You are on page 1of 53

Information Science and Applications

2017: ICISA 2017 1st Edition Kuinam


Kim
Visit to download the full and correct content document:
https://textbookfull.com/product/information-science-and-applications-2017-icisa-2017
-1st-edition-kuinam-kim/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Information Science and Applications ICISA 2016 1st


Edition Kuinam J. Kim

https://textbookfull.com/product/information-science-and-
applications-icisa-2016-1st-edition-kuinam-j-kim/

Rare Metal Technology 2017 1st Edition Hojong Kim

https://textbookfull.com/product/rare-metal-technology-2017-1st-
edition-hojong-kim/

Mobile and Wireless Technologies 2016 1st Edition


Kuinam J. Kim

https://textbookfull.com/product/mobile-and-wireless-
technologies-2016-1st-edition-kuinam-j-kim/

Health Information Science: 6th International


Conference, HIS 2017, Moscow, Russia, October 7-9,
2017, Proceedings 1st Edition Siuly Siuly Et Al. (Eds.)

https://textbookfull.com/product/health-information-science-6th-
international-conference-his-2017-moscow-russia-
october-7-9-2017-proceedings-1st-edition-siuly-siuly-et-al-eds/
Applications and Techniques in Information Security:
8th International Conference, ATIS 2017, Auckland, New
Zealand, July 6–7, 2017, Proceedings 1st Edition Lynn
Batten
https://textbookfull.com/product/applications-and-techniques-in-
information-security-8th-international-conference-
atis-2017-auckland-new-zealand-july-6-7-2017-proceedings-1st-
edition-lynn-batten/

Information and Communication Technologies in


Education, Research, and Industrial Applications: 13th
International Conference, ICTERI 2017, Kyiv, Ukraine,
May 15-18, 2017, Revised Selected Papers 1st Edition
Nick Bassiliades
https://textbookfull.com/product/information-and-communication-
technologies-in-education-research-and-industrial-
applications-13th-international-conference-icteri-2017-kyiv-
ukraine-may-15-18-2017-revised-selected-papers-1st/

Electronic Engineering: Proceedings of the 4th


International Conference of Electronic Engineering and
Information Science (ICEEIS 2017), January 7-8, 2017,
Haikou, P.R. China. 4th Edition Dongxingwang
https://textbookfull.com/product/electronic-engineering-
proceedings-of-the-4th-international-conference-of-electronic-
engineering-and-information-science-
iceeis-2017-january-7-8-2017-haikou-p-r-china-4th-edition-
dongxingwang/
Computational Science and Technology 4th ICCST 2017
Kuala Lumpur Malaysia 29 30 November 2017 1st Edition
Rayner Alfred

https://textbookfull.com/product/computational-science-and-
technology-4th-iccst-2017-kuala-lumpur-
malaysia-29-30-november-2017-1st-edition-rayner-alfred/

Logic, Language, Information, and Computation: 24th


International Workshop, WoLLIC 2017, London, UK, July
18-21, 2017, Proceedings 1st Edition Juliette Kennedy

https://textbookfull.com/product/logic-language-information-and-
computation-24th-international-workshop-wollic-2017-london-uk-
july-18-21-2017-proceedings-1st-edition-juliette-kennedy/
Lecture Notes in Electrical Engineering 424

Kuinam Kim
Nikolai Joukov
Editors

Information
Science and
Applications
2017
ICISA 2017
Lecture Notes in Electrical Engineering

Volume 424

Board of Series editors


Leopoldo Angrisani, Napoli, Italy
Marco Arteaga, Coyoacán, México
Samarjit Chakraborty, München, Germany
Jiming Chen, Hangzhou, P.R. China
Tan Kay Chen, Singapore, Singapore
Rüdiger Dillmann, Karlsruhe, Germany
Haibin Duan, Beijing, China
Gianluigi Ferrari, Parma, Italy
Manuel Ferre, Madrid, Spain
Sandra Hirche, München, Germany
Faryar Jabbari, Irvine, USA
Janusz Kacprzyk, Warsaw, Poland
Alaa Khamis, New Cairo City, Egypt
Torsten Kroeger, Stanford, USA
Tan Cher Ming, Singapore, Singapore
Wolfgang Minker, Ulm, Germany
Pradeep Misra, Dayton, USA
Sebastian Möller, Berlin, Germany
Subhas Mukhopadyay, Palmerston, New Zealand
Cun-Zheng Ning, Tempe, USA
Toyoaki Nishida, Sakyo-ku, Japan
Bijaya Ketan Panigrahi, New Delhi, India
Federica Pascucci, Roma, Italy
Tariq Samad, Minneapolis, USA
Gan Woon Seng, Nanyang Avenue, Singapore
Germano Veiga, Porto, Portugal
Haitao Wu, Beijing, China
Junjie James Zhang, Charlotte, USA
About this Series

“Lecture Notes in Electrical Engineering (LNEE)” is a book series which reports


the latest research and developments in Electrical Engineering, namely:
• Communication, Networks, and Information Theory
• Computer Engineering
• Signal, Image, Speech and Information Processing
• Circuits and Systems
• Bioengineering
LNEE publishes authored monographs and contributed volumes which present
cutting edge research information as well as new perspectives on classical fields,
while maintaining Springer’s high standards of academic excellence. Also
considered for publication are lecture materials, proceedings, and other related
materials of exceptionally high quality and interest. The subject matter should be
original and timely, reporting the latest research and developments in all areas of
electrical engineering.
The audience for the books in LNEE consists of advanced level students,
researchers, and industry professionals working at the forefront of their fields. Much
like Springer’s other Lecture Notes series, LNEE will be distributed through
Springer’s print and electronic publishing channels.

More information about this series at http://www.springer.com/series/7818


Kuinam Kim Nikolai Joukov

Editors

Information Science
and Applications 2017
ICISA 2017

123
Editors
Kuinam Kim Nikolai Joukov
Kyonggi University modelizeIT Inc., CEO and NYU
Seongnam-si, Gyeonggi Stony Brook, NY
Korea, Republic of USA

ISSN 1876-1100 ISSN 1876-1119 (electronic)


Lecture Notes in Electrical Engineering
ISBN 978-981-10-4153-2 ISBN 978-981-10-4154-9 (eBook)
DOI 10.1007/978-981-10-4154-9
Library of Congress Control Number: 2017934217

© Springer Nature Singapore Pte Ltd. 2017


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by Springer Nature


The registered company is Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Preface

This LNEE volume contains the papers presented at the iCatse International
Conference on Information Science and Applications (ICISA 2017) which was held
in Macau, China, during March 20–23, 2017.
ICISA2017 will be an excellent international conference for sharing knowledge
and results in Information Science and Application. The aim of the conference is to
provide a platform to the researchers and practitioners from both academia and
industry to meet and share the cutting-edge developments in the field.
The primary goal of the conference is to exchange, share and distribute the latest
research and theories from our international community. The conference will be
held every year to make it an ideal platform for people to share views and expe-
riences in Information Science and Application related fields.
On behalf of the Organizing Committee, we would like to thank Springer for
publishing the proceedings of ICISA2017. We would also like to express our
gratitude to the ‘Program Committee and Reviewers’ for providing extra help in the
review process. The quality of a refereed volume depends mainly on the expertise
and dedication of the reviewers. We are indebted to the Program Committee
members for their guidance and coordination in organizing the review process, and
to the authors for contributing their research results to the conference.
Our sincere thanks to the Institute of Creative Advanced Technology,
Engineering and Science for designing the conference web page and also spending
countless days in preparing the final program during the time for printing. We
would also like to thank our organization committee for their hard work in sorting
our manuscripts from our authors.
We look forward to seeing all of you next year at ICISA.

Kuinam J. Kim
Nikolai Joukov

v
Organization

General Chairs

Nikolai Joukov New York University and modelizeIT Inc, USA


Nakhoon Baek Kyungpook National University, Republic of Korea

Steering Committee

Nikolai Joukov New York University and modelizeIT Inc, USA


Borko Furht Florida Atlantic University, USA
Bezalel Gavish Southern Methodist University, USA
Kin Fun Li University of Victoria, Canada
Kuinam J. Kim Kyonggi University, Korea
Naruemon Wattanapongsakorn King Mongkut’s University of Technology
Thonburi, Thailand
Xiaoxia Huang University of Science and Technology Beijing,
China
Dong-Seong (Dan) Kim University of Canterbury, New Zealand
Nakhoon Baek Kyungpook National University,
Republic of Korea

Publicity Chairs

Hongseok Jeon ETRI, Republic of Korea


Tomas Cerny Czech Technical University, Czech Republic
Naruemon Wattanapongsakorn King Mongkut’s University of Technology
Thonburi, Thailand
Suresh Thanakodi National Defence University of Malaysia,
Malaysia

vii
viii Organization

Workshop Chair

Dong-Seong (Dan) Kim University of Canterbury, New Zealand

Publication Chair

Kyoungho Choi Institute of Creative Advanced Technologies,


Science and Engineering

Program Chair

Kuinam J. Kim Kyonggi University, Republic of Korea

Financial Chairs

WonHyung Park Institute of Creative Advanced Technologies,


Science and Engineering
Sanggyoon Oh BPU Holdings Corp, Republic of Korea

Organizers and Supporters

Institute of Creative Advanced Technologies, Science and Engineering (iCatse)


Czech Technical University, Czech Republic
River Publishers, Netherlands
Korean Industry Security Forum (KISF)
Korea Convergence Security Association (KCSA)
Kyonggi University, Korea
King Mongkut’s University of Technology Thonburi, Thailand
National Defence University of Malaysia, Malaysia
University of Canterbury, New Zealand
University of Science and Technology Beijing, China
Electronics and Telecommunications Research Institute (ETRI)
Korea Institute of Science and Technology Information (KISTI)
Kyungpook National University, Republic of Korea
Organization ix

Program Committee

Ahmad Kamran Malik COMSATS Institute of Information Technology,


Pakistan
Ahmed Adel Abdelwahab Qassim University, Saudi Arabia
Alessandro Bianchi University of Bari, Italy
Alexandar Djordjevich City University of Hong Kong, China
Ana Paula Ferreira Barroso Universidade NOVA de Lisboa, Portugal
Andrea Ceccarelli University of Florence, Italy
Baojun Ma Beijing University of Posts
and Telecommunications, China
Bernd E. Wolfinger University of Hamburg, Germany
Bongkyo Moon Dongguk University, Korea
Bruno Defude Université Paris-Saclay, France
Chi-Man Pun University of Macau, China
Chin-Chen Chang Feng Chia University, Taiwan
Chittaranjan Pradhan KIIT University, India
Christian Prehofer Technische Universitaet Muenchen, Germany
Christof Ebert Vector Consulting Services GmbH, Germany
Chuangyin Dang City University of Hong Kong, China
Claudia Linnhoff-Popien Ludwig-Maximilians Universitat Munchen,
Germany
Dabin Ding University of Central Missouri, USA
Dan Lin Missouri University of Science and Technology,
USA
Daniel B.-W. Chen Monash University, Australia
David Liu Indiana University, USA
David Naccache Ecole normale supérieure, France
Dennis Pfisterer University of Luebeck, Germany
Derek Doran Wright State University, USA
Edward Chlebus Illinois Institute of Technology, USA
Filippo Gaudenzi Università degli Studi di Milano, Italy
George Okeyo Jomo Kenyatta University of Agriculture
and Technology, Kenya
Haralambos Mouratidis University of Brighton, UK
Harikumar Rajaguru Bannari Amman Institute of Technology, India
Helmi Zulhaidi Mohd Shafi Universiti Putra Malaysia, Malaysia
Heming Cui University of Hong Kong, China
Hing Keung LAU The Open University of Hong Kong, China
Hironori Washizaki Waseda University, Japan
Huai Liu RMIT University, Australia
Hyoungshick Kim Sungkyunkwan University, Korea
Hyunsung Kim Kyoungil University, South Korea
Ireneusz Czarnowski Gdynia Maritime University, Poland
x Organization

James Braman The Community College of Baltimore County, USA


Jianbin Qiu Harbin Institute of Technology, China
Jie Zhang Newcastle University, UK
Jitender Grover MMU, India
Johann M. Marquez-Barja Trinity College Dublin, Ireland
José Manuel Matos Ribeiro NOVA University of Lisbon, Portugal
da Fonseca
Kai Liu Chongqing University, China
Kittisak Jermsittiparsert Rangsit University, Thailand
Longzhi Yang Northumbria University, UK
Maicon Stihler Federal Center for Technological Education
of Minas Gerais, Brazil
Mainguenaud Michel INSA Rouen-Normandie, France
Manik Sharma DAV University, India
Marco Listanti University Sapienza, Italy
Marco Mesiti Universita’ degli Studi di Milano, Italy
Massimo Mecella SAPIENZA Università di Roma, Italy
Mauro Gaggero National Research Council of Italy, Italy
Michalis Pavlidis University of Brighton, UK
Min-Shiang Hwang Asia University, Taiwan
Mohammed M Kadhum Queen’s University, Canada
Mohd Ashraf Ahmad Universiti Malaysia Pahang, Malaysia
Mohd Faizal Abdollah University Technical Malaysia Melaka, Malaysia
Mohd Helmy Abd Wahab Universiti Tun Hussein Onn Malaysia, Malaysia
Mounir Arioua Abdelmalek Essaadi University, Morocco
Mukesh Kumar Saini Indian Institute of Technology Ropar, India
Nasir Uddin Oracle Inc, USA
Ng Hui Fuang Universiti Tunku Abdul Rahman, Malaysia
Nik Bessis Edge Hill University, UK
Óscar Mortágua Pereira University of Aveiro, Portugal
Pablo Casaseca University of the West of Scotland, UK
Pascal Lorenz University of Haute Alsace, France
Pinar Kirci Istanbul University, Turkey
Qi Shi Liverpool John Moores University, UK
Qiao Xiang Yale University, USA
Ramesh Rayudu Victoria University of Wellington, New Zealand
Reza Malekian University of Pretoria, South Africa
Robert S. Laramee Swansea University, UK
Rossitza Ivanova Goleva Technical University of Sofia, Bulgaria
Sakgasit Ramingwong Chiang Mai University, Thailand
Sandro Leuchter Hochschule Mannheim University of Applied
Sciences, Germany
Sangseo Park The University of Melbourne, Australia
Sathiamoorthy Manoharan University of Auckland, New Zealand
Organization xi

Selma Regina Martins Federal Fluminense University, Brazil


Oliveira
Seung Yeob Nam Yeungnam University, Korea
Shamim H Ripon East West University, Bangladesh
Shao Jie University of Electronic Science and Technology
of China, China
Sharmistha P. Chatterjee Florida Atlantic University, USA
Shimpei Matsumoto Hiroshima Institute of Technology, Japan
Shitala Prasad CNRS, France
Shuxiang Xu University of Tasmania, Australia
Sira Yongchareon Auckland University of Technology, New Zealand
Somlak Wannarumon Naresuan University, Thailand
Kielarova
Stelvio Cimato Università degli studi di Milano, Italy
Suksan Prombanpong King Mongkut’s University of Technology
Thonburi, Thailand
Susan Mengel Texas Tech University, USA
Syh-Yuan Tan Multimedia University, Malaysia
Terje Jensen Telenor, Norway
Tor-Morten Grønli Westerdals, Norway
Toyohide Watanabe Nagoya Industrial Science Research Institute, Japan
Vasco Soares Instituto de Telecomunicaçõe, Portugal
Vasilis Friderikos King’s College London, UK
Vishwas Rudramurthy Visvesvaraya Technological University, India
Wojciech Giernacki Pozan University of Technology, Poland
Wolfgang A. Halang Fernuniversitaet, Germany
Wun-She Yap Universiti Tunku Abdul Rahman, Malaysia
Ximing Fu Tsinghua University, China
Yanjun Liu Feng Chia University, Taiwan
Yanling Wei Technical University of Berlin, Germany
Yin-Fu Huang National Yunlin University of Science
and Technology, Taiwan
Yuen Chau Singapore University of Technology and Design,
Singapore
Zeeshan Ali Rana University of Central Punjab, Pakistan
Zhiyong Shan University of Central Missouri, USA
Zhiyuan Chen University of Maryland, Baltimore County, USA
Zhiyuan Hu Nokia Shanghai Bell, China
Zulfiqar Habib COMSATS Institute of Information Technology,
Pakistan
Contents

Ubiquitous Computing
Improving Performance and Energy Efficiency for OFDMA Systems
Using Adaptive Antennas and CoMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yapeng Wang, Xu Yang, Laurie Cuthbert, Tiankui Zhang, and Lin Xiao
Privacy in Location Based Services: Protection Strategies,
Attack Models and Open Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Priti Jagwani and Saroj Kaushik
An Efficient and Low-Signaling Opportunistic Routing
for Underwater Acoustic Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . 22
Zhengyu Ma, Quansheng Guan, Fei Ji, Hua Yu, and Fangjiong Chen
A Novel Mobile Online Vehicle Status Awareness Method Using
Smartphone Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Dang-Nhac Lu, Thi-Thu-Trang Ngo, Duc-Nhan Nguyen, Thi-Hau Nguyen,
and Ha-Nam Nguyen
A Study on OPNET State Machine Model Based IoT Network
Layer Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Young-hwan Ham, Hyo-taeg Jung, Hyun-cheol Kim, and Jin-wook Chung
A Secure Localization Algorithm Based on Confidence Constraint
for Underwater Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . 46
Xiaofeng Xu, Guangyuan Wang, Yongji Ren, and Xiaolei Liu

Networks and Information Systems


Generating Time Series Simulation Dataset Derived from Dynamic
Time-Varying Bayesian Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Garam Lee, Hyunjin Lee, and Kyung-Ah Sohn

xiii
xiv Contents

AMI-SIM: An NS-2 Based Simulator for Advanced Metering


Infrastructure Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Nam-Uk Kim and Tai-Myoung Chung
Beyond Map-Reduce: LATNODE – A New Programming Paradigm
for Big Data Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Chai Yit Sheng and Phang Keat Keong
Indoor Positioning Solely Based on User’s Sight . . . . . . . . . . . . . . . . . . . 76
Matthias Becker
Naming Convention Scheme for Role Based Access Control in Cloud
Based ERP Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Abed Alshreef, Lin Li, and Wahid Rajeh

Multimedia and Visualization


Korean/Chinese Web-Based Font Editor Based on METAFONT
for User Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Minju Son, Gyeongjae Gwon, and Jaeyeong Choi
A Highly Robust and Secure Digital Image
Encryption Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Md. Anwar Hussain, Popi Bora, and Joyatri Bora
Saliency Based Object Detection and Enhancements
in Static Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Rehan Mehmood Yousaf, Saad Rehman, Hassan Dawood, Guo Ping,
Zahid Mehmood, Shoaib Azam, and Abdullah Aman Khan
A Center Symmetric Padding Method for Image Filtering . . . . . . . . . . . 124
Mengqin Li and Xiaopin Zhong
Implementing a Stereo Image Processing for Medical 3D Microscopes
with Wireless HMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Cheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee, Shihyun Ahn,
and Yongtaek Park
Design of OpenGL SC 2.0 Rendering Pipeline . . . . . . . . . . . . . . . . . . . . . 139
Nakhoon Baek
Saliency Detection via Foreground and Background Seeds . . . . . . . . . . . 145
Xiao Lin, Zhixun Yan, and Linhua Jiang
Identification and Annotation of Hidden Object
in Human Terahertz Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Guiyang Yue, Zhihao Yu, Cong Liu, Hui Huang, Yiming Zhu,
and Linhua Jiang
Contents xv

Information Visualization for Mobile-Based Disability


Test Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Jongmun Jeong, Seungho Kim, Changsoon Kang, and Mintae Hwang
Deep Convolutional Neural Networks for All-Day
Pedestrian Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Xingguo Zhang, Guoyue Chen, Kazuki Saruta, and Yuki Terata
An Augmented Reality Learning System for Programming
Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Kelwin Seen Tiong Tan and Yunli Lee

Middleware and Operating Systems


Efficient vCore Based Container Deployment Algorithm
for Improving Heterogeneous Hadoop YARN Performance . . . . . . . . . . 191
SooKyung Lee, Min-Ho Bae, Jun-Ho Eum, and Sangyoon Oh
A Real-Time Operating System Supporting Distributed Shared
Memory for Embedded Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . 202
Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo,
and Takanori Yokoyama

Security and Privacy


MBR Image Automation Analysis Techniques Utilizing Emulab . . . . . . 213
Gibeom Song and Manhee Lee
Detection of DNS Tunneling in Mobile Networks
Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Van Thuan Do, Paal Engelstad, Boning Feng, and Thanh van Do
On the Security Analysis of Weak Cryptographic Primitive Based Key
Derivation Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Chai Wen Chuah, Mustafa Mat Deris, and Edward Dawson
On the Security of a Privacy Authentication Scheme Based
on Cloud for Medical Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Chun-Ta Li, Dong-Her Shih, and Chun-Cheng Wang
Physical Layer Security with Energy Harvesting in Single Hop
Wireless Relaying System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Poonam Jindal and Rupali Sinha
A System Design for the Measurement and Evaluation
of the Communications Security Domain in ISO 27001:2013
Using an Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Pongsak Sirisom, Janjira Payakpate, and Winai Wongthai
xvi Contents

Timing Side Channel Attack on Key Derivation Functions . . . . . . . . . . . 266


Chai Wen Chuah and Wen Wen Koh
A Security Aware Fuzzy Embedded ACO Based Routing Protocol
(SAFACO) in VANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Hang Zhang, Xi Wang, and Dieter Hogrefe
Cryptanalysis of “An Efficient Searchable Encryption Against
Keyword Guessing Attacks for Shareable Electronic Medical Records
in Cloud-Based System” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu,
and Chien-Ming Chen
eDSDroid: A Hybrid Approach for Information Leak Detection
in Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Hoang Tuan Ly, Tan Cam Nguyen, and Van-Hau Pham
Detect Sensitive Data Leakage via Inter-application on Android
by Using Static Analysis and Dynamic Analysis . . . . . . . . . . . . . . . . . . . . 298
Nguyen Tan Cam, Van-Hau Pham, and Tuan Nguyen
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme . . . . . . 306
Kin-Woon Yeow, Swee-Huay Heng, and Syh-Yuan Tan
Perceptual 3D Watermarking Using Mesh Saliency . . . . . . . . . . . . . . . . . 315
Jeongho Son, Dongkyu Kim, Hak-Yeol Choi, Han-Ul Jang,
and Sunghee Choi
Perceptual Watermarking for Stereoscopic 3D Image Based
on Visual Discomfort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Sang-Keun Ji, Ji-Hyeon Kang, and Heung-Kyu Lee
Fingerprint Spoof Detection Using Contrast Enhancement
and Convolutional Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Han-Ul Jang, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son,
and Heung-Kyu Lee
Content Recapture Detection Based on Convolutional
Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Hak-Yeol Choi, Han-Ul Jang, Jeongho Son, Dongkyu Kim,
and Heung-Kyu Lee
Secret Sharing Deniable Encryption Technique . . . . . . . . . . . . . . . . . . . . 347
Mohsen Mohamad Hata, Fakariah Hani Mohd Ali,
and Syed Ahmad Aljunid
Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map . . . . 358
Dongkyu Kim, Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, In-Jae Yu,
and Heung-Kyu Lee
Contents xvii

From Sealed-Bid Electronic Auction to Electronic Cheque . . . . . . . . . . . 366


Kin-Woon Yeow, Swee-Huay Heng, and Syh-Yuan Tan
Enhanced Database Security Using Homomorphic Encryption . . . . . . . . 377
Connor Røset, Van Warren, and Chia-Chu Chiang
k-Depth Mimicry Attack to Secretly Embed Shellcode into
PDF Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Jaewoo Park and Hyoungshick Kim
Reconstruction of Task Lists from Android Applications . . . . . . . . . . . . 396
Xingmin Cui, Ruiyi He, Lucas C.K. Hui, S.M. Yiu, Gang Zhou,
and Eric Ke Wang
Design and Evaluation of Chaotic Iterations Based Keyed
Hash Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Zhuosheng Lin, Christophe Guyeux, Simin Yu, and Qianxue Wang

Data Mining and Artificial Intelligence


Intellectual Overall Evaluation of Power Quality Including
System Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Buhm Lee, Dohee Sohn, and Kyoung Min Kim
A Data-Driven Decision Making with Big Data Analysis
on DNS Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Euihyun Jung
A Case-Based Approach to Colorectal Cancer Detection . . . . . . . . . . . . . 433
Pedro Morgado, Henrique Vicente, António Abelha, José Machado,
João Neves, and José Neves
Multi-Modes Cascade SVMs: Fast Support Vector Machines
in Distributed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Lijuan Cui, Changjian Wang, Wanli Li, Ludan Tan, and Yuxing Peng
Deep Learning Based Recommendation: A Survey . . . . . . . . . . . . . . . . . 451
Juntao Liu and Caihua Wu
Towards Collaborative Data Analytics for Smart Buildings . . . . . . . . . . 459
Sanja Lazarova-Molnar and Nader Mohamed
English and Malay Cross-lingual Sentiment Lexicon Acquisition
and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Nurul Amelina Nasharuddin, Muhamad Taufik Abdullah, Azreen Azman,
and Rabiah Abdul Kadir
xviii Contents

A Novel Natural Language Processing (NLP) Approach


to Automatically Generate Conceptual Class Model from Initial
Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Mudassar Adeel Ahmed, Wasi Haider Butt, Imran Ahsan,
Muhammad Waseem Anwar, Muhammad Latif, and Farooque Azam
The Applications of Natural Language Processing (NLP) for Software
Requirement Engineering - A Systematic Literature Review . . . . . . . . . . 485
Farhana Nazir, Wasi Haider Butt, Muhammad Waseem Anwar,
and Muazzam A. Khan Khattak
Smart Fetal Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Jane You, Qin Li, Zhenhua Guo, and Ruohan Zhao
A Network-Based Approach on Big Data for the Comorbidities
of Urticaria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Yi-Horng Lai, Chih-Chiang Ho, and Piao-Yi Chiou
Application of Automated Theorem-Proving to Philosophical
Thought: Spinoza’s Ethics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Maciej Janowicz, Luiza Ochnio, Leszek J. Chmielewski,
and Arkadiusz Orłowski
Improving the B+-Tree Construction for Transaction Log Data
in Bank System Using Hadoop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Cong Viet-Ngu Huynh, Jongmin Kim, and Jun-Ho Huh
Calculate Deep Convolution NeurAl Network on Cell Unit . . . . . . . . . . . 526
Haofang Lu, Ying Zhou, and Zi-Ke Zhang
Stepwise Structure Learning Using Probabilistic Pruning for Bayesian
Networks: Improving Efficiency and Comparing Characteristics . . . . . . 533
Godai Azuma, Daisuke Kitakoshi, and Masato Suzuki
Differential-Weighted Global Optimum of BP Neural Network
on Image Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Lin Ma, Xiao Lin, and Linhua Jiang
Classification Model for Skin Lesion Image . . . . . . . . . . . . . . . . . . . . . . . 553
Nontachai Danpakdee and Wararat Songpan

Software Engineering
Generation of Use Cases for Requirements Elicitation
by Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Junko Shirogane
Smart Learner-Centric Learning Systems . . . . . . . . . . . . . . . . . . . . . . . . . 577
Naseem Ibrahim and Ismail I.K. Al Ani
Contents xix

Prioritized Process Test: More Efficiency in Testing of Business


Processes and Workflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Miroslav Bures, Tomas Cerny, and Matej Klima
Static Testing Using Different Types of CRUD Matrices . . . . . . . . . . . . . 594
Miroslav Bures and Tomas Cerny
Extracting Test Cases with Message-Sequence Diagram for Validating
the Photovoltaic Energy Integrated Monitoring System . . . . . . . . . . . . . . 603
Woo Sung Jang, Bo Kyung Park, Hyun Seung Son, Byung Kook Jeon,
and R. Young Chul Kim
Automatic Test Case Generation with State Diagram for Validating
the Solar Integrated System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Bo Kyung Park, Woo Sung Jang, Hyun Seung Son, Keunsang Yi,
and R. Young Chul Kim
Comparison of Software Complexity Metrics in Measuring
the Complexity of Event Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Johanna Ahmad and Salmi Baharom
Implementation of Ceph Storage with Big Data
for Performance Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Chao-Tung Yang, Cai-Jin Chen, and Tzu-Yang Chen

Web Technology
Predicting Engaging Content for Increasing Organic Reach
on Facebook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Natthaphong Phuntusil and Yachai Limpiyakorn
Learning Performance Evaluation in eLearning
with the Web-Based Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Cheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li,
and Jenq-Foung JF Yao
Improving Teaching and Learning in Southeast Asian Secondary
Schools with the Use of Culturally Motivated Web
and Mobile Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Sithira Vadivel, Insu Song, and Abhishek Singh Bhati
Game-Based Learning to Teach Assertive Communication ClickTalk
for Enhancing Team Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Bah Tee Eng
Cloud Storage Federation as a Service Reference Architecture . . . . . . . . 668
Rene Ivan Heinsen, Cindy Pamela Lopez, Tri D.T. Nguyen,
and Eui-Nam Huh
xx Contents

Internet of Things
A Study on the IoT Framework Design for Ginseng Cultivation . . . . . . 679
Kyung-Gyun Lim and Chang-Geun Kim
An IPS Evaluation Framework for Measuring the Effectiveness
and Efficiency of Indoor Positioning Solutions . . . . . . . . . . . . . . . . . . . . . 688
Jacqueline Lee Fang Ang, Wai Kong Lee, Boon Yaik Ooi,
and Thomas Wei Min Ooi
An IoT-Based Virtual Addressing Framework for Intelligent
Delivery Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Omar Hiari, Dhiah el Diehn I. Abou-Tair, and Ismail Abushaikha
Context-Aware Security Using Internet of Things Devices . . . . . . . . . . . 706
Michal Trnka, Martin Tomasek, and Tomas Cerny
An Energy-Efficient Transmission Framework for IoT Monitoring
Systems in Precision Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Peerapak Lerdsuwan and Phond Phunchongharn
Piezoelectric Voltage Monitoring System Using Smartphone . . . . . . . . . . 722
Nazatul Shiema Moh Nazar, Suresh Thanakodi, Azizi Miskon,
Siti Nooraya Mohd Tawil, and Muhammad Syafiq Najmi Mazlan
A System for Classroom Environment Monitoring Using the Internet
of Things and Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Wuttipong Runathong, Winai Wongthai, and Sutthiwat Panithansuwan

4th Convergence of Healthcare and Information Technology


Research on Design of End Site Architecture to Connect LHCONE
in KREONET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Chanjin Park, Wonhyuk Lee, Kuinam J. Kim, and Hyuncheol Kim
A Study of Children Play Educational Environment Based
on u-Healthcare System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
Minkyu Kim, Soojung Park, and Byungkwon Park
Virtual Resources Allocation Scheme in ICT Converged Networks . . . . 757
Hyuncheol Kim
Enhanced Metadata Creation and Utilization for Personalized
IPTV Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Hyojin Park, Kireem Han, Jinhong Yang, and Jun Kyun Choi
A Study of Teaching Plan for the Physical Activity Using ICT . . . . . . . . 770
Seung Ae Kang
Contents xxi

Design and Implementation of Headend Servers


for Downloadable CAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Soonchoul Kim, Hyuncheol Kim, and Jinwook Chung
A Method of Modeling of Basic Big Data Analysis for Korean Medical
Tourism: A Machine Learning Approach Using Apriori Algorithm . . . . 784
Jun-Ho Huh, Han-Byul Kim, and Jinmo Kim
The Study of Application Development on Elderly Customized
Exercise for Active Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791
YoungHee Cho, SeungAe Kang, SooHyun Kim, and SunYoung Kang
Improving Jaccard Index for Measuring Similarity
in Collaborative Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Soojung Lee
Temperature Recorder System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Suresh Thanakodi, Nazatul Shiema Moh Nazar, Azizi Miskon,
Ahmad Mujahid Ahmad Zaidi, and Muhammad Syafiq Najmi Mazlan

7th International Workshop on ICT Convergence


The Emergence of ICTs for Knowledge Sharing Based on Research
in Indonesia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
Siti Rohajawati, Boy Iskandar Pasaribu, Gun Gun Gumilar,
and Hilda Rizanti Putri
Quality of Transformation of Knowledge as Part of Knowledge
Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Dyah Budiastuti and Harjanto Prabowo
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Ubiquitous Computing
Improving Performance and Energy Efficiency
for OFDMA Systems Using Adaptive Antennas and CoMP

Yapeng Wang1 ✉ , Xu Yang2, Laurie Cuthbert1, Tiankui Zhang3, and Lin Xiao4
( )

1
MPI-QMUL Information Systems Research Centre, Macao Polytechnic Institute,
Macao SAR, China
{yapeng.wang,laurie.cuthbert}@isrcmo.org
2
School of Public Administration, Macao Polytechnic Institute, Macao SAR, China
xuyang@ipm.edu.mo
3
Beijing University of Posts and Telecommunications, Beijing, China
tkzhang@gmail.com
4
Nanchang University, Nanchang, China
xiaolin910@gmail.com

Abstract. The research described in this paper shows how by combining CoMP
with adaptable semi-smart antennas it is possible to improve the throughput of an
OFDMA LTE system and at the same time reduce the power required for trans‐
mission; i.e. providing better performance at lower cost. Optimisation of antenna
patterns is performed by a Genetic Algorithm to satisfy an objective function that
considers throughput, number of UEs handled as well as power in the transmis‐
sion. It is shown that the dominant effect is using the semi-smart antennas and
that the results are not sensitive to small amounts of movement.

