By Topic

Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on

Date 12-14 Oct. 2005

Go

Filter Results

Displaying Results 1 - 25 of 196
  • Proceedings International Symposium on Communication and Information Technologies 2005

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (1019 KB)  
    Freely Available from IEEE
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright page

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Copyright page

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • Welcome message from chair of the international steering

    Page(s): v
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE
  • Message from General Chair

    Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (575 KB)  
    Freely Available from IEEE
  • Message from general co-chair

    Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (623 KB)  
    Freely Available from IEEE
  • Message from technical program chair

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • Foreword

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (626 KB)  
    Freely Available from IEEE
  • International Steering Committee members:

    Page(s): x - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (361 KB)  
    Freely Available from IEEE
  • ISCIT 2005 timetable of technical program

    Page(s): xiv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (274 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1 - 24
    Save to Project icon | Request Permissions | PDF file iconPDF (3727 KB)  
    Freely Available from IEEE
  • An OPNET-based 3-tier network simulation architecture

    Page(s): 793 - 796
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2338 KB) |  | HTML iconHTML  

    Simulation is an indispensable technique to evaluate the performance of computer networks, and along with the continuous growth of network scale and diversity, the simulation systems become more enormous and complex. In this paper, we present an approach to create a distributed and Web-based 3-tier simulation architecture based on the external model access (EMA) library of OPNET. With this architecture, we can partition modeling and simulation tasks efficiently, and synchronously access the system functions regardless of the location. And at the same time we can share the extremely expensive simulation resources, including the OPNET platform and the hardware devices, among a potentially large number of users. The extensible markup language (XML) is also adopted to describe network simulation scenarios that can be automatically translated into simulation scripts. This technology is especially predominant when focusing on large-scale network simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Envelope domain method characterizing RF nonlinear system excited with a two-tone

    Page(s): 797 - 800
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2672 KB) |  | HTML iconHTML  

    Envelope domain method that is well-suited for representing large signal RF network is presented, including theory and algorithm. Subsequently, characterize a RF nonlinear system excited with a two-tone by envelope domain simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CVM approach for service migration

    Page(s): 801 - 804
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2681 KB) |  | HTML iconHTML  

    The road to 3G runs through 2G and 2.5G networks. Until 3G is deployed ubiquitously, 2-2.5G networks and endpoints dominates. The 3G subscribers should share the successful services deployed in the existing network and the service migration is needed. Redesigning and redeveloping the legacy services is a time-consuming and error-prone task. A connection view model (CVM) approach is taken to simplify the service migration. Services represented with the CVM are platform independent and the main task is to develop the transform rules for service migration which can be reused. With this approach, the successful color ring back tone (CRBT) service is migrated to the IP multimedia subsystem (IMS). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hyperlink-based algorithm incorporating hops between Web pages

    Page(s): 805 - 808
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1372 KB) |  | HTML iconHTML  

    This paper proposes a new ranking algorithm using the hyperlink-based concept with emphases on the number of hops between Web pages. Our proposed approach takes into consideration both the importance and the relevance of a Web page associated with a query phrase. Experiments are carried out to show that the proposed approach shows great promises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information extraction system in large-scale Web

    Page(s): 809 - 812
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1130 KB) |  | HTML iconHTML  

    Manually querying search engines in order to acquire a large body of related information is a tedious, error-prone process. Search engines retrieve and rank potentially relevant documents for human perusal, but do not extract facts, assess confidence, or fuse information from multiple documents. This paper present an information extraction system that aims to automate the tedious process of extracting large collections of facts from large-scale, domain-independent, and scalable manner. The paper focus on four major components: search engine interface, extractor, assessor, database, and further analyzes system architecture and reports on simulation results with large-scale information extraction systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local route optimization in hierarchical mobile IPv6 networks from topologies perspective

    Page(s): 813 - 816
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1071 KB) |  | HTML iconHTML  

    Hierarchical mobile IPv6 (HMIPv6) has long been prevailing in the realm of effective micromobility management. The HMIPv6 protocol, associated with mobile IPv6, supports route optimization to resolve 'triangle-routing' problem, and enables local route registration within a MAP domain to reduce the amount of network-wide signaling traffic. But most of the researches on micromobility related protocol were focused on access networks with tree topology, which have severely limited flexibility and scalability of access networks. In this paper, a novel local route optimization scheme is proposed to facilitate applying HMIPv6 to access networks with various topologies. By dynamically optimizing route to the mobile anchor point according to access network topologies, the new scheme could significantly reduce signaling overhead, handoff latency and packet loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Thai educational Web page classification using inverse class frequency

    Page(s): 817 - 820
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1081 KB) |  | HTML iconHTML  

