Linear analysis of a terahertz staggered double-grating arrays waveguide Cerenkov traveling wave amplifier

Based on a sheet electron beam propagating through the tunnel of a staggered double-grating arrays waveguide (SDGAW) slow-wave structure (SWS), a three dimensional linear theory for describing beam-wave interaction is presented, in which the higher order terms inside the groove were retained.

With the optimized parameters, a 1THz SDGAW Cerenkov traveling wave amplifier (CTWA) may obtain a moderate net gain larger than 10dB/cm in 0.92THz to 1.145THz considering the serious Ohmic losses in THz frequency range.

Analysis of effect of mobility and transmission power on AODV and DSR in mobile Adhoc network

Now a days there is a remarkable growth in telecommunication technology which makes users of mobile electronic devices accessible to a communication network. These electronic devices are nothing but the nodes of the Mobile Ad hoc Network (MANET). Each node can move from one place to other during communication and this mobility is having its effect on performance of the network. Mobility changes when speed of the node and pause time with which it moves changes. Change in mobility causes break of link with neighboring nodes as a result of which the performance of a network may be reduced.

A number of packets are dropped at different layers of the network. This paper describes the analysis of change in performance due to change in mobility and transmission power. The parameters describing the reason of variation in performance are (1) number of link breaks and (2) number of packet delivered. (3)End to end delay. The simulator we have used in our work for the calculation of performance matrices is GLOMOSIM. The performance comparison has also made between two types of on demand routing protocols AODV and DSR.

Can you trust your fridge?

The Internet of Things has been touted as many things. But what you haven’t heard is that it could be your worst enemy. Yet all of these incidents have actually occurred, according to news reports. And it’s likely that even more disturbing transgressions have been taking place unbeknownst to homeowners. For example, researchers have discovered that in some cases, they can hack the Internet of Things to intercept each document you print and divert it to a remote site, use your smart TV to bug your house, and even control the tramc light on the corner outside your home.

The vulnerabilities lie all around you. An HP Research study reported that the average Internet of Things gadget has an astounding 25 security flaws, and 70 percent have at least one such vulnerability. Many of these problems may yield to solutions like those adopted by the personal computer industry decades ago. There are also some that require new approaches that take into account the vast scale and narrow profit margin of the emerging world of Internet augmented products.

C22. Avionics Full-duplex switched Ethernet (AFDX): Modeling and simulation

This paper develops a comprehensive simulation model for Avionics Full-duplex switched Ethernet (AFDX) network based on OPNET platform. Accordingly, the performance of AFDX networks is analyzed. The effect of frame size, switching delay and changing frames transmission order on the AFDX network performance are investigated.

It is found that using faster switches and small frame size reduces the fixed part of the end to end delay. Also, it affects the variable part of end to end delay due to changing of delay in switches’ buffers and frames transmission order.

A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System

In current peer-to-peer (P2P) live streaming systems, nodes in a channel form a P2P overlay for video sharing. To watch a new channel, a node depends on the centralized server to join in the overlay of the channel. In today’s live streaming applications, the increase in the number of channels triggers users’ desire of watching multiple channels successively or simultaneously. However, the support of such watching modes in current applications is no better than joining in different channel overlays successively or simultaneously through the centralized server, which if widely used, poses a heavy burden on the server. In order to achieve higher efficiency and scalability, we propose a Social-network-Aided efficient liVe strEaming system (SAVE). SAVE regards users’ channel switching or multichannel watching as interactions between channels.

By collecting the information of channel interactions, nodes’ interests, and watching times, SAVE forms nodes in multiple channels with frequent interactions into an overlay, constructs bridges between overlays of channels with less frequent interactions, and enables nodes to identify friends sharing similar interests and watching times. Thus, a node can connect to a new channel while staying in its current overlay, using bridges or relying on its friends, reducing the need to contact the centralized server. We further propose the channel-closeness-based chunk-pushing strategy and capacity-based chunk provider selection strategy to enhance the system performance. Extensive experimental results from the PeerSim simulator and PlanetLab verify that SAVE outperforms other systems in system efficiency and server load reduction, as well as the effectiveness of the two proposed strategies.