Keywords: OFDMA · CoMP · Adaptive antennas · Genetic Algorithm

1 Introduction

One of the well-known key principles of OFDMA is that the orthogonality within the cell
eliminates intra-cell interference so that the interference is from neighbouring cells –
inter-cell interference. A key technology to mitigate this effect is Multi-Input Multi-
Output (MIMO), which can improve users’ throughput performance significantly. It
utilises time and space diversity to increase the number of communication channels
between the base station (BS) and user equipment (UE). Multiple antennas are used at
both ends of the link to create space diverse channels. However the usage of MIMO is
limited to one base station. With synchronising between BSs, it is possible to utilise two
or more BSs to transmit signals to one UE using one frequency channel without interfer‐
ence by utilising time and space diversity. This technology is also called Coordinated
Multipoint Transmission (CoMP) [1].
In this study, a cross layer approach is proposed to mitigate the inter-cell interference
(ICI) and improve energy efficiency at the same time. We combine CoMP, adaptive
antenna and Artificial Intelligence (AI) technology to handle complex resource allocation
problems. Radio recourses are allocated to cell-edge users in an efficient and co-operative

© Springer Nature Singapore Pte Ltd. 2017


K. Kim and N. Joukov (eds.), Information Science and Applications 2017,
Lecture Notes in Electrical Engineering 424, DOI 10.1007/978-981-10-4154-9_1
4 Y. Wang et al.

manner. Energy costs at RF components are reduced as an optimised radio radiation


pattern is produced and power is radiated towards UEs in an efficient way. In addition, it
can be easily integrated into current networks to provide extra system throughput and
energy efficiency. The concept was published by the authors in a Letter [2] but this paper
expands the work reported there and provides a more detailed description of the tech‐
nology.
In the real world, users are not uniformly distributed and this has an impact on
performance. For example, in a scenario where one cell is lightly loaded (with few active
UEs) and its neighbouring cells are heavy loaded (with many UEs), the free radio
resources in the lightly loaded cell cannot be utilised to serve neighbouring cells.
However, by using adaptive antennas to change the cell coverage, as described in this
paper, some of the UEs in the highly loaded BS can be handed over to neighbouring
BSs to achieve load balancing.

2 CoMP and Semi-smart Antennas

CoMP [1, 3] (also called distributed MIMO) is a technology that features joint
processing to change the interference signal into a useful signal. This technology utilises
a distributed multi-antenna channel to improve transmission diversity gain or spatial
multiplexing gain. This can effectively mitigate inter-cell interference to improve link
throughput and reliability for cell-edge users.
CoMP technology can be divided into uplink multi-point reception and downlink
multi-point transmission. In this research, we only consider downlink CoMP. Downlink
CoMP transmission has two categories and in this work we use CoMP JP/JT where two
or more BSs can create two parallel special channels in a co-ordinated way to serve a
single cell-edge. Instead of treating the other BS’s signal as interference, CoMP co-
ordinates the two UE transmissions from the two different BS to make them appear as
if they were distributed MIMO. Tight synchronisation and co-operation is required in
order to create MIMO channel coding and this remote synchronisation and co-operation
makes CoMP much more complicated than MIMO.

Fig. 1. Simple illustration of semi-smart antenna

Not all UEs in the system need to co-operate; those that are close to a BS or have
high SINR do not need to be CoMP users: only UEs that are located at the cell edge and
Improving Performance and Energy Efficiency for OFDMA Systems 5

suffer high interference (low SINR) require cooperation. These cell-edge users are called
CoMP users. In this study, if a UE’s SINR is lower than a certain threshold it is treated
as CoMP user.
The adaptive antenna system (also called semi-smart antenna) used in this study is
described in [4] and illustrated simply in Fig. 1.
A BS is equipped with 3 antenna sectors and each sector has 4 elements. Every
individual antenna element is controlled by a power amplifier and the power level for
each element can be individually controlled. By changing the gain and phase between
the elements the overall pattern for that sector can be modified. In this work only the
gain is changed. As there is no expensive DSP needed to track individual UEs, the cost
of the adaptive system is much lower compared with a fully adaptive antenna system.
The EU project SHUFFLE (IST-1999-11014) constructed such an antenna to demon‐
strate its feasibility.
With CoMP technology, the antenna pattern plays a key role in improving system
performance as changing the antenna pattern can effectively change the channel condi‐
tions between the BSs and the UE, thereby affecting the UE throughput. Figure 2 illus‐
trates this process: in (a) the two channels are not optimised for CoMP but changing the
antenna patterns as in (b) provides overlap allowing better CoMP performance.

Fig. 2. Changing antenna patterns to improve cell-edge CoMP

In a multiple user scenario, the calculation of the optimal antenna pattern for all UEs
is extremely difficult and almost impossible, so we use a genetic algorithm (GA) to find
the optimised coverage pattern for each BS by adjusting each antenna elements’ power
levels. GAs [5] are known to be an effective search algorithm to find near optimal solu‐
tion for many fields where little knowledge is known or there are many conflicting
constraints or objectives to affect best solutions. It is acknowledged that running a GA is
not fast and it is unlikely to be suitable for real-time deployment, but the results do serve
as a benchmark against which other, faster, algorithms may be compared.

3 Genetic Algorithm Configuration

3.1 Encoding and Decoding

A gain vector G = [g1 , g2 , … gN ] represents the antenna gains along N directions and in
our scheme each gain value is coded as a gene. This determines one antenna beam-
forming pattern. If we have M base stations, one chromosome is represented as,
[ ]
G1 , G2 , … GM , which has N × M genes. Each gene is a real number with value between
0 and 1 corresponding to the minimum to maximum coverage.
6 Y. Wang et al.

We use a real-coded genetic algorithm with BLX − a crossover operator [6], distor‐
tion crossover operator, simple random mutation operator, and creep operator. The
BLX − a crossover operator is widely used in real-coded GAs and has been shown to
achieve very good performance in many applications [6]. The distortion crossover oper‐
ator means doing a crossover between two gain values at different directions in one
antenna pattern. Simple random mutation replaces randomly selected gain values with
random values from the appropriate valid range. In the creep operator, gain values which
are to be mutated are incremented or decremented by the creep fraction, which is a small
fraction of the valid range for the attribute value [7]. Additionally Elitism [7] of a few
best chromosomes, which are copied to the next population, is used to prevent losing
the best found solutions to date.

3.2 Fitness Function


One general approach for solving multi-objective optimisation problems is to combine
the individual objective functions into a single composite function such as the weighted
sum method [8]. This is simple yet probably the most widely used classical approach.
The objective function is defined as:
o = 𝛼 × TotalLoad + 𝛽 × HandledUEs + 𝛿 × TotalRFPower
TotalLoad is the sum of the traffic load in all base stations.
HandledUEs is the number of UEs receiving service.
∑M ∑N
TotalRFPower = i=1 j=1 g2ij where M is the number of base stations, N the number
of directions at each base station and g the antenna gain at BS i in direction j.
𝛼, 𝛽, 𝛿 are the weights given to each objective, and their values are set (i) to make
the order of each weighted objective the same (otherwise one would dominate) and (ii)
to set a priority for the objectives. This may be considered to be somewhat arbitrary and
a weakness of the weighted sum method, but it is easy to determine a weight to make
each objective the same order of magnitude and the modification of those values to set
the priority between objectives can be validated by simple experiments.
We assume that a network provider would first consider providing services to all the
users in the service area but also aim to achieve maximum traffic load. The least impor‐
tant objective is to minimizing the transmitting power, not that saving power is unim‐
portant, but it was given top priority there would be a tendency to reduce the power to
levels where the user requirements would not be satisfied.

3.3 Constraint Handling

This work includes the constraint that there must be no gaps (no “holes”) in coverage
from the BSs. As the weighted sum method combines multi-objectives into a single
objective, many of constraint handling methods investigated for a single objective can
be directly applied into our case. This is one reason why the weighted sum method was
chosen, despite the apparently arbitrary choice of weights.
In this paper, we use the superiority of feasible points method [9, 10] to handle
coverage constraint, as this approach has shown promise in many GA applications even
Improving Performance and Energy Efficiency for OFDMA Systems 7

when the feasible region is quite small compared with whole search space. The concept
is that feasible solutions have superiority over infeasible ones, and infeasible solutions
are penalised to provide a search direction towards the feasible region [9, 10].
A penalty value measures the constraints violation and is added to the objective
function value of the worst feasible solution in the last population. Thus, the fitness of
an infeasible solution not only depends on the amount of constraint violation, but also
depends on the feasible solutions in the population.
To measure the coverage constraint violation, the network makes a grid of check
points (uniformly distributed in the constraint coverage area) and examines whether all
the points are covered. The penalty is the number of uncovered points.

3.4 Simulation Parameters


A conventional multi-cell system level simulation is constructed for downlink multi-
cell OFDMA. The baseline system is the conventional non-cooperative system with
SVD (Singular Value Decomposition) precoding and MMSE (Minimum Mean Square
Error) receiving and all subcarriers are transmitted with equal power. A TDD frame
structure is used, the length of radio frame is 10 ms and the length of subframe is 1 ms.
The detailed simulation parameters are listed in Table 1.

Table 1. Simulation parameters.


Parameters Value
Layout 7 sites with 3 sectors each
Number of loops per GA loop 30 TTI
Inter cell distance 500 m
Carrier frequency 2.0 GHz
Bandwidth 10 MHz
Average number of users per sector 20
SINR threshold for determining CoMP 0.3 dB
Number of RBs per sector 10
No. of TX- and RX-antennas per RRU 2
Antenna gain 12 individual controlled gain for each BS. Each gain
is between −6 to 14 dBi
Traffic Full Buffer
Penetration loss 20 dB
Frequency reuse 1
Path loss 128.1 + 37.6lg(d), where d is in km, Minimum 70 dB
Scheduling method Proportional Fairness (PF)
Channel SCM-E

To evaluate the performance gain of the system with single user CoMP, a fixed CoMP
region with 3 sectors is used, and 2 Resource Blocks (RBs) are reserved for CoMP
transmission for cell-edge users. The cell-edge users are decided by the large-scale
fading SINR threshold. A local precoding scheme is used in each CoMP region.
8 Y. Wang et al.

