Selected Papers from the Computer Science and Electronic Engineering Conference (CEEC) 2014

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (15 February 2015) | Viewed by 15043

Special Issue Editors


E-Mail Website
Co-Guest Editor
Computer Science Department, Faculty of Computer Science and Engineering, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait
Interests: pervasive computing; signal analysis; AI; data mining; evolutionary computation; localized muscle fatigue
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

The Computer Science and Electronic Engineering Conference (CEEC) will be held 25-26 September 2014 at the School of Computer Science and Electronic Engineering, University of Essex, United Kingdom.

Researchers presenting their work at the conference are invited to submit their papers to this special issue of the journal Computers after the conference and at the latest by 31 December 2014. Submitted papers should be expanded to the size of regular research or review articles. All submitted papers will undergo our standard peer-review procedure. Accepted papers will be published in open access format in the journal Computers and collected together on this special issue website. There are no page/publication charges for this journal.

As there are no publication charges in this journal, please prepare and format your paper according to the Instructions for Authors. Use the LaTeX or Microsoft Word template file of the journal (both available from the Instructions for Authors page). Manuscripts should be submitted online via our susy.mdpi.com editorial system.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

1216 KiB  
Article
Error and Congestion Resilient Video Streaming over Broadband Wireless
by Laith Al-Jobouri, Ismail A. Ali, Martin Fleury and Mohammed Ghanbari
Computers 2015, 4(2), 113-141; https://doi.org/10.3390/computers4020113 - 21 Apr 2015
Cited by 1 | Viewed by 7140
Abstract
In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC) codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning [...] Read more.
In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC) codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine. Full article
Show Figures

Figure 1

1479 KiB  
Article
A Dynamic Reputation Management System for Mobile Ad Hoc Networks
by Eric Chiejina, Hannan Xiao and Bruce Christianson
Computers 2015, 4(2), 87-112; https://doi.org/10.3390/computers4020087 - 17 Apr 2015
Cited by 9 | Viewed by 7584
Abstract
Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by [...] Read more.
Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network. Full article
Show Figures

Back to TopTop