    Automatic text classification for a Web collection is a challenge task, especially in the case that the language is not English, such as Thai. However, most of Thai educational Web pages usually include English terms due to their technical aspect. Lots of technical terms and typing errors both in Thai and in English are found in Web sites of universities. Most previous works on text categorization applied term frequency and inverse document frequency for representing importance of terms. In this paper, we use inverse class frequency instead of inverse document frequency in centroid-based text categorization because it works well on a collection with a large number of unique terms. The experimental results show that inverse class frequency is useful, especially when it is applied on both prototype and query vectors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web page creation and management system for users without programming skills

    Page(s): 821 - 824
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1215 KB) |  | HTML iconHTML  

    Technology of computer and network system has changed and developed rapidly so that it requires rapid design and development especially for computer and Internet technology which play a major role in our everyday lives and business. However, Web page development and information update usually needs programming skills which can take time to collect. This paper presents framework and concept in developing Web page and/or information update for users without programming skills. Under the proposed framework which is based on a Web application, input such as text image and/or formals for analyzing according concept and being able to develop or update Web conveniently, faster and reducing complication about programming. The proposed framework was implemented and tested with a group of people from different backgrounds. The results showed satisfaction (level 4 out of 5). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple narrow-band interferences suppression based on SVD in UWB communication systems

    Page(s): 826 - 829
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (943 KB) |  | HTML iconHTML  

    In this paper, a novel multiple narrow-band interferences (NBI) suppression technique based on singular value decomposition (SVD) algorithm is presented. SVD is used to approximate the interferences which then are subtracted from the received signals. The proposed technique is simple and robust. Three UWB systems are considered and simulation results show that the proposed new technique is very effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on orthogonal wavelet synthesized UWB waveform signal

    Page(s): 830 - 832
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1480 KB) |  | HTML iconHTML  

    Based on the Haar wavelet synthesized narrow pulse technique, the paper initially puts forward a diversity receiving and transmitting technique of Haar waveform (WD) of UWB signal. The narrow pulses synthesized by each order of Haar wavelet are sent to the receiving system through the transmitting system. The receiver uses coherent detection technique to detect each order of Haar wavelet, which can extract accurately each order of Haar wavelet in the transmitted UWB narrow pulse. The proposed method has important significance for the practical applications due to the easier implementation of Haar wavelet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel timing jitter resist method in UWB systems

    Page(s): 833 - 836
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1148 KB) |  | HTML iconHTML  

    Ultra wideband (UWB) is a kind of wireless communication system which can perform high data rate with nano-second pulses of baseband, and has recently received much attention for short-range applications. Thus a high sensitivity of timing synchronization between modulation and demodulation is required. Timing synchronization error named timing jitter between transmitter and receiver has been introduced and their properties have been analyzed in some papers. However, there are not many methods brought forward to improve the system performance in the scenarios that deteriorated jitter existents. We consider this problem and offer a method to resist the adverse effect by timing jitter to the whole system by adopting a new designed correlator reference signal in UWB receiver. This reference signal is formed corresponding to the timing jitter distribution of the received pulses waveforms to increase the jitter robust performance. From the simulation results of different UWB modulation systems, better performance can be achieved by adopting this reference signal in the receiver than the conventional schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The carrier envelope modulation (CEM) scheme for ultra-wideband WPAN communication

    Page(s): 837 - 841
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1077 KB) |  | HTML iconHTML  

    Considering the two limitations of UWB baseband modulation, the UWB carrier envelope modulation (CEM) scheme is presented in the paper. The UWB binary orthogonal carrier envelope modulation (BOCEM) is discussed as an example to show the realization of UWB carrier-based modulation system. The carrier frequency selection criteria is also derived. The performance analysis and simulation results show the feasibility of the modulation scheme. The UWB carrier envelope modulation (CEM) scheme is different from the present ultra-short pulse UWB and multiband UWB and provides a new design idea for UWB. With the concept of carrier being applied in UWB modulation, the UWB signal processing is extended from the time domain to the frequency domain and a new sight is provided for further development of UWB wireless communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new multiple access protocol for time-hopping UWB ad-hoc wireless networks

    Page(s): 842 - 845
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1028 KB) |  | HTML iconHTML  

    Ultra-wide bandwidth (UWB) is a prospective radio technology for wireless networks. As being approval by FCC, UWB radio has received much attention. In this paper, we propose a new multiple access protocol for time-hopping UWB ad-hoc network. As UWB system is a carrier-less impulse radio system, it is cumbersome to implement the carrier sensing capability needed in popular approaches such as carrier-sense, multiple access with collision avoidance (CSMA/CA) MAC protocols. The novel multiple access scheme to detect the busy medium and reduce the probability of collisions in TH UWB ad-hoc network is given out and evaluated. In UWB TH modulation, the spreading codes for target node are used. In our scheme, another binary PN sequence according to the destination node is also added to the modulation scheme to sense the busy medium before transmission. Communications outside the definition of directly transmission region (DTR) have to relay over intermediate nodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.