A very important decision to make in implementing a GA to solve a particular


problem is to set up the values for the various parameters such as population size, cross‐
over rate, mutation rate, creep rate and elitism rate. Discussions of parameter settings
feature widely in the evolutionary computation literature, but there are no conclusive
results on what is best: most people use what has worked well in previously reported
cases [5]. The parameter settings for the GA here broadly follow those in [11–13] and
are summarized in Table 2.

Table 2. GA parameters
Parameter Value
Total generations 100
Number of policies in each generation 50
BLX−a: a = 0.5 0.2
Distortion rate 0.3
Random mutation rate 0.012
Creep rate 0.012
Elitism rate 0.1

4 Simulation Result

Tests to check the stability of the GA were performed with up to 100 generations, each
with 50 policies. The best policy for each generation was recorded for further analysis.
Figure 3 shows the system throughput (total throughput in Mbps for seven BSs) and RF
power performance (a relative value for total base stations’ RF amplifiers) for the best
policy in each generation with CoMP. We can see that stability is reached after about
after 60 generations. Similar results were obtained for a system without CoMP.
To evaluate the performance gain or our approach we consider four scenarios and
the results are shown in Fig. 4.
i. Conventional network: no CoMP and fixed antenna patters (no GA);
ii. No CoMP with GA (as in [14])
iii. CoMP with fixed antenna patterns
iv. CoMP with GA
Scenario 1: the network has “fixed antenna patterns”, the RF power was varied from
minimum to maximum within the adjustable range (−6 to 14 dB for each sector), and
the system throughput change noted. In this conventional network, the system
throughput reaches a peak rate of 549 Mbps when maximum power is used for all BS
antennas. This is shown in Fig. 4.
Scenario 2: with the GA and adaptive antennas, the system can find a near optimal
solution for that user distribution. In Fig. 4 the optimum gives a system throughput of
566 Mbps, (3% performance gain over the system with maximum fixed antenna gain),
but the RF power needed to produce the antenna pattern is reduced by about 58%.
This is because with the GA-calculated optimal antenna pattern, the UEs can get the
best SINR performance without wasting antenna radiation in other directions.
Improving Performance and Energy Efficiency for OFDMA Systems 9

42
640

40 620

System Throughput
600
Total RF Power

38
580
36
560
Total RF Power
System Throughput
34 540

520
32
0 20 40 60 80 100
GA Generations

Fig. 3. System throughput and RF power for different GA generations for system with CoMP.

Scenario 3: as CoMP is mainly used for cell-edge users to improve their throughput
performance, we considered mainly the cell-edge users. Without the GA, a 31% perform‐
ance gain is achieved for cell-edge users in terms of throughput; at the same time, the
transmission power for these cell edge users is reduced by 25% in total because, in CoMP

650 650

600 600
System Throughput Mbps

550 550

500 500

450 450
(i) No CoMP; fixed antenna patterns
400 (ii) No CoMP with GA 400

(iii) CoMP; fixed antenna patterns


350 350
(iv) CoMP with GA
300 300

10 20 30 40 50 60 70 80 90 30 40

a) Antenna RF power level b)

Fig. 4. System throughput against RF Power for different scenarios.


10 Y. Wang et al.

mode, the signal from a neighbouring cell is transformed from noise to useful signal, so
the power required to achieve a certain throughput is reduced.
Scenario 4: the performance of a system combining GA with CoMP is also shown
in Fig. 4. We can see that with GA and adaptive antenna, the system benefits with higher
system throughput and much less RF antenna power required, although slightly higher
power than in Scenario (ii).
In a real, deployed conventional system, the RF power is often set to a suitable level
that just covers the whole service area (if it is too small it will not cover all the area and
if it is too high it will cause more interference to neighbouring cells). In our simulation,
with the same RF power level, the GA and adaptive antenna system offers clearly supe‐
rior performance, as shown in Fig. 4(b) where the performance is shown using the power
that is optimum for the GA with CoMP.

5 Conclusion

In this paper, we propose a GA based adaptive antenna system that works with CoMP
for OFDMA networks. The results show that CoMP delivers a significant performance
gain. However by combining CoMP with adaptive antennas whose patterns are deter‐
mined by a GA optimisation, the system achieves further performance gain in terms of
overall system throughput and energy efficiency. Further studies will be carried out to
investigate more scenarios and real system integration issues.

References

1. Marsch, P., Fettweis, G.P.: Coordinated Multi-Point in Mobile Communications: From


Theory to Practice. Cambridge University Press, New York (2011)
2. Yang, X., Wang, Y., Zhang, T., Cuthbert, L., Xiao, L.: Combining CoMP with semi-smart
antennas to improve performance. Electron. Lett. 47(13), 775–776 (2011)
3. Zhou, S., Zhao, M., Xu, X., Wang, J., Yao, Y.: Distributed wireless communication system:
a new architecture for future public wireless access. IEEE Commun. Mag. 41(3), 108–113
(2003)
4. Nahi, P., Parini, C.G., Papadopoulos, S., Du, L., Bigham, J., Cuthbert, L.: A semi-smart
antenna concept using real-time synthesis for use in a distributed load balancing scheme for
cellular networks. In: Antennas and Propagation, (ICAP 2003), vol. 1, pp. 168–171 (2003)
5. Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)
6. Carroll, D.L.: Chemical laser modeling with genetic algorithms. AIAA J. 34(2), 338–346
(1996)
7. Konak, A., Coit, D.W., Smith, A.E.: Multi-objective optimization using genetic algorithms:
a tutorial. Reliab. Eng. Syst. Saf. 91(9), 992–1007 (2006)
8. Deb, K.: Multi-Objective Optimization Using Evolutionary Algorithms. Wiley, New York
(2001)
9. Deb, K.: An efficient constraint handling method for genetic algorithms. Comput. Method
Appl. Mech. Eng. 186(2), 311–338 (2000)
10. Powell, D., Skolnick, M.M.: Using genetic algorithms in engineering design optimization
with non-linear constraints. In: 5th International conference on Genetic Algorithms, pp. 424–
431 (1993)
Another random document with
no related content on Scribd:
well versed in the knowledge of the stars, he was the first who
offered sacrifices to the gods of heaven. We are also told, that in the
island just named is a mountain, where Uranus, holding the sceptre
of the world, took great pleasure in contemplating the firmament and
the stars. Among the sons of this monarch, according to the same
fiction, the two most distinguished were Atlas and Saturn, who
partitioned between them their father’s kingdom; and Atlas, who in
the division acquired the sea-coasts, is said to have excelled in
astrology: his reign is placed about sixteen hundred years before the
Christian era, and he is therefore ranked as a co-temporary of
Moses.

Such is the fabulous history of Uranus! whose name some


Christian philosophers seem desirous to perpetuate, with honour, by
attaching it to a newly-discovered world! It would be extremely
difficult if not impracticable (and, perhaps, even if practicable, the
attempt would not be advisable at this time of day,) to abolish such of
the names of the heavenly bodies as are derived from the
appellations of the false gods of antiquity. But it appears very
questionable, whether it be consistent with propriety and a due
regard to truth, to connect fable, in any manner, with established and
important realities; or whether it be right to dignify the heathen
mythology and the preposterous annals of fabulous ages, by
unnecessarily associating any thing relating to them, with objects of
genuine and useful science.

Baron Bielfeld seems to entertain similar sentiments on this head,


when (treating of the mathematics, in his “Elements of Universal
Erudition,”) he observes, that “the fables of ancient poets concerning
the stars, and,” he adds, “the fancies of some modern Christian
astronomers, who have given them names borrowed from the holy
scriptures, do not deserve the least attention, when we would treat
seriously on this science.” There is much justness in this observation
of the learned and ingenious baron: But if the application of names
derived from sacred writ, to the stars, be censurable; how much to
be condemned among Christians is the practice of giving, even in
our day, and in a science which has philosophical truth for its object,
the names of heathen deities, and fabulous persons of antiquity, to
the celestial bodies! Is it proper, can it, in any way, promote the
interests of true science or the attainment of useful knowledge, thus
to commemorate any of the absurdities of a false and impious
mythology; or any of those traditional personages of the early ages,
whose history, as handed down to us in the reveries of the ancient
poets and other profane writers, are either enveloped in fable or
inexplicable mystery? But to return from this digression:—

Mr. Lalande remarks in his great work on astronomy, which was


published in the year 1792, that Louis XIV. gave to astronomers
unceasing marks of the interest he took in their labours; and that
George III. occupied, with great delight, much of his time in his
Observatory at Richmond, as well as in Herschel’s at Slough. In his
own, in Richmond Gardens, the king of England has noble and
beautiful instruments; among which are a mural arch of 140° and 8
feet radius, made by Sisson, a sector of 12 feet, a transit telescope
of 8 feet, made by Adams, and a telescope of 10 feet of Herschel.
This grand Observatory was erected in the year 1770, under the
direction of Dr. Bevis: it is 140 feet in front, and consists of two
stories.

Such princes, then, as Louis XIV. and George III. deserve to be


honourably mentioned in the records of astronomical science: and it
was meritorious in Dr. Herschel, to dedicate to so munificent a patron
and promoter of astronomy as the latter sovereign, in the way he has
done, his important discovery of a new planet.

It is noticed by the writer of the article “Astronomy,” in Dr.


Brewster’s New Edinburgh Encyclopædia, (the first volume of which
has been very lately reprinted in Philadelphia,) that the venerable
Herschel,[85c] at the advanced age of seventy-two years, still
continued to observe the heavens with the most unwearied assiduity:
and that his contemplated “successor,” who, it is presumed, is his
son, “promises to inherit the virtues and the talents of his father.”

85a. Herschel, in calling his newly-discovered planet by the name of his


patron, was not without illustrious precedents for so doing. When Galileo
discovered the four Satellites of Jupiter, in the year 1610, he named them the
Medicea Sidera, in honour of the family of Medici, his patrons. And Cassini, who,
in the years 1671, 1672, and 1684, successively, discovered the fifth, the third, and
the first and second Satellites of Saturn, denominated these stars, Sidera
Lodoicea, in honour of Louis XIV. in whose reign, and observatory, they were first
discovered. The fourth Satellite of Saturn (but the first of them, in the order of time,
that was known) had been previously discovered by Huygens, sixteen years
before any one of the others was known to exist.

85b. So written by Lalande. There is an Asiatic island called Panay: it is one of


the Philippines, and lies, as Panchay is said to do, “to the east of Africa.”

85c.

“Herschel, with ample mind and magic glass,


Mid worlds and worlds revolving as they pass,
Pours the full cluster’d radiance from on high,
That fathomless abyss of Deity.”
Purs. of Lit. dial. the fourth.

86. Philip III. king of Spain, first offered a reward for the discovery
of the longitude, about two centuries ago; and the States of Holland,
soon after, followed his example. The Regent of France, during the
minority of Louis XV. also promised a great reward to any person
who should discover the longitude at sea.

In the year 1714, the parliament of Great Britain offered a reward


for a like discovery; and if the method, to be proposed, should
determine the longitude to twenty geographical miles, the premium
was to be twenty-thousand pounds sterling. The act of parliament
established a board of Commissioners of the Longitude. Several
other acts were passed, in the reigns of Geo. II. and III. directed to
the same purpose. Finally, in the year 1774, all those acts were
repealed, by one offering separate premiums for finding the
longitude; either by the lunar method, or by a watch keeping true
time,—or by any other method practicable at sea. This act proposes
as a reward for a time-keeper, 5000l., if it determine the longitude to
one degree or sixty geographical miles,—7500l., if to forty miles,—
and 10,000l., if to thirty miles. If the method be by improved Solar
and Lunar Tables, constructed upon Sir Isaac Newton’s theory of
gravitation, the author is to receive 5000l.; provided such Tables
shall show the distance of the Moon from the Sun and Stars within
fifteen seconds of a degree, answering to about seven minutes of
longitude, after making an allowance of a half a degree for the errors
of observation. The Commissioners have the power of giving smaller
rewards, at their discretion, to persons making any discovery for
finding the longitude at sea, though it may not be within the above
limits.

The set of Solar and Lunar Tables which were sent to the Board of
Longitude, about the year 1763, by the widow of the celebrated
astronomer, Tobias Mayer, were honoured with a reward of 3000l.
sterling, by an act of the British parliament, in consideration of their
great usefulness in finding the longitude at sea.

87. See Mr. de Zach’s great work, entitled, Tabulæ Motuum Solis
novæ et correctæ, &c.

88. For the use of such readers as may not be acquainted with the
Latin language, the following translation of the above is given, from
the original of Mr. de Zach.

“Concerning the means of determining the longitude, this is not the


proper place to treat: of one, however, the marine or nautical time-
keeper, it will not be foreign to our purpose to say something.

“It is now about thirty years, since those very ingenious makers of
time-keepers, Harrison, Cummings, Kendal, Arnold, and Mudge,
among the English,—Le Roy, and Berthoud, among the French,—
devised various and excellent ones for the use of navigators, and
brought to a great degree of perfection those marine watches, called
by the English, Time-keepers. As every one knows their use in
ascertaining the longitude, on a sea-voyage, I shall not say any thing
more of them here.—A similar time-piece, made by the celebrated
watch-maker Mr. Thomas Mudge, and often referred to in the royal
observatory of Greenwich, was, in 1784, made use of by the Hon.
Vice-Admiral (John) Campbell, commander of the naval squadron[88a]
on the Newfoundland station,—going thither and returning; and from
that time was diligently examined, at the observatory of his
Excellency Count Bruhl, in Dover street London.

“This very marine time-piece was confided to my charge, in the


year 1786, for the purpose of determining the longitudes of my
journey by land; when, called from London by his Serene Highness
the Duke of Saxe-Gotha,—the patron of all the sciences and liberal
arts, but more especially favouring astronomy,—I returned to
Germany; where the erecting of a complete and splendid
Observatory, at Gotha, was placed under my direction.[88b] I then took
with me, by the command of his Serene Highness, a watch of a
smaller size, which he usually carried in his fob,—called by the
English a Pocket-chronometer,—made by a London artist, Mr. Josiah
Emery:[88c] which, being made with the greatest accuracy and
ingenuity, yielded nothing in point of correctness to the larger
nautical time-keepers, as may be seen from three tables of their
movements by the illustrious Count Bruhl, and also of others, by Dr.
Arnold, lately established by authenticated certificates.

“About the end of the year 1786 and the beginning of 1787, I
accompanied His Serene Highness, in a tour through Germany,
France and Italy. In this journey, the longitudes of several places and
astronomical observatories were determined, from a comparison of
the time of a nautical time-keeper (which was set by the solar mean
time in Dover street, London,) with the mean time of the place; which
appears by the altitudes of the sun, by Hadley’s sextant—those
which we call corresponding, or by a comparison with it, as
transmitted to us in observatories, by those astronomers. By the
same instruments, therefore, when I arrived at Gotha, I ascertained
the longitude of the future observatory there, with the greatest care
and attention; which the Duke, going to London a few days after,
taking with him his chronometer, at length fully verified.”
88a. Here is a reference, in the text, to note 89.

88b. Here is a reference, in the text, to note 90.


88c. Here is a reference, in the text, to note 91.

89. Sundry astronomical observations were made by this officer,


while a captain in the British navy, in the years 1757, 8, and 9; which
were reported to the admiralty on the 14th of April, 1760, by Dr.
Bradley, then astronomer-royal. See Dr. Bradley’s letter of that date,
to the Secretary of the Admiralty; published (among other papers) in
the year 1770, by order of the board of longitude, at the end of T.
Mayer’s Tables and Method of finding the Longitude; edited by Dr.
Maskelyne.

90. The Observatory, a very handsome and respectable one, was


constructed at Gotha in the year 1788, under the auspices of the
then reigning Duke of Saxe-Gotha, a zealous patron of astronomy. It
is placed on an eminence, a league from the city, and is built entirely
of hewn stone. Mr. de Zach, a native of Hungary, an experienced
astronomer, was appointed by the duke its director.

The instruments with which the Gotha Observatory is furnished


are chiefly English, as are those of most of the celebrated European
observatories. Among these, is a transit telescope, by Ramsden; and
Mr. Lalande mentions, in his Astronomie (in the year 1792,) that
there were to be added, two murals of eight feet radius, an entire
circle of eight feet diameter, a great zenith-sector, &c. but that Mr.
Ramsden, who was employed to make them, found great difficulty in
supplying all the demands for instruments, which his great reputation
occasioned.

It is well known, that the first improvements in astronomical


instruments took place in Great-Britain; and both Lalande and de
Zach, as well as other foreign astronomers of eminence, have done
ample justice to the superior ingenuity and skill of the artists of that
country, in this department of mechanism. The ingenious Mr.
Edmund Stone, in his Supplement to the English Translation of Mr.
Bion’s Construction and Use of Mathematical Instruments,
(published in 1758, nearly forty years after he translated Mr. Bion’s
work into English,) observes—that, having set about the business
(the translating of this latter work,) he soon perceived that many
French instruments were excelled by some of the English of the
same kind, in contrivance; and that, as to workmanship, he never did
see one French instrument so well framed and divided as some
English have been. “For example,” says Mr. Stone, “Mr. Sutton’s
quadrants, made above one hundred years ago,” (before the middle
of the seventeenth century,) “are the finest divided instruments in the
world; and the regularity and exactness of the vast number of circles
drawn upon them, is highly delightful to behold. The mural quadrant
at the Royal Observatory, at Greenwich, far exceeds that of the
Royal Observatory at Paris. Also, the theodolites of Messrs. Sisson
and Heath, the clocks and watches of Messrs. Graham, Tompion
and Quare, the orreries of Mr. Graham and Mr. Wright, and many
more curiously contrived and well executed mathematical
instruments which I could mention, far exceed those of the French,
or indeed any other nation in the world.—The making good
mathematical instruments,” continues Mr. Stone, “is almost peculiar
to the English; as well as their skill in all branches of the
mathematics and natural philosophy has been generally superior to
that of other nations.”

Without wishing to derogate from the justly acquired fame of


British artists, for the excellence of their mathematical and
astronomical instruments, M. Rittenhouse’s skill and accuracy,
displayed in such as he made, stand unsurpassed by similar works
of their most celebrated mechanicians: while his profoundness in
astronomical science, and his wonderful ingenuity of invention and
contrivance, manifested in the construction of his Orrery, leave him
without a rival, in the two-fold character of an Astronomer and a
Mechanic. The idea of the fine planetarian machine constructed by
Mr. Rowley, under the name of the Orrery, and supposed to have
been invented by Mr. Graham, is said to have been taken from a
very similar machine, of which that eminent philosopher, Dr. Stephen
Hales, had the credit of being the original contriver. But Mr.
Rittenhouse was, incontrovertibly, the Inventor, as well as the Maker,
of that sublimely-conceived and unrivalled machine, which bears the
name of the Rittenhouse-Orrery: and Dr. Morse, in noticing some of
the more prominent productions of scientific ingenuity and skill, in
America, observes, with good reason, that “every combination of
machinery may be expected from a country, a native son of which,”
(referring in a note to “David Rittenhouse, Esq. of Pennsylvania,”)
“reaching this inestimable object in its highest point, has epitomised
the motions of the spheres that roll throughout the universe.” See
Morse’s American Geography, first published in 1789.

91. The accuracy of some of the fine pocket-chronometers


constructed by the celebrated artists named by Mr. de Zach, and by
some others, such, for instance, as the one made by Emery for the
count de Bruhl, mentioned in the text, has rendered them, on some
occasions, useful assistants in making astronomical observations on
land. Dr. Rittenhouse occasionally used one for such purposes,
many years. It was an excellent pocket-watch, made by Le Roy of
Paris for the late Matthias Barton, Esq. who was induced to let Dr.
Rittenhouse have it. After his decease, this watch was gratuitously
restored to its former proprietor, by Mrs. Rittenhouse’s desire, and as
a testimonial of what she knew to have been her late husband’s
regard for his nephew. Mr. M. Barton bequeathed it, by his last will,
to his brother and physician, Dr. Benjamin S. Barton.

92. The Memoirs of the Royal Academy of Sciences at Paris, for


the year 1729, contain an article that furnishes additional evidence of
the extraordinary skill and ingenuity manifested by English artists in
the construction of watches, as well as other pieces of mechanism
which require great accuracy in the workmanship: it forms a pleasant
little narrative in an eulogium on Father Sebastian,[92a] a Carmelite
Friar of singular mechanical ingenuity; and it indicates, at the same
time, that the repeating-watch was invented in England. The story is
thus told:—

“Charles II. roy d’Angleterre, avoit envoyé au feu roi deux Montres
à Repetition; les premieres qu’on ait vues en France. Elles ne
pouvoient s’ouvrir que par une secrete précaution des ouvriers
Anglois, pour cacher la nouvelle construction, et s’en assurer
d’autant plus la gloire et le profit. Les montres se dérangérent, et
furent remises entre les mains de M. Martineau, horloger du roi, qui
n’y put travailler faute de les sçavoir ouvrir. Il dit a M. Colbert, et c’est
un trait de courage digne d’etre remarqué, qu’il ne connoissoit qu’un
jeune Carme capable d’ouvrir les montres, ques’il n’y réussissoit
pas, il falloit se resoudre à les renvoyer en Angleterre. M. Colbert
consentit qu’il les donnât au P. Sebastien, qui les ouvrit assez
promptement, et de plus les raccommoda sans sçavoir qu’ elles
étoient au roi, ni combien étoit important par ses circonstances
l’ouvrage dont on l’avoit chargé.”
92a. His baptismal name was John Truchet.

