CINXE.COM
Search results for: software defined radios
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: software defined radios</title> <meta name="description" content="Search results for: software defined radios"> <meta name="keywords" content="software defined radios"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="software defined radios" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="software defined radios"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 7497</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: software defined radios</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7497</span> Preliminary Findings from a Research Survey on Evolution of Software Defined Radio</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Srilatha">M. Srilatha</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Hemalatha"> R. Hemalatha</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Sri%20Aditya"> T. Sri Aditya </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communication of today world is dominated by wireless technology. This is mainly due to the revolutionary development of new wireless communication system generations. The evolving new generations of wireless systems are accommodating the demand through better resource management including improved transmission technologies with optimized communication devices. To keep up with the evolution of technologies, the communication systems must be designed to optimize transparent insertion of newly evolved technologies virtually at all stages of their life cycle. After the insertion of new technologies, the upgraded devices should continue the communication without squalor in quality. The concern of improving spectrum access and spectrum efficiency combined with both the introduction of Software Defined Radios (SDR) and the possibility of the software application to radios has led to an evolution of wireless radio research. The software defined radio term was coined in the 1970s to overcome the problems in the application of software to wireless radios which eliminates the requirement of hardware changes. SDR has become the prime theme of research since it eliminates the drawbacks associated with conventional wireless communication systems implementation. This paper identifies and discusses key enabling technologies and possibility of research and development in SDRs. In addition transmitter and receiver architectures of SDR are also discussed along with their feasibility for reconfigurable radio application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios" title="software defined radios">software defined radios</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20communication" title=" wireless communication"> wireless communication</a>, <a href="https://publications.waset.org/abstracts/search?q=reconfigurable" title=" reconfigurable"> reconfigurable</a>, <a href="https://publications.waset.org/abstracts/search?q=reconfigurable%20transmitter" title=" reconfigurable transmitter"> reconfigurable transmitter</a>, <a href="https://publications.waset.org/abstracts/search?q=reconfigurable%20receivers" title=" reconfigurable receivers"> reconfigurable receivers</a>, <a href="https://publications.waset.org/abstracts/search?q=FPGA" title=" FPGA"> FPGA</a>, <a href="https://publications.waset.org/abstracts/search?q=DSP" title=" DSP"> DSP</a> </p> <a href="https://publications.waset.org/abstracts/11812/preliminary-findings-from-a-research-survey-on-evolution-of-software-defined-radio" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11812.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7496</span> A Survey of Baseband Architecture for Software Defined Radio</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Fodha">M. A. Fodha</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Benfradj"> H. Benfradj</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Ghazel"> A. Ghazel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is a survey of recent works that proposes a baseband processor architecture for software defined radio. A classification of different approaches is proposed. The performance of each architecture is also discussed in order to clarify the suitable approaches that meet software-defined radio constraints. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-core%20architectures" title="multi-core architectures">multi-core architectures</a>, <a href="https://publications.waset.org/abstracts/search?q=reconfigurable%20architectures" title=" reconfigurable architectures"> reconfigurable architectures</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20radio" title=" software defined radio"> software defined radio</a>, <a href="https://publications.waset.org/abstracts/search?q=baseband%20processor" title=" baseband processor"> baseband processor</a> </p> <a href="https://publications.waset.org/abstracts/18695/a-survey-of-baseband-architecture-for-software-defined-radio" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18695.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7495</span> Influence of Security Attributes in Component-Based Software Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Zeinali">Somayeh Zeinali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20development" title="component-based software development">component-based software development</a>, <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20engineering" title=" component-based software engineering "> component-based software engineering </a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security%20attributes" title="software security attributes">software security attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=dependability" title=" dependability"> dependability</a>, <a href="https://publications.waset.org/abstracts/search?q=component" title=" component"> component</a> </p> <a href="https://publications.waset.org/abstracts/26037/influence-of-security-attributes-in-component-based-software-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">559</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7494</span> Evaluation of SDS (Software Defined Storage) Controller (CorpHD) for Various Storage Demands</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shreya%20Bokare">Shreya Bokare</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Pawar"> Sanjay Pawar</a>, <a href="https://publications.waset.org/abstracts/search?q=Shika%20Nema"> Shika Nema</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Growth in cloud applications is generating the tremendous amount of data, building load on traditional storage management systems. Software Defined Storage (SDS) is a new storage management concept becoming popular to handle this large amount of data. CoprHD is one of the open source SDS controller, available for experimentation and development in the storage industry. In this paper, the storage management techniques provided by CoprHD to manage heterogeneous storage