Modeling distributed denial of service attack in advanced metering infrastructure

Imminent attacks on critical infrastructure can disrupt operations. It also interrupts information availability. One way through cyberspace is to harness the distributed computing power and flood on targeted systems with massive information as a consequence of denial in service. This paper discusses the distributed denial of service (DDoS) attack, a potential cyberthreat in AMI communication network.

A typical DDoS includes two stages: (1) agents recruitment stage and (2) actual attack stage. In this paper, various models of malware installation and flooding attack on AMI devices are introduced and potential impacts are studied. Some particular attack scenario is simulated using NS3. We also discussed the potential defense technologies.

Power and Rate Optimization for Visible Light Communication System With Lighting Constraints

Visible-light communication (VLC) will be deployed in various indoor environments, including those requiring different lighting colors, which imposes the needs for transmission optimization under certain lighting constraints. This work establishes a framework for the transmission power and rate optimization, for light emitting diode (LED)-based VLC systems under lighting constraints. We describe the system model of LED-based color-division VLC system, which incorporates the transmission power spectral density, the receiving optical filters, the human eye perception, and the lighting constraints. Then, we formulate the corresponding power and rate optimization problems, for both point-to-pointcommunication system and broadcast communication system.

More specifically, for a point-to-pointcommunication system, it maximizes the transmission rate subject to the transmission power constraint and the lighting constraint; and for a broadcast system, it minimizes the total transmission power subject to some quality of service (QoS) constraint across all receivers. Various convex optimization problems have been formulated and solved analytically or using standard convex optimization solutions. It is obsesrved that the optimal symbol modulation power allocation scheme significantly outperforms the equal power allocation scheme.

Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues

Smart grid has modernized the way electricity is generated, transported, distributed, and consumed by integrating advanced sensing, communications, and control in the day-to-day operation of the grid. Electricity is a core utility for the functioning of society and for the services provided by information andcommunication technologies (ICTs). Several concepts of the smart grid, such as dynamic pricing, distributed generation, and demand management, have significantly impacted the operation of ICT services, in particular, communication networks and data centers. Ongoing energy-efficiency and operational expenditures reduction efforts in communication networks and data centers have gained another dimension with those smart grid concepts. In this paper, we provide a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data centers, and the interaction between smart grid and information and communication infrastructures.

Although the studies on smart grid, energy-efficient communications, and green data centers have been separately surveyed in previous studies, to this end, research that falls in the intersection of those fields has not been properly classified and surveyed yet. We start our survey by providing background information on the smart grid and continue with surveying smart grid-driven approaches in energy-efficient communicationsystems, followed by energy, cost and emission minimizing approaches in data centers, and the corresponding cloud network infrastructure. We discuss the open issues in smart grid-driven approaches in ICTs and point some important research directions such as the distributed renewable energy generation capability-coupled communication infrastructures, optimum energy-efficient network design for the smart grid environment, the impact of green communication techniques on the reliability and latency requirements of smart grid data, workload consolidation with smart grid-awareness, and many more.

A Visible Light Communication Link Protection Mechanism for Smart Factory

In recent years, wireless networks and applications have achieved marvelous successes in government, enterprise, home, and personal communication systems. The desired features of wirelesscommunications draw lots of attention to the industrial communication and expected to bring benefits such as reduce deployment and maintenance after employed. However, the industrial communicationsystem required real-time communication, which means the control systems in the factory are required accurate control and rapid communication, such as the industrial motion control system. In this type of application, the communication system performance and efficiency will be evaluated to ensure it applicable to the industrial network.

However, there are a few original issues in the wirelesscommunication, such as fading, multipath propagation and interference problems, which will affect the reliability and performance of industrial communication system operation. Therefore, we proposed a connection protection mechanism that cooperates with wireless network and visible lightcommunication to achieve reliability and performance in industrial communication network. We will consider implementing this mechanism by using industrial wireless Ethernet in the near future.

Toward a learned project-specific fault taxonomy: application of software analytics

This position paper argues that fault classification provides vital information for software analytics, and that machine learning techniques such as clustering can be applied to learn a project- (or organization-) specific fault taxonomy.

Anecdotal evidence of this position is presented as well as possible areas of research for moving toward the posited goal.