93. This great man, who was the son of Christian Huygens lord of
Zuylichem, a counsellor of the prince of Orange, was born in the
year 1629, at Zuylichem, in the province of Guelderland, the country
of the ancestors of Rittenhouse. Having resided for some time in
France, he quitted that country on account of his religion, in 1684, in
consequence of the revocation of the edict of Nantes. He died in
Holland in 1695, at the age of sixty-six years.

Galileo, who was a native of Florence, lived to the age of eighty-


seven years. He died fifty-three years before Huygens; and about
fourteen before Huygens’s application of the pendulum to clocks, so
as to effect an isochronal regulation of their movements. Galileo’s
use of the pendulum, for the purpose of measuring time, seems to
have been nothing more than the annexation of a short pendulum to
clock-work.

94. This celebrated naturalist and physician, who was styled by


Boerhaave, Monstrum Eruditionis, was born at Zurich in 1516: He
was, probably, of the same family as that of the late Solomon Gesner
the poet, who was a native of the same city, and appeared more
than two centuries afterwards. Conrad Gesner was so distinguished
a writer, as a naturalist, that he was called the Pliny of Germany. A
splendid edition of Pliny’s Natural History, under the title of the
Historia Mundi of Caius Plinius Secundus, with a dedication by
Erasmus to Stanislaus Turzo, bishop of Olmutz, was printed at Basil,
by Froben, so early as 1525. This copy of Pliny (which is now very
rare) having been published in the vicinity of Conrad Gesner, during
his youth, that circumstance may have prompted him to direct his
attention to those pursuits in science, which distinguished this
learned Swiss.

95. About two centuries after that period when the sciences had
begun to revive and the mechanical arts to flourish, the construction
of clocks appears to have been much improved. And in the reign of
Henry VIII. a stately clock was made by an artist, the initials of
whose name are “N. O.” in the year 1540, and placed in the royal
palace at Hampton-Court. This not only shewed the hour of the day,
but an orrery-part, connected with it, exhibited the motion of the sun
through all the signs of the zodiac, and also of the moon, with other
matters depending on them. A similar one, in the cathedral of
Lunden in Denmark, is mentioned by Heylin: But Martin, in his
Philosophia Britannica, speaks of a piece of clock-work in the
cathedral of Strasburg, in Alsace; “in which, besides the clock-part, is
the celestial globe or sphere, with the motions of the sun, moon,
planets and fixed stars, &c.” This was finished in the year 1574, and
is represented as being much superior to a pompous clock at Lyons,
in France, which also has an orrery department.

96. The first pendulum-clock made in England, was in the year


1662, by Mr. Fromanteel, a Dutchman.

In the library-hall of the Philadelphia Library-Company, is one of


the clocks made by that artist, having this inscription engraven on its
face, “Johannes Fromanteel, Londini, fecit;” but without any date.
This clock was a donation to the library-company, in the year 1804,
by Mr. Samuel Hudson, of Philadelphia, whose ancestor purchased it
at an auction in London, after the restoration of king Charles II. The
traditional account of it is, that it belonged, originally, to the Cromwell
family; and, when presented, was said to be one hundred and forty
years old: but it could not have been the property of the protector,
Cromwell, the time of whose death was between three and four
years anterior to Fromanteel’s construction of a pendulum-clock.

97. Besides the testimony of so distinguished an astronomer as


Mr. de Zach, already given, respecting the very great accuracy to
which time-keepers have been brought, the following translation,
taken from what the celebrated Lalande has said in his treatise Des
Horloges Astronomiques, (in the second volume of his Astronomie,)
furnishes some curious and interesting facts on that subject.

“Short (the mathematical instrument maker,) upon the occasion of


the transit of mercury over the sun observed in 1753, assures us that
he had found by many observations, that his clock had not varied
more than one second, from the 22d of February to the 6th of May
(Philos. Trans. 1753, p. 200;) so that, with a like pendulum, it is
possible to obtain an exactness which, till this time, was thought
incredible. There are English astronomers who have assured me,”
continues Lalande, “that pendulum-clocks have been made which
did not vary more than five″ in a year:[97a] but that does not appear to
me to be yet established as a fact; the oils that one is obliged to use
in them are sufficient, by the change of consistency they undergo, to
prevent such preciseness. The count de Bruhl, a great amateur and
a perfect connoisseur also, on the subject of time-pieces, shewed
me in London a diary of the going of two pendulums of Mudge, one
of the most celebrated clock-makers in London: in one, there was a
difference of half a second a day, between winter and summer; and
in the other a second. Mr. Aubert has a pendulum made by Shelton,
which varies also nearly a second in the day, in extreme seasons.
Picard, in 1671, had a clock which did not lose a second in two
months. But, whatever may have been, since that period, the skill of
the clock-makers of Paris, we cannot obtain such exactness, but by
mere accident and an equality of temperature in the atmosphere that
is very rare: now, the correctness of our clocks is a necessary
consequence of their principles; but these do not go so far. Mr.
Emery has observed two clocks beat the same second, during three
months; they were, however, very near to each other, and probably
had some influence on one another by means of their foot-board or
support.”
97a. Even watches have been already brought to an inconceivable degree of
exactness. Mr. Arnold and Mr. Emery made some, in the year 1786, which did not
vary one second in a voyage of an hundred leagues.

98. This gentleman’s name is connected with another


circumstance in relation to Mr. D. Rittenhouse, which deserves to be
noticed. He is in possession of a finely-graduated thermometer,
made by our Philosopher; on the scale of which is engraved, by him,
the record of a memorable fact concerning the climate of
Pennsylvania, referring by a mark to 22° below 0, of Fahrenheit’s
scale; viz.—“Jan. 2. 1762—Great Cold in Pennsylvania.” This fact
was ascertained by Mr. Rittenhouse, from a reference to the
accurate Messrs. Masons and Dixon’s Journal; in which, such was
stated to have been the degree of cold in the forks of the Brandywine
(about thirty miles westward, and very little to the southward, from
Philadelphia,) on the day mentioned.

Mr. Rittenhouse had noticed, that, at his Norriton Observatory, (in


lat. 40° 9′ 31″ N.) the mercury in Fahrenheit’s thermometer, not
exposed to the sun-shine but open to the air, was at 94½°, on the 5th
of July 1769; “which,” says he, “was the greatest height it had ever
been observed to rise to, at that place.” But the writer is informed by
a judicious and attentive observer, that at Lancaster, Pennsylvania,
which is in lat. 40° 2′ 39″ N. (the long. of this borough-town is 5h 1′ 4″
W. from Greenw.) the mercury rose by Fahrenheit’s scale, on the 7th
of July, 1811, to 97½°. Admitting this to be correct, if 1½° be then
deducted, for the extra heat of so large a town as Lancaster in
comparison with a country-situation, there is in this case the great
range of 118° by Fahrenheit’s scale, for the extremes of heat and
cold in Pennsylvania.

The writer brought with him, from England, a meteorological diary


kept in London, during the severe frost there, from the 7th day of
January, 1776, to the 28th of the same month, both days inclusive.
The greatest cold, during that period, was 15° and it is thus noted, in
respect to the state of the atmosphere at the time; “Clear sky—
intense cold—wind west.” The mercury rose on one day, within that
time, to 34°. The mean degree of cold, in the same period, was there
26¾°.

The greatest cold at Philadelphia, during the same days of


January, 1776, was at 17°, but the mercury rose there, on one of
those days, to 48°. The mean degree of cold at Philadelphia, in this
corresponding period of time, was 29⅓°; being about 2½° warmer
(or rather, less cold,) than the general temperature of the weather in
London, at the same time, in what was there called a “severe frost.”
Eighty-five degrees of Fahrenheit’s scale is considered as a very
extraordinary heat, in London: consequently, a range of 68° may be
presumed to reach the extremes of heat and cold in England, in the
latitude of nearly 52° N.[98a]

Notwithstanding the extremes of heat and cold, which thus appear


in the climate of Pennsylvania, Mr. Jefferson remarks (in his Notes
on Virginia,) that these extremes are greater at Paris than at
Williamsburg, the hottest part of Virginia. Yet Williamsburg, which is
only about 2¾° to the southward of Philadelphia, is nearly 11¾°
further south than Paris.
98a. Since writing the above, the author has ascertained, that in London,
during the four last years of the last century, Six’s thermometer, out of doors,
averaged 49.6; that on the hottest day within that period, the mercury rose to 86;
and that it fell, on the coldest day, to 4.

99. See a description of this Chronometer, in the Appendix.

100. Mr. Stanton died at Philadelphia, the 28th of June, 1770,


aged sixty-two years. He was, for above forty years, a distinguished
preacher among the people called Quakers; and is reputed to have
been a man, “who, from his youth, had been a conspicuous example
of Christian meekness, humility, and self-denial; a zealous promoter
of the cause of religion, and the essential good of mankind.”

Some elegiac verses, under the title of a “poetic tribute” to the


memory of this worthy man,—from the pen of a lady in Philadelphia,
—were published in the Port Folio, for April 1813.
101. This letter contains, likewise, a short narrative of an
occurrence which excited much feeling, and claimed a considerable
portion of the public attention, at the time. As Mr. Rittenhouse’s
account of the transaction referred to, will serve to shew that he was
not an indifferent spectator of the political events of that early day;
and, further, that he was zealously disposed to support the legitimate
authority of the government, in order to suppress illegal and
disorderly proceedings, subversive of the laws and dangerous to the
public peace and safety; this part of his letter to Mr. Barton (of the
16th of February, 1764,) is also presented to the reader.

It will be recollected that what was called the Paxton Riot in


Pennsylvania, in the year 1763, was occasioned by an attempt made
by many of the inhabitants of a district in the upper end of Lancaster
(now Dauphin) county, called Paxton, with some of their neighbours,
to destroy a number of Indians resident in and near that county; who
were extremely obnoxious to the Paxton people, by reason of the
supposed treachery, if not actual hostility, of these Indians to the
settlers on the Paxton frontier, in the war that had then recently
terminated. These unfortunate Indians had, nevertheless, uniformly
professed themselves to be friendly to the English, in that war; and
were so reputed by the government of Pennsylvania: but finding
themselves, notwithstanding, threatened with extermination by “the
Paxton Boys” (as they were then called,)—by whom a few old men,
women, and children had been destroyed, shortly before, at their
homes,—they sought the protection of the government. Part of them
were, accordingly, placed in the public prison in Lancaster, and the
remainder at the barracks in Philadelphia, as places of security.
Those in Lancaster, to the number of fourteen or fifteen, were soon
after, as is well known, killed by the Paxton people, one of the prison
doors having been forcibly broken open by them. The remnant of
these persecuted Indians, who were in Philadelphia, were more
fortunate than their brethren; they escaped the horrors of
assassination: And it is to the expedition against these wretched
fugitives—a mere handful of men, unarmed, and claiming from
Christians an asylum from massacre,—that Mr. Rittenhouse refers in
his letter.
“You are no doubt, long before this time, well acquainted,” said our
young philosopher, “with every particular of the Paxtonian expedition
to Philadelphia: nor need I tell you, that whatever information you
may have through the channel of ——, will be abominably corrupt.
About fifty of the scoundrels marched by my work-shop—I have seen
hundreds of Indians travelling the country, and can with truth affirm,
that the behaviour of these fellows was ten times more savage and
brutal than theirs. Frightening women, by running the muzzles of
their guns through windows, swearing and hallooing; attacking men
without the least provocation; dragging them by the hair to the
ground, and pretending to scalp them; shooting a number of dogs
and fowls;—these are some of their exploits.

“I received a letter from sister E. soon after the alarm at


Philadelphia was over, and will give you a part of it, which I doubt not
will be agreeable to you.”—It is as follows.

—“On Monday morning between one and two o’clock, an express


came to the governor, informing that the rebels were on their way,
and that a great number of them were on this side the White Horse.
There was one express after another, till there was certain
intelligence that some of them were at Germantown. When the first
express came, the bells were rung, the drums beat, and the
constables were ordered to go from house to house, to knock up the
inhabitants, and to bid them put candles at their doors: it had the
appearance of all the houses being illuminated. Before day, there
were above twenty men met at J. J.’s, and chose their officers.
Before night they were increased to nearly an hundred; as were
likewise most of the other companies: E—— and all our men were in
captain Wood’s company. They all appeared to be in high spirits, and
desirous to meet the rebels. On Tuesday, when the mayor and the
other gentlemen set off for Germantown, the heads of the companies
begged of them not to comply with any dishonourable terms, and
told them—“Gentlemen, we are ready to go wherever you may
command us; and we had much rather you would let us treat with
them (the rebels) with our guns.”—On their return, there was a
general murmur among the companies against the proceedings of
our great men; they knew it, and there was a long harangue made by
Mr. Chew: but it did not answer the end. On Wednesday morning I
went to —-—, as usual; and on my return home, I stopped at our
friend H. J.’s; when, on a sudden, the alarm-gun was fired, the bells
began to ring, and the men called “to arms,” as loud as possible. I
cannot describe, my dear brother, how I felt: we ran to the door,
when to add to my fright, I saw E——, amidst hundreds of others,
run by with his gun. They met at the court-house, formed themselves
into regular companies, and marched up Second-street as far as the
barracks; when they found it was a false alarm.

“It was a pleasing, though melancholy sight, to view the activity of


our men. In less than a quarter of an hour, they were all on their
march,—it is supposed above a thousand of them; and by all
accounts, there were not ten —— among them. It was the common
cry, while our men were parading—“What! not one —— among
us!”—Instead of joining with others, they would sneak into corners,
and applaud the “Paxton-boys.” Their behaviour on this occasion has
made them appear blacker than ever.”

Concerning these extraordinary transactions, to which much


importance was attached in their day, and which, moreover,
constitute a curious and interesting occurrence in the history of
Pennsylvania, in the time of our philosopher, the testimony of
another respectable witness is added; a person, besides, who bore a
principal part in arresting the progress of the insurrection referred to.
On the 2d of June, 1765, Dr. Franklin, who was then in London,
wrote a letter to the celebrated Henry Home, lord Kames, in which
the following interesting circumstances are related, respecting what
was called the Paxton Expedition: this letter is inserted entire in lord
Woolhousie’s Memoirs of the Life and Writings of Lord Kames. The
Doctor therein says—“In December (1763,) we had two insurrections
of the back inhabitants of our province, by whom twenty poor Indians
were murdered, that had from the first settlement of the province
lived among us, under the protection of our government. This gave
me a good deal of employment; for, as the rioters threatened further
mischief, and their actions seemed to be approved by an increasing
party, I wrote a pamphlet, entitled A Narrative, &c. to strengthen the
hands of our weak government, by rendering the proceedings of the
rioters unpopular and odious. This had a good effect: and
afterwards, when a great body of them with arms marched towards
the capital in defiance of the government, with an avowed resolution
to put to death one hundred and forty Indian converts, then under its
protection, I formed an association at the governor’s request, for his
and their defence, we having no militia. Near one thousand of the
citizens accordingly took arms: Governor Penn made my house for
some time his head-quarters, and did every thing by my advice; so
that, for about forty-eight hours, I was a very great man, as I had
been once some years before, in a time of public danger. But the
fighting face we put on, and the reasonings we used with the
insurgents, (for I went, at the request of the governor and council,
with three others, to meet and discourse them,) having turned them
back, and restored quiet to the city, I became a less man than ever;
for I had, by these transactions, made myself many enemies among
the populace.”

102. .fm rend=t The writer of these memoirs well remembers to


have heard Mr. Rittenhouse, when fully matured in years, speak of
the pleasure he derived from the reading of John Bunyan’s Pilgrim’s
Progress, while a youth. It is, certainly, no faint compliment to the
“well-told tale” of that “ingenious dreamer,” that it engaged the
attention of David Rittenhouse, even at a very early period of his life:
and that compliment is greatly enhanced by the following beautiful
invocation, addressed to the long-since departed spirit of the
humble, yet persecuted, the pious, yet fanciful Bunyan, by the
amiable Cowper:—

“Oh thou, whom, borne on fancy’s eager wing,


Back to the season of life’s happy spring,
I pleas’d remember, and, while mem’ry yet
Holds fast her office here, can ne’er forget;
Ingenious dreamer, in whose well-told tale
Sweet fiction and sweet truth alike prevail;
Whose hum’rous vein, strong sense, and simple style;
Witty, and well-employ’d, and, like thy Lord,
Speaking in parables his slighted word;
I name thee not, lest so despis’d a name
Should move a sneer at thy deserved fame:
Yet, ev’n in transitory life’s late day,
That mingles all my brown with sober gray,
Revere the man, whose Pilgrim marks the road,
And guides the Progress of the soul to God.”
Cowper’s Tirocinium.

The celebrated Benjamin Franklin too, in the account of his Life


written by himself, informs us, that the Pilgrim’s Progress (which
Franklin there, inadvertently, calls “Bunyan’s Voyages,”) was a
favourite book of his, in his earlier years. “I have since learned,” says
the Doctor, “that it has been translated into almost all the languages
of Europe; and, next to the Bible, I am persuaded, it is one of the
books which has had the greatest spread.”

103. This was about the year 1764.

104. In the earlier part of this interval of time, and before he


became more seriously engaged in those great works and
researches, the construction of his Orrery, and the Observation of
the Transit of Venus with the operations preparatory to it, which
about that time engrossed his attention, he occasionally amused
himself with matters rather speculative than practical: though he very
seldom devoted any considerable portion of his time to things which
he did not consider as being in some degree useful.

The following is one of those instances in which his active mind


was diverted from severer studies, to some objects of a more playful
nature.

In the year 1767, some ingenious country-gentleman published in


Messrs. Hall and Sellers’s paper, under the signature of T.T. the
result of calculations he had made on Archimedes’s famous vaunting
assertion, Δος που στω, και την γην κινησω. Mr. Rittenhouse
published, some short time after, calculations (or rather the result of
calculations) of his own, on the same problem. This appeared in a
piece under the signature of “A Mechanic,” dated the 8th of October,
1767: and a reply to it, by T. T. dated October the 29th, appeared in
the same paper. These little speculations will be found in the
Appendix. It is not improbable that Mr. Rittenhouse, under the
disguise of “A Mechanic,” appeared in print on this occasion, for the
purpose of drawing the attention of ingenious men to subjects of this
nature.

105. It was between the years 1766 and 1770—the interval of time
above mentioned,—that the two important circumstances occurred,
which gave great celebrity to the reputation of Mr. Rittenhouse, as an
astronomer: these were the Construction of the Orrery invented by
him, and the admirable result of his observations of the Transit of
Venus, as published in the Philosophical Society’s Transactions.

Amidst those objects of importance in which he was principally


occupied, he occasionally amused himself with matters of minor
consequence. Among other things, he contrived and made, in the
beginning of the year 1767, an ingeniously contrived thermometer,
constructed on the principle of the expansion and contraction of
metals, by heat and cold, respectively. This instrument had, under
glass, a face upon which was a graduated semi-circle: the degrees
of heat and cold corresponded with those of Fahrenheit’s
thermometer; and these were also correspondently designated, by
an index, moving on the centre of the arch. Its square (or rather
parallelogramical) form, its flatness and thinness, and its small size
—together with its not being liable to the least sensible injury or
irregularity, from any position in which it might be placed,—rendered
it safely portable; insomuch, that it could be conveniently carried in
the pocket.

He presented one of these metaline Thermometers to Dr. Peters,


in June 1767: Another, which he made for himself, was a
considerable time in the hands of Mr. Barton, at Lancaster. They
were found to agree very well with Fahrenheit’s. In a letter to Mr.
Barton, dated the 26th of July 1769, he said—“You will oblige me by
sending the metaline thermometer by..., and let me know the
greatest height you have seen it, this season, Fahrenheit’s
thermometer, in my Observatory, not exposed to the sunshine but
very open to the air, was 94½° on the 5th of this month, at 3 in the
afternoon; which is the highest I have ever seen it.”

106. The Rev. Ebenezer Kinnersley, A. M. Professor of English and


Oratory in the college of Philadelphia. This venerable and worthy
man, who was a clergyman of the Baptist church, was a very
eminent Electrician. In this branch of philosophy, he was an able
lecturer and ingenious experimentalist: and perhaps to no person—
at least in America,—were his cotemporaries more indebted, than to
him, for the light which he shed, at a very early day, on this
interesting and pleasing science.

107. According to the American historian, Marshall, Lord Berkeley


assigned his interest in the Jersies to Penn and his three associates,
in the year 1674; and they, soon perceiving the inconvenience of a
joint property, divided the province, in 1676, with Carteret, who still
retained his interest: to him they released East-Jersey; and received
from him, in return, a conveyance for the western part of the
province. The Duke of York resigned the government of East Jersey
to the proprietor, retaining that of West-Jersey as an appendage to
New-York, until August 1680; when, on a reference to Sir William
Jones, the title was decided against the Duke: after which, he
formally released all claim upon East-Jersey. Soon after this,
Carteret transferred his rights to Penn, and eleven other persons of
the same religious persuasion, who immediately conveyed one half
of their interest to James Drummond, Earl of Perth, and eleven
others; and these, in March 1683, obtained a conveyance from the
Duke of York directly to themselves.—During these transactions,
continual efforts were made to re-annex the Jerseys to the province
of New-York. [See Marshall’s Introduction to the Life of Washington,
ch. vi.]

108. There will not be another transit of Venus over the Sun’s disk,
until the 8th of December, 1874; which, it is probable few persons

You might also like