platforms are experimented and analyzed. Various storage management parameters such as time to provision, storage capacity measurement, and heterogeneity are experimentally evaluated along with the theoretical expression to prove the completeness of CoprHD controller for storage management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20storage" title="software defined storage">software defined storage</a>, <a href="https://publications.waset.org/abstracts/search?q=SDS" title=" SDS"> SDS</a>, <a href="https://publications.waset.org/abstracts/search?q=CoprHD" title=" CoprHD"> CoprHD</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20source" title=" open source"> open source</a>, <a href="https://publications.waset.org/abstracts/search?q=SMI-S%20simulator" title=" SMI-S simulator"> SMI-S simulator</a>, <a href="https://publications.waset.org/abstracts/search?q=clarion" title=" clarion"> clarion</a>, <a href="https://publications.waset.org/abstracts/search?q=Symmetrix" title=" Symmetrix"> Symmetrix</a> </p> <a href="https://publications.waset.org/abstracts/58089/evaluation-of-sds-software-defined-storage-controller-corphd-for-various-storage-demands" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7493</span> Software-Defined Architecture and Front-End Optimization for DO-178B Compliant Distance Measuring Equipment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farzan%20Farhangian">Farzan Farhangian</a>, <a href="https://publications.waset.org/abstracts/search?q=Behnam%20Shakibafar"> Behnam Shakibafar</a>, <a href="https://publications.waset.org/abstracts/search?q=Bobda%20Cedric"> Bobda Cedric</a>, <a href="https://publications.waset.org/abstracts/search?q=Rene%20Jr.%20Landry"> Rene Jr. Landry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Among the air navigation technologies, many of them are capable of increasing aviation sustainability as well as accuracy improvement in Alternative Positioning, Navigation, and Timing (APNT), especially avionics Distance Measuring Equipment (DME), Very high-frequency Omni-directional Range (VOR), etc. The integration of these air navigation solutions could make a robust and efficient accuracy in air mobility, air traffic management and autonomous operations. Designing a proper RF front-end, power amplifier and software-defined transponder could pave the way for reaching an optimized avionics navigation solution. In this article, the possibility of reaching an optimum front-end to be used with single low-cost Software-Defined Radio (SDR) has been investigated in order to reach a software-defined DME architecture. Our software-defined approach uses the firmware possibilities to design a real-time software architecture compatible with a Multi Input Multi Output (MIMO) BladeRF to estimate an accurate time delay between a Transmission (Tx) and the reception (Rx) channels using the synchronous scheduled communication. We could design a novel power amplifier for the transmission channel of the DME to pass the minimum transmission power. This article also investigates designing proper pair pulses based on the DO-178B avionics standard. Various guidelines have been tested, and the possibility of passing the certification process for each standard term has been analyzed. Finally, the performance of the DME was tested in the laboratory environment using an IFR6000, which showed that the proposed architecture reached an accuracy of less than 0.23 Nautical mile (Nmi) with 98% probability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=avionics" title="avionics">avionics</a>, <a href="https://publications.waset.org/abstracts/search?q=DME" title=" DME"> DME</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20radio" title=" software defined radio"> software defined radio</a>, <a href="https://publications.waset.org/abstracts/search?q=navigation" title=" navigation"> navigation</a> </p> <a href="https://publications.waset.org/abstracts/163144/software-defined-architecture-and-front-end-optimization-for-do-178b-compliant-distance-measuring-equipment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163144.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7492</span> Software-Defined Networks in Utility Power Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ava%20Salmanpour">Ava Salmanpour</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanieh%20Saeedi"> Hanieh Saeedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Payam%20Rouhi"> Payam Rouhi</a>, <a href="https://publications.waset.org/abstracts/search?q=Elahe%20Hamzeil"> Elahe Hamzeil</a>, <a href="https://publications.waset.org/abstracts/search?q=Shima%20Alimohammadi"> Shima Alimohammadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Siamak%20Hossein%20Khalaj"> Siamak Hossein Khalaj</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Asadian"> Mohammad Asadian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software-defined%20network" title="software-defined network">software-defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=SDNs" title=" SDNs"> SDNs</a>, <a href="https://publications.waset.org/abstracts/search?q=utility%20network" title=" utility network"> utility network</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20flow" title=" open flow"> open flow</a>, <a href="https://publications.waset.org/abstracts/search?q=communication" title=" communication"> communication</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20and%20electricity" title=" gas and electricity"> gas and electricity</a>, <a href="https://publications.waset.org/abstracts/search?q=controller" title=" controller"> controller</a> </p> <a href="https://publications.waset.org/abstracts/155341/software-defined-networks-in-utility-power-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7491</span> UWB Open Spectrum Access for a Smart Software Radio</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hemalatha%20Rallapalli">Hemalatha Rallapalli</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Lal%20Kishore"> K. Lal Kishore</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In comparison to systems that are typically designed to provide capabilities over a narrow frequency range through hardware elements, the next generation cognitive radios are intended to implement a broader range of capabilities through efficient spectrum exploitation. This offers the user the promise of greater flexibility, seamless roaming possible on different networks, countries, frequencies, etc. It requires true paradigm shift i.e., liberalization over a wide band of spectrum as well as a growth path to more and greater capability. This work contributes towards the design and implementation of an open spectrum access (OSA) feature to unlicensed users thus offering a frequency agile radio platform that is capable of performing spectrum sensing over a wideband. Thus, an ultra-wideband (UWB) radio, which has the intelligence of spectrum sensing only, unlike the cognitive radio with complete intelligence, is named as a Smart Software Radio (SSR). The spectrum sensing mechanism is implemented based on energy detection. Simulation results show the accuracy and validity of this method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20radio" title="cognitive radio">cognitive radio</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20detection" title=" energy detection"> energy detection</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20radio" title=" software radio"> software radio</a>, <a href="https://publications.waset.org/abstracts/search?q=spectrum%20sensing" title=" spectrum sensing"> spectrum sensing</a> </p> <a href="https://publications.waset.org/abstracts/6573/uwb-open-spectrum-access-for-a-smart-software-radio" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7490</span> Software-Defined Radio Based Channel Measurement System of Wideband HF Communication System in Low-Latitude Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20H.