By Topic

Communication Technology, 2008. ICCT 2008. 11th IEEE International Conference on

Date 10-12 Nov. 2008

Filter Results

Displaying Results 1 - 25 of 217
  • An efficient LPP-based spam filtering algorithm

    Publication Year: 2008 , Page(s): 478 - 481
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (71 KB) |  | HTML iconHTML  

    With the fast expansion of the Internet globally in the last decade, the spam e-mail has become a main problem of the email service for Internet service providers, corporate and private users. To efficiently solve the spam filtering problems, a spam mail filtering method based on locality pursuit projection (LPP) and nearest feature line (NFL) classifier is proposed in this paper. Experimental results show that the proposed algorithm achieves much better performance than other traditional spam filtering methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kalman filter based on adaptive quantized information

    Publication Year: 2008 , Page(s): 482 - 485
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    When dealing with decentralized estimation problem of dynamic stochastic process in a sensor network, it is important to reduce the cost of communicating the local information due to bandwidth constraints. Thus, only quantized messages of the original information from local sensor are available. For a class of vector state-vector observation model, an adaptive quantization strategy and sequential filter technique are introduced to design fusion algorithms in this paper. According to different forms of original information, two suboptimal Kalman filters are presented based on quantized measurements (KFQM) and quantized innovations (KFQI) respectively. In contrast, the latter has better estimation accuracy under the same bandwidth constraints because of the less information loss while quantizing innovations. Computer simulations show the effectiveness of both methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Essential factors influencing building penetration loss

    Publication Year: 2008 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    This paper investigates radio wave propagation into buildings illuminated from an outdoor base station with an antenna above the rooftop. Field strength measurements are taken in four buildings in urban microcells. Results of the performed experiment as well as those of several other authors are analysed and the most important factors influencing building penetration loss have been discussed namely angle of incidence, external wall configuration, receiver height and significance of non-line-of-sight surface of the building. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCA based multi-level small fault diagnosis

    Publication Year: 2008 , Page(s): 486 - 489
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB)  

    To diagnose multiple faults of multivariate system, DCA (designated component analysis) is introduced to avoid the pattern compounding problem of PCA (principal component analysis). In this paper and a DCA based multi-level small fault diagnosis method is developed for multiple faults diagnosis when small faults are involved in the system. Simulation for observation data involved 4 faults shows its efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A coarse cell search scheme of TD-SCDMA systems

    Publication Year: 2008 , Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (112 KB) |  | HTML iconHTML  

    This paper presents a novel initial cell search (frame synchronization) scheme of TD-SCDMA system. This algorithm uses the implicit power transition in the special frame structure and introduces a different power ratio detector comparing with the conventional non-coherent algorithms, which makes it less complicated and more reliable. We verify our algorithm by computer simulations, and the results show a good and robust performance in a wide range of signal-to-noise ratios (SNRs). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a fractional chaos generator based on virtual instrument technology

    Publication Year: 2008 , Page(s): 490 - 493
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    This paper introduces a method to solve the fractional calculus problem and proposes a new fractional chaotic system for generating complex carrier wave signals of chaos-based communications. Numerical simulations show that the lowest order we found for chaos to exist in the system is 2.31. Based on the system, a fractional chaotic signal generator is designed using virtual instrument technology and the experimental results are observed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new cognitive mobile communication system

    Publication Year: 2008 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1234 KB) |  | HTML iconHTML  

    A new cognitive mobile communication system (CCMCS) is proposed in this paper, which can utilize the unlicensed frequency sufficiently, protect the investment of networks existed and support its evolution. Through the effective application of variable-band OFDM and multiband OFDM, the system can connect several narrow bands into a wideband, and support high speed data transmit. Synchronization to the CCMCS is realized if a MT can synchronize to one of the systems existed. Besides, database supplies a convenient way to obtain suitable access schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconstruct discontinuous signal by all-phase Fourier technique

    Publication Year: 2008 , Page(s): 494 - 496
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (78 KB) |  | HTML iconHTML  

    In order to reconstruct discontinuous signal with the least error by using finite information, this paper combines the concept of all-phase data processing and the conventional Fourier approximation. By utilizing the coefficients acquired by discrete Fourier transforming the samples of signