48
Mar. 2017, Vol. 17, No. 1

Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Mar. 2017, Vol. 17, No. 1

Page 2: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Frontmatter

Editors 3

SIGAPP FY’17 Quarterly Report J. Hong 4

Selected Research Articles

Mobile Crowdsourcing of Occupant Feedback in Smart Buildings

S. Lazarova-Molnar, H. Logason, P. Andersen, and M. Kjærgaard

5

A Cross-Layer Flow Schedule with Dynamical Grouping for Mitigating Larger-Scale TCP Incast

H. Tseng, I. Peng, W. Chang, and P. Chen

15

Signature Verification Based on Inter-Stroke and Intra-Stroke Information

J. Shin, K. Maruyama, and C. Kim

26

Towards Clustering-Based Device-to-Device Communications for Supporting Applications

A. Hematian, W. Yu, C. Lu, D. Griffith, and N. Golmie

35

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 2

Page 3: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Applied Computing Review

Editor in Chief Sung Y. Shin

Associate Editors Hisham Haddad Jiman Hong John Kim Tei-Wei Kuo Maria Lencastre Editorial Board Members

Gail-Joon Ahn Davide Ancona João Araújo Maurice Ter Beek Giampaolo Bella Paolo Bellavista Albert Bifet Ig Ibert Bittencourt Sander Bohte Gloria Bordogna Barrett Bryant Jaelson Castro Tomas Cerny Alvin Chan Li-Pin Chang Seong-Je Cho Soon Ae Chun Marilia Curado Egidio Falotico Mario M. Freire João Gama Marisol García-Valls Marc-Oliver Gewaltig Raúl Giráldez Karl M. Goeschka Aniruddha Gokhale George Hamer Hyoil Han Ramzi A. Haraty M. Ani Hsieh Jun Huang

Yin-Fu Huang Angelo Di Iorio Seiji Isotani Hasan Jamil Jinman Jung Soon Ki Jung Christopher D. Kiekintveld Bongjae Kim Dongkyun Kim Sang-Wook Kim Stefan Kramer S.D Madhu Kumar Cecilia Laschi Cecilia Laschi Paola Lecca Byungjeong Lee Hong Va Leong Paul Levi Frédéric Loulergue Sergio Maffeis Cristian Mateos Hernán Melgratti Arianna Menciassi Mercedes G. Merayo Marjan Mernik Riichiro Mizoguchi Marco Di Natale Rui Oliveira Ganesh Kumar P. Apostolos N. Papadopoulos Gabriella Pasi

Anand Paul Manuela Pereira Diego Perez-Palacin Ronald Petrlic Peter Pietzuch Beatriz Pontes Fernando De la Prieta Rui P. Rocha Pedro P. Rodrigues Juan Manuel Corchado Rodriguez Florian Röhrbein Agostinho Rosa Davide Rossi Giovanni Russello Gwen Salaün Patrizia Scandurra Jean-Marc Seigneur Dongwan Shin Eunjee Song Junping Sun Sangsoo Sung Dan Tulpan Stefan Ulbrich Julita Vassileva Teresa Vazão Hugo Torres Vieira Tomas Vojnar Wei Wang Raymond Wong Davide Zambrano

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 3

Page 4: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

SIGAPP FY’17 Quarterly Report

January 2017 – March 2017 Jiman Hong

Mission

To further the interests of the computing professionals engaged in the development of new computing applications and to transfer the capabilities of computing technology to new problem domains.

Officers

Chair Jiman Hong Soongsil University, South Korea Vice Chair Tei-Wei Kuo National Taiwan University, Taiwan Secretary Maria Lencastre University of Pernambuco, Brazil Treasurer John Kim Utica College, USA Webmaster Hisham Haddad Kennesaw State University, USA Program Coordinator Irene Frawley ACM HQ, USA

Notice to Contributing Authors

By submitting your article for distribution in this Special Interest Group publication, you hereby grant to ACM the following non-exclusive, perpetual, worldwide rights:

• to publish in print on condition of acceptance by the editor • to digitize and post your article in the electronic version of this publication • to include the article in the ACM Digital Library and in any Digital Library related services • to allow users to make a personal copy of the article for noncommercial, educational or research purposes

However, as a contributing author, you retain copyright to your article and ACM will refer requests for republication directly to you.

Next Issue

The planned release for the next issue of ACR is June 2017.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 4

Page 5: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Mobile Crowdsourcing of Occupant Feedback in Smart Buildings

Sanja Lazarova-Molnar

Center for Energy Informatics University of Southern Denmark

Odense, Denmark [email protected]

Peter Grønbæk Andersen Center for Energy Informatics

University of Southern Denmark Odense, Denmark

[email protected]

Halldór Þór Logason Center for Energy Informatics

University of Southern Denmark Odense, Denmark

[email protected]

Mikkel Baun Kjærgaard

Center for Energy Informatics University of Southern Denmark

Odense, Denmark [email protected]

ABSTRACT Energy consumption of buildings represents roughly 40% of the overall energy consumption. Most of the national agendas include rigorous measures aimed at reducing the energy consumption and, thereby, the carbon footprint. Timely and accurate Fault Detection and Diagnosis (FDD) in Building Management Systems (BMS) have the potential to reduce energy consumption cost by approximately 15-30%. Most FDD methods are data-based, meaning that their performance is tightly linked to the quality and availability of relevant data about faults and related events. Based on our experience, such data is very sparse and inadequate, mostly because of the difficulty and lack of incentive to collect such data in a structured manner. In this article we introduce the idea of using crowdsourcing to support FDD-related data collection, and illustrate the concept through a mobile application that has been implemented for this purpose. Furthermore, we describe our experience from using the mobile application in a university building and propose a strategy of how to successfully deploy the application in new buildings.

CCS Concepts • Artificial intelligence ➝ Knowledge representation and reasoning ➝ Causal reasoning and diagnostics • World Wide Web ➝ Web applications ➝ Crowdsourcing • Power and energy ➝ Energy distribution ➝ Energy metering.

Keywords Crowdsourcing; energy performance; buildings; fault detection and diagnosis, data collection; occupants.

1. INTRODUCTION Intense weather, rising sea levels and fossil fuels running out at some point in the future have increased the importance of reduction of greenhouse gas emissions and lowering the dependence on fossil fuels. The European Union has set a goal to reduce its CO2 emissions by 40% in 2030, relative to what it was in 1990. Energy consumption of buildings is a significant share of the total energy consumption. In fact, between 30% and 40% of the total energy consumption stems from heating, ventilation, air conditioning (HVAC) and lighting for buildings. Retrofitting buildings with newer materials is the traditional way of lowering energy consumption of buildings, but in recent years an additional option has come forth. Using internet- and communications technologies (ICT) to make buildings ’smart’, has been shown to be a viable way of lowering energy consumption of buildings [1]. This is often achieved by utilizing automation of certain systems in the building, such as HVAC and lighting. However, these improvements also come at a price. New components installed within buildings increase complexity and bring new and, typically, increased vulnerability to faults and misconfigurations that often result in increased energy consumption and reduced occupants’ comfort.

Fault detection and diagnosis of smart buildings is a critical component to improving their energy performance [2]. Existing studies suggest that the estimated saving potential is 15-30% of the energy-related cost. This potential has been an excellent motivation to a significant amount of research in this area. The existing FDD methods can be classified into: model-based, data-based and hybrid methods that combine the former two. Model-driven FDD methods for buildings are based on sound physical models that accurately describe and quantify relations of control and output parameters of subsystems [3]. Data-driven diagnosis methods typically deploy machine learning algorithms and derive relationships and predictive models based on historical and ongoing data collection [4; 5]. Hybrid methods contain elements from both model-driven and data-driven methods [6; 7].

Copyright is held by the authors. This work is based on an earlier work: RACS'16 Proceedings of the 2016 ACM Research in Adaptive and Convergent Systems, Copyright 2016 ACM 978-1-4503-4455-5. http://dx.doi.org/10.1145/2987386.2987416

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 5

Page 6: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

This article introduces the use of crowdsourcing for FDD in buildings, and an implementation of the concept in form of a mobile application, termed RoomFixr. The mobile application enables occupants to provide feedback on their comfort levels and report faults that may occur in a building. The goal of collecting this data is to both improve communication with occupants, as well as support FDD processes, as illustrated in Figure 1. Occupants’ feedback can be utilized to increase general occupant comfort and energy consumption efficiency by supplementing the sensed and metered data. Our case study building, as detailed in Section 3, is a university campus building. This implies that the majority of our target demographics are students and most of them also own a smartphone. Furthermore, a mobile application enables occupants to report faults quickly and on the spot. Reporting a fault should require minimal effort, as occupants would otherwise

be unwilling to spend time and effort doing it.

The paper is structured as follows. In Section 2 we review the challenges associated with FDD data collection processes and provide basic knowledge of the concept of crowdsourcing. Further, in Section 3 we describe our approach of utilizing crowdsourcing for FDD data collection and detail the implemented mobile application. In Section 4 we discuss potential enhancements of our application that aim to improve its deployment and its usefulness. Further, in Section 5 we provide discussion of the approach, and finally, in Section 6 we conclude our paper.

2. DATA COLLECTION FOR FDD In the following we provide a brief overview of FDD in smart buildings, followed by a summary of existing challenges in the data collection processes for FDD purposes. Furthermore, we

discuss the state-of-the-art of crowdsourcing as a new and promising technology.

2.1 FDD in Smart Buildings As demonstrated by Lazarova-Molnar et al. [8], faults in buildings can be very costly in terms of energy consumption, depending on the type of fault. Some of the most energy consuming faults identified were related to HVAC and lighting. There are a number of different FDD approaches. They can be model-driven, that are based in physical models, where relations are strictly quantitatively described. They can also be data-driven, which typically utilize machine-learning algorithms. The two approaches can also be combined, yielding what is termed as hybrid FDD methods. Some issues and limitations of the current automated data-driven FDD in buildings are reported as follows. First of all, not enough historical data is available to make the data-driven machine learning approaches accurate, also in terms of fault prediction. A new dimension can be added to the collected sensor-data from the Building Management System (BMS), by also taking into account feedback from buildings’ occupants. The collection of occupant comfort feedback can be significantly supported by the new technologies such as smartphones, smart watches, and other mobile devices. A problem with this kind of data collection directly from users is that it is intrusive, as it requires some effort on the part of the user for sending the data. Minimizing this intrusiveness, or somehow making the advantages of submitting data to outweigh the annoyance of spending time and effort doing it, should help in this process. In the following we report more thoroughly on the challenges associated with the data collection for purposes of FDD in smart buildings. One example of an FDD-related scenario that illustrates the significance of obtaining occupants’ data is malfunctioning sensors, such as a malfunctioning temperature sensor that, for instance, reports a temperature that is lower than the actual temperature. This would result in the building’s HVAC-system to incorrectly heat the room and, as such, would probably lower the occupant comfort levels and the building’s energy efficiency. Here, the system cannot trust the data from its sensors, but by receiving occupants’ data it could determine that by heating the room, the occupant’s comfort levels have decreased, and, further extrapolate that the sensor might be faulty or misplaced.

2.2 Challenges in the Data Collection for FDD As previously explained, data collection for FDD represents a challenge, as the most relevant data (event logs) is also the most challenging to obtain. The main problem is that this kind of data cannot be collected in a non-intrusive fashion, and it is very rarely kept track of. Lazarova-Molnar et al. in [2] thoroughly describe this problem and identify the main challenges, as the following:

• Availability of detailed and structured logs for every historical event, and

• Logging of changes in hardware/ configuration/ calibration along with immediate meta-data updates, as especially important for diagnosing misconfigurations.

In this work the authors also identify the main FDD-relevant data streams, and the corresponding challenges, as detailed in Table 1. The main FDD-related data streams have been identified as follows:

Figure 1: The idea behind the crowdsourcing

application for data relevant to FDD

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 6

Page 7: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

1) Metered Data, 2) User Feedback, 3) Expert Knowledge, 4) Event Log, and 5) Implicit Data.

As detailed in this work, both occupant feedback and event logging can hugely impact the accuracy of the data-based FDD approaches, and both of them are obtained in an intrusive manner. To account for the lack of these streams of data, we decided to build an application that to a major extent targets both of these streams. Namely, building occupants and their percepts are utilized to collect data on both occupant comfort, as well as obvious faults in the building (ventilation, lighting, etc.). The goal is to utilize this data to obtain insights and derive meaningful rules about the faulty behavior of BMS, including its configuration, control or building instrumentation. Attempts at collecting user comfort feedback have already been made. One such attempt is ZonePAC by Balaji et al. [9]. ZonePAC is a system for controlling an HVAC system and crowdsource user comfort feedback via a web interface. Users could report their comfort levels depending on the temperature. The study showed that making users provide feedback about their HVAC comfort levels can motivate them to save energy, which in our case would be an added benefit. Another attempt at saving energy by using occupant comfort feedback to control an HVAC-system is by Purdon et al. by using smartphones [10]. This study showed that such an adaptive data-driven HVAC-system is able to save energy, compared to when it is model-driven. In the following we review the concept of crowdsourcing and its potential in obtaining relevant data.

2.3 Crowdsourcing for Data Collection Using the power of the crowd to get jobs done is termed crowdsourcing [11]. Usually, participants in crowdsourcing are rewarded in some way. An example is the cash-incentive of the Amazon Mechanical Turk crowdsourcing platform [12]. Much work has already been done on this subject in recent years, especially since mobile devices with sensors have become widely available. Hosseini et al. [13] have analyzed a significant amount of the research on crowdsourcing from recent years, and have come forth with taxonomy on the subject. According to this analysis,

crowdsourcing is comprised of four parts. First of all, there is the crowd, who are the ones performing the crowdsourced activity. Secondly, there is the crowdsourcer, who has made the crowdsourced activity available to the crowd. And finally the crowdsourcing task, that is the activity performed by the crowd, and the crowdsourcing platform wherein the task is actually distributed to the crowd, then performed and lastly sent back to the crowdsourcer. Using some of the reference model resulting from their analysis, some of the system requirements can be derived later on. The crowd often has some degree of diversity among the individuals within, on several different fronts. This can for example be the age, gender, location and background, and also the degree of expertise on the crowdsourced task. Something else to consider is the anonymity or unknown-ness of the participants. This is both in relation to the participants not knowing the crowdsourcer, and also to an individual in the crowd not knowing other participants. The crowd also suits the given task to a certain degree, for example when certain abilities are present, when individuals in the crowd have volunteered for the task, or when the crowd is motivated to perform the task [14]. A motivation of a crowd is found to be either intrinsic or extrinsic in its nature. Extrinsic motivations are motivations that come from the crowdsourcer, namely some kind of incentives, of which many different kinds exist. On the other hand, intrinsic motivations come from within each individual in the crowd. Examples of intrinsic motivations are mental satisfaction with the performed task, and also love of the community wherein the crowdsourced task is done. The intrinsic motivations were often found to be stronger than the extrinsic ones. Crowdsourcing has also been applied in a mobile context by distributing application to the crowd. The applications then enable users to tag information in the app or use the mobile phones sensors or camera to collect data about the environment around them. An example is to use mobile location data to gather data about the movement of the crowd at large city events [15; 16] or distribute an application to youngsters in a neighborhood to gather about their views and opinions about the surroundings [15]. Blunck et al. [16] discuss the challenges of gathering data while addressing biases including demographics and technical differences among mobile platforms and devices.

Table 1: Relevant data streams for FDD of buildings and related challenges [2]

Data Stream Metered Data User Feedback Expert Knowledge Event Log Implicit Data

Cha

lleng

es

- availability and collection of meta-data - tagging of data - calibrating of sensors and meters

- intrusive - inconsistent - subjective

- intrusive - could be subjective - difficult to formalize

- intrusive - difficult to determine how to describe events

- easily available - accessibility and privacy issues

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 7

Page 8: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

3. CROWDSOURCING MOBILE APP TO SUPPORT DATA COLLECTION FOR FDD Crowdsourcing has been successfully utilized for various data collection missions [17-19]. Therefore, additional crowdsourced input would be highly valuable to the data-based FDD approaches for smart buildings. In the following we detail the mobile application (termed RoomFixr) that we built to support these data collection processes. Automation of certain tasks, such as determining the location, can be used to reduce the effort required to report a problem. To facilitate indoor positioning a number of iBeacons have been installed in the case study building [20; 21]. These can be used for implementing an indoor positioning system, which can be serve as the component determining the location automatically for the occupant. Our case study building, Building 44, also known as OU44, at The University of Southern Denmark (SDU) is a newly built smart building. OU44 consists primarily of lecture rooms, offices and study zones. Furthermore, the building is equipped with a range of sensors, which are used to control parts of the building, such as curtains, windows, lights, heating and ventilation. Fault Detection and Diagnostics (FDD) can be used to detect faults in such buildings. FDD in buildings can be data-driven, meaning that data collected, for example from the sensors within the building, is used for performing the detection and diagnostics. One of the challenges for data-driven FDD in buildings can be the lack of historical data available [2], and this is especially the case for newly built buildings like OU44. The data from the OU44’s range of sensors is already being used for FDD, and as of now, there is no event logging in place. This represents a significant challenge for diagnosing, and has formed the motivation to design and develop the RoomFixr mobile application. Our application, RoomFixr, aims to provide a means for occupants to supply feedback on their comfort levels and report faults that may occur in the building. Here, handling submissions of false reports from occupants is also part of the concerns that need addressing. In the future, this occupant feedback can be used to increase general occupant comfort and energy consumption efficiency by supplementing sensor data. That is however out of the scope for this application. A mobile application that counts on user input has to exhibit a high level of usability. Minimal effort should be required to report faults, as otherwise occupants could be unwilling to spend time and effort doing it. Automation of certain tasks, such as determining location, is used to reduce the effort required. A number of iBeacons have also been installed into the building. These can be used for implementing an indoor positioning system, which can serve to determine the location automatically for the occupant. To test the user-friendliness of the application, a usability study has been performed, where the occupants themselves were given the opportunity to provide feedback. We provide the results of this study in Section 4.

3.1 Types of Complaint Reports The crowdsourcing application targets occupants and allows them to report the following concerns:

• Too hot and too cold, when the temperature in the room is higher or lower than expected, it could signal a fault in the temperature sensor or ventilation valve,

• No power, when there is no power in the room, it could signal a number of different faults, such as a software fault as power in rooms is run by a schedule,

• Bad air, when the quality of the air feels inadequate, it could signal a faulty CO2 sensor,

• Too dark or too bright, when there is insufficient/too much light in the room, it could be a signal that a lux sensor is faulty or a fault in the shades actuator,

• Open window, which could explain abnormal energy consumption if it is during a cold season,

• Noise, that can explain also some abnormal sensor data, and

• Other, which is a category for more complex unspecified faults.

Occupants can supplement their reports with text and images if they feel it is necessary. There is also an administrator side that controls the reporting. In the following we explain in more detail how these functions work.

3.2 Application Description The RoomFixr application has two operating modes, one mode for building occupants and another mode for administrators. Building occupants can report various issues related to BMS and administrators can attend to these issues and arrange for their resolution, as well as view various statistics about the reporting behavior and occurrence of faults. The usability of the application is of the utmost importance, and this is the reason for utilizing the indoor positioning system, i.e. to enable occupants to report problems with the minimal number of interactions with their mobile devices. To facilitate the usability of the crowdsourcing application, an indoor positioning is utilized. This serves to easily locate occupants and release them from the burden of specifying location, which can often be very complicated. OU44 (our case study building) is equipped with a series of iBeacons from Kontakt.io and serve as a basis for determining an occupant’s location within the building [20]. Each iBeacon is uniquely identified by its UUID in combination with its major and minor values. All iBeacons in OU44 have the same UUID but have different major and minor values. In order to link each discovered iBeacon when scanning, a JSON file containing every iBeacon in OU44 along with their major, minor and location data is parsed each time the app is started. In Figure 2 the main reporting screen is shown. Here we can see that basically in only two clicks a problem (fault) can be reported. However, the application also allows for attaching an image to verify or further detail the encountered fault. Besides the typical complaint/fault categories, there is also a custom category “Other” that allows for new and unforeseen types of problems to be reported. Once a report is completed, it is immediately available to all occupants to confirm or deny it, as shown in the last screenshot in Figure 2. The process of confirming or denying a report is illustrated in Figure 3, and it represents a mechanism to control the false reporting. A voting system based on majority-voting was implemented to determine whether a specific report is trustworthy or not. This enables the system and its admins to disregard reports that have a particularly low vote-balance. It can also support

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 8

Page 9: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

future incentive models for rewarding loyal occupants. Occupants have insight in all reported faults at any point in time. They are also supplied with a map that illustrates all locations that have associated reports, as shown in Figure 4.

In Figure 5, the administrator mode of the application is shown along with some of the statistics visualizations. The application provides statistics on the number of faults per floor per category, or per room per category, as well as various statistics for users on the type and number of reports that he/she has made. This can be

Figure 2: The process of reporting a fault

Figure 3: The process of confirming/denying a fault, as a way to control false reporting.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 9

Page 10: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

further used in combination with the sensed and metered data to develop data-based models for FDD. The proposed admin-client has been implemented with the ability to view data in the system and mark faults as fixed. It was made as a Java desktop client to ensure cross-platform capability. The data extraction functionality has also been implemented where the admin can view graphs of both all-time data and by periods of time such as weekly.

3.3 General Usability Aspects The initial approach to getting students that use OU44 on a daily basis to test the system proved ineffective due to the time limitation for the project. We still intend to carry out this study thoroughly, as part of our future work plan. From the small usability study we performed, we found that several areas of the application that can be improved. The view-report screen shown to the left in Figure 3 is one of those places. The grid of the text between the top section with icon, type and location, and the vote buttons, should perhaps be broken up into smaller areas with differing sizes of text. Also adding relevant icons instead of description labels would be a way of reducing clutter further, these could also be used in the list-items in the other screens. A small static version of the the indoors map used, could serve to show the location of the fault to the user in addition to the location specified in text. The main lists that contain reports should probably be re-organized as well, right now the first text in the reading direction (in Europe at least) is the room name. This should be changed to something like <category> in <room>, or perhaps just the category. Making use of the action bar more could also be considered in the reporting process, because it is currently barely used. Both manual room selection and adding attachments within the report screen, could be considered to be placed as items in the

action bar, instead of like it is done now with a list dialog and floating action button respectively. Rooms and also what to attach could be selected via dropdown lists that are shown when the menu items are clicked. What combination of the current UI and putting things in the action bars that works best, must be determined in a further usability study. Setting a range of alternatives up with the different combinations would do this, and then letting the users decide which they think works best. During the usability study, indications that too many things are displayed on the main screen was discovered. A way to solve this could be to use a navigation drawer on the main screen, its function is to hide some of the apparent clutter. Again, it should be tested in a new usability study by setting up two alternatives, one with the navigation drawer and one as it is currently. A solution, or a combination of solutions, is chosen based on the feedback from the users. Regarding the buttons on the screen, especially the report and send-report buttons on the main-screen and report-screen respectively, some spacing between the edge of the screen and the edge of the button is needed. This should be done to ensure that users understand it is a button, and not just some area on the screen. The cause of why some users seemed to be confused about where to press the screen in the beginning during the observational tests. Another thing to consider for these buttons, is the addition of some kind of shadow along the edges, to promote the button-look even further. These things should also be tested in a further usability study.

4. ANTICIPATED ENHANCEMENTS In the following, we discuss the anticipated future improvements and extensions of our crowdsourcing application. We focus on deployment of the application, discovered as a challenge based on our usability survey, and also on the potential for utilization of the collected data.

4.1 Strategy for Deployment The RoomFixr application relies on crowdsourcing for data collection purposes. During our usability testing, we were able to observe difficulties with deployment of the application, for which we already have a plan of how to overcome. As expected, SDU campus citizens would need an additional motivation to use our application [22]. To support this, we have the following strategies:

• Provide leaderboard that will rank the most committed and loyal applicants at the top,

• Allow for sharing of occupants’ statuses to social networks, • Provide financial incentive/rewards to the leading occupants, where awards can be either physical/monetary items, or electronic badges and certificates, shared throughout the community. These actions are necessary for successful deployment of the application. Furthermore, as this is a prototype application that only works on Android devices, we will need to develop solutions for the rest of the smartphone operating systems. One idea for calculating a score for leaderboard is the following:

Here F is a boolean value of either 0 or 1, that indicate whether or not the report has been attended to, and S is a boolean value of

Figure 4: Map overview of locations

with reported faults

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 10

Page 11: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

either 0 or 1 that indicates whether or not the report is marked as spam. votesr is the vote-balance of a report that can be both positive and negative, which is an indicator of the report truthfulness. The leaderboard score ScoreU is based upon summing the vote balances of reports made by the user. Modifiers are introduced, so that the system administrator has the ability to override the opinion of the crowd. For example, if the vote balance of a report is highly positive and the report is marked as spam, the score counted will always be negative by the same amount, no matter how high the vote balance becomes. On the other hand, if the vote balance is below 0, the score of the report becomes even more negative as the vote balance decreases. The same is the case when fault reports are marked as “fixed”, it just works the opposite way around. Other parameters such as how detailed a report has been made could also be considered in the

calculation score. Alternatively, users could be rewarded for making detailed reports. One way of estimating if a report is detailed or not is by looking at the attachments, e.g. image and description. However, users could abuse this by adding random images that do not contribute a report in any way and perhaps confuse the administrator that is tasked with fixing the fault. This also applies to descriptions, where users would just input random characters to the description. Both of these problems could potentially be fixed by implementing image and text recognition algorithms. For example, a text recognition algorithm would look for bogus combinations of characters that obviously do not describe a potential problem in a meaningful way.

4.2 Occupant Feedback vs. Sensor Data When the system is deployed, the gathered data from users reporting faults could be combined with data gathered from the

a)

b) c)

Figure 5: a) Administrator view b) Report statistics c) User statistics

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 11

Page 12: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

building’s sensors. A potential benefit from this would be further improvements to the building’s efficiency in terms of energy consumption. As an example we can take malfunctioning sensors, such as a temperature sensor that is malfunctioning by reporting a different and lower temperature than the actual temperature. This would result in the building’s HVAC system incorrectly heating the room and as such would probably lower occupants’ comfort levels and the building’s energy efficiency. Here the system cannot trust the data from its sensors, but by receiving user-data it could determine that by heating the room, the occupant’s comfort levels have decreased. And, further extrapolate that the sensor might be faulty. In terms of actually implementing such functionality, the human element could be variable. Meaning, that it could be completely run by admins or some form of machine learning could be used with some admin support. Why machine learning? It would enable the system to learn on its own and perhaps avoid future faults that are similar to past faults, e.g. a data-driven approach.

5. DISCUSSION Crowdsourcing can certainly benefit and enhance data collection processes in general. In this case it can be utilized as supplement of event logging for buildings FDD, as this process does not take place exhaustively. Therefore, there is usually no extensive log of data on problems with BMS that could be utilized for data-based FDD approaches. In our future work, our plan is to deploy this application, enhanced by an incentive model, and utilize it in combination with data analytics tools to discover significant insights between the crowdsourced data, and the data that is being collected through sensors and meters. This will be utilized to derive rules that can further be utilized for FDD and performance monitoring and testing. One interesting aspect of this application is the expectation of occupants to have faults removed. This would definitely impact the success of the application. It would be a natural expectation to have something repaired if it has been reported.

6. CONCLUSIONS We have presented an approach and a prototype mobile application to support the data collection processes for more accurate fault detection and diagnosis in buildings. The approach relies on building occupants, and it achieves the following goals:

• Obtaining user feedback, • Partial event logging, • Enabling occupants to communicate with BMS, • Making occupants feel taken care of, and • Increasing accuracy of FDD processes.

Finally, all of these goals can lead to decreased energy consumption due to the more accurate FDD, as well as increased occupants’ comfort, thereby touching upon these two dimensions of building’s performance.

7. ACKNOWLEDGEMENT This work is supported by the Innovation Fund Denmark for the project COORDICY.

8. REFERENCES [1] Jørgensen, B.N., Kjærgaard, M.B., Lazarova-Molnar, S.,

Shaker, H.R., and Veje, C.T., 2015. Challenge: Advancing

energy informatics to enable assessable improvements of energy performance in buildings. In Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems ACM, 77-82.

[2] Lazarova-Molnar, S. and Mohamed, N., 2016. Challenges in the Data Collection for Diagnostics of Smart Buildings. In Information Science and Applications (ICISA) 2016 Springer Singapore, 941-951.

[3] O'neill, Z., Pang, X., Shashanka, M., Haves, P., and Bailey, T., 2014. Model-based real-time whole building energy performance monitoring and diagnostics. Journal of Building Performance Simulation 7, 2, 83-99.

[4] Namburu, S.M., Azam, M.S., Luo, J., Choi, K., and Pattipati, K.R., 2007. Data-driven modeling, fault diagnosis and optimal sensor selection for HVAC chillers. Automation Science and Engineering, IEEE Transactions on 4, 3, 469-473.

[5] Fan, C., Xiao, F., and Yan, C., 2015. A framework for knowledge discovery in massive building automation data and its application in building diagnostics. Automation in Construction 50, 81-90.

[6] Du, Z., Jin, X., and Yang, Y., 2009. Fault diagnosis for temperature, flow rate and pressure sensors in VAV systems using wavelet neural network. Applied energy 86, 9, 1624-1631.

[7] Li, S. and Wen, J., 2014. A model-based fault detection and diagnostic methodology based on PCA method and wavelet transform. Energy and Buildings 68, 63-71.

[8] Lazarova-Molnar, S., Shaker, H.R., and Mohamed, N., 2016. Fault detection and diagnosis for smart buildings: State of the art, trends and challenges. In 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC) IEEE, Muscat, Oman, 1-7.

[9] Balaji, B., Teraoka, H., Gupta, R., and Agarwal, Y., 2013. Zonepac: Zonal power estimation and control via hvac metering and occupant feedback. In Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings ACM, 1-8.

[10] Purdon, S., Kusy, B., Jurdak, R., and Challen, G., 2013. Model-free HVAC control using occupant feedback. In Local Computer Networks Workshops (LCN Workshops), 2013 IEEE 38th Conference on IEEE, 84-92.

[11] Schenk, E. and Guittard, C., 2011. Towards a characterization of crowdsourcing practices. Journal of Innovation Economics & Management, 1, 93-107.

[12] Howe, J., 2006. The rise of crowdsourcing. Wired magazine 14, 6, 1-4.

[13] Hosseini, M., Shahri, A., Phalp, K., Taylor, J., and Ali, R., 2015. Crowdsourcing: A taxonomy and systematic mapping study. Computer Science Review 17, 43-69.

[14] Brabham, D.C., 2010. Moving the crowd at Threadless: Motivations for participation in a crowdsourcing application. Information, Communication & Society 13, 8, 1122-1145.

[15] Kjærgaard, M.B., 2013. Studying sensing-based systems: Scaling to human crowds in the real world. IEEE internet computing 17, 5, 80-84.

[16] Blunck, H., Bouvin, N.O., Franke, T., Grønbæk, K., Kjaergaard, M.B., Lukowicz, P., and Wüstenberg, M., 2013. On heterogeneity in mobile sensing applications aiming at representative data collection. In Proceedings of the 2013

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 12

Page 13: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

ACM conference on Pervasive and ubiquitous computing adjunct publication ACM, 1087-1098.

[17] Kim, A.E., Lieberman, A.J., and Dench, D., 2014. Crowdsourcing data collection of the retail tobacco environment: case study comparing data from crowdsourced workers to trained data collectors. Tobacco control, tobaccocontrol-2013-051298.

[18] Mcduff, D., El Kaliouby, R., and Picard, R., 2011. Crowdsourced data collection of facial responses. In Proceedings of the 13th international conference on multimodal interfaces ACM, 11-18.

[19] Freitas, J., Calado, A., Braga, D., Silva, P., and Dias, M., 2010. Crowdsourcing platform for large-scale speech data collection. Proc. FALA.

[20] Chen, Z., Zhu, Q., Jiang, H., and Soh, Y.C., 2015. Indoor localization using smartphone sensors and ibeacons. In Industrial Electronics and Applications (ICIEA), 2015 IEEE 10th Conference on IEEE, 1723-1728.

[21] Kjærgaard, M.B., 2011. Indoor location fingerprinting with heterogeneous clients. Pervasive and Mobile Computing 7, 1, 31-43.

[22] Borst, I., 2010. Understanding Crowdsourcing: Effects of motivation and rewards on participation and performance in voluntary online activities.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 13

Page 14: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

ABOUT THE AUTHORS:

Sanja Lazarova Molnar is an Associate Professor at the Center for Energy Informatics, under the Faculty of Engineering, at the University of Southern Denmark. Her current research interests include: modeling and simulation of stochastic systems, reliability modeling, decision support for decentralized energy systems, energy informatics and data-based approaches to fault detection and diagnosis. Sanja obtained her Ph.D. in Computer Science from the University “Otto-von-Guericke” in Magdeburg, Germany, where she was also a member of the Simulation Group at the Institute of Simulation and Graphics. Contact her at [email protected]. See also http://www.lazarova-molnar.net.

Halldór Þór Logason is a Master student in Software Engineering at the Maersk McKinney Moller Institute, University of Southern Denmark. He holds a Bachelor degree in Software Engineering from the University of Southern Denmark. His current interests are machine learning, statistics and app development. In his spare time he enjoys programming in dynamic languages. Contact him at [email protected].

Peter Grønbæk Andersen is an M.Sc. Student in Software Engineering at the University of Southern Denmark. He received a B.Sc. in Software Engineering from the same university in 2016. Machine learning and mobile development are among his prime interests within the field. He can be contacted at [email protected].

Mikkel Baun Kjærgaard is an Associate Professor at the SDU Center for Energy Informatics, University of Southern Denmark. His current research interests are within energy informatics and pervasive computing. He holds a Ph.D in Computer Science from Aarhus University.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 14

Page 15: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

A Cross-Layer Flow Schedule with Dynamical Grouping forMitigating Larger-Scale TCP Incast

Hsueh-Wen TsengNational Chung-Hsing

UniversityTaiwan

[email protected]

Wan-Chi ChangNational Chung-Hsing

UniversityTaiwan

[email protected]

I-Hsuan PengMinghsin University of Science

and TechnologyTaiwan

[email protected]

Pei-Shan ChenNational Chung-Hsing

UniversityTaiwan

[email protected]

ABSTRACTData center network (DCN), a type of network featuring low de-

lays and high bandwidths, exchanges information rapidly through

high-performance network switches. Currently, DCN provides var-

ious distributed services to satisfy user requirements. However, the

size of buffers in the switches of DCNs is limited, thus causing

throughput collapse when transmission control protocol (TCP) is

used for multiple-to-one transmissions. Dropped packets result in

additional retransmission costs and cause a substantial decrease in

the efficient use of network bandwidths. Such a decrease in net-

work performance is called a TCP incast problem. Previous studies

have typically focused on modifying the original TCP or increas-

ing additional switch hardware costs; rarely have studies focused

on the existing DCN environments. Therefore, this study proposes

using a cross-layer flow schedule with dynamical grouping (CLFS-

DG) scheme to reduce the effect of TCP incast in DCNs. In CLSF-

DG, data transmission schedules are organized by a receiver using

application-level information. Multiple data flows are then grouped

for simultaneously transmission to improve TCP throughput and

satisfy deadline requirements. CLFS-DG can be applied to inex-

pensive switches without extra hardware support, substantially re-

ducing hardware costs. The simulation result indicated that CLFS-

DG can effectively prevent TCP incast occurrence and ensure the

quality of service in both local networks and fat-tree topologies

typically applied in the DCN. A realistic multiple-to-one transmis-

sion in the one-hop local network scenario had been set up and

tested. The average error rate of the simulation results and actual

experimental results is small and about 4.6%. The results show that

CLFS-DG can actually be applied to real large networks.

CCS Concepts•Networks → Packet scheduling;

KeywordsTCP Incast; Data Center Network; QoS; SLA

Copyright is held by the authors. This work is based on an ear-

lier work: RACS’16 Proceedings of the 2016 ACM Research in Adap-tive and Convergent Systems, Copyright 2016 ACM 978-1-4503-4455-5.

http://dx.doi.org/10.1145/2987386.2987389

1. INTRODUCTIONData center networks (DCNs) are network infrastructure used for

cloud computing [2]; such infrastructure is connected to numer-

ous servers through switches, providing the servers with high band-

width and low delay characteristics as well as mass storage and dis-

tributed computing applications. Currently, numerous system op-

erators use DCNs to provide commercial services such as Google

File System [10], Hadoop File System [29], and Network File Sys-

tem [23]. These systems are used to partition distributed data com-

putation and then aggregate the distributed data to improve compu-

tation performance. In addition, service level agreement (SLA) has

been established to ensure quality of service (QoS) for users.

Installing a DCN is expensive. To reduce installation costs, system

operators have connected numerous low-level switches to servers

[18]. The buffer capacities of these switches are extremely limited

(e.g., the typical buffer capacity of a top-of-rack switch is only 128

KB). This causes a throughput collapse in DCNs during distributed

computing. As illustrated in Fig. 1, data (server request unit, SRU)

from multiple senders are transmitted to a single receiver. When

excessive packets are transferred to the same receiver, the packets

cannot be stored in the buffer of the switch because of the limited

buffer capacity of the switch. Thus, several packets are dropped

by the switch, causing continual retransmission by the senders and

eventually throughput collapse, in which the utilization of network

Receiver

Switch

Data tramsmission

TCP Incast

Sender1

Sender2

Sendern

Figure 1: TCP incast occurring.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 15

Page 16: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

bandwidths and the performance of DCNs are severely reduced and

such has become the bottleneck of data transmission. Because TCP

is typically used in the packet transmission mechanisms of DCNs

( [3] reported that 99% of the data flows in DCNs are regulated

using TCP), the aforementioned problem is called a TCP incast [5].

Typically, a fat-tree network [2] or a virtual layer 2 network [12]

design is adopted in DCN topologies, and they use asymmetrical

bandwidths (1 Gbps/10 Gbps) to provide a high-bandwidth net-

work environment to reduce network congestion. However, cloud

service providers provide numerous distributed computing services

to users. For example, in Google File System, files are typically

divided into chunks and stored in different servers [10]. When a

receiver transmits a read request to all the servers containing the

files, all the servers transmit the files to the receiver. Alternatively,

during the shuffling phase of a MapReduce calculation, every re-

ducer receives the calculation results of all the mappers. Such a

multiple-to-one communication causes a simultaneous data trans-

mission by excessive senders to a receiver; therefore, the number

of transmitted packets exceeds the buffer capacity of the switch.

Generally, drop tails or random early detection is applied in packet

scheduling algorithms in buffers [9], in which packets that exceed

the buffer capacity are dropped. The retransmission timeout (RTO)

is defined as in a typical operating system is 200 microseconds (ms)

for Linux or 400 ms for Solaris (Fig. 2(b)). However, in a DCN, the

round-trip time (RTT) for packet transmission is only hundreds of

microseconds. Hence, senders cannot immediately retransmit the

dropped packets, and have to undergo an RTO before retransmitting

the packets.

Fig. 2 (a) illustrates the ideal throughput. If packets are dropped,

the sender has to wait for an RTO before it can retransmit data in

Fig. 2 (b). This causes a decrease in the overall network throughput

per unit time. If the sender transmits a data to the receiver and does

not receive an acknowledgment (ACK) from the receiver, it con-

tinues retransmitting the packet, increasing the cost of bandwidths

in the entire network by 20% [38]. According to the statistics by

Amazon, Google, and Microsoft, each additional 100 ms of reac-

tion time to data request causes operation loss [27]. Therefore, it is

imperative to satisfy the restrictions of packet transmission delays

and improve network throughput.

Fig. 1 illustrates the transmission processes between the senders

and the receiver, in which the receiver receives data from all the

senders. Knowing the current network condition through the re-

Data Transmission

RT

O=

200

ms

TCP Incast

ReceiverSenderReceiverSender

RT

T=

100

μs

(a) (b)

Figure 2: Prolonged RTO reduces data throughput.

ceiver enables effective suppression of TCP incast. Most previous

studies on TCP incast have resorted to modifying the original trans-

mission protocol (transport layer, data link layer, or application

layer). These methods usually require adding switch hardware de-

signs and are aimed at only a single layer rather than cross-layer in-

formation integration. Moreover, they usually require extra cost on

switch hardware. TCP incast occurs in multiple-to-one transmis-

sions in local networks and in multipath transmissions such as fat-

tree topologies. Most previous studies have evaluated the scenarios

for local networks or multipath networks alone, rather than evalu-

ating both network types simultaneously. Therefore, the effective-

ness of the solutions to TCP incast has been limited. This study

proposes using cross-layer flow schedule with dynamical grouping

(CLFS-DG) to reduce the effect of TCP incast. The advantages of

CLFS-DG are as follows:

1. CLFS-DG can be used to combine the information of the ap-

plication, transport, and network layers, creating cross-layer

scheduling:

(a) Senders notify the receiver about the incoming infor-

mation of transmission.

(b) The receiver receives information from senders through

the application layer, evaluates the overall network con-

ditions according to the transmitted information in the

transport and network layers, calculates the most ideal

flow scheduling in the entire network, and notifies

senders.

(c) Senders transmit data to the receiver according to the

scheduling, reducing TCP incast.

2. The scheduling reduces cost on switches in DCNs: In previ-

ous papers, additional switch hardware cost is required and

such methods are not applicable to large DCN environments.

CLFS-DG does not require additional switch hardware cost

and is applicable to large DCN environments.

The rest of this paper is organized as follows. In Section 2, dis-

cusses the previous solutions about TCP incast, briefly describes

the challenges of DCNs. In section 3, our cross-layer flow Sched-

ule with dynamical grouping (CLFS-DG) is presented. The results

of numerical experiments are demonstrated in Section 4. In Section

5, we implement our CLFS-DG in a realistic test-bed to show the

performance. Finally, the conclusions are given in Section 6.

2. RELATED WORKTransmitting packets in a network by using TCP causes TCP in-

cast, a phenomenon first mentioned in [11]. This is because the

number of packets entering a switch exceeded the buffer capac-

ity of switches [24]. Numerous studies have examined TCP incast

and sought solutions. The approaches used in previous studies to

solve the TCP incast problem can be divided into the following

categories: modification of the design of switch hardware (2.1),

modification of the transmission mechanism in the transport layer

(2.2), congestion control in the data link layer (2.3), scheduling in

the application layer (2.4), and TCP incast in the multipath (2.5);

these solutions are explained as follows.

2.1 Modification of the Design of Switch Hard-ware

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 16

Page 17: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

In [33], the effect of switch buffer, SRU, and TCP congestion win-

dow size (CWND) on overall network throughput was explored,

reporting that small CWND and high buffer capacities enable op-

timal overall network throughput. However, expanding the switch

buffer size to improve packet storage capacities [24] requires addi-

tional hardware costs; this approach also prolongs the waiting time

for packets in buffers and is unable to fulfill deadline requirements.

In [28], information from senders and receivers were clustered

through hash functions, and the buffer was divided into two queues

of varying priorities. The cluster with the higher number of packets

was prioritized in transmission. Such a design requires additional

switch hardware costs, can only be applied to small-size networks,

and is inapplicable to enormous packet flows in DCNs. In [32],

the switch buffer size was reduced to improve the usage rate of

bandwidths. However, because a DCN is typically connected to

numerous switches, changing the existing DCN structures results

in excessive construction costs [45].

2.2 Modification of the Transmission Mecha-nism in the Transport Layer

Because modifying switch hardware designs results in excessive

costs, previous studies have typically resorted to modifying the ex-

isting packet transmission mechanism in the transport layer. The

following are the primary modification directions:

2.2.1 Reduce the Reaction Time of Webpage Query

Google achieved this method by increasing the initial window size

of TCP [8]. In [25], data transmission was enabled at the initial

handshaking stage of TCP.

2.2.2 Explicit Congestion Notification

Data center TCP (DCTCP) [3] acquired information on buffer us-

age by using the Explicit Congestion Notification (ECN) in switches.

DCTCP then adjusted TCP window to control the queue length

of switch buffer for packet transmission. Deadline-aware DCTCP

(D2TCP) [30] enhanced the mechanism of DCTCP and included

SLA considerations. After the ratio between the remaining data

transmission time and the deadline was calculated, D2TCP adjusted

the TCP window size accordingly to fulfill the deadline. The thresh-

old values and packet transmission strategies of DCTCP and D2TCP

were studied in [21], and a mathematic analysis model was estab-

lished.

2.2.3 Aim to Delay-Sensitive Flow

D3 was used to calculate the predicted transmission rate of delay-

sensitive flow (e.g., voice or video) in the perspective of senders and

the information was sent to switch. Switch then allocated adequate

transmission rates to each flow [35]. Preemptive distributed quick

(PDQ) provided preemptive priority scheduling to delay-sensitive

flow [13]. pFabric adjusted the transmission rates of flow according

to the priority mechanism scheduling of switches [4]. In [39], TCP

connections were established according to the sequences of senders

and receivers, and the slow startup intervals of next TCP connec-

tions were overlapped to reduce TCP incast. In these methods, the

existing protocols must be modified and high construction costs are

generated.

2.2.4 RTO Reduction

The authors reduced RTO for reducing TCP incast in [5] and [31].

However, reducing RTO causes continual retransmission by senders

without guaranteeing successful packet transmission to receivers,

thus wasting bandwidths and transmission energy. The method pro-

posed in [31] modified the core timers in operating systems and re-

quired high expenses on hardware and operating system upgrades,

and it was only applicable to transmission conditions involving few

senders.

2.2.5 Adjusting the Transmission and Reception Win-dow Size

In [40], they investigated the types of packets were dropped by

switches because of the TCP incast problem. Sender transmission

windows were then reduced using the priority mechanism to re-

duce the RTO occurrence. In [24], the authors attempted to reduce

TCP incast occurrence by reducing data transmission rates; the data

transmission rates were reduced by increasing the SRU size. How-

ever, receivers require larger memory to process larger SRUs. In-

cast congestion controls for TCP (ICTCP) periodically estimated

currently available bandwidths and packet RTTs through receivers

to calculate appropriate receiver windows to control transmission

rates [37]. However, in the realistic environment, RTTs and band-

widths are unpredictable, and ICTCP is inapplicable for simultane-

ous transmission by numerous senders.

2.2.6 Modification TCP Protocol

An improvement mechanism based on Fast TCPs [34] was pro-

posed in [46]. They considered packet delays and maintaining the

queue lengths in switches within buffer capacities in reducing TCP

incast. A previous study attempted to provide sharing mechanisms

by using switch bandwidth distribution to reduce TCP incast [41].

However, in these methods, the existing transmission mechanisms

must be modified and the construction costs generated would be

excessive, according to the existing DCN structures.

In [14], software-defined networking (SDN) was used for central-

ized control, dynamically adjusting, and regulating the initial win-

dow size and retransmission timers in TCPs to prevent incast occur-

rence. However, in this method, switches with SDN are required.

Thus, high costs and higher latency are generated. A previous study

attempted to reduce the influence of TCP incast by limiting the

maximum number of simultaneous transmission flows [15]. How-

ever, this study discussed only general flows and did not discuss the

QoS limitations of packets.

2.3 Congestion Control in the Data Link LayerThe quantized congestion notification (QCN) in IEEE 802.1 Qau

[7] enabled controlling congestion points (e.g., switches) and re-

action points (e.g., senders) through the flow control mechanism.

The switch usage was monitored at the congestion points. Mes-

sages were added into packets to notify senders of the current net-

work congestion status. Senders then adjusted the transmission rate

according to the information to reduce the network congestion.

However, the congestion notification was randomly added only into

packets from the congestion points, and not every sender received

the notifications. Therefore, the improvement of network conges-

tion was not comprehensive. An improvement upon the QCN, the

fair QCN, was proposed in [44] to fulfill fair transmission among

various flows. However, this mechanism required switches to mon-

itor the packet arrival rate in each flow, causing a considerable bur-

den in management to DCNs, which exhibited high traffic flows. A

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 17

Page 18: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

smaller maximum transmission unit (MTU) was proposed in [42]

to solve the problem of TCP incast. However, shrinking MTUs

only delayed the TCP incast occurrence without fully alleviating it.

2.4 Scheduling in the Application LayerIn [17], the authors used the information of the application layer

for transmission scheduling. However, practicing this method was

a difficult task. In [38], the researchers observed TCP incast in

actual operations and reported that the time interval between each

successfully received packet on the receivers was approximately

20 µs, verifying that adjusting the data transmission time intervals

effectively reduced TCP incast occurrence. However, the varying

size of data in networks was difficult to accurately calculate ideal

transmission time intervals. Moreover, this method was only used

for general data flow without considering the QoS of packets. Cus-

tomized application protocols and programmable routers were de-

signed in [16] to realize various transport-layer protocols such as

DCTCP, ICTCP, or D3. Facebook [22] reduced incast by limiting

the number of required packets in senders. However, higher DCN

construction costs were generated in these methods.

2.5 TCP Incast in the MultipathBecause multipath structures such as fat-tree have typically been

adopted in DCNs, previous studies [36] [26] have explored the TCP

incast problem in multipath TCP (MPTCP) environments. In [6],

the authors proposed Fountain code-based multipath TCP scheme

to mitigate the negative impact of the heterogeneity of different

paths. However, the coding technology generated a higher calcu-

lation burden in TCP. EW-MPTCP [19] was proposed for compre-

hensively using the effective bandwidths in every path by adjusting

the individual subflow weights in each MPTCP. Furthermore, EW-

MPTCP did not generate additional hardware costs. The solutions

proposed in previous studies typically required modifying the orig-

inal TCP or additional switch hardware expenses. Moreover, these

solutions were aimed at only in a single layer; a few were aimed at

cross-layer information.

Most of the solutions were proposed only for single-path local net-

work environments or only for multipath network environments,

rather than for both types of environments simultaneously. There-

fore, the effectiveness of the solutions in resolving TCP incast was

limited. This study proposes a CLFS-DG approach, in which re-

ceivers are used to allocate the transmission schedules of senders

dynamically to reduce the effect of TCP incast (i.e., network through-

put degradation). CLFS-DG is applicable to various multiple-to-

one packet transmission environments.

3. CROSS-LAYER FLOW SCHEDULE

WITH DYNAMICAL GROUPINGFig. 3 illustrates the processes of CLFS-DG. When i senders are

anticipated to simultaneously transmit data to the receiver, the re-

ceiver with CLFS-DG combines the information of the application,

transport, and network layers for cross-layer integrated scheduling.

The processes are described as follows:

• Step1: The senders communicate to the receiver the informa-

tion of the application layer of the anticipated data transmis-

sion, such as start transmission time and size of the transmit-

ted data. They acquire the information of the transport and

Application

Transport

Network

Sender 1 Sender 2 Sender i

......

Application

Transport

Network

Receiver

1(a). Collect transport

layer information

1(b). Collect network

layer information

2. Calculate the proper schedule.

3. Send the schedule

to senders

4. Forward packets

by the schedule. 1. Send sender’s info.

Figure 3: Processes of CLFS-DG.

network layers such as RTT, type of service and the size of a

packet.

• Step2: The receiver estimates the current network flow ac-

cording to the information of the transport and network lay-

ers and creates an overall network flow schedule.

• Step3: The receiver communicates to the senders the trans-

mission schedule.

• Step4: The senders transmit the data according to the trans-

mission schedule.

3.1 Collection of Transmission InformationAs depicted in Step 1 (Fig. 3), the senders communicate to the

receiver the anticipated deadline and size of the transmitted data.

The receiver then acquires the information from the transport layer

(e.g. TCP packets and ACKs) and network layer (e.g. RTT) for

scheduling. This requires corresponding with the original commu-

nication mode between the senders and the receiver to lower the

communication costs effectively. The network condition at the be-

ginning of the communication between the senders and the receiver

is assumed to be well, no congestion.

3.2 Schedule PlanningAs shown in Step 2 (Fig. 3), when the receiver acquires the dead-

line and anticipated size of the transmitted data from the senders,

it calculates the grouping of this transmission and the optimal time

for the senders to transmit the data. The dynamical grouping and

transmission scheduling algorithm of the CLFS-DG are detailed in

the following two sections: dynamic grouping algorithm in 3.2.1

and transmission scheduling algorithm in 3.2.2.

3.2.1 Dynamic Group Algorithm

Fig. 4 (a) illustrates the packet growth trend in the switch buffer.

The x-axis represents transmission time, and tfinidenotes the time

required for Senderi to transmit its data. The y-axis represents

the number of packets in the buffer. Line 1 and Line 2 are the

growth curves of the accumulated number of packets flowing into

the switch according to varying transmission rates. The slopes of

the curves are correlated with the packet input speed (Vin(t)).

Line 1, which exhibits a higher flow speed, comprises a greater

number of packets flowing into the switch and consequently a higher

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 18

Page 19: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

slope; it also reaches the switch buffer capacity (SizeB) more rapidly

compared with Line 2. Line 2, which exhibits a lower flow speed,

comprises a smaller number of packets flowing into the switch and

consequently a lower slope; it also reaches the switch buffer capac-

ity more slowly.

In Fig. 4 (a), tfin1 and tfin2 represent the completion time of

data transmission in Line 1, and Line 2, respectively. Furthermore,

tthre represents the threshold time which the accumulated number

of packets exceeds the buffer capacity according to the current flow

speed. Packets begin to be dropped as tthre is reached. As depicted

in Fig. 4 (a), tfin1 is higher than tthre, it indicates that the packet

dropping had begun before the transmission was completed. Con-

versely, tfin2 is lower than tthre, indicating that no packets had

been dropped even after the transmission was completed. The ob-

jective of CLFS-DG is to determine the optimal grouping transmis-

sion flow combination, enabling finishing flow transmission before

tthre is reached.

Fig. 4 (b) depicts the varying Vin(t) of packets into the switch

according to the number of packets Senderi transmits. The out-

put speed Vout(t) is determined according to the current network

bandwidth. The equations of Vin(t) and Vout(t) are expressed as

follows:

Vin(t) =

BWin(t), if

NumS∑

i=1

SizeSRUi ×BWu

> BWin(t),

NumS∑

i=1

SizeSRUi ×BWu, otherwise.

(1)

Vout(t) = BWout(t), (2)

where SizeSRUi represents the transmission data of the ith sender

each t second and a multiplying power for data units, BWu rep-

resents the current transmission speed of a data unit entering the

switch (bandwidth), BWin(t) represents the current maximal band-

width when packets enter the switch, BWout(t) represents the cur-

rent bandwidth when packets leave the switch, and NumS rep-

resents the number of senders transmitting data simultaneously.

When SizeSRUi ×BWu is greater than the current maximal band-

SizeB Vin(t)

Switch

Vout(t)

(b)

Line1

tfin1tthretfin2

(a)

TheNumberofPacketsinBuffer

Vin(t)

Line2

Figure 4: (a) Packet growth trend (b) Conceptual diagram.

width of the switch, the receiver can use only that maximal band-

width to transmit data.

When Vin(t) is greater than Vout(t), packets begin to accumulate

in the switch buffer. The number of accumulated packets and its

growing trend are correlated with Vin(t). When the number of

packets in the buffer exceeds SizeB , packets begin to be dropped.

tfiniis the time required by Senderi to transmit data in the switch,

and tthre is the time required for the number of packets in the

buffer to exceed SizeB . If tfiniis less than tthre, packets can

be transmitted before the number of packets in the buffer exceeds

the threshold, and no packets are dropped, thus preventing TCP in-

cast from occurring. The relationship among tfini, tthre, Vin(t),

Vout(t), SizeB , and NumS is expressed as follows:

tfini= max{tSRUi,∀i∈0≤i≤NumS

}, (3)

tSRUi =SizeSRUi×Datau

BWn

, (4)

tthrei =SizeB

Vin(t)− Vout(t), (5)

where Datau represents a data block unit, and tSRUi represents

the time required to transmit SizeSRUi . tSRUi is calculated as

the ratio of the amount of data transmitted to the current bandwidth

BWn. The optimal number of groups NumG and number of mem-

bers in each group NumM are calculated using the transmission

information in the application, transport, and network layers. The

relationship between NumG and NumM is expressed as follows:

NumG ×NumM ≥ NumS . (6)

Algorithm 1 depicts the optimal dynamical grouping method for

each transmission in the CLFS-DG. When multiple senders are

anticipated to simultaneously transmit data to a receiver, the re-

ceiver calculates the varying number of members in each group

(NumM ), the approximate tfini, and tthre according to NumS

and SizeSRUi . The receiver then determines the appropriate num-

ber of members (NumM ). In other words, to find the highest num-

ber of members is possible within tthre. The complexity of the

algorithm is O(NS).

Algorithm 1: Dynamic grouping algorithm

for i from 1 to NumS dotfini

= max{tSRUi,∀i∈0≤i≤NumS}

Set Vin(t) according to equation (1)

Set tthre according to equation (5)

if tthre > tfinithen

NumM = i

elsebreak

NumG = ⌈ NumS

NumM⌉

3.2.2 Transmission Scheduling Algorithm

When the receiver has determined NumM and NumG, it begins

determining the transmission sequence and time for Senderi ac-

cording to the size of its transmitted data (SizeSRUi ), its deadline

(Deadlinei), start time of its transmission (Starti), and current

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 19

Page 20: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

network bandwidth. This algorithm is shown as follows:

Algorithm 2: Transmission scheduling algorithm.

The receiver calculates PriorityiPriorityi = Deadlinei + StartiSort Priorityi in ascending order and sequential grouping

StartGi = StartGj−1 +max{tSRUi,∀i∈1≤i≤NumS} × C

In Algorithm 2, the receiver calculates the priority according to the

current total number of senders (NumS), deadline (Deadlinei),

and start time (Starti) of the data transmission by Senderi by

using the following equation:

Priorityi = Deadlinei + Starti. (7)

The receiver creates a sequence in ascending order according to the

Priorityi of each sender and groups the senders according to the

sequence. The data transmission start time (StartGj ) of the jth

group of senders is the data transmission start time (StartGj−1 ) of

the j−1th group of senders added by max{tSRUi,∀i∈0≤i≤NumS}×

C, where max{tSRUi,∀i∈0≤i≤NumS} is the maximal data trans-

mission time of the group, and C is a constant used to split each

overlapping transmission time to avoid overlapping the transmis-

sion time of different groups, which causes congestion in data trans-

mission.

Appropriately adjusting the interval between each two transmission

start time can effectively reduce TCP incast occurrence [10]. The

optimal overall network throughput (Topt) can be expressed as fol-

lows according to the definition in [7]:

Topt =∑NumS

i=1 SizeSRUi×Datau

RTT+OS+

(∑NumS

i=1SizeSRUi

×Datau×γ)

BWn

,(8)

where OS represents delay overhead of the network caused by dif-

ferent scheduling algorithms and γ represents the processing co-

efficient of the packet header; γ is correlated with the size of the

packet header and it is assumed to be 1 in this paper. When TCP

incast occurs, the overall throughput (TIncast) is changed as fol-

lows:

TIncast =∑NumS

i=1 SizeSRUi×Datau

RTT+α×RTO+OS+

(∑NumS

i=1SizeSRUi

×Datau×γ)

BWn

,

(9)

where α is a multiplying power to transmission timeouts. Because

of network congestion, packets must wait for RTO to be retransmit-

ted. In this study, TCLFS is calculated as follows:

TCLFS =

∑NumGj=1

∑NumMi=1 SizeSRUi,j

×Datau

RTT+K+OS+∑NumG

j=1

(∑NumM

i=1SizeSRUi,j

×Datau×γ)

BWn

.

(10)

The objective of the algorithm is to obtain a solution closest to the

optimal throughput (Topt), TCLFS ≤ Topt; K represents max{tSRUx , ∀i ∈ 1 ≤ x ≤ i}×C and must be less than α×RTO, pre-

venting TCP incast during sender transmission over time through

the adjustment of C.

3.2.3 Data transmission

As illustrated in Step 4 (Fig. 3), when the senders receive the

scheduling from the receiver, they begin transmitting data accord-

ing to the schedule. CLFS-DG can increase network throughput

and decrease the number of dropped packets. Moreover, pack-

ets with higher priority arrive at the destination first, fulfilling the

SLA.

4. SIMULATION RESULTSCLFS-DG is an omni-bearing schedule control mechanism for an

entire network environment. We use NS2 [1] to simulate two sce-

narios for assessing the efficiency of the CLFS-DG. The first sce-

nario is a multiple-to-one transmission under a hop, in which a

varying number of hosts transmit data simultaneously to a single

host, creating varying levels of TCP incast. The second scenario

involves simulating a DCN environment, and the most commonly

used fat-tree topology [2] is used for assessing the CLFS-DG effi-

ciency. The number of pods in the fat-tree, k, is simulated from 2

to 12. The number of pods represented the number of virtual lo-

cal area networks (VLANs). A higher number of pods indicated a

higher number of hosts. Previous studies have typically explored

the performance only in small-size DCN. This study showed the

performance of the CLFS-DG in the fat-tree structure with differ-

ent numbers of pods, verifying the applicability of the proposed

method to DCN environments of various sizes.

Because TCP incast occurs in switch buffer for multiple-to-one

transmissions, the packet transmission in all the switches was mon-

itored. The throughput from the senders to the receiver, total num-

ber of dropped packets, and transmission success rate within the

deadline according to varying QoSs are calculated for performance

assessment. The throughput of each simulated scenario in a mul-

timedia environment that fulfilled deadline restrictions was tested.

In [20], three traffic types with different QoSs are selected, and

Table 1 shows the specification of these traffic types.

Table 1: Transmission deadline requirements

Data Traffic types Deadline Data size Application

0 Voice 150 ms 250 bytes VoIP

1 Video 30 ms 2048 bytes Video on demand

2 Multimedia 250 ms 2048 bytes Video conference

Table 2: Experimental parameters

Local network Fat Tree

Network Bandwidth 1 Gbps 1 Gbps/10 GbpsRTT 100 µs 100 µsRTO 200 ms 200 msSwitch Buffer 250 packets 250 packets

To facilitate the process of investigating the different types of data

flow, the three types of data flows are evenly distributed. Sender0transmitted Data0, Sender1 transmitted Data1, Sender2 trans-

mitted Data2, and Senderi transmitted Dataj , where j = i mod

3.Previous studies typically aim to modify TCP to reduce TCP in-

cast occurrence. Therefore, CLFS-DG is compared with DCTCP

[3] and D2TCP, the most commonly used methods in previous stud-

ies. DCTCP acquires information on buffer usage through the ECN

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 20

Page 21: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

messages in switches and adjusts the CWND of the senders. D2TCP

improves upon DCTCP to fulfill the required QoS of packet trans-

mission. The marking threshold for both DCTCP and D2TCP is

set to 20 packets [3]. CLFS-DG acquires information on the over-

all network through the receiver and facilitated scheduling.

To ensure the accuracy of the simulation, the simulated parameters

are set according to [3] and [30] and as shown in Table 2. The

simulation is conducted in 1 Gbps/10 Gbps fat-tree. The SRU size

of data transmitted in the DCN is typically measured in KB [24].

Therefore, the data size of the packets with different QoSs (as Table

1) for each transmission is multiplied to 1024 bytes (B) to simulate

the real scenario more closely. The 10-seconds continual transmis-

sion performance of the senders is tested.

4.1 Performance in the Local Network Topol-ogy

Fig. 5 illustrates the simulated multiple-to-one transmission in a

local network, in which a total of i senders transmitted data simul-

taneously to a receiver. The input and output bandwidths (BWin(t)and BWout(t)) of switch are both set to 1 Gbps, and the RTT was

set to 100 µs. Each multiple-to-one transmission scenario with dif-

ferent numbers of senders (NumS) is tested, and the status in the

switch buffer is monitored. The throughput from the switch to the

receiver is then recorded. According to (10), C is measured asNumS

3.1.

In a typical DCN environment, the number of servers in a VLAN is

approximately 200 [43], [47]. Therefore, 20 senders are set in the

first network performance test, and 20 additional senders are added

in each subsequent retest, up to a maximal of 200 senders. Fig. 6

illustrates the line graphs of the throughput and number of dropped

packets with different NumS simultaneously transmitting data.

According to the methods in [3] and [30], the equation of through-

put is shown as follows:

Throughput =StopPacketCount−StartPacketCount

SimulationTime× 1460bytes× 8bits.

(11)

In the switch, two counters, StartPacketCount and StopPacketCount,

are implemented for recording the initial and final number of pack-

ets in the receiver during a transmission. The simulation time was

set to 10 second, and the TCP packet size is 1460B.

As illustrated in Fig. 6 (a), the DCTCP and D2TCP achieve higher

throughputs than that of the CLFS-DG. When the receiver in the

CLFS-DG is calculating the dynamic grouping, the receiver finds

the total number of the transmitted packet which may cause packet

Figure 5: Multiple-to-one transmission in a local network.

Figure 6: (a) Throughput (b) Number of dropped packets.

dropped by the switch, the receiver automatically adjusts the inter-

vals between each pair of data transmission groups to delay the

start transmission time and reduce the network congestion. Al-

though the throughput in the CLFS-DG is lower, no packet in the

CLFS-DG is dropped, regardless how big the value of NumS is

(Fig. 6 (b)). Conversely, the number of dropped packets by the

DCTCP and D2TCP substantially increases when NumS exceeds

140. When NumS is equal to 200, a total of 345 and 1117 packets

are dropped in the DCTCP and D2TCP, respectively. This shows

that even though the CLFS-DG exhibits lower throughput, it ef-

fectively reduces packet dropping when numerous senders trans-

mit data simultaneously, eliminating the retransmission cost for the

senders (i.e., additional network bandwidths). Fig. 7 depicts the

rate diagrams of successful transmission within the deadline ac-

cording to NumS . Fig. 7 (a) shows the data flow (Data0) with

the deadline of 150 ms, Fig. 7 (b) depicts the data flow (Data1)

with the deadline of 30 ms, and Fig. 7 (c) illustrates the data flow

(Data2) with the deadline of 250 ms. Data1 has the highest pri-

ority, and Data2 has the lowest priority. When NumS increases,

the CLFS-DG increases the proportion of the high-priority Data1

and reduces those of the low-priority Data0 and Data2 (Fig. 7).

Thus, the high-priority packets are prioritized in the transmission,

Figure 7: Proportion of deadline requirement satisfaction.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 21

Page 22: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

which subsequently satisfy the QoS at the highest possible level,

facilitating a higher SLA in the entire network.

4.2 Performance in the Fat-Tree Topology

Table 3: The number of nodes and senders referred to k

k 2 4 6 8 10 12

Host 2 16 54 128 250 432Senders 1 8 27 64 125 216

Fig. 8 shows a simulated fat-tree topology structure. In the simu-

lation, half the number of hosts (NumH ) simultaneously transmits

data to a receiver each time. This scenario is simulated in a so-

cial networking website, in which users requested to read photos

of a friend. The photo files are distributed and stored in numerous

servers, and the servers return the files to the users. The network

bandwidths are set according to the actual DCNs. The switch band-

width is set to 10 Gbps, and the switch-host bandwidth is set to 1

Gbps. The RTT is set to 100 µs according to the typical DCNs.

The multiple-to-one transmission is tested with various numbers of

pods (k), which are set to 2 ∼ 12. Table 3 shows the reference

for the number of pods (k), hosts, and data-transmitting senders,

indicating that when k = 12, the number of senders (NumS) is

216, close to the maximal number of senders of 200 in the simu-

lated local network. In addition, the status in every switch buffer is

monitored, and the switch-to-receiver throughput is recorded. Ac-

cording to (10), the value of C is measured as approximately 10.

Fig. 9 illustrates the throughput and number of dropped packets

according to varying numbers of senders. The throughput is calcu-

lated using (11), and the throughput from the nearest switch to the

receiver is recorded. As depicted in Fig. 9 (b), when the number of

pods is less than 12, the number of dropped packets in the D2TCP

switch is a few. However, when the number of pods is 12, the num-

ber of dropped packets in the D2TCP switch increases significantly.

This indicates that the D2TCP exhibits an ideal performance when

few senders are transmitting data simultaneously.

However, when NumS increases, the number of dropped packets

in the D2TCP switch increases significantly. This indicates that the

D2TCP exhibits an ideal performance when few senders are trans-

mitting data simultaneously. However, When the NumS is high,

the D2TCP is unable to control the packet transmission in the net-

Figure 8: Fat-tree topology.

Figure 9: (a) Throughput (b) Number of dropped packets.

Figure 10: Proportion of deadline requirement satisfaction.

work effectively, causing a considerable increase in the number of

dropped packets and subsequently the frequency of sender retrans-

mission. When NumS increases, the number of dropped packets

in the DCTCP is relatively low. However, the QoS of packets is not

considered in the DCTCP, the packet transmission could not satisfy

the SLA requirement. No packets are dropped in the CLFS-DG.

Fig. 10 depicts the proportion diagrams of successful transmission

within the deadline according to varying numbers of senders trans-

mitting data simultaneously. Fig. 10 (a) illustrates the data flow

(Data0) with the deadline of 150 ms, Fig. 10 (b) shows the data

flow (Data1) with the deadline of 30 ms, and Fig. 10 (c) depicts

the data flow (Data2) with the deadline of 250 ms. Data1 has

the highest priority, and Data2 has the lowest priority. As shown

in Fig. 10 (a), when the number of pods is 2, only one sender

transmits packets, and only Data0 is transmitted in the network.

Therefore, Data0 is transmitted at 100%.

When the number of pods increases, the number of senders also in-

creases, and different types of data begin to flow in the network.

When NumS increases, the CLFS-DG increases the proportion

of the high-priority Data1 and decreases those of the low-priority

Data0 and Data2 (Fig. 10). Thus, the high-priority packets are

prioritized in the packet transmission transmitted first, enabling the

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 22

Page 23: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

transmission to satisfy the QoS requirement to the highest possible

level, facilitating a higher SLA in the entire network.

5. EXPERIMENTAL RESULTS

Figure 11: The validation for the results.

We set up a multiple-to-one transmission in one-hop local networks

experiment scenario and experimental settings are as Table 4. Ex-

perimental results are compared with NS2 simulations. Accord-

ing to the experiment parameters in [30], we choose four kinds of

flows to produce varying levels of TCP Incast phenomenon. The

flow sizes are set as 150, 220, 350, and 500 MB, with respective

deadlines of 1000, 1500, 2500, and 4000 ms. To verify whether

proposed method is applicable to the general real network envi-

ronment, we test the CLFS-DG with different number of senders

in LAN by NS2 simulator and actual network experiment. Three

senders are set in the first network performance test, and 2 addi-

tional senders are added in each subsequent retest, up to a maximal

of 19 senders.

Table 4: Experimental settingsEquipment Software Spec./Version

Switch Brand CISCO LINKSYS SR2024Switch Buffer Size 256 KBServer OS Debian/Linux7.4 (64) bit

Server CPU AMD PhenomTM II ∗6 1065T ProcessorServer RAM 8 GBServer Bandwidth 1 GB

Fig. 11 depicts the number of received data in multiple-to-one

transmission in a local network according to the varying number

of senders transmitting data simultaneously. S-CLFS and E-CLFS

represent the simulated and experimental performance respectively.

When the number of simultaneous transmission senders is fewer,

the simulation results and actual experimental results are closer.

When the number of the simultaneous transmission senders in-

creases, the simulation results and actual experimental results be-

gin slightly different. The average error of S-CLFS and E-CLFS is

small and about 4.6%. The experimental results verify the correct-

ness of the simulation, and the proposed method is implemented

in a real environment. The results also show that CLFS-DG can

actually be applied to realistic large networks.

6. CONCLUSIONIn the CLFS-DG, the information from the application, transport,

and network layers are combined to create a cross-layer integra-

tion of senders and receivers. Receivers receive information from

senders in the application layer, and they calculate the optimal sched-

ules for the entire network according to the network conditions in

the transport and network layers. The senders then transmit data ac-

cording to the schedules, enabling the packet transmission to fulfill

deadlines and reducing the number of dropped packets. Compared

with DCTCP and D2TCP, the most commonly used methods in pre-

vious studies, which focused on only single layer scheduling, the

method proposed in this study is more cost-efficient and easier to

implement. Applying CLFS-DG to the large multiple-to-one trans-

mission environment of the DCN can effectively reduce the DCN

maintenance costs and TCP incast occurrence as well as improve

the packet throughput of the entire network.

7. ACKNOWLEDGMENTSThe authors would like to thank the Ministry of Science and Tech-

nology, Republic of China (Taiwan), for financially supporting this

research under Contract MOST 105-2221-E- 005-058.

8. REFERENCES[1] The network simulator - ns-2.

http://www.isi.edu/nsnam/ns/.

[2] M. Al-Fares, A. Loukissas, and A. Vahdat. A scalable,

commodity data center network architecture. ACM

SIGCOMM, pages 63–74, August 2008.

[3] M. Alizadeh, A. Greenberg, D. A. Maltz, J. Padhye, P. Patel,

B. Prabhakar, S. Sengupta, and M. Sridharan. Data center tcp

(dctcp). ACM SIGCOMM, pages 63–74, August 2010.

[4] M. Alizadeh, S. Yang, M. Sharif, S. Katti, N. McKeown,

B. Prabhakar, and S. Shenker. pfabric: Minimal near-optimal

datacenter transport. ACM SIGCOMM, pages 435–446,

August 2013.

[5] Y. Chen, R. Griffith, J. Liu, R. H. Katz, and A. D. Joseph.

Understanding tcp incast throughput collapse in datacenter

networks. ACM WREN, pages 73–82, August 2009.

[6] Y. Cui, L. Wang, X. Wang, H. Wang, and Y. Wang. Fmtcp: A

fountain code-based multipath transmission control protocol.

IEEE/ACM TON, 23(2):465–478, April 2015.

[7] P. Devkota and A. L. N. Reddy. Performance of quantized

congestion notification in tcp incast scenarios of data centers.

IEEE International Symposium on MASCOTS, pages

235–243, August 2010.

[8] N. Dukkipati, T. Refice, Y. Cheng, J. Chu, T. Herbert,

A. Agarwal, A. Jain, and N. Sutin. An argument for

increasing tcpâAZs initial congestion window. ACM

SIGCOMM, pages 26–33, July 2010.

[9] S. Floyd and V. Jacobson. Random early detection gateways

for congestion avoidance. IEEE/ACM TON, 1(4):397–413,

August 1993.

[10] S. Ghemawat, H. Gobio, and S.-T. Leungm. The google file

system. ACM SOSP, pages 29–43, October 2003.

[11] G. A. Gibson, D. F. Nagle, K. Amiri, J. Butler, F. W. Chang,

H. Gobioff, C. Hardin, E. Riedel, D. Rochberg, and

J. Zelenka. A cost-effective, high-bandwidth storage

architecture. International Conf. on ASPLOS, pages 92–103,

October 1998.

[12] A. Greenberg, J. R. Hamilton, N. Jain, S. Kandula, C. Kim,

P. Lahiri, D. A. Maltz, P. Patel, and S. Sengupta. Vl2: a

scalable and flexible data center network. ACM SIGCOMM,

pages 51–62, August 2009.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 23

Page 24: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

[13] C.-Y. Hong, M. Caesar, and P. B. Godfrey. Finishing flows

quickly with preemptive scheduling. ACM SIGCOMM, pages

127–138, October 2012.

[14] S. Jouet and D. P. Pezaros. Measurement-based tcp

parameter tuning in cloud data centers. IEEE ICNP, pages

1–3, October 2013.

[15] K. Kajita, S. Osada, Y. Fukushima, and T. Yokohira.

Improvement of a tcp incast avoidance method for data

center networks. IEEE ICTC, pages 459–464, October 2013.

[16] S. Kim, S. H. Park, Y. Song, W. Cho, and H.-J. Lee.

Application-aware optimization of networking protocols for

data centers. IEEE ICACT, pages 446–450, January 2013.

[17] E. Krevat, V. Vasudevan, A. Phanishayee, D. G. Andersen,

G. R. Ganger, G. A. Gibson, and S. Seshan. On

application-level approaches to avoiding tcp throughput

collapse in cluster-based storage systems. ACM PDSW,

pages 1–4, November 2007.

[18] D. Li, C. Guo, H. Wu, K. Tan, Y. Zhang, S. Lu, and J. Wu.

Scalable and cost-effective interconnection of data center

servers using dual server ports. IEEE/ACM TON,

19(1):102–114, February 2011.

[19] M. Li, A. Lukyanenko, S. Tarkoma, and A. Yla-Jaaski.

Mptcp incast in data center networks. IEEE China Commun.,

11(4):25–37, April 2014.

[20] S. I. Maniatis, E. G. Nikolouzou, and I. S. Venieris. Qos

issues in the converged 3g wireless and wired networks.

IEEE Commun. Mag., 40(8):44–53, August 2002.

[21] A. Mukhopadhyay and P. Ranjan. Nonlinear instabilities of

d2tcp-ii. International Conf. on TIME-E, pages 99–104, June

2013.

[22] R. Nishtala, H. Fugal, S. Grimm, M. Kwiatkowski, H. Lee,

H. C. Li, R. McElroy, M. Paleczny, D. Peek, P. Saab,

D. Stafford, T. Tung, and V. Venkataramani. Scaling

memcache at facebook. ACM NSDI, pages 385–398, April

2013.

[23] B. Nowicki. Nfs: Network file system protocol specification.

March 1989.

[24] A. Phanishayee, E. Krevat, V. Vasudevan, D. G. Andersen,

G. R. Ganger, G. A. Gibson, and S. Seshan. Measurement

and analysis of tcp throughput collapse in cluster-based

storage systems. ACM FAST, pages 1–14, February 2008.

[25] S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and

B. Raghavan. Tcp fast open. ACM CoNEXT, pages 1–12,

December 2011.

[26] C. Raiciu, S. Barre, C. Pluntke, A. Greenhalgh, D. Wischik,

and M. Handley. Improving datacenter performance and

robustness with multipath tcp. ACM SIGCOMM, pages

266–277, August 2011.

[27] E. Schurman and J. Brutlag. The user and business impact of

server delays, additional bytes, and http chunking in web

search. June 2009. http://velocityconf.com/

velocity2009/public/schedule/detail/8523.

[28] A. Shpiner, I. Keslassy, G. Bracha, E. Dagan, O. Iny, and

E. Soha. A switch-based approach to throughput collapse

and starvation in data centers. ACM CN, 56(14):3333–3346,

October 2012.

[29] K. Shvachko, H. Kuang, S. Radia, and R. Chansler. The

hadoop distributed file system. IEEE Symposium on MSST,

pages 1–10, May 2010.

[30] B. Vamanan, J. Hasan, and T. Vijaykumar. Deadline-aware

datacenter tcp (d2tcp). ACM SIGCOMM, pages 115–126,

August 2012.

[31] V. Vasudevan, A. Phanishayee, H. Shah, E. Krevat, D. G.

Andersen, G. R. Ganger, G. A. Gibson, and B. Mueller. Safe

and effective finegrained tcp retransmissions for datacenter

communication. ACM SIGCOMM, pages 303–314, August

2009.

[32] A. Vishwanath, V. Sivaraman, and M. Thottan. Perspectives

on router buffer sizing: Recent results and open problems.

ACM SIGCOMM, pages 34–39, April 2009.

[33] G. Wang, Y. Ren, K. Dou, and J. Li. The effect of the

congestion control window size on the tcp incast and its

implications. IEEE Symposium on ISCC, pages 625–628,

July 2013.

[34] D. X. Wei, C. Jin, S. H. Low, and S. Hegde. Fast tcp:

Motivation, architecture, algorithms, performance.

IEEE/ACM TON, 14(6):1246–1259, Decemeber 2006.

[35] C. Wilson, H. Ballani, T. Karagiannis, and A. Rowtron.

Better never than late- meeting deadlines in datacenter

networksthe lorentz transformation and absolute time. ACM

SIGCOMM, pages 50–61, August 2011.

[36] D. Wischik, C. Raiciu, A. Greenhalgh, and M. Handley.

Design, implementation and evaluation of congestion control

for multipath tcp. ACM NSDI, pages 99–112, March 2011.

[37] H. Wu, Z. Feng, C. Guo, and Y. Zhang. Ictcp: incast

congestion control for tcp in data-center networks.

IEEE/ACM TON, 21(2):345–358, April 2013.

[38] Y. Yang, H. Abe, K. ich Baba, and S. Shimojo. A scalable

approach to avoid incast problem from application layer.

IEEE Annual COMPSACW, pages 713–718, July 2013.

[39] J. Zhang, F. Ren, L. Tang, and C. Lin. Taming tcp incast

throughput collapse in data center networks. IEEE ICNP,

pages 1–10, October 2013.

[40] J. Zhang, F. Ren, L. Tang, and C. Lin. Modeling and solving

tcp incast problem in data center networks. IEEE TPDS,

26(2):478–491, Feburary 2015.

[41] J. Zhang, F. Ren, X. Yue, R. Shu, and C. Lin. Sharing

bandwidth by allocating switch buffer in data center

networks. IEEE JSAC, 32(1):39–51, January 2014.

[42] P. Zhang, H. Wang, and S. Cheng. Shrinking mtu to mitigate

tcp incast throughput collapse in data center networks.

International Conf. on CMC, pages 126–129, April 2011.

[43] W. Zhang, X. Zhou, L. Yang, Z. Zhang, B. Y. Zhao, and

H. Zheng. 3d beamforming for wireless data centers. ACM

HotNets-X, pages 1–6, November 2011.

[44] Y. Zhang and N. Ansari. On mitigating tcp incast in data

center networks. IEEE INFOCOM, pages 51–55, April 2011.

[45] Y. Zhang and N. Ansari. On architecture design, congestion

notification, tcp incast and power consumption in data

centers. IEEE Commun. Surveys & Tutorials, 15(1):39–64,

January 2013.

[46] F. Zheng, Y. Huang, and D. Sun. Designing a new tcp based

on fast tcp for datacenter. IEEE ICC, pages 3209–3214, June

2014.

[47] X. Zhou, Z. Zhang, Y. Zhu, Y. Li, S. Kumar, A. Vahdat, B. Y.

Zhao, and H. Zheng. Mirror mirror on the ceiling: Flexible

wireless links for data centers. ACM SIGCOMM, pages

443–454, August 2012.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 24

Page 25: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

ABOUT THE AUTHORS:

Hsueh-Wen Tseng received the Ph.D. degree in computer science and information engineering from National Taiwan University, Taiwan, in 2009. He is currently an Associate Professor of Computer Science and Engineering with National Chung Hsing University. His research interests include cloud computing and networking, networks on chip, design, analysis, and implementation of network protocols and wireless networks.

I-Hsuan Peng received the B.S. degree in electronic engineering from Chung Yuan Christian University, Taiwan, in 2001 and the M.S. degree in electrical engineering and Ph.D. degree in communication engineering from National Central University, Taiwan, in 2003 and 2008, respectively. Currently, she is an assistant professor of computer science and information engineering in Minghsin University of Science and Technology. Her research interests include wired and wireless networks, cloud computing, network resource management, and Quality of Service.

Wan-Chi Chang received the M.S. degrees in Computer Science and Engineering from National Chung Hsing University in 2014. She is currently pursuing the Ph.D. degree with the School of Computer Science and Engineering, National Chung Hsing University, Taichung City, Taiwan (R.O.C.). And she is also a Software Program Designer with Prophetstor, Taichung City, Taiwan, since 2015. Her current research interests include storage area network, cloud storage system, and distributed storage system.

Pei-Shan Chen received the B.B.A. degree in Information Management from National Taichung University of Science and Technology in 2015. Currently, she is studying at Institute of Computer Science and engineering, National Chung-Hsing University, Taichung City, Taiwan (R.O.C.). Her research interests include cloud computing, network function virtualization and recommendation-as-a-service.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 25

Page 26: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Signature Verification Based on Inter-Stroke and Intra-Stroke Information

Jungpil Shin School of Computer Science

and Engineering The University of Aizu

Fukushima, Japan, 965-8580

[email protected]

Ken Maruyama School of Computer Science

and Engineering The University of Aizu

Fukushima, Japan, 965-8580

[email protected]

Cheol Min Kim Department of Computer Education

Jeju National University 102, jejudaehak-ro, Jeju-si

Jeju-do, Korea, 63243

[email protected]

ABSTRACT

Signature verification is one of the most popular subjects in

pattern recognition. Many kinds of verification methods for on-

line handwritten signatures have basically used the individual

features of signatures. However, how to reflect inter-stroke

information extracted from handwritten multi-stroke signatures in

the verification has not been well considered. This paper suggests

a new verification method that uses inter-stroke information based

on shape contexts. The shape context describes how points are

distributed around a given point on the shape. We compare our

Shape Context method with a basic method. The basic method

performs signature verification using intra-stroke information

such as pen position, pen pressure, pen inclination, pen altitude

and elapsed time by DP matching. The Shape Context method

treats inter-stroke information such as point distribution. In

addition, we try to improve the accuracy of the method by

incorporating a weighted evaluation of the average pressure value

of each stroke. Comparing with the basic method, the Shape

Context method reduces false rejection rate from 4.14% to 1.54%,

and false acceptance rate from 4.06% to 2.01%. The experimental

results show the effectiveness of inter-stroke information on

signature verification.

CCS Concepts

• Security and privacy ➝ Biometrics; • Human-centered

computing➝User models

Keywords

Signature Verification, Biometrics, Online Handwriting, Dynamic

Programming.

1. INTRODUCTION As the information and communication technology has rapidly

developed in the past few years, there has been an increasing need

for enhancing the level of trust and applying security using

biometric elements, which are also known as authentication

techniques [13]. If one was able to disguise another person, many

problems would occur. Recently, the growth of the network

requests further development of identification technology.

Biometrics is one of the technologies that realize personal

identification. Many methods that realize biometrics exist, for

example, the use of fingerprints, lustre, the face and voiceprints.

Biometric systems are more excellent than old identification

methods that use IDs and Passwords because biometrics uses

living body information. In brief, biometrics is hard for other

people to forge and reduces the user’s burden. Therefore,

biometrics is predicted to be a prevalent method of personal

identification in the future.

Handwritten signature verification is a biometric technology. In

the case of credit card transactions, handwritten signatures have

been used for personal identification. Writing signatures is a

formal action and signature verification by a well-informed person

is one of the certain methods for personal identification.

Unfortunately, there is a limit to the accuracy of signature

verification by humans. Also, we must think about the cost of

verification when a well-informed person does the verification.

Such problems in signature verification could be solved by using

computers. The development of computing technology in recent

years makes it possible to get not only pen position but also pen

pressure, pen direction and pen altitude when users write their

own signatures. The individual features of each signer extracted

from the information make a meaningful role in verifying and

identifying the signer.

Handwritten signature verification methods are divided into two

groups, i.e. on-line methods and off-line methods. While off-line

methods use static information extracted from written signatures,

on-line methods utilize dynamic information obtained when users

write their signatures. Generally, on-line methods give better

results than off-line methods do because the former can use the

information such as pen pressure, pen inclination, pen direction,

pen altitude and elapsed time that reflects individual

characteristics of users but the latter cannot.

Sansone and Vento [20] proposed a serial three stage

verification system which eliminates three different types of

forgeries such as random forgeries, simple forgeries and

skilled forgeries in stages. In many cases, the distinction

between genuine signatures and skilled forgeries is

complicated because of the imitation skill and the large

variability introduced by some signers when writing their own

signatures. This paper focuses on the signatures composed of

multi-stroke characters such as kanji and Chinese characters.

We discriminate between genuine signatures and skilled

forgeries with inter-stroke and intra-stroke information

extracted from the signatures.

Various studies on on-line handwritten signature verification have

been done in the field of signature verification. R. Plamondom

Copyright is held by the authors. This work is based on an earlier work:

RACS'16 Proceedings of the 2016 ACM Research in Adaptive and Convergent Systems, Copyright 2016 ACM 978-1-4503-4455-5.

http://dx.doi.org/10.1145/2987386.2987440

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 26

Page 27: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

and F. Leclerc did research [2] [3] in Europe and the United States.

In Japanese, on-line intra-stroke information such as pen position,

pen pressure, pen inclination and elapsed time has been used for

handwritten signature verification.

Many researchers have applied DP-matching methods to time-

series data sets [4] [5] [6] [7]. S. Yamazaki used P type Fourier

descriptors to extract personal features and categorized the

features for verification [8]. Y. Nakamura and others researched

how to extract personal features from on-line signatures based on

handwriting analysis [10]. Some studies to evaluate the signature

were done. A method was proposed to evaluate how a signature is

difficult to imitate [16]. The fuzzy rules which treat characteristic

features of signatures were studied to make handwritten signatures

remarkable [17].

As applications of handwritten signature verification, there are

studies on the methods to detect intoxicated persons with their

handwritten signatures [18] and to use handwritten signatures as a

password alternative in on-line system [19]. Many methods have

been suggested until now, but none of the methods are able to do

precise verification. That is the reason why more research to

discover and utilize various individual features embedded in

handwritten signature is needed. This paper notes not only intra-

stroke information but also inter-stroke information extracted

from handwritten multi-stroke signatures. By using shape contexts

[11] as inter-stroke information, we were able to improve the

accuracy of the verification. The remainder of this paper is

organized as follows. Section 2 describes our verification method

in detail. The experimental results are presented in Section 3.

After evaluating and discussing the results in Section 4, we

conclude in Section 5.

2. THE SIGNATURE VERIFICATION

METHOD

2.1 Signature Verification System We collected the data on handwritten signatures with a pen tablet

(WACOM Intuos GD-0608-U). The pen tablet periodically

provides data such as pen position, pen pressure, pen direction,

pen altitude and elapsed time while a user write his/her signature

as shown in Figure 1. The signature verification is done by

calculating the distance between the input signature and the

reference signature registered beforehand through sample data

preprocessing.

Figure 1. The extracted data of signature

Figure 2 shows the examples of x-coordinate, y-coordinate, pen

pressure, pen direction, pen altitude and elapsed time of (a) an

authentic signature of one user, (b) another authentic signature of

the same user, and (c) a forged signature of another user.

Figure 3 shows overall flow of our signature verification system.

As preprocessing, 0-pressure points are removed and the shape

and position of signatures are normalized. And then the individual

features are extracted from signatures. After comparing the input

pattern with the reference pattern by using the inter-stroke and

intra-stroke information, the system decides whether the input

signature is authentic or not.

2.2 Basic Method The basic method that we apply to signature verification is based

on DP (Dynamic Programming) matching. DP matching is a

popular method for comparing the shapes of two signals and

calculating the distance (dissimilarity) between them when their

sequential information is fully or partially known. When the

signals are sequences of discrete points, DP matching basically

focuses on how to match the points having similar values

considering their sequential positions. It has been shown to be

applicable to speech recognition and employed in matching

problem studies dealing with online handwriting and images,

including feature matching in images, shape boundary matching,

face recognition, object matching in images, online signature

verification, online writer verification, and online character

recognition [15].

Our basic method uses various types of distances between the

reference signature and the input signature such as pen position

distance Dxy, pen pressure distance Dp, pen direction and altitude

distance Dθρ and elapsed time distance DT. The data on each of

signatures that we treat are a time series data set and the set of the

reference signature and that of the input signature can be different

from each other. Hence, we adopted DP matching method to get

the warping functions wxy, wp, and wθρ, each of which represents a

correspondence between the reference data set and the input data

set. Formula (10) is used to get the warping functions. The

reference signature is:

( ) ( ) ( ) ( ) ( ) ( )r r r r r r r r r r r r rS x n y n p n n n t n (1)

and an input signature is:

( ) ( ) ( ) ( ) ( ) ( )i i i i i i i i i i i i iS x n y n p n n n t n (2)

Before the distance measure, feature extraction was applied to

signature Sr and Si. The extraction reduces computational efforts

and removes the noise data. The extraction was done using a

piecewise liner approximation:

2 2

1

minr

r

N

xy X Y

n

D D D

(3)

where

( ) ( ( ))X r r i xy rD x n x w n (4)

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 27

Page 28: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

(a) (b) (c)

Figure 2. Examples of x-coordinate, y-coordinate, pen pressure, pen direction, pen altitude and elapsed time of (a) an authentic

signature of one user, (b) another authentic signature of the same user, and (c) a forged signature of another user.

Figure 3. Overall flow of our signature verification system

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 28

Page 29: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

and

( ) ( ( ))Y r r i xy rD y n y w n (5)

1

min ( ) ( ( ))r

r

N

p r r i p r

n

D p n p w n

(6)

and

1

1

( ) ( ( ))min cos

( ) ( ( ))

r

r

Nr rr i

n r rr i

n w nV VD

n w nV V

(7)

where

sin ( )cos ( )

( ) cos ( )cos ( )

sin ( )

n n

V n n n

n

(8)

DT = | tr(Nr) - ti (Ni) |. (9)

The recurrence equation that the DP matching uses is:

( 1 )

( ) ( ) min ( 1 1)

( 1 2)

g i j

g i j d i j g i j

g i j

(10)

where d(i,j) is the distance between the i-th point of the input

pattern and the j-th point of the reference pattern and g(i,j) is the

accumulated sum of distances up to (i,j).

A stroke of a kanji character is an important unit in doing the

handwritten signature verification. Inter-stroke information in a

kanji character represents a correlation between one stroke and

other strokes. It has been proved that the information is useful for

character recognition [1]. In fact, it is very important to find inter-

stroke features of signatures in professional’s handwriting

analysis. That is because when different people write the same

character or signature, the correlations among the strokes are

different. However, the basic method cannot treat inter-stroke

information well because it evaluates signatures as a simple time

series data set. This is why we have made a new signature

verification method based on shape contexts.

2.3 Shape Context Method The shape context is a descriptor of point distribution. It has a

histogram that retains the information of the distribution of points.

The histogram consists of finite cells that represent the relative

distribution of points from a reference point as shown in Figure 4.

The value of a cell is the number of points in the region that the

cell covers. Therefore, the shape context is able to concisely show

how the points around a reference point are distributed. We

calculate the cost between two shape contexts by Formula (11)

that is led by the knowledge of the χ2 test. The cost shows the

difference between two point distributions. In Formula (11), N is

the number of cells of a histogram and ha,i(k) is the value of k-th

cell of a histogram for the reference point p(i) of the signature a.

So the cost Csc(SCa(i), SCb(j)) represents the difference between

shape contexts SCa(i) of p(i) and shape context SCb(j)) of p(j).

𝐶𝑠𝑐(𝑆𝐶𝑎(𝑖), 𝑆𝐶𝑏(𝑗)) = 1

2∑

(ℎ𝑎,𝑖(𝑘) − ℎ𝑏,𝑗(𝑘))2

ℎ𝑎,𝑖(𝑘) + ℎ𝑏,𝑗(𝑘)

𝑁

𝑘=1

(11)

A shape context is generated for each stroke of handwritten

signatures. The shape context at each stroke as inter-stroke

information represents the distribution of points on other strokes

as shown in Figure 4. The range to examine the distribution is

decided by referring to J.Shin’s research [1]. The research

demonstrates that we can extract enough inter-stroke information

from just three vicinity strokes. Hence, when creating the shape

context at a reference stroke, our Shape Context method examines

the distribution of points on the previous and successive strokes in

the time series as shown in Figure 5.

The steps to create the shape context SC(i) at the i-th stroke s(i)

are as follows:

1. Find the reference point of s(i) that is at the centre of gravity

of s(i).

2. Select a point p(j) on s(i-1) or s(i+1).

3. Find the cell of the histogram for the reference point of s(i)

where p(j) is located and increase the value of the cell by 1.

4. Repeat step 2 and step 3 for all the points on s(i-1) and

s(i+1).

Figure 4. An example of a shape context

Figure 5. A point distribution in a signature

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 29

Page 30: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

When the number of strokes of an input signature is Nis and that of

a reference signature is Nrs, a shape context distance Dsc between

the input signature and the reference signature is computed by

Formula (12). In the formula, SC(i) is the shape context at the i-th

stoke and the cost between shape contexts is computed by

Formula (11). The warping function wsc is used to solve the

problem that Nis is not same to Nrs. The function wsc is computed

by DP matching that we have discussed. If Nis is same to Nrs, the

function wsc becomes a linear function.

𝐷𝑠𝑐 = ∑ {(1 − 𝑊𝑎𝑝)𝐶𝑠𝑐 (𝑆𝐶𝑟(𝑖), 𝑆𝐶𝑖(𝑤𝑠𝑐(𝑖)))

𝑁𝑟𝑠

𝑖=1

+ 𝑊𝑎𝑝𝐶𝑎𝑝(𝑖, 𝑤𝑠𝑐(𝑖))}

(12)

Through analysing the signatures, we found out that there were

some authors whose signatures vary considerably. We could not

get high verification accuracies for their signatures because the

cost between shape contexts of their signatures was large. That

was the reason why we introduced an intra-stroke factor into

Formula (12). P. Zhao reported that pen position and pen pressure

were good individual features for signature verification [12].

Considering the potential instability of pen position in instable

signatures, we incorporated only the stroke pressure evaluation

Cap into Formula (12). Cap is the difference between the average

pen pressure values of two strokes. Wap(0 ≤ Wap ≤ 1) is a weight

for pen pressure evaluation.

2.4 Thresholds in Decision The verification is done by comparing a threshold value and the

distance we have discussed. The input signatures that pass all the

comparisons are accepted. The value of each threshold variable Th

used for the comparison is decided using Formula (13) as a

statistical finding. We compute the distance values of every

reference signatures and get the mean M and the standard

deviation S of them. The variable C is used for adjusting the

condition of verification. The severity of verification is changed

according to the value of C. Through experiments, we can find a

proper value of C which enables to improve the precision of

signature verification.

( )Th C M S (13)

(a)

(b)

Figure 6. Examples of (a) an authentic signature and (b) a

forged signature used for the experiment

Figure 7. Error rates in Experiment 1

Figure 8. Error rates in Experiment 2

Figure 9. Error rates in Experiment 3

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 30

Page 31: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 10. FAR and FRR at their closest approach

Figure 11. FAR according to Wap for author 2 and author 10

3. EXPERIMENT AND RESULTS In the experiments, 1680 authentic signatures and 1680 forged

signatures were provided by 42 subjects. Each writer wrote his/her

own signature 20 times. 10 signatures of them were used as

reference signatures for signature verification. Figure 6 shows

examples of (a) an authentic signature and (b) a forged signature

used for the experiment. All signatures consisted of kanji

characters and all the forged signatures were skilled. Through

prior processing, 0-pressure points are removed and the shape and

position of signatures are normalized. Processing was done for

removing noise data. To evaluate our method, a simulation

program was developed in JAVA language and executed in a

Windows 7 machine.

We performed three types of experiments using DP algorithms

based on the previous research [14]. The experimental conditions

are as follows :

1. Experiment 1: used Dxy, Dp, Dθρ, and DT.

2. Experiment 2: used distances of Experiment 1 and Dsc

where Wap = 0.0.

3. Experiment 3: used distances of Experiment 1 and Dsc

where Wap was set automatically.

Two types of error rates were measured to evaluate the precision

of each method. One is the false acceptance rate (FAR) that shows

how many forged signatures are accepted. The other is the false

rejection rate (FRR) that shows how many authentic signatures

are rejected.

The measured results are in Figure 7, 8 and 9. The graphs in the

figures show how FAR and FRR vary with the experiment value

C described in section 2.6. The two error rates are equal to each

other at about 4.0%, 3.0% and 2.0% in Experiment 1, 2 and 3

respectively. Figure 10 shows the values of FAR and FRR when

they are closest to each other as the value of C varies.

The experimental results of Experiment 2 and 3 show that shape

contexts as inter-stroke information help to improve the precision

of signature verification. Moreover, the result of Experiment 3

demonstrates that incorporating average stroke pressure

evaluation with some proper values of Wap makes the accuracy of

the signature verification stable. Through Experiment 2, we found

Figure 12. Fixed Wap for each author in Experiment 3

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 31

Page 32: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 13. The average weights of pen pressure factor and

shape context cost factor

out that the bigger the difference among signatures of one author

is, the worse the accuracy of the Shape Context method is. Figure

11 shows the relation FAR and Wap for two typical subjects. In the

case of author 10 whose signatures are almost identical, the FAR

decreases as Wap decreases. But in the case of author 2 whose

signatures vary considerably, the FAR increases as Wap decreases.

From this, we can see the following implications. For authors

whose signatures are stable, the verification accuracy can be

improved by reflecting the shape context feature more than the

pen pressure feature. For authors with instable signatures, the

accuracy can be kept high with the pen pressure feature. We can

achieve that by selecting the most proper value of Wap for each

author through analysing his/her reference signatures. Figure 12

shows the fixed values of Wap for each author which is used for

experiment.

The average of the Wap values of all the authors is 0.69 as shown

in Figure 13. It explains how big role the inter-stroke information

such as shape contexts plays in getting the higher accuracy of

signature verification.

4. DISCUSSION Signatures written by one author whose writing was unstable had

negative effects on the results. The big difference among

reference signatures increased the threshold values, which made

FAR worse. Figure 14 shows the average of shape context

distances at each stroke of reference signatures written by author 2

and author 10. The figure shows that the averages of shape

context distances of author 10 are low and steady, but those of

author 2 are relatively high and unsteady. The verification results

of author 10 were good, but the results of author 2 were not good.

It confirms that the accuracy of the Shape Context method

depends on the stability of writing. This problem can be solved by

using a signature evaluation method that inspects signature’s

stability. Considering that only a few strokes of signatures tended

to be unstable, it is necessary to study on the methods that adopt

the weight of each stroke or the simplification of strokes.

In our Shape Context method, the center of gravity of each stroke

is selected as the reference point of the stroke. If another point, for

example the center of the stroke, is decide as the reference point,

the shape context is changed, which may result in the better

experimental results. Hence, we need to investigate various

methods for choosing the reference point of each stroke. In

addition, it is worth noticing minute information on adjacent

strokes, such as splash and brushing off, as additional inter-stroke

information.

5. CONCLUSION This paper proposes a new method based on shape contexts for

handwritten signature verification that treats inter-stroke

information well. Our Shape Context method extracts the inter-

stroke information from the distribution of points on adjacent

strokes. In addition, we try to improve the accuracy of the method

by incorporating a weighted evaluation of the average pressure

value of each stroke. The experimental results demonstrate that

our method improves the accuracy of signature verification.

Comparing with the basic method based on only intra-stroke

information, the Shape Context method reduces false rejection

Figure 14. Average shape context cost at each stroke of signatures written by author 2 and author 10

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 32

Page 33: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

rate from 4.14% to 1.54%, and false acceptance rate from 4.06%

to 2.01%. Future work will improve the verification method to

solve the stated problems and apply the method to the studies of

signature evaluation.

6. REFERENCES [1] Jungpil Shin, “Stroke Order- and Number-Free On-Line

Character Recognition Using Intra- and Inter-Stroke

Information,” International Journal of Knowledge-Based

Intelligent Engineering Systems, Vol.6, No. 2, pp. 72-79,

April, 2002.

[2] R. Plamondon and G. Lorette, “Automatic Signature

Verification and Writer Identification - The State of the Art-,”

Pattern Recognition, vol. 22, no. 2, pp. 7–131, Feb. 1989.

[3] F. Leclerc and R. Plamondon, “Automatic Signature

Verification: The State of the Art-1989–1993,” Int. Journal

of Pattern Recognition and Artificial Intelligence, vol. 8, no.

3, pp. 643–660, Mar. 1994.

[4] M. Yoshimura, S. Matsuda, and I. Yoshimura, “On-line

Signature Verification Incorporating the Direction of Pen

Movement,” IEICE Trans., vol. E74, no. 7, pp. 2083–2092,

Jul. 1991.

[5] C. Kim, S. Watabe, C. Kawashima, and Y. Aoki, “Signature

Verification by Using Closed-door Parameter,” IEICE Trans.,

vol. J75–DII, no. 1, pp. 121–127, Jan. 1992.

[6] S. Nakajima, T. Hamamoto, and S. Hangai, "On-line

Signature Verification using Pen Inclination," Technical

report of IEICE, PRMU, 97(559), pp. 15–22, Feb. 1998.

[7] Y. Komiya, T. Ohishi, and T. Matsumoto, “A Pen Input On-

line Signature Verifier Integrating Position, Pressure and

Inclination Trajectories,” IEICE Trans. Inf. and Syst., Vol.

E84-D, no. 7, pp. 833–838, Jul. 2001.

[8] S. Yamazaki and S. Komatu, “The Method of Extracting

Personal Feature Based on Handwriting Information That

Made Category,” IEICE Trans., Vol. J77-DII, no.3, pp. 510–

518, Mar. 1994.

[9] Y. Nakamura and J. Toyoda, “An Extraction of Individual

Handwriting Characteristics Based on Calligraphic Skills,”

IEICE Trans., vol. J77-DII, no. 3, pp. 510–518, Mar. 1994.

[10] Y. Nakamura and M. Kidoe, “Extraction of Individual

Handwriting Characteristics from Handwritten Chinese

Characters Based on Knowledge of Handwriting Analysis,”

Technical report of IEICE, PRMU, 104(89), pp. 65-70, May,

2004.

[11] S. Belongie, J. Malik, and J. Puzicha, “Shape Matching and

Object Recognition Using Shape Context,” IEEE Trans.

Patten Analysis and Machine Intelligence., vol. 24, no. 24,

pp. 509–521, April, 2002.

[12] P. Zhao, A. Higashi, and Y. Sato, “On-Line Signature

Verification by Adaptively Weighted DP Matching,” IEICE

Trans. Inf. and Syst., vol. E79-D, no. 5, pp. 535–541, 1996.

[13] G. Taherzadeh, R. Karimi, A. Ghobadi, and H. Modaberan

Beh, “Evaluation of Online Signature Verification Features,”

IEEE 13th International Conference on Advanced

Communication Technology (ICACT2011), pp. 772–777,

Feb. 2011.

[14] Jungpil Shin, “Optimal Stroke-Correspondence Search

Method for On-Line Character Recognition,” Pattern

Recognition Letters (Elsevier Science), Vol. 23, pp. 601-608,

2002

[15] Wondu Chang, Jungpil Shin, “Dynamic Positional Warping:

Dynamic Time Warping for Online Handwriting,”

International Journal of Pattern Recognition and Artificial

Intelligence (IJPRAI), Vol.23, No.5, pp. 967-986, July. 2009.

[16] Nuha L. Othman, Jungpil Shin, “Handwritten Signature

Evaluation Based on Curve Segmentation,” International

Transactions on Computer Science and Engineering, Vol.24,

No.1, pp. 19-28, Dec. 2005.

[17] Kazunari Soma, Jungpil Shin, "Fuzzy Rules Method for On-

Line Signature Evaluation," International Journal of Applied

Engineering Research (IJAER), Vol. 10, No. 79, pp. 111-114,

Oct. 2015.

[18] Jungpil Shin, Toshiki Okuyama, “Detection of Alcohol

Intoxicated via Online handwritten Signature,” Pattern

Recognition Letters (Elsevier Science), Vol. 35, pp. 101-104,

Jan. 2014.

[19] Jungpil Shin, Junichi Sato, “Signature Verification for

Multiuser Online Kanji Learning System,” Computer

Technology and Application (CTA), Vol. 3, No. 3, pp. 211-

218, 2012.

[20] Sansone and Vento, “Signature Verification: Increasing

Performance by a Multi-Stage System”, Pattern Analysis &

Applications, vol. 3, pp. 169–181, 2000. 2.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 33

Page 34: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

ABOUT THE AUTHORS:

Jungpil Shin received a Ph.D. in Communication Engineering from Kyushu University, Japan in 1999. He became an Associate Professor and Senior Associate Professor in the School of Computer Science and Engineering, the University of Aizu, Japan, in 1999 and 2004, respectively. His research interests include pattern recognition, character recognition, image processing, and computer vision. He is currently researching the following advanced fields: pen-based interaction system, real-time system, oriental character processing, mobile computing, computer education, human recognition, and machine intelligence. He served several conferences as a program chair and program committee member for numerous international conferences and serves as a reviewer for several SCI major journals and an editor of journals. He is a member of IEEE, ACM, IEICE, IPSJ, KISS, and KIPS.

Ken Maruyama received a B.A in School of Computer Science and Engineering from University of Aizu, Japan in 2005. His research interests include the areas of pattern recognition, human computer interaction and user authentication.

Cheol Min Kim received a Ph.D. from Seoul National University, the Republic of Korea in 1996. His major is Operating System in Computer Engineering. He became an Instructor and Professor at the Department of Computer Education, College of Education, Jeju National University, Korea, in 1997 and 2010 respectively. He has continuously done research in the field of System Software. And also, he has been interested in the Computer Science education for secondary school students and gifted teenagers. Thus, he has given his lectures for them and has performed his research related to the instructional methods, the instructional contents, and teaching-and-learning systems for them. His research interests include system software, computer education, algorithm visualization, machine intelligence, and computational thinking.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 34

Page 35: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Towards Clustering-Based Device-to-DeviceCommunications for Supporting Applications

Amirshahram HematianWei Yu

Chao LuTowson Univ., USA

[email protected]{wyu,clu}@towson.edu

David GriffithNada Golmie

National Institute of Standards and Technology,USA

[email protected]@nist.gov

ABSTRACTIn this paper, we address the issue of how to leverage Wi-FiDirect (as an outband solution) to enable the Device-to-Device (D2D) communication, which can not only offloadmassive data traffic from the LTE (Long Term Evolution)-based cellular network, but also support the communicationsof Internet-of-Things (IoT) applications. Particularly, wedevelop a clustering-based scheme that automatically findsthe best candidates to remain connected to the LTE net-work while the rest of the devices can be disconnected di-rectly from the LTE-based cellular network. By doing so,we can reduce the signal interference, increase the averagethroughput and spectral efficiency of the network, and alsoreduce unnecessary data traffic that can be transmitted lo-cally by D2D communications instead of going through theLTE-based cellular network. Devices in established clusterscan indirectly communicate with the LTE network via thecluster head, which can be dynamically selected and remainsconnected to the LTE network directly. Using the real-worldcellular data collected from a public database related to thedeployment of LTE networks, and Google geo-coding APIs(Application Program Interfaces) to locate the real-worldsmart meters, we show the effectiveness of our proposedscheme based on an extensive study of two scenarios: thefirst is in traffic offloading in the cellular network, and thesecond is in IoT applications, specifically, smart grid com-munications.

CCS Concepts•Networks → Wireless access points, base stationsand infrastructure; Network performance evaluation;Mesh networks; Mobile networks; Network mobility;Peer-to-peer networks; Wireless access networks; Networkarchitectures; Network algorithms;

KeywordsDevice-to-Device Communication; Clustering; Traffic Offload-ing; Applications.

Copyright is held by the authors. This work is based on an ear-lier work: RACS’16 Proceedings of the 2016 ACM Research in Adap-tive and Convergent Systems, Copyright 2016. ACM 978-1-4503-4455-5http://dx.doi.org/10.1145/2987386.2987391

1. INTRODUCTIONA modern cellular network (LTE, future 5G, etc.) pro-vides ubiquitous networking connections to devices (mobilephones, laptops, meters, sensors, etc.) and services to sup-port diverse critical applications (public safety, smart grid,smart transportation, smart cities, smart healthcare, socialnetworking, etc.) [25, 1]. These applications demand mas-sive data traffic transmitted from a large number of devices.The ongoing effort of 5G research and development (ultra-dense network, millimeter wave, massive MIMO, etc.) havebeen investigated to improve the capacity and coverage ofwireless networks [30, 23]. Nonetheless, there are limitationsto expanding data service and traffic capacity supportingall types of data traffic such as video, voice and other traf-fic by only boosting system capacity via adding more an-tennas, sub-carriers, symbols, slots, etc. As an orthogonalapproach, the D2D-based communication technologies havegained much attention as one of the techniques to offloadtraffic from the main wireless network infrastructure andimprove the network performance consequently [12, 7].

Generally speaking, D2D communication refers to a technol-ogy that empowers devices (User Equipments (UE), smartmeters, sensors, etc.) to send and receive data directly with-out going through the core wireless network infrastructurevia base stations (or access points) [8]. The D2D communi-cation can be either inband or outband. Inband refers to thecase where the D2D communication utilizes the same spec-trum that devices use to communicate to the base station,while the outband D2D communication refers to the casewhere the spectrum used for D2D communication does notcoincide with the one used by base station communication.Wi-Fi Direct [2] is one known outband D2D communicationtechnology, which operates at Industrial, Scientific and Med-ical (ISM) radio bands. It is worth noting that the questionof how to effectively share spectrum resources and overcomeinterferences from devices (UE, smart meters, sensors, basestations, etc.) remains a challenging issue in inband D2Dcommunication.

In this paper, we focus on the investigation of the outbandD2D communication technique and demonstrate its feasibil-ity by offloading traffic in cellular networks and supportingIoT applications. Our paramount contributions are listed asfollowing. First, we outline our developed clustering-based

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 35

Page 36: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

scheme to enable the D2D communication for devices thatare close to each other. In this way, massive traffic canbe transmitted via D2D communication in local areas andtraffic transmitted via the core cellular network can be re-duced. The main idea behind the clustering scheme is tocreate small Wi-Fi networks for communications betweendevices in local areas while these devices remain connectedindirectly to the cellular network via the head of the clus-ters. Within each cluster, the cluster head directly connectsto the LTE network and is dynamically selected based onvarious factors (quality of reception, bandwidth, etc.).

Second, having implemented Wi-Fi Direct as an outbandsolution for enabling D2D communication within a simu-lated LTE network, we demonstrate the scheme’s effective-ness via an extensive study of the two scenarios: offloadingtraffic in the cellular network, and supporting IoT applica-tions using smart grid communications as the primary ex-ample. We leverage the Vienna LTE-A system level sim-ulator [27] 1 and have collected real-world deployment in-formation of base stations via OpenCellID website [11]) andreal-world smart meter locations via Google geo-coding APIsto demonstrate the effectiveness of our proposed schemes tosupport these two scenarios. It is worth noting that ourproposed scheme is generic, and can be applied to supportother types of wireless networks and IoT applications. Withrespect to performance metrics (average UE throughput, av-erage spectral efficiency, average Resource Blocks (RB) perTransmission Time Interval (TTI), and rank indicator dis-tribution), the experimental data shows that our developedscheme can be used to not only significantly improve the net-work performance by offloading traffic, but also extends thisperformance improvement to smart grid communications.

The remainder of the paper is organized as follows: We intro-duce the background in Section 2. In Section 3, we presentour schedule in detail. In Section 4, we show the experi-mental results to validate the effectiveness of our proposedscheme in terms of offloading traffic in the cellular network.In Section 5, we demonstrate the effectiveness of our schemein supporting IoT applications such as the smart grid. Weprovide the literature review in Section 6 and We concludethe paper in Section 7, respectively.

2. BACKGROUNDIn this section, we introduce the background of D2D com-munication, Wi-Fi Direct techniques, and Vienna LTE sim-ulation toolbox.

2.1 D2D CommunicationD2D communication in LTE networks refers to directly rout-ing data traffic among mobile User Equipment (UEs) when

1Certain commercial equipment, instruments, or materialsare identified in this chapter in order to specify the exper-imental procedure adequately. Such identification is notintended to imply recommendation or endorsement by theNational Institute of Standards and Technology, nor is it in-tended to imply that the materials or equipment identifiedare necessarily the best available for the purpose.

UEs are close to each other. By doing so, network per-formance measured by energy efficiency, throughput, delay,as well as spectrum efficiency can be improved. With thesupport of D2D communication, devices can exchange infor-mation when they are located within mutual transmissionrange, thereby forming a local network [8]. Such a com-munication technique has been considered as a viable solu-tion to deploy the cellular network infrastructure in ruralareas, support public safety applications when the networkinfrastructure breaks down during a disaster, and supportthe monitoring and control of numerous IoT applications(smart grid, smart transportation, smart healthcare, andsmart cities, etc.). Based on the spectrum used for D2Dcommunication co-existing with the spectrum used for thecore wireless network infrastructure (e.g., cellular networks),existing D2D communication techniques can be categorizedinto two main categories: inband and outband D2D tech-niques.

To illustrate the difference between inbound and outbandD2D techniques, we use the cellular network to present thecore wireless network infrastructure. Sharing a widely usedspectrum in the cellular network (also called inband D2Dcommunication) can be problematic because of the interfer-ence between the communication spectrum used for bothD2D communication and cellular communication. Noticethat the inband D2D communication in cellular networksrequires additional efforts and changes to the componentsof cellular networks. Also, how to efficiently manage theshared spectrum allocated for D2D communication remainsan open issue. In contrast, because the cellular network usesa different spectrum from the D2D communication, interfer-ence will not occur.

With respect to outband-based D2D communication tech-niques, unlicensed spectrum is commonly used for support-ing the communication of D2D links. In these techniques,while no interference issue exists between D2D communi-cation and cellular communication, mobile devices are nor-mally required to have an extra wireless communication in-terface to support the different wireless communication im-plementations (Wi-Fi Direct [12, 4], ZigBee [28], Bluetooth[22], etc.) through an unlicensed spectrum.

2.2 Wi-Fi DirectWi-Fi Direct is a Wi-Fi standard, which tends to enablewireless devices to easily connect with each other withoutthe support of wireless access points [2]. It is applicablefor network access and file transfer among multiple mobiledevices that are close to each other.

Wi-Fi Direct can negotiate the link with a Wi-Fi manage-ment system, which assigns each device a wireless AccessPoint (AP) (known as Software Access Point (Soft AP)).By using Soft AP, a Wi-Fi Direct-enabled device becomesmulti-role, hosting small networks and clients of other Wi-Finetworks, and supports multi-hop communication. By us-ing multi-hop technology in Wi-Fi Direct-enabled networks,the coverage of a small local network can be easily extendedby adding another device to the network. The through-

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 36

Page 37: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

put of Wi-Fi Direct-enabled networks can be enhanced dueto shorter communication hops required to send and receivedata. In addition, the battery life of devices will be extendeddue to low power for data transmission between nearby de-vices even though the destination of the data is far away.

In our proposed clustering-based scheme in Section 3, weassume that all UEs support Wi-Fi Direct and every clusteris a Wi-Fi Direct network with a mesh-based topology tosupport multi-hopping data transmission. Also, after clus-tering and selecting the head of the cluster, every cluster isconnected to the cellular network via the head of the cluster.

2.3 Vienna LTE Simulation ToolboxesVienna LTE simulators [27] are implemented in MATLABand support both link and system level simulations of theUniversal Mobile Telecommunications System (UMTS) inLTE. The objectives of Vienna LTE simulator are to testand upgrade existing or new schemes and algorithms, whichcan be implemented in both link level and system levelsimulators. Both simulators are freely accessible for non-commercial academic use [10]. To implement our clustering-based scheme, we use the system level simulator to investi-gate the effectiveness of our proposed clustering scheme.

3. CLUSTERING-BASED D2D SCHEMEIn this section, we first give an overview of our clustering-based D2D scheme and then present the detailed design andworkflow of our proposed scheme. Finally, we discuss theefficiency of the proposed scheme and other related issues.

3.1 OverviewLTE-based cellular networks as a broadband wireless net-work deployment should have the ability to support numer-ous applications including public safety, social networking,and other IoT applications. To reduce the traffic overloadin the network and improve the bandwidth efficiency, D2Dcommunication is an effective solution to offload traffic fromthe cellular network and utilize the network resources moreefficiently. Recall that in this paper, we consider the use ofWi-Fi Direct as an outbound solution to provide D2D com-munication, which requires fewer changes in the LTE-basedcellular network. By using Wi-Fi Direct and transmittingdata locally among nearby mobile users and meter (sensors)that monitor physical objects in the context of IoT appli-cations, we can not only offload data traffic from the cellu-lar network and support the network connectivity of meters(sensors), but also prevent interference to cellular users asthe Wi-Fi Direct and cellular network operate in differentfrequency bands.

By doing so, the available bandwidth for each user or me-ter (sensor) can be increased by offloading the local datatraffic from the global cellular network. The local data canbe transmitted in a multi-hop manner in Wi-Fi Direct net-works, where each UE and meter (senor) requires a lowtransmission power to send and receive data, via a multi-hop fashion even when the source and destination of the

data are significantly far away in the same Wi-Fi Directnetwork. The D2D communication in a mesh-based Wi-FiDirect network (denoted as cluster) not only provides im-proved coverage because of multi-hop data forwarding, butalso enhances the throughput of the network due to shorterhops and extend battery life because many users and me-ters are located nearby each other. Nonetheless, if any UEor meter requires data to be transmitted globally, the headof the cluster in the Wi-Fi Direct network can provide thecommunication to the cellular network indirectly based onthe Wi-Fi direct network that it is already connected to.

By leveraging the Vienna LTE-A Downlink System LevelSimulation tool [27], we deploy a simulation environment toimplement and evaluate the Wi-Fi Direct-based D2D com-munication in two scenarios: (i) offloading traffic in cellularnetworks, (ii) supporting the communications of IoT appli-cations using the example of the smart grid. We have col-lected real-world data in LTE networks and smart meters,and will show the feasibility of both scenarios based on thesimulation. The detailed performance evaluation for thesetwo scenarios will be provided in Section 4 and Section 5,respectively.

To enable the D2D communication in the cellular network,we propose a clustering-based scheme, which creates clus-ters for small Wi-Fi Direct networks. All the UEs or me-ters (sensors)2 within each cluster can directly and indirectlycommunicate with each other and transfer data without nec-essarily going through the core cellular network. In eachcluster, the node that remains directly connected to the cel-lular network is the head of the cluster, which is dynami-cally selected based on the quality of reception, bandwidth,and other factors. In the following, we explain how theclustering-based scheme gathers the statistical data, createsthe clusters, merges the clusters, and then selects the headsfor clusters.

3.2 Cluster-Based D2D CommunicationWe now introduce the proposed cluster-based D2D commu-nication.

3.2.1 Clustering AlgorithmThe main idea behind the proposed clustering method isto enable the local D2D communication so that each UEcan communicate with other UEs based on established smallmesh-based Wi-Fi networks dedicated for D2D communica-tion among UEs while these UEs remain connected indi-rectly to the LTE network via the head of the cluster. Ineach cluster, the node that remains directly connected tothe LTE network is defined as the head of the cluster, whichis dynamically selected based on the quality of reception,bandwidth and other metrics.

Figure 1 illustrates the basic workflow of our developed clus-tering scheme, which consists of the following steps:

2Notice that when we describe the clustering algorithm, weuse UE as an example to illustrate the idea and other nodes(meters and sensors) in IoT applications can be also applied.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 37

Page 38: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 1: Workflow of Clustering-Based Scheme

Figure 2: Discovering Neighbours (Discoverer UE inBlue, Neighbours in Range in Green, Out-of-Range

Neighbours in Grey)

Step 1. Discovering devices and finding the nearest neigh-bours: The first step gives UEs that have the Wi-Fi Directcapability a way to discover each other, as well as servicesthat they support. For example, a UE with Wi-Fi Directcapability can see all compatible devices in a given areaand then narrow down the list of devices that enable theWi-Fi Direct D2D communication. Mobile users can decidewhether to join the clustering service or not by turning theservice on and off on their UE. In the simulation tool thatwe used [27], as there was no Wi-Fi Direct feature provided,we have implemented a module to define the Wi-Fi rangefor each UE and perform the discovery. We assume thatall discovered UEs are willing to join the D2D-based com-munication based clusters created. To simulate the Wi-Fidiscovery process and obtain a list of available neighboursfor each UE, we create a discovery list that can store up to256 neighbours for each UE. As shown in Figure 2, everyneighbour is listed in each UE record only when it is locatedwithin the Wi-Fi range of the current UE. The discoverylist is generated based on the distance between the currentUE and their neighbours, considering the maximum Wi-Firange given prior to the simulation.

Step 2. Creating clusters for D2D communication: Oncethe UE that has not joined a cluster has generated a list ofdiscovered nearby devices using the Wi-Fi Direct discoveryservice, the clustering process begins. Every UE starts fromthe beginning of the discovery list and creates a new clusterof its own if the UE and its neighbours in the discovery listhave not already been assigned to one cluster. Otherwise,every UE will join all the clusters it finds in the discovery listthat its neighbours have already connected to. For example,if UE1 has three UEs (UE2, UE3 and UE4) in its discoverylist and none of them has yet joined any cluster, the UE1

will create a new cluster and allow its three neighbours tojoin. On the other hand, if any of the three UEs (say UE3)has already connected to a cluster, UE1 will not create a newcluster, but instead will join all of the same clusters as itsneighbors. By doing so, the UE can join multiple clusters ata same time. Then, later in the merging process, all clustersthat are sharing UEs will be merged and become one cluster.

To keep track of the clustering process, we could use a 2D

matrix where the number of rows represents the number ofclusters generated and the number of columns represents thenumber of UEs within that cluster. Since not all the clustershave the same number of UEs, there are elements in thematrix assigned either by the UE ID number or zero. Eachrow (as a cluster) is initially filled by zeroes that represent noUE has yet been assigned to that cluster and then filled fromleft to right whenever a new UE is joined to that cluster.Since one UE can join multiple clusters, it is possible thatmultiple copies of the same UE ID can appear in differentrows of the matrix, but only one copy at each row. To keepthe number of clusters low, and to reduce the complexity ofestablishing clusters, we decide to merge multiple clustersinto one cluster.

Step 3. Merging clusters: When a UE is joined to morethan one cluster, all those clusters could be merged intoone cluster. By broadcasting the cluster information, it ispossible to let the head of each cluster know that a newUE has joined multiple clusters. Then, the head of clusterscan proceed another round of the head election process andone of them becomes the head of the newly formed mergedcluster.

To implement this mechanism, we check each element fromeach row of the clustering matrix (every UE in each cluster)with all elements of other rows (all UEs from other clus-ters) to see whether we can find any duplication of UE IDs.Wherever we found a duplication of UE IDs in two rows,we remove one of the rows (source cluster) and add the ele-ments (UEs in the source cluster) in the removed row to theother row (destination cluster), except the duplicated ele-ment itself (the shared UE between source and destinationclusters). By doing this, one of the clusters (source cluster)that has shared one UE (or more) with the other cluster(destination cluster) is removed and all the UEs are joinedto the other cluster (destination cluster).

Figure 3 illustrates an example of merged clusters in regions.As we can see from this example, the Wi-Fi coverage of everyUE is portrayed in green circles. Wherever these circlesintersect each other, a cluster is created and starts to growuntil there are no more circles close enough to expand thecluster any more. In one case, several small clusters couldbe created inside another cluster and those clusters remainunmerged as there is no UE in between to connect theseclusters.

The clustering-based D2D communication in the cellularnetwork needs to be periodically updated due to the factthat mobile users could change their locations dynamically.As a result, the selection process of the new head of clusterneeds to be conducted periodically. Since UEs are mobile,they may lose connection from one cluster and join anothercluster. Consequently, the clustering and role changing op-erations must be performed continuously for each cluster aswell. On one hand, two or more clusters may be merged be-cause of those clusters are close enough. On the other hand,one cluster could be broken into two or more clusters be-cause UEs may go far enough as a group (or alone) to loseconnection from the original cluster and then create their

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 38

Page 39: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 3: Merged Clusters

Figure 4: Out of Range Clusters Not Merged

own clusters. In addition, even in some cases there may bea few small clusters (inner clusters) created inside a largercluster (outer cluster) as the inner clusters cannot reach anyof UEs associated with the outer cluster. In Figure 4, weshow a black arrow pointing to an inner cluster that can-not merge with the outer cluster unless some of UEs fromeither inner or outer clusters move toward the UEs from an-other cluster and make a D2D connection available. Oncethis bridge connection is established, the inner cluster willmerge into the outer cluster.

Step 4. Indirect LTE connection: To reduce the data trafficload of the cellular network, the local data traffic associ-ated with UEs can be transmitted via D2D communicationswithin the clusters. Since we do not want to completely re-move the UEs from the LTE network, we select one of theUEs in each cluster that is denoted as the head of the cluster,which remains connected to the LTE network. In each D2Dcluster, only the head of the cluster remains connected toboth the cluster and cellular network directly. Every othernode within the cluster can indirectly connect to the cellularnetwork through the head of the cluster, which functions asa relay node. Notice that the communication between thecluster member and the cluster head may be a direct linkbetween them or through multiple one-hop links.

Step 5. Changing cluster head : At the beginning of thecluster head selection process, each UE considers itself thehead of the cluster. Nonetheless, there might be another UEinside the same cluster that has better connecting charac-teristics. In this case, the head of the cluster will be changed

Algorithm 1 Proposed Algorithm

1: procedure Clustering2: ListOfUEs← Array of UE3: if ListOfUEs.Length <= 0 then return false4: for i = 0; i < ListOfUEs.Length; i++ do5: ListOfUEs[i].FindNearestNeighbours();

6: j← 07: loop1 :8: if ListOfUEs[j].ListOfNeighbours.Length <= 0 then9: j++;

10: goto loop1.11: Found← False12: k← 013: loop2 :14: m← 015: loop3 :16: UENID← ListOfUEs[j].ListOfNeighbours[m].ID17: if SearchCluster(UENID, k) == true then18: Found← True19: goto done.20: else21: if m < ListOfUEs[j].ListOfNeighbours.Length

then22: m++23: goto loop3.24: if k < Clusters.Length then25: k++26: goto loop2.27: done:28: if Found == true then29: AddUEtoCluster(ListOfUEs[j].ID, k)30: else31: n← CreateNewCluster()32: AddUEtoCluster(ListOfUEs[j].ID, n)

33: if Clusters.Length <= 0 then return false34: if j < ListOfUEs.Length then35: j++;36: goto loop1.37: for i = 0; i < Clusters.Length; i++ do38: Clusters[i].Merge();

to the latter UE. The re-election process of cluster heads isa periodic process that gathers the statistical informationabout all UEs connected to a single cluster. At the end,the best candidate will be selected to be the next head ofthe cluster. To make the selection, the statistical informa-tion about signal quality, coverage, and other factors can beobtained via the network. The re-election process of clusterheads can be controlled by the service provider via the cellu-lar network, or be autonomously completed inside the clusterby the head of the cluster. The maximum average through-put and maximum average spectral efficiency are two majorfactors that the re-election process is based on.

To implement the re-election process in the study, we coulduse the cluster matrix generated in the second step of ourproposed scheme. Based on the UE IDs and results of theLTE network performance metrics (the average throughputof UE, average spectral efficiency, etc.), the re-election pro-cess of cluster heads can be carried out. As a result of thesimulation, all UE traces are recorded into matrices associ-ated with UE IDs. By finding the related traces to each UE,we can find the average throughput and spectral efficiencyfor each UE. Once the information about all UEs within the

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 39

Page 40: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

current cluster is extracted, the head of cluster is selected byfinding the UE, which has the highest average throughputand spectral efficiency among other UEs in that cluster.

Figure 5: Site Locations of Baltimore City Area

3.2.2 DiscussionOur proposed scheme produces additional clusters and latermerges them due to the fact that each UE only sees theother UEs under its own Wi-Fi coverage at the beginning.By joining other clusters, the heads of the clusters will findout that they are now connected to each other and can mergedown and release one of the heads (known as “chaining phe-nomenon”, in particular with the single-linkage clustering[16]). Algorithm 1 shows the detailed procedure of our algo-rithm, where there are three nested loops (loop1, loop2 andloop3), and each will iterate for at almost in the total numberof UEs. Since the three nested loops have higher complexityand iterations in comparison with finding the nearest neigh-bours (two nested loops, one shown in Algorithm 1 and oneinside FindNearestNeighbours() function) and merging clus-ters (one loop), The complexity of the proposed clusteringscheme is O(n3).

Due to the fact that the proposed scheme is implementedas part of an LTE network simulator, it sees the UEs fromthe network perspective. The complexity of this methodof implementation is much higher in comparison with run-ning the proposed scheme on each UE individually, whereeach UE only sees the nearby UEs, making the complexitymuch lower and computation more efficient. In other words,instead of doing the clustering on the LTE network side,we can let the UEs carry out the clustering themselves inparallel and then let the LTE network know the structure ofclusters. This information can be later provided for the LTE

Figure 6: 150 Site Locations

Figure 7: Clusters of 150 Sites

Number of UEs

0 500 1000 1500 2000 2500

Avera

ge T

hro

ughput[M

bps]

0

10

20

30

40

50

60Wi-Fi assisted LTE bandwidth changes

Without D2D

With D2D

Average 2250 UEs

Average 95 UEs

Figure 8: Average Throughput of UEs

network by the heads of clusters for relaying data betweenLTE and Wi-Fi direct networks.

From the network operation perspective, there are two typesof D2D communications: controlled and autonomous. Theformer is under the supervision of the cellular network, andthe latter is totally independent. Although we use the con-trolled type in our implementation, in order to reduce thecomplexity and share the computation power required be-tween the UEs, our proposed clustering scheme can be im-plemented with the autonomous type of D2D clustering aswell, which is independent from the cellular network anduses the UEs computation power to reduce the computa-tion power needed, and let the UEs carry out the clusteringthemselves independently.

4. CASE STUDY I: TRAFFIC OFFLOADINGIN CELLULAR NETWORKS

To show the effectiveness of our proposed scheme in theapplication case of offloading traffic for cellular users, weleverage the Vienna LTE-A system level simulator [27] andcollected the real-world deployment information of base sta-tions via the OpenCellID website [11] to carry out our per-formance evaluation.

4.1 Evaluation SettingWe implemented the proposed clustering scheme in Mat-lab based on the LTE-A Downlink System Level Simulationtool. In our simulation, we generate LTE cells in a honey-

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 40

Page 41: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

comb structure and UEs are randomly deployed throughoutthe cells. To make our study to reflect the real-world prac-tice, we have implemented a tool to obtain the deploymentinformation of base stations from cellular network providers(AT&T, Verizon, T-Mobile, etc.) and have established real-istic cellular networks to carry out the performance evalua-tion.

To measure the effectiveness of Wi-Fi Direct-based D2Dcommunication on the realistic LTE-based cellular network,we consider the performance metrics, including average UEthroughput, average spectral efficiency, and UE widebandSignal to Interference and Noise Ratio (SINR). Generallyspeaking, the throughput can be computed in symbols persecond. Then, by knowing the number of bits that a symbolcan carry, the bits per second can be computed.

The downlink spectral efficiency of the communication sys-tem can be measured in Bits Per Channel Use (bpcu) [24].SINR, as the measurement of signal quality, can be used toquantify the relationship between RF conditions and through-put in the experimented network. Based on SINR, the CQI(Channel Quality Indicator) can be computed by UEs and isreported it the network. Notice that SINR can be used as anindicator for quantify network quality. The Empirical Cu-mulative Distribution Function (ECDF) of the UE averagethroughput, average spectral efficiency, and UE widebandSINR are collected when the simulation is complete. Bycomparing metrics in the case without enabling D2D com-munication to the case with D2D communication, we canobserve the improvement of performance of our proposedscheme based on these metrics.

To set the configuration for the defined LTE-based cellularnetwork, all key parameters are defined in the Matlab simu-lation code. In addition to parameters related to LTE-basedcellular networks, we have also implemented the D2D featureand added several parameters related to D2D communica-tion. One parameter is to configure whether the simulationshould use randomly generated eNodeBs location data orconnect to an online database [11] and download real lo-cation data (i.e. AT&T or T-Mobile tower locations) tobe used in the evaluation. Also, the Wi-Fi discovery andcommunication range can be set through the graphical userinterface in the simulation code. Another parameter relatedto D2D communication is to configure whether the simu-lation tool should randomly generate the locations of UEs,get real smart meter locations from Google API, or use apreviously stored file that contains the location data of theheads of clusters gathered from previous simulations. Wethen compare the results of simulations in which either D2Dcommunication is enabled or disabled by configuring corre-sponding parameters. Because we want to compare the be-fore and after effects of Wi-Fi Direct D2D communicationusing the proposed scheme, we need to run the simulationstwo times. In the first round of simulation, we use all theUEs (either real or simulated) and all the eNodeBs (eitherreal or simulated). In the second round of simulation, weuse only the heads of the clusters and all the eNodeBs to seethe changes happening to LTE network performance.

At the beginning of the first simulation for offloading trafficfor cellular users, the locations of UEs need to be randomlygenerated and then the Wi-Fi discovery process proceeds tocreate the clusters. After merging clusters, the head of eachcluster can be determined by finding the UE which has thebest reception, average bandwidth, etc. Once the heads ofall clusters are selected, the information of cluster heads willbe stored into a file, which will be later used for the secondsimulation in order to show how the performance of the net-work is enhanced by removing unnecessary UEs from thenetwork and offloading local data traffic supported by D2Dcommunication. In this way, all the local data traffic re-mains within Wi-Fi Direct clusters and only the global datatraffic is transmitted through the global ITE-based wirelessnetwork. The simulator randomly generates eNodeBs andUEs. After the simulation run is complete, the values ofmetrics (average UE throughput, average spectral efficiency,average Reserved Blocks (RB) per Transmission Time Inter-val (TTI) per UE, and rank indicator distribution) will becomputed.

4.2 Real-World Data CollectionTo use the real-world data for the location of each eNodeB,we have implemented Matlab codes to retrieved the site loca-tions from an open worldwide database called OpenCellID[11]. This website provided APIs for making HTTP (Hy-pertext Transfer Protocol) requests in different formats, e.g.,XML (Extensible Markup Language) and Comma SeparatedValues (CSV). Based on the Region Of Interest (ROI), wecan define the intended location and retrieve 1000 site loca-tions in each HTTP request. As an example, we have re-trieved the locations of eNodeB in Baltimore city, the stateof Maryland. Figure 5 shows 1000 eNodeBs, which are lo-cated in Baltimore, MD. In our simulation, we choose thefirst 150 site locations from Baltimore city area and thesesite locations in the list downloaded from the online databasepoint to highway 695, Pikesville, and Parkville as shown inFigure 6. In our simulation, we use these locations of eN-odeB and randomly generate 2250 UEs to run the simula-tions. After applying our developed clustering-based D2Dcommunication scheme, we create clusters for randomly de-ployed UEs. Figure 7 shows an example of merged clustersfor UEs in the simulated area.

4.3 Evaluation ResultsWe run the simulation for both the LTE only communicationand Wi-Fi Direct assisted LTE using our proposed methodto create clusters. Figure 8 shows a magnificent increase inthe average throughput of UEs when the D2D communica-tion is used. As we can see from Figure 8, the number ofclusters (blue curve) was 95 (182 clusters merged down to95) and 1913 UEs out of 2250 were able to join clusters, whilethe rest of the UEs were out of range. Each cluster has oneUE (head of cluster), which connects to the LTE networkdirectly. By doing so, the average throughput of UEs canbe significantly improved in compared with the case whereD2D communication is not used (red curve).

We also evaluate the network performance comparing withother metrics when either D2D communication is enabled

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 41

Page 42: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 9: UE AverageSpectral Efficiency (with

D2D As Green)

Figure 10: UE AverageThroughput (with D2D As

Green)

Figure 11: UE WidebandSINR (with D2D As Green)

UE wideband SINR [dB]

-15 -10 -5 0 5 10 15 20 25

avera

ge U

E thro

ughput [M

b/s

]

0

5

10

15

20

25

30UE wideband SINR-to-throughput mapping

Figure 12: Experimental Results without D2D

UE wideband SINR [dB]

-10 -5 0 5 10 15avera

ge U

E thro

ughput [M

b/s

]0

10

20

30

40

50

60UE wideband SINR-to-throughput mapping

Figure 13: Experimental Results with D2D

or disabled in the LTE network. Figures 9, 10 and 11show the CDF of the UE average spectral efficiency, averagethroughput, and UE wideband SINR, respectively. As wecan see, when D2D communication is enabled, the averageUE throughput is continuously improved (almost doubled)and this is exactly what we expect, the average UE spectralefficiency is decreased because higher throughput demandshigher frequencies that can accommodate lower numbers ofbits, and SINR has lower range but still many UEs are ingood range of coverage from the base stations. For exam-ple, for the average throughput of UEs, about 80 percentof UEs can reach a throughput of 10 to 30 Mbps when theD2D communication is enabled, while almost 80 percent ofthe UEs have the throughput under 10 Mbps when the D2Dcommunication is not used.

As shown in Figure 12, when the D2D communication is notenabled and all 2250 UEs (blue dots) are connected to theLTE network, the Maximum Average Throughput is lessthan 25 Mbps where SINR is less than 15 db. However,majority of UEs have throughput less than 10 Mbps whereSINR is less than 10 db. The average ratio between through-put and SINR is displayed in red dots. When we compareFigure 12 to Figure 13, we can clearly see that out of 95 UEs(heads of clusters) connected to the LTE network, the ma-jority of the UEs have a throughput between 10 to 50Mbpswhere SINR is between -5 to 10 db. These results show thatwhen Wi-Fi D2D communications is enabled, we can dra-matically increase the UE throughput (UEs obtain about 5times more throughput than what they had before the D2D

communication assistance).

On the other hand, Figure 14 shows that the majority of all2250 UEs, which are connected to the LTE network whenthe D2D communication is not used, have an average spec-tral efficiency of less than 3 bit/cu where SINR is less than10 db. However, when we enable the D2D communicationand disconnect most of the UEs connected to the LTE net-work (only 95 UEs are connected to the LTE network inthis case), we expect that the LTE network should switchfrom lower frequency LTE channels to higher frequenciesbecause of less signal noise and interference in comparisonwith the condition where the D2D communication is not en-abled and all 2250 UEs are connected. When this occurs,the average throughput will increase dramatically becausewe disconnected a large number UEs. Nonetheless, we donot see a significant change in spectral efficiency. As shownin Figure 15, the majority of 95 UEs connected to the LTEnetwork have the spectral efficiency of less than 2.5 bit/cuwhere SINR is less than 5 db.

5. CASE STUDY II: SUPPORTING IOT AP-PLICATIONS

IoT has attracted significant attention and can be consid-ered to a networking infrastructure which can connect mas-sive amounts of physical objects belonging to numerous crit-ical infrastructure systems and others. By incorporatingcomputing and communication techniques with the physical

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 42

Page 43: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

UE wideband SINR [dB]

-10 -5 0 5 10 15 20 25

avera

ge U

E s

pecctr

al eff

icie

ncy [bit/c

u]

0

1

2

3

4

5

6

7

8UE wideband SINR-to-spectral efficiency mapping

Figure 14: Experimental Results without D2D

UE wideband SINR [dB]

-10 -5 0 5 10 15

avera

ge U

E s

pecctr

al eff

icie

ncy [bit/c

u]

0

0.5

1

1.5

2

2.5

3

3.5

4UE wideband SINR-to-spectral efficiency mapping

Figure 15: Experimental Results with D2D

Figure 16: Smart MeterAverage Spectral Efficiency

(with D2D as Green)

Figure 17: Smart MeterAverage Throughput (with

D2D as Green)

Figure 18: Smart MeterWideband SINR (with D2D

as Green)

systems, IoT applications can enable monitoring and con-trol abilities of a number of physical systems (power grid,transportation system, medical system, city infrastructuresystem, etc.).

In this case study, we now use the smart grid as an ex-ample to demonstrate that our proposed scheme can sup-port efficient communication of IoT applications. Our pro-posed scheme is generic and can be expanded to supportother IoT applications. In the smart grid, the geographi-cally distributed meters, sensors, actuators and controllersare tightly integrated through communication networks andcomputational cores, enabling the secured and efficient op-erations of the power grid [17]. Meters and sensors obtainmeasurements from the physical power grid and transmitmeasurement data to the operation center through commu-nication networks, which further use computational coresto determine the status of power grid. The operation cen-ter then performs management and control, sending controlcommands to actuators, which activate the power grid sys-tem to desirable states. Thus, in the smart grid, a largenumber of meters and sensors need to be interconnectedand transmit the data to the operation center for the sakeof effective operation.

In our investigation, we consider leveraging the developedclustering-based scheme to establish mesh-based Wi-Fi Di-rect networks to connect smart meters (sensors) in the smartgrid. Then, the head of a cluster will provide indirect com-munication links between meters (sensors) in the cluster andthe operation center, either through the cellular network or

by connecting to another nearby cluster.

5.1 Evaluation Setting and Real-WorldData Collection

To set the configuration for the defined LTE-based cellularnetwork, all key parameters are defined in the Matlab simu-lation code. As previously mentioned, in addition to param-eters related to LTE-based cellular networks, we have alsoimplemented the D2D feature and added several parame-ters related to D2D communication. Furthermore, there aremore configurations added to gather smart meter locationsfrom Google servers. At this point, similar to previous casestudy, we have collected real-world data for both eNodeBsand UEs from OpenCellID (similar to the Case Study I) andsmart meters (as UEs) from Google. For the eNodeBs, weneed to define a ROI to obtain the first 1000 tower locationsand for the smart meters, we need to generate completepostal addresses to obtain the locations of the smart metersone by one.

To use real-world data for smart meters and bring them tothe simulation, we used Google geo-coding APIs and gen-erated HTML “get” requests in Matlab simulation code togather the locations of the smart meters. Since the exactlocations of smart meters that are actually installed are notavailable to the public, we use the locations of the addressesthat we gather from Google geo-coding APIs and assumethey already installed a smart meter. To use Google geo-coding APIs, we need to generate addresses for each street(or avenue, etc.) and send that address to Google server to

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 43

Page 44: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

UE wideband SINR [dB]

-40 -30 -20 -10 0 10 20 30

avera

ge U

E thro

ughput [M

b/s

]

0

10

20

30

40

50

60

70UE wideband SINR-to-throughput mapping

Figure 19: Experimental Resultswithout D2D

Figure 20: Experimental Resultswith D2D

UE wideband SINR [dB]

-15 -10 -5 0 5 10 15 20 25 30

avera

ge U

E s

pecctr

al effic

iency [bit/c

u]

0

1

2

3

4

5

6

7

8

9

10UE wideband SINR-to-spectral efficiency mapping

Figure 21: Experimental Resultswithout D2D

Figure 22: Experimental Resultswith D2D

obtain the latitude and longitude of that particular addresson the earth. Later in the implementation, those coordi-nates of addresses are converted to a two dimensional mapusing built-in functions in Matlab that receive latitude andlongitude and translate them into a 2D position to showon a 2D map (also gathered from Google), shown in Fig-ure 23. To run the simulations for real-world data for botheNodeBs and UEs, we use the first 50 locations out of 1000site locations for BSs such that each location has 3 eNodeBs(150 eNodeBs in total), and 10000 locations from Google forsmart meters. As shown in Figure 23, we collect smart me-ter locations between Towson University and Johns HopkinsUniversity to have ample diversity in both UE locations andeNodeB locations that are considerably far away from eachother.

5.2 Evaluation ResultsAs mentioned before, we run the simulation for both theLTE only communication and Wi-Fi Direct assisted LTE us-ing our proposed scheme to create clusters. Figure 17 showsa magnificent increase in the average throughput of smartmeters when the D2D communication is enabled. Out of10000 smart meters from different areas of the Towson townarea and Baltimore city, 9708 smart meters were able to joinclusters and the rest of the smart meters were out of range.Each cluster has one smart meter that is connected to theLTE network directly. By doing so, the average throughput

of smart meters can be significantly improved in compari-son with the case where D2D communication is not used.Since the Wi-Fi range in the simulations is set to 20 metersin radius, we expect to have a lower number of clusters incomparison with the previous case study because most of thesmart meters are located within range of the Wi-Fi coverageof each other. As expected, all 9708 smart meters createdonly 69 clusters, meaning that only 69 smart meters need tohave LTE modules installed to connect all 9708 smart me-ters to the LTE network for utility providers to collect datareported from smart meters.

Figures 16, 17 and 18 show the CDF of the smart meter’s av-erage spectral efficiency, average throughput, and widebandSINR. When the D2D communication is enabled, the aver-age throughput of smart meters is continuously improved,the average spectral efficiency of smart meters is decreased,and SINR has lower range. For example, for the averagethroughput of smart meters, about 50 percent of smart me-ters can reach a throughput of 10 to 50 Mbps when the D2Dcommunication is enabled, while almost 100 percent of thesmart meters have the throughput under 500 kbps when theD2D communication is not used. Notice that since smartmeters may not have much data to transmit locally to eachother, there is not much local data traffic to be offloadedfrom the LTE network for smart meters. The main ideausing the proposed scheme to connect smart meters to theLTE network is to find the heads of the clusters that we can

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 44

Page 45: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

Figure 23: Smart Meters Locations of Baltimore Cityand Towson Area

determine the optimum number LTE modules to connect allsmart meters in a neighbourhood to the LTE network andprovide them with broadband network access connected tothe utility provider. Smart meters do not generate networktraffic like users’ UEs, and it is expected that by using theproposed scheme for a combination of both user UEs andsmart meters, the LTE network capacity can increase anddata traffic can still be reduced when Wi-Fi Direct D2Dcommunication is enabled.

As shown in Figure 19, when the D2D communication isnot enabled and all 10000 smart meters are connected tothe LTE network, the Maximum Average Throughput is lessthan 500 kbps where SINR is between -10 to 10 db. How-ever, only a few smart meters have throughput higher than1 Mbps and lower than 30 Mbps. The average ratio be-tween throughput and SINR is displayed in red dots. Whenwe compare Figure 19 to Figure 20, we clearly see that outof 69 smart meters (heads of clusters) connected to the LTEnetwork, the majority of the smart meters have throughputbetween 10 to 60 Mbps where SINR is between -5 to 10 db.These results show that by assisting the LTE network withour proposed Wi-Fi Direct D2D scheme, we can dramati-cally increase the throughput.

On the other hand, Figure 21 shows that the majority ofall 10000 smart meters that are connected to the LTE net-work when D2D communication is not enabled, have averagespectral efficiency of less than 5 bit/cu where SINR is lessthan 15 db. However, when we enable the D2D communi-cation and only 69 smart meters are connected to the LTEnetwork directly and the average throughput can increasedramatically as we disconnect a very large number of smartmeters (9,639 smart meters). We do not see a significantchange in spectral efficiency as shown in Figure 22 and themajority of 69 UEs connected to the LTE network have thespectral efficiency of less than 4 bit/cu where SINR is lessthan 10 db.

6. RELATED WORKD2D communication techniques have been gaining more at-tention in recent years. There have been a number of re-search efforts on developing D2D communication techniquesto improve the spectral efficiency of wireless networks [19,

14, 13, 18, 31, 9]. Based on the spectrum used for D2Dcommunication co-existing with the spectrum used for thecore wireless network infrastructure (e.g., cellular networks),existing D2D communication techniques can be categorizedinto two main categories: inband and outband D2D tech-niques. To illustrate the difference between inbound andoutband D2D techniques, we use the cellular network topresent the core wireless network infrastructure.

With respect to inband-based D2D communication tech-niques, the spectrum is shared by the D2D communicationand the cellular users [6, 15]. While the inband D2D-basedtechniques use a licensed spectrum band and the cellularnetwork is capable of controlling spectrum resources sharedwith the D2D communication, how to deal with the in-terference between D2D users to cellular users and effec-tively manage spectrum resources remains an open issue.To mitigate the interference, a number resource manage-ment schemes have been developed [26, 29, 20, 21]. Forexample, Lin et al. [21] developed a hybrid network modelto capture some key characteristics of D2D-enabled cellularnetworks, including the control of transmission power, theresource scheduling of cellular users to optimize spectrumsharing, etc. Kim et al. [26] developed a scheme to deter-mine the range of frequency that is available only for D2Dlinks in order to ensure the orthogonality between cellularlinks and D2D links in the frequency domain.

With respect to outband-based D2D communication tech-niques, unlicensed spectrum is commonly used for support-ing the communication of D2D links. In these techniques,while there is no interference issue between D2D and cellu-lar communications, mobile devices are required to have anextra wireless communication interface to support the dif-ferent wireless communication implementations (Wi-Fi Di-rect [12, 4], ZigBee [28], Bluetooth [22], etc.) through anunlicensed spectrum. For example, Camps-Mur et al. [12]provided an overview of features specified in Wi-Fi Directand investigated the performance-energy tradeoffs of thepower saving mechanisms defined in Wi-Fi Direct. Therehave been some research efforts on improving the efficiencyand reliability of D2D communications [3, 5, 4]. For ex-ample, Zhou et al. in [32] proposed to use the ISM bandfor D2D communications in a LTE-based wireless network.Their study showed that simultaneous channel contentionfrom both D2D and wireless LAN users could dramaticallyreduce the network performance.

7. CONCLUSIONIn this paper, we investigated Wi-Fi Direct as an outbandsolution of D2D communication in LTE-based cellular net-works. To enable the communication among devices that arenearby each other, provide the ability of offloading traffictransmitted via LTE-based cellular networks, and supportcommunications for IoT applications such as the smart grid,we developed a clustering scheme which could create smallWi-Fi network clusters for nearby devices to remain con-nected to the LTE-based cellular network. Using real-worlddata collected from a public database in LTE networks andsmart meter information, we demonstrated the effectiveness

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 45

Page 46: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

of our proposed scheme with respect to a comprehensive setof metrics.

8. REFERENCES

[1] Cyber-Physical Systems Virtual Organization. http://

cps-vo.org/.

[2] WiFi-Direct. http://www.wi-fi.org/who-we-are.

[3] V. M. Arash Asadi. On the compound impact of op-portunistic scheduling and d2d communications in cel-lular networks. In Proceedings of the 16th ACM Inter-national Conference on Modeling, Analysis and Simu-lation of Wireless and Mobile Systems (MSWiM), De-cember 2013.

[4] A. Asadi and V. Mancuso. Wifi direct and lte d2d in ac-tion. In Proceedings of 2013 IFIP Wireless Days (WD),November 2013.

[5] A. Asadi and V. Mancuso. Dronee: Dual-radio op-portunistic networking for energy efficiency. ComputerCommunications, 50:41 – 52, 2014.

[6] A. Asadi, V. Mancuso, and P. Jacko. Floating bandd2d: Exploring and exploiting the potentials of adap-tive d2d-enabled networks. In Proceedings of 2015 IEEE16th International Symposium on a World of Wireless,Mobile and Multimedia Networks (WoWMoM), 2015.

[7] A. Asadi, Q. Wang, and V. Mancuso. A survey ondevice-to-device communication in cellular networks.IEEE Communications Surveys Tutorials, 16(4):1801–1819, Fourthquarter 2014.

[8] A. Asadi, Q. Wang, and V. Mancuso. A surveyon device-to-device communication in cellular net-works. IEEE Communication Survey and Tutorials,16(4):1801–1819, April 2014.

[9] A. Asadi, Q. Wang, and V. Mancuso. A survey ondevice-to-device communication in cellular networks.IEEE Communications Surveys Tutorials, 16(4):1801–1819, Fourthquarter 2014.

[10] S. S. Assaf. Performance analysis of prioritization in ltenetworks with the vienna lte system level simulator.

[11] O. W. by ENAiKOON. Available at:http://opencellid.org/.

[12] D. Camps-Mur, A. Garcia-Saavedra, and P. Ser-rano. Device-to-device communications with wi-fi di-rect: overview and experimentation. IEEE WirelessCommunications, 20(3):96–104, 2013.

[13] K. Doppler, M. Rinne, P. Janis, C. Ribeiro, andK. Hugl. Device-to-device communications; functionalprospects for lte-advanced networks. In Proceedingsof IEEE International Conference on CommunicationsWorkshops (ICC Workshop), pages 1–6, June 2009.

[14] K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, andK. Hugl. Device-to-device communication as an under-lay to lte-advanced networks. IEEE CommunicationsMagazine, 47(12):42–49, December 2009.

[15] Q. Du, P. Ren, H. Song, Y. Wang, and L. Sun. On p2p-share oriented routing over interference-constrained d2dnetworks. In Proceedings of 2014 10th InternationalConference on Mobile Ad-hoc and Sensor Networks(MSN), December 2014.

[16] B. Everitt. Cluster analysis.

[17] X. Fang, S. Misra, G. Xue, and D. Yang. Smartgrid: The new and improved power grid: A survey.IEEE Communications Surveys Tutorials, 14(4):944–980, 2012.

[18] N. Golrezaei, P. Mansourifard, A. F. Molisch, and A. G.Dimakis. Base-station assisted device-to-device com-munications for high-throughput wireless video net-works. IEEE Transactions on Wireless Communica-tions, 13(7), April 2014.

[19] B. Kaufman and B. Aazhang. Cellular networks with anoverlaid device to device network. In Proceedings of the2008 42nd Asilomar Conference on Signals, Systemsand Computers, October 2008.

[20] A. Kuhnle, X. Li, and M. Thai. Online algorithmsfor optimal resource management in dynamic d2d com-munications. In Proceedings of 2014 10th Interna-tional Conference on Mobile Ad-hoc and Sensor Net-works (MSN), December 2014.

[21] X. Lin, J. G. Andrews, and A. Ghosh. A comprehen-sive framework for device-to-device communications incellular networks. CoRR, abs/1305.4219, 2013.

[22] C. Liu, C. Zhang, H. Yao, D. Zeng, Q. Liang, and C. Hu.A gps information sharing system based on bluetoothtechnology. In Proceedings of 2014 International Con-ference on IT Convergence and Security (ICITCS), Oc-tober 2014.

[23] A. Osseiran, F. Boccardi, V. Braun, K. Kusume,P. Marsch, M. Maternia, O. Queseth, M. Schellmann,H. Schotten, H. Taoka, et al. Scenarios for 5g mobileand wireless communications: the vision of the metisproject. IEEE Communications Magazine, 52(5):26–35,2014.

[24] P. K. Rekhi. Throughput calculation forlte tdd and fdd system. Available at:http://www.slideshare.net/veermalik121/throughput-calculation-for-lte-tdd-and-fdd-system.

[25] R. Rouil, A. Izquierdo, M. Souryal, C. Gentile, D. Grif-fith, and N. Golmie. Nationwide safety: Nationwidemodeling for broadband network services. IEEE Vehic-ular Magazine, 2:83–91, June 2013.

[26] H. sub Kim, J. hyeon Na, and E. Cho. Resource allo-cation policy to avoid interference between cellular andd2d links/ and d2d links in mobile networks. In Proceed-ings of 2014 International Conference on InformationNetworking (ICOIN), February 2014.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 46

Page 47: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

[27] M. Taranetz, T. Blazek, T. Kropfreiter, M. Muller,S. Schwarz, and M. Rupp. Runtime precoding: En-abling multipoint transmission in lte-advanced system-level simulations. IEEE Access, 3:725–736, June 2015.

[28] Y. Yan, P. Yang, X.-Y. Li, Y. Zhang, J. Lu, L. You,J. Wang, J. Han, and Y. Xiong. Wizbee: Wise zig-bee coexistence via interference cancellation with sin-gle antenna. IEEE Transactions on Mobile Computing,14(12):2590–2603, December 2015.

[29] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. An-drews. Resource optimization in device-to-device cel-lular systems using time-frequency hopping. CoRR,abs/1309.4062, 2013.

[30] W. Yu, H. Xu, H. Zhang, D. Griffith, and N. Golmie.Ultra dense networks: State of art and future directions.In Proc. of IEEE International Conference on Com-puter Communication and Networks (ICCCN), 2016.

[31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen. Intr-acluster device-to-device relay algorithm with optimalresource utilization. IEEE Transactions on VehicularTechnology, 62(5):2315–2326, June 2013.

[32] B. Zhou, S. Ma, J. Xu, and Z. Li. Group-wise chan-nel sensing and resource pre-allocation for lte d2d onism band. In Proceedings of IEEE Wireless Commu-nications and Networking Conference (WCNC), April2013.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 47

Page 48: Mar. 2017, Vol. 17, No. 1 17-1.pdf · 2017-03-30 · incorrectly heat theroom and , as su ch, would probably lower the occupant comfort levels and the building’s energy efficiency

ABOUT THE AUTHORS:

Amirshahram Hematian received his B.S. degree in Computer’s Hardware Engineering from Azad University of Maybod, Yazd, Iran in 2007, the M.S. degree in Software Engineering from University Teknologi Malaysia, Kuala Lumpur, Malaysia in 2013, and currently pursuing his doctoral degree in Information Technology at Towson University since 2014. His research interests include wireless networks, biometrics, robotics and signal processing. His current research encompasses device-to-device communication in LTE networks adopting software defined radio systems and clustered mesh networks. He has published 12 research papers in the past 5 years.

Wei Yu received the B.S. degree in electrical engineering from Nanjing University of Technology, Nanjing, China, in 1992, the M.S. degree in electrical engineering from Tongji University, Shanghai, China in 1995, and the Ph.D. degree in computer engineering from Texas A&M University in 2008. He is currently an Associate Professor with the Department of Computer and Information Sciences, Towson University. Before joining Towson, he was with Cisco Systems Inc. for nine years. His research interests include cyberspace security and privacy, computer networks, and cyber-physical systems. He is a recipient of a 2014 NSF CAREER Award, and 2016 USM Wilson H. Elkins Professorship.

Chao Lu has been with Towson University as a professor of Computer Science since 1990. He received his BS in Engineering from Shandong University China in 1982, and MS in 1985 and Ph.D. in Engineering (E.E.) in 1988 from the City University of New York. His research interests include error-free computing, human motion classification, computer vision, and parallel computing. He received the U.S. Federal “Excellence in Technology Transfer” award and the “Alan Berman Research Publications” award in 2001, and published more than 80 research papers.

David Griffith is with the Communication Technology Laboratory at the National Institute of Standards and Technology (NIST), where his research interests include public safety broadband networks, with a focus on modeling device-to-device communications networks, and resource allocation for next generation wireless communications. Prior to coming to NIST, he received the PhD in electrical engineering from the University of Delaware, and spent several years in industry doing systems engineering for satellite communications systems.

Nada Golmie received her Ph.D. in computer science from the University of Maryland at College Park. Since 1993, she has been a research engineer at the National Institute of Standards and Technology. She is currently the chief of the wireless networks division in the Communications Technology Laboratory. Her research in media access control and protocols for wireless networks led to over 100 technical papers presented at professional conferences, journals, and contributed to international standard organizations and industry led consortia. She leads several projects related to the modeling and evaluation of future generation wireless systems and protocols and serves as a co-chair for the 5G mmWave Channel Model Alliance and leads the NIST Future Generation Communication R&D Roadmap.

APPLIED COMPUTING REVIEW MAR. 2017, VOL. 17, NO. 1 48