%20Mukti">P. H. Mukti</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Kurniawati"> I. Kurniawati</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Oktaviansyah"> F. Oktaviansyah</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20D.%20Adhitya"> A. D. Adhitya</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Rachmadani"> N. Rachmadani</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Corputty"> R. Corputty</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Hendrantoro"> G. Hendrantoro</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Fukusako"> T. Fukusako </a> </p> <p class="card-text"><strong>Abstract:</strong></p> HF Communication system is one of the attractive fields among many researchers since it can be reached long-distance areas with low-cost. This long-distance communication can be achieved by exploiting the ionosphere as a transmission medium for the HF radio wave. However, due to the dynamic nature of ionosphere, the channel characteristic of HF communication has to be investigated in order to gives better performances. Many techniques to characterize HF channel are available in the literature. However, none of those techniques describe the HF channel characteristic in low-latitude regions, especially equatorial areas. Since the ionosphere around equatorial region has an ESF phenomenon, it becomes an important investigation to characterize the wideband HF Channel in low-latitude region. On the other sides, the appearance of software-defined radio attracts the interest of many researchers. Accordingly, in this paper a SDR-based channel measurement system is proposed to be used for characterizing the HF channel in low-latitude region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=channel%20characteristic" title="channel characteristic">channel characteristic</a>, <a href="https://publications.waset.org/abstracts/search?q=HF%20communication%20system" title=" HF communication system"> HF communication system</a>, <a href="https://publications.waset.org/abstracts/search?q=LabVIEW" title=" LabVIEW"> LabVIEW</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20radio" title=" software-defined radio"> software-defined radio</a>, <a href="https://publications.waset.org/abstracts/search?q=universal%20software%20radio%20peripheral" title=" universal software radio peripheral"> universal software radio peripheral</a> </p> <a href="https://publications.waset.org/abstracts/8589/software-defined-radio-based-channel-measurement-system-of-wideband-hf-communication-system-in-low-latitude-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8589.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7489</span> Identifying Mitigation Plans in Reducing Usability Risk Using Delphi Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayaletchumi%20T.%20Sambantha%20Moorthy">Jayaletchumi T. Sambantha Moorthy</a>, <a href="https://publications.waset.org/abstracts/search?q=Suhaimi%20bin%20Ibrahim"> Suhaimi bin Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Naz%E2%80%99ri%20Mahrin"> Mohd Naz’ri Mahrin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most quality models have defined usability as a significant factor that leads to improving product acceptability, increasing user satisfaction, improving product reliability, and also financially benefiting companies. Usability is also the best factor that acts as a balance for both the technical and human aspects of a software product, which is an important aspect in defining quality during software development process. A usability risk can be defined as a potential usability risk factor that a chosen action or activity may lead to a possible loss or an undesirable outcome. This could impact the usability of a software product thereby contributing to negative user experiences and causing a possible software product failure. Hence, it is important to mitigate and reduce usability risks in the software development process itself. By managing possible involved usability risks in software development process, failure of software product could be reduced. Therefore, this research uses the Delphi method to identify mitigation plans to reduce potential usability risks. The Delphi method is conducted with seven experts from the field of risk management and software development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=usability" title="usability">usability</a>, <a href="https://publications.waset.org/abstracts/search?q=usability%20risk" title=" usability risk"> usability risk</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20mitigation" title=" risk mitigation"> risk mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=delphi%20study" title=" delphi study"> delphi study</a> </p> <a href="https://publications.waset.org/abstracts/11891/identifying-mitigation-plans-in-reducing-usability-risk-using-delphi-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11891.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">466</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7488</span> Implementation and Demonstration of Software-Defined Traffic Grooming</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lei%20Guo">Lei Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Xu%20Zhang"> Xu Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Weigang%20Hou"> Weigang Hou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NOX" title="NOX">NOX</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenFlow" title=" OpenFlow"> OpenFlow</a>, <a href="https://publications.waset.org/abstracts/search?q=Software%20Defined%20Network%20%28SDN%29" title=" Software Defined Network (SDN)"> Software Defined Network (SDN)</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20grooming" title=" traffic grooming"> traffic grooming</a> </p> <a href="https://publications.waset.org/abstracts/46050/implementation-and-demonstration-of-software-defined-traffic-grooming" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46050.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7487</span> A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anusha%20M.">Anusha M.</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Srikanth"> V. Srikanth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=TDMA" title="TDMA">TDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=MAC" title=" MAC"> MAC</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-channel" title=" multi-channel"> multi-channel</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-radio" title=" multi-radio"> multi-radio</a>, <a href="https://publications.waset.org/abstracts/search?q=WMN%E2%80%99S" title=" WMN’S"> WMN’S</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20radios" title=" cognitive radios"> cognitive radios</a> </p> <a href="https://publications.waset.org/abstracts/23181/a-survey-on-traditional-mac-layer-protocols-in-cognitive-wireless-mesh-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23181.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">561</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7486</span> Flow Conservation Framework for Monitoring Software Defined Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jes%C3%BAs%20Antonio%20Puente%20Fern%C3%A1ndez">Jesús Antonio Puente Fernández</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Javier%20Garcia%20Villalba"> Luis Javier Garcia Villalba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New trends on streaming videos such as series or films require a high demand of network resources. This fact results in a huge problem within traditional IP networks due to the rigidity of its architecture. In this way, Software Defined Networks (SDN) is a new concept of network architecture that intends to be more flexible and it simplifies the management in networks with respect to the existing ones. These aspects are possible due to the separation of control plane (controller) and data plane (switches). Taking the advantage of this separated control, it is easy to deploy a monitoring tool independent of device vendors since the existing ones are dependent on the installation of specialized and expensive hardware. In this paper, we propose a framework that optimizes the traffic monitoring in SDN networks that decreases the number of monitoring queries to improve the network traffic and also reduces the overload. The performed experiments (with and without the optimization) using a video streaming delivery between two hosts demonstrate the feasibility of our monitoring proposal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optimization" title="optimization">optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20networking" title=" software defined networking"> software defined networking</a>, <a href="https://publications.waset.org/abstracts/search?q=statistics" title=" statistics"> statistics</a>, <a href="https://publications.waset.org/abstracts/search?q=query" title=" query"> query</a> </p> <a href="https://publications.waset.org/abstracts/70411/flow-conservation-framework-for-monitoring-software-defined-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70411.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7485</span> Defect Management Life Cycle Process for Software Quality Improvement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aedah%20Abd%20Rahman">Aedah Abd Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Nurdatillah%20Hasim"> Nurdatillah Hasim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software quality issues require special attention especially in view of the demands of quality software product to meet customer satisfaction. Software development projects in most organisations need proper defect management process in order to produce high quality software product and reduce the number of defects. The research question of this study is how to produce high quality software and reducing the number of defects. Therefore, the objective of this paper is to provide a framework for managing software defects by following defined life cycle processes. The methodology starts by reviewing defects, defect models, best practices and standards. A framework for defect management life cycle is proposed. The major contribution of this study is to define a defect management road map in software development. The adoption of an effective defect management process helps to achieve the ultimate goal of producing high quality software products and contributes towards continuous software process improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defects" title="defects">defects</a>, <a href="https://publications.waset.org/abstracts/search?q=defect%20management" title=" defect management"> defect management</a>, <a href="https://publications.waset.org/abstracts/search?q=life%20cycle%20process" title=" life cycle process"> life cycle process</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20quality" title=" software quality"> software quality</a> </p> <a href="https://publications.waset.org/abstracts/40687/defect-management-life-cycle-process-for-software-quality-improvement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40687.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">306</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7484</span> Hardware Implementation and Real-time Experimental Validation of a Direction of Arrival Estimation Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nizar%20Tayem">Nizar Tayem</a>, <a href="https://publications.waset.org/abstracts/search?q=AbuMuhammad%20Moinuddeen"> AbuMuhammad Moinuddeen</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20A.%20Hussain"> Ahmed A. Hussain</a>, <a href="https://publications.waset.org/abstracts/search?q=Redha%20M.%20Radaydeh"> Redha M. Radaydeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research paper introduces an approach for estimating the direction of arrival (DOA) of multiple RF noncoherent sources in a uniform linear array (ULA). The proposed method utilizes a Capon-like estimation algorithm and incorporates LU decomposition to enhance the accuracy of DOA estimation while significantly reducing computational complexity compared to existing methods like the Capon method. Notably, the proposed method does not require prior knowledge of the number of sources. To validate its effectiveness, the proposed method undergoes validation through both software simulations and practical experimentation on a prototype testbed constructed using a software-defined radio (SDR) platform and GNU Radio software. The results obtained from MATLAB simulations and real-time experiments provide compelling evidence of the proposed method's efficacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DOA%20estimation" title="DOA estimation">DOA estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20validation" title=" real-time validation"> real-time validation</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20radio" title=" software defined radio"> software defined radio</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20complexity" title=" computational complexity"> computational complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=Capon%27s%20method" title=" Capon's method"> Capon's method</a>, <a href="https://publications.waset.org/abstracts/search?q=GNU%20radio" title=" GNU radio"> GNU radio</a> </p> <a href="https://publications.waset.org/abstracts/171293/hardware-implementation-and-real-time-experimental-validation-of-a-direction-of-arrival-estimation-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171293.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7483</span> Automated Detection of Related Software Changes by Probabilistic Neural Networks Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuan%20Huang">Yuan Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiangping%20Chen"> Xiangping Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaonan%20Luo"> Xiaonan Luo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Current software are continuously updating. The change between two versions usually involves multiple program entities (e.g., packages, classes, methods, attributes) with multiple purposes (e.g., changed requirements, bug fixing). It is hard for developers to understand which changes are made for the same purpose. Whether two changes are related is not decided by the relationship between this two entities in the program. In this paper, we summarized 4 coupling rules(16 instances) and 4 state-combination types at the class, method and attribute levels for software change. Related Change Vector (RCV) are defined based on coupling rules and state-combination types, and applied to classify related software changes by using Probabilistic Neural Network during a software updating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PNN" title="PNN">PNN</a>, <a href="https://publications.waset.org/abstracts/search?q=related%20change" title=" related change"> related change</a>, <a href="https://publications.waset.org/abstracts/search?q=state-combination" title=" state-combination"> state-combination</a>, <a href="https://publications.waset.org/abstracts/search?q=logical%20coupling" title=" logical coupling"> logical coupling</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20entity" title=" software entity"> software entity</a> </p> <a href="https://publications.waset.org/abstracts/10601/automated-detection-of-related-software-changes-by-probabilistic-neural-networks-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10601.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7482</span> A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Esmeralda%20Hysenbelliu">Esmeralda Hysenbelliu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=challenges" title="challenges">challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IPTV%20service" title=" IPTV service"> IPTV service</a>, <a href="https://publications.waset.org/abstracts/search?q=requirements" title=" requirements"> requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20networking%20%28SDN%29" title=" software defined networking (SDN)"> software defined networking (SDN)</a> </p> <a href="https://publications.waset.org/abstracts/49752/a-survey-on-requirements-and-challenges-of-internet-protocol-television-service-over-software-defined-networking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49752.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7481</span> Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andre%20Slonopas">Andre Slonopas</a>, <a href="https://publications.waset.org/abstracts/search?q=Zona%20Kostic"> Zona Kostic</a>, <a href="https://publications.waset.org/abstracts/search?q=Warren%20Thompson"> Warren Thompson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=moving%20target%20defense" title="moving target defense">moving target defense</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=hopping%20randomization" title=" hopping randomization"> hopping randomization</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20network" title=" software defined network"> software defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security%20theory" title=" network security theory"> network security theory</a> </p> <a href="https://publications.waset.org/abstracts/147592/cyber-security-enhancement-via-software-defined-pseudo-random-private-ip-address-hopping" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7480</span> Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Behrooz%20Daneshmand">Behrooz Daneshmand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software-defined%20networking" title="software-defined networking">software-defined networking</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=SDN" title=" SDN"> SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=5G%2FIMT-2020" title=" 5G/IMT-2020"> 5G/IMT-2020</a> </p> <a href="https://publications.waset.org/abstracts/148751/software-defined-networking-a-new-approach-to-fifth-generation-networks-security-issues-and-challenges-ahead" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7479</span> User-Driven Product Line Engineering for Assembling Large Families of Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhaopeng%20Xuan">Zhaopeng Xuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuan%20Bian"> Yuan Bian</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Cailleaux"> C. Cailleaux</a>, <a href="https://publications.waset.org/abstracts/search?q=Jing%20Qin"> Jing Qin</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Traore"> S. Traore</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traditional software engineering allows engineers to propose to their clients multiple specialized software distributions assembled from a shared set of software assets. The management of these assets however requires a trade-off between client satisfaction and software engineering process. Clients have more and more difficult to find a distribution or components based on their needs from all of distributed repositories. This paper proposes a software engineering for a user-driven software product line in which engineers define a feature model but users drive the actual software distribution on demand. This approach makes the user become final actor as a release manager in software engineering process, increasing user product satisfaction and simplifying user operations to find required components. In addition, it provides a way for engineers to manage and assembly large software families. As a proof of concept, a user-driven software product line is implemented for eclipse, an integrated development environment. An eclipse feature model is defined, which is exposed to users on a cloud-based built platform from which clients can download individualized Eclipse distributions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20product%20line" title="software product line">software product line</a>, <a href="https://publications.waset.org/abstracts/search?q=model-driven%20development" title=" model-driven development"> model-driven development</a>, <a href="https://publications.waset.org/abstracts/search?q=reverse%20engineering%20and%20refactoring" title=" reverse engineering and refactoring"> reverse engineering and refactoring</a>, <a href="https://publications.waset.org/abstracts/search?q=agile%20method" title=" agile method"> agile method</a> </p> <a href="https://publications.waset.org/abstracts/9008/user-driven-product-line-engineering-for-assembling-large-families-of-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9008.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">432</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7478</span> Quantification of Aerodynamic Variables Using Analytical Technique and Computational Fluid Dynamics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adil%20Loya">Adil Loya</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamran%20Maqsood"> Kamran Maqsood</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Duraid"> Muhammad Duraid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aerodynamic stability coefficients are necessary to be known before any unmanned aircraft flight is performed. This requires expertise on aerodynamics and stability control of the aircraft. To enable efficacious performance of aircraft requires that a well-defined flight path and aerodynamics should be defined beforehand. This paper presents a study on the aerodynamics of an unmanned aero vehicle (UAV) during flight conditions. Current research holds comparative studies of different parameters for flight aerodynamic, measured using two different open source analytical software programs. These software packages are DATCOM and XLRF5, which help in depicting the flight aerodynamic variables. Computational fluid dynamics (CFD) was also used to perform aerodynamic analysis for which Star CCM+ was used. Output trends of the study demonstrate high accuracies between the two software programs with that of CFD. It can be seen that the Coefficient of Lift (CL) obtained from DATCOM and XFLR is similar to CL of CFD simulation. In the similar manner, other potential aerodynamic stability parameters obtained from analytical software are in good agreement with CFD. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XFLR5" title="XFLR5">XFLR5</a>, <a href="https://publications.waset.org/abstracts/search?q=DATCOM" title=" DATCOM"> DATCOM</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20fluid%20dynamic" title=" computational fluid dynamic"> computational fluid dynamic</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aero%20vehicle" title=" unmanned aero vehicle"> unmanned aero vehicle</a> </p> <a href="https://publications.waset.org/abstracts/89932/quantification-of-aerodynamic-variables-using-analytical-technique-and-computational-fluid-dynamics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7477</span> Measuring Delay Using Software Defined Networks: Limitations, Challenges, and Suggestions for Openflow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Alutaibi">Ahmed Alutaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ganti%20Sudhakar"> Ganti Sudhakar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Providing better Quality-of-Service (QoS) to end users has been a challenging problem for researchers and service providers. Building applications relying on best effort network protocols hindered the adoption of guaranteed service parameters and, ultimately, Quality of Service. The introduction of Software Defined Networking (SDN) opened the door for a new paradigm shift towards a more controlled programmable configurable behavior. Openflow has been and still is the main implementation of the SDN vision. To facilitate better QoS for applications, the network must calculate and measure certain parameters. One of those parameters is the delay between the two ends of the connection. Using the power of SDN and the knowledge of application and network behavior, SDN networks can adjust to different conditions and specifications. In this paper, we use the capabilities of SDN to implement multiple algorithms to measure delay end-to-end not only inside the SDN network. The results of applying the algorithms on an emulated environment show that we can get measurements close to the emulated delay. The results also show that depending on the algorithm, load on the network and controller can differ. In addition, the transport layer handshake algorithm performs best among the tested algorithms. Out of the results and implementation, we show the limitations of Openflow and develop suggestions to solve them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20defined%20networking" title="software defined networking">software defined networking</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service" title=" quality of service"> quality of service</a>, <a href="https://publications.waset.org/abstracts/search?q=delay%20measurement" title=" delay measurement"> delay measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=openflow" title=" openflow"> openflow</a>, <a href="https://publications.waset.org/abstracts/search?q=mininet" title=" mininet"> mininet</a> </p> <a href="https://publications.waset.org/abstracts/126268/measuring-delay-using-software-defined-networks-limitations-challenges-and-suggestions-for-openflow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7476</span> Software Cloning and Agile Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Kumar">Ravi Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhrubajit%20Barman"> Dhrubajit Barman</a>, <a href="https://publications.waset.org/abstracts/search?q=Nomi%20Baruah"> Nomi Baruah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Cloning has grown an active area in software engineering research community yielding numerous techniques, various tools and other methods for clone detection and removal. The copying, modifying a block of code is identified as cloning as it is the most basic means of software reuse. Agile Software Development is an approach which is currently being used in various software projects, so that it helps to respond the unpredictability of building software through incremental, iterative, work cadences. Software Cloning has been introduced to Agile Environment and many Agile Software Development approaches are using the concept of Software Cloning. This paper discusses the various Agile Software Development approaches. It also discusses the degree to which the Software Cloning concept is being introduced in the Agile Software Development approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agile%20environment" title="agile environment">agile environment</a>, <a href="https://publications.waset.org/abstracts/search?q=refactoring" title=" refactoring"> refactoring</a>, <a href="https://publications.waset.org/abstracts/search?q=reuse" title=" reuse"> reuse</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20cloning" title=" software cloning"> software cloning</a> </p> <a href="https://publications.waset.org/abstracts/16005/software-cloning-and-agile-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16005.