bruno Carpentieri, and Arcangelo Castiglione

A Study on the Integration of ISO 27001 & 27011 and the New Personal

Information Protection Act in the Telecom Enterprises in Taiwan 393

l-Long Lin, Che-Min Lin, and Che-Jui Sun

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS 399

Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang,

and William Cheng-Chung Chu

Improve Two Remote User Authentication Scheme Using Smart Card 404

Chin-Ling Chen, Wei-Chen Tasi, and Fang-Yie Leu

MAPWC 2013

Session 1: Methods, Analysis, and Protocols for Wireless

Communication

Diffracted Fields in Buildings and Wedges: A Comparison Study 408

Jiro Iwashige, Leonard Barolli, Saki Kameyama, and Motohiko Iwaida

Path Loss Estimation for Analytically Expressed Inhomogeneous Random

Rough Surface 414

Kazunori Uchida, Masafumi Takematsu, and Junichi Honda

Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal

by Metallic Pillars 422

Hiroshi Maeda, Kiyotoshi Yasumoto, Kazuya Tomiura, Chen Huili,

and Daichi Ogata

Interferometric Coherence Optimization: A Comparative Study 427

Sofiane Tahraoui, Mounira Ouarzeddine, and Boularbah Souissi

Effect of Roadside APs in VANETs: A Comparison Study 432

Makoto Ikeda, Taiki Honda, Evjola Spaho, Masahiro Hiyama, and Leonard Barolli

MNSA2013

Session 1: Secure and Renewable Systems

A Quantitative Measure of the Security Risk Level of Enterprise Networks 437

Rashid Munir, Jules Pagna Disso, Irian Awan, and Muhammad Rafiq Mufti

A Plausible Solution to SCADA Security Honeypot Systems 443

Jules Pagna Disso, Kevin Jones, and Steven Bailey

xii

Page 10: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

CMMI Security Model for Cloud Manufacturing System's Network 449

Anna Kang, Jong Hyuk Park, Leonard Barolli, and Hwa Young Jeong

Metabolic Ring: Tape Based Renewable System 453

Minoru Uehara and Hideki Mori

Session 2: Multimedia Applications

A Survey of Home Energy Management Systems in Future Smart Grid

Communications 459

N. Javaid, I. Khan, M.N. Ullah, A. Mahmood, and M.U. Farooq

Very High Resolution Satellite Images Filtering 465

Assia Kourgliand YoucefOukil

Classification of Dayas Formations on Landsat TM Imagery Using

Morphological Profiles 471

Akila Kemmouche and Nassim Atmani

Image Medical Diagnostic Using Dynamic Programming 476

Minh Hoan Pham, Andrei Doncescu, and Sebastien Regis

Session 3: Parallel and Distributed Systems

Parallel Greedy Randomized Adaptive Search Procedure with Delayand Delay Variation for RP Selection in PIM-SM Multicast Routing 481

Youssef Baddi, Mohamed Dafi, and Ech-Cherif El Kettani

Default Logic for Diagnostic of Discrete Time System 488

Tan Le, Andrei Doncescu, and Pierre Siegel

Group Communication Protocols Based on Hybrid Types of Logical

and Physical Clocks 494

Diawaer Doulikun, Ailixier Aikebaier, Tomoya Nokido, and Makoto Takizawa

Design and Implementation of a Cache-less P2P Web Proxy 500

Masashi Nishimine and Kazunori Ueda

NGWMN 2013

Session 1: Wireless Sensor Networks and Geo-location

Systems

Dynamic Data Forwarding in Wireless Sensor Networks 506

S.M. Iddalagi and S.K. Mahabaleshwar

Energy-Efficient Routing Based on Geo-location for Heterogeneous Sensor

Networks 512

Usama Iqbal and Muhammad Mohsin Rahmatullah

xiii

Page 11: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

Managing a Coastal Sensors Network in a Nowcast-Forecast Information

System 518

Joao Gomes, Maria Rodrigues, Alberto Azevedo, Gongalo Jesus,

Joao Rogeiro, and Anabela Oliveira

The Accuracy Enhancement of GPS Track in Google Map 524

Jen-Yung Lin, Bo-Kai Yang, Juan Ann Do, and Hsing-Chung (Jack) Chen

Session 2: MANETs and Smart Grids

Analysis and Modeling of Network Connectivity in Routing Protocols

for MANETs and VANETs 528

S.N. Mohammad, M.J. Ashraf, S. Wasiq, S. Iqbal, and N. Javaid

Modeling Probability of Path Loss for DSDV, OLSR and DYMO above 802.11

and 802.11p 534

S.N. Mohammad, S. Wasiq, W. Arshad, N. Javaid, S. Khattak, and M.J. Ashraf

A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks 539

Hsing-Chung (Jack) Chen and Jen-Yung Lin

Residential Energy Consumption Controlling Techniques to Enable

Autonomous Demand Side Management in Future Smart Grid

Communications 545

M.N. Ullah, N. Javaid, I. Khan, A. Mahmood, and M.U. Farooq

NTCAA 2013

Session 1: Network Applications

Bring Your Own Calendar: A CalDAV-Based Virtual Calendar System 551

Yoshinari Nomura, Yuya Murata, Hideo Taniguchi, Masakazu Urata,

and Shinyo Muto

Development of Lecture Videos Delivery System using HTML5 Video Element 557

Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, and Kenzi Watanabe

The Design and Development of an On-Line 3DCG Builder for Multi-player 560

Ningping Sun and Kousei Hayata

Session 2: Network Security and Detection

Development of Network User Authentication System Using OpenFlow 566

Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani,

and Kenzi Watanabe

Performance Evaluation of Information Theoretic Secure Multi-channel

Transmission on Multihop Wireless Network 570

Wataru Tsuda, Yoshiaki Hori, and Kouichi Sakurai

xiv

Page 12: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

A Token-based Illicit Copy Detection Method Using Complexity for a Program

Exercise

Mai Iwamoto, Shunsuke Oshima, and Takuo Nakashima

,575

RI3C 2013

Session 1: Image Processing and Support Systems

Foreground Extraction Algorithm Using Depth Information for Image

Segmentation 581

Sang-Wook Lee, Hyun S. Yang, and Yong-Ho Seo

Study on Method of New Digital Watermark Generation Using QR-Code 585

Dae-Jea Cho

An Integrated System of Robot, SmartBox and RFID as an Approachfor Internet of Things 589

Evjola Spaho, Ardiana Sula, Keita Matsuo, Leonard Barolli, Fatos Xhafa,

and Jiro Iwashige

Consistency Checking Rules of Variability in Software Product Lines 595

Jeong Ah Kim and Sehoon Kim

Session 2: Robotics Applications

Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM 598

Jong Bin Ryu, Hyun S. Yang, and Yong-Ho Seo

Design of Cursive Handwriting Characters with Nonlinear Typeface Reshaping

Transformation 602

Hirotsugu Matsukida and Hiroyuki Fujioka

Design of Scenario-Based Architecture for Supporting Interoperability

among Heterogeneous Home Network Middlewares 608

Jae-Hyuk Cho

SCMAS 2013

Session 1: Architecture and Advanced Applicationsof Symbiotic ComputingSurveillance Architecture of Evolutional Agent System on Repository-Based

Agent Framework 614

Takahiro Uchiya and Tetsuo Kinoshita

A Method to Configure Autonomous Sensor Nodes 618

Hideki Hara

XV

Page 13: 2013 Eighth International Conference on Broadband …Session7: Mobile Computing APowerControl MechanismBasedonPriority GroupingforSmall Cell Networks 170 AntoniosAlexiou, Dimitrios

A Design of State Acquisition Function Using Range Image Sensor for 3D

Symbiotic Space 622

Takuya Kawamura, Torn Abe, and Takuo Suganuma

Autonomous Control Method Using Al Planning for Energy-Efficient Network

Systems 628

Kouta Awahara, Satoru Izumi, Torn Abe, and Takuo Suganuma

Author Index 634

xvi