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">530</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7475</span> Statistical Analysis with Prediction Models of User Satisfaction in Software Project Factors </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katawut%20Kaewbanjong">Katawut Kaewbanjong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We analyzed a volume of data and found significant user satisfaction in software project factors. A statistical significance analysis (logistic regression) and collinearity analysis determined the significance factors from a group of 71 pre-defined factors from 191 software projects in ISBSG Release 12. The eight prediction models used for testing the prediction potential of these factors were Neural network, k-NN, Naïve Bayes, Random forest, Decision tree, Gradient boosted tree, linear regression and logistic regression prediction model. Fifteen pre-defined factors were truly significant in predicting user satisfaction, and they provided 82.71% prediction accuracy when used with a neural network prediction model. These factors were client-server, personnel changes, total defects delivered, project inactive time, industry sector, application type, development type, how methodology was acquired, development techniques, decision making process, intended market, size estimate approach, size estimate method, cost recording method, and effort estimate method. These findings may benefit software development managers considerably. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prediction%20model" title="prediction model">prediction model</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20analysis" title=" statistical analysis"> statistical analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20project" title=" software project"> software project</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20satisfaction%20factor" title=" user satisfaction factor"> user satisfaction factor</a> </p> <a href="https://publications.waset.org/abstracts/121683/statistical-analysis-with-prediction-models-of-user-satisfaction-in-software-project-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121683.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7474</span> An Orphan Software Engineering Course: Supportive Ways toward a True Software Engineer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haya%20Sammana">Haya Sammana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A well-defined curricula must be adopted to meet the increasing complexity and diversity in the software applications. In reality, some IT majors such as computer science and computer engineering receive the software engineering education in a single course which is considered as a big challenged for the instructors and universities. Also, it requires students to gain the most of practical experiences that simulate the real work in software companies. Furthermore, we have noticed that there is no consensus on how, when and what to teach in that introductory course to gain the practical experiences that are required by the software companies. Because all of software engineering disciplines will not fit in just one course, so the course needs reasonable choices in selecting its topics. This arises an important question which is an essential one to ask: Is this course has the ability to formulate a true software engineer that meets the needs of industry? This question arises a big challenge in selecting the appropriate topics. So answering this question is very important for the next undergraduate students. During teaching this course in the curricula, the feedbacks from an undergraduate students and the keynotes of the annual meeting for an advisory committee from industrial side provide a probable answer for the proposed question: it is impossible to build a true software engineer who possesses all the essential elements of software engineering education such teamwork, communications skills, project management skills and contemporary industrial practice from one course and it is impossible to have a one course covering all software engineering topics. Besides the used teaching approach, the author proposes an implemented three supportive ways aiming for mitigating the expected risks and increasing the opportunity to build a true software engineer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20engineering%20course" title="software engineering course">software engineering course</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering%20education" title=" software engineering education"> software engineering education</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20experience" title=" software experience"> software experience</a>, <a href="https://publications.waset.org/abstracts/search?q=supportive%20approach" title=" supportive approach"> supportive approach</a> </p> <a href="https://publications.waset.org/abstracts/36629/an-orphan-software-engineering-course-supportive-ways-toward-a-true-software-engineer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7473</span> Deep Routing Strategy: Deep Learning based Intelligent Routing in Software Defined Internet of Things.</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zabeehullah">Zabeehullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahim%20Arif"> Fahim Arif</a>, <a href="https://publications.waset.org/abstracts/search?q=Yawar%20Abbas"> Yawar Abbas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Defined Network (SDN) is a next genera-tion networking model which simplifies the traditional network complexities and improve the utilization of constrained resources. Currently, most of the SDN based Internet of Things(IoT) environments use traditional network routing strategies which work on the basis of max or min metric value. However, IoT network heterogeneity, dynamic traffic flow and complexity demands intelligent and self-adaptive routing algorithms because traditional routing algorithms lack the self-adaptions, intelligence and efficient utilization of resources. To some extent, SDN, due its flexibility, and centralized control has managed the IoT complexity and heterogeneity but still Software Defined IoT (SDIoT) lacks intelligence. To address this challenge, we proposed a model called Deep Routing Strategy (DRS) which uses Deep Learning algorithm to perform routing in SDIoT intelligently and efficiently. Our model uses real-time traffic for training and learning. Results demonstrate that proposed model has achieved high accuracy and low packet loss rate during path selection. Proposed model has also outperformed benchmark routing algorithm (OSPF). Moreover, proposed model provided encouraging results during high dynamic traffic flow. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SDN" title="SDN">SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=DL" title=" DL"> DL</a>, <a href="https://publications.waset.org/abstracts/search?q=ML" title=" ML"> ML</a>, <a href="https://publications.waset.org/abstracts/search?q=DRS" title=" DRS"> DRS</a> </p> <a href="https://publications.waset.org/abstracts/150674/deep-routing-strategy-deep-learning-based-intelligent-routing-in-software-defined-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150674.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7472</span> Suggestion for Malware Detection Agent Considering Network Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji-Hoon%20Hong">Ji-Hoon Hong</a>, <a href="https://publications.waset.org/abstracts/search?q=Dong-Hee%20Kim"> Dong-Hee Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Nam-Uk%20Kim"> Nam-Uk Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Tai-Myoung%20Chung"> Tai-Myoung Chung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android%20malware%20detection" title="android malware detection">android malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20network" title=" software-defined network"> software-defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20environment" title=" interaction environment"> interaction environment</a>, <a href="https://publications.waset.org/abstracts/search?q=android%20malware%20detection" title=" android malware detection"> android malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20network" title=" software-defined network"> software-defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20environment" title=" interaction environment"> interaction environment</a> </p> <a href="https://publications.waset.org/abstracts/39330/suggestion-for-malware-detection-agent-considering-network-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39330.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7471</span> Network Automation in Lab Deployment Using Ansible and Python</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20Andal%20Priyadharshini">V. Andal Priyadharshini</a>, <a href="https://publications.waset.org/abstracts/search?q=Anumalasetty%20Yashwanth%20Nath"> Anumalasetty Yashwanth Nath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Python%20network%20automation" title="Python network automation">Python network automation</a>, <a href="https://publications.waset.org/abstracts/search?q=Ansible%20configuration" title=" Ansible configuration"> Ansible configuration</a>, <a href="https://publications.waset.org/abstracts/search?q=container%20lab%20deployment" title=" container lab deployment"> container lab deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20networking" title=" software-defined networking"> software-defined networking</a>, <a href="https://publications.waset.org/abstracts/search?q=networking%20lab" title=" networking lab"> networking lab</a> </p> <a href="https://publications.waset.org/abstracts/149854/network-automation-in-lab-deployment-using-ansible-and-python" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149854.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7470</span> Software Engineering Revolution Driven by Complexity Science</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jay%20Xiong">Jay Xiong</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Lin"> Li Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces a new software engineering paradigm based on complexity science, called NSE (Nonlinear Software Engineering paradigm). The purpose of establishing NSE is to help software development organizations double their productivity, half their cost, and increase the quality of their products in several orders of magnitude simultaneously. NSE complies with the essential principles of complexity science. NSE brings revolutionary changes to almost all aspects in software engineering. NSE has been fully implemented with its support platform Panorama++. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complexity%20science" title="complexity science">complexity science</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20development" title=" software development"> software development</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20maintenance" title=" software maintenance"> software maintenance</a> </p> <a href="https://publications.waset.org/abstracts/41084/software-engineering-revolution-driven-by-complexity-science" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7469</span> Software Architectural Design Ontology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Irfan%20Marwat">Muhammad Irfan Marwat</a>, <a href="https://publications.waset.org/abstracts/search?q=Sadaqat%20Jan"> Sadaqat Jan</a>, <a href="https://publications.waset.org/abstracts/search?q=Syed%20Zafar%20Ali%20Shah"> Syed Zafar Ali Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software architecture plays a key role in software development but absence of formal description of software architecture causes different impede in software development. To cope with these difficulties, ontology has been used as artifact. This paper proposes ontology for software architectural design based on IEEE model for architecture description and Kruchten 4+1 model for viewpoints classification. For categorization of style and views, ISO/IEC 42010 has been used. Corpus method has been used to evaluate ontology. The main aim of the proposed ontology is to classify and locate software architectural design information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=semantic-based%20software%20architecture" title="semantic-based software architecture">semantic-based software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title=" software architecture"> software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a> </p> <a href="https://publications.waset.org/abstracts/2056/software-architectural-design-ontology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2056.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">548</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7468</span> Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bilal%20Haider">Bilal Haider</a>, <a href="https://publications.waset.org/abstracts/search?q=Farhan%20Aadil"> Farhan Aadil</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SDN" title="SDN">SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET" title=" VANET"> VANET</a>, <a href="https://publications.waset.org/abstracts/search?q=mobility%20management" title=" mobility management"> mobility management</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a> </p> <a href="https://publications.waset.org/abstracts/147701/mobility-management-via-software-defined-networks-sdn-in-vehicular-ad-hoc-networks-vanets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=249">249</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=250">250</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20defined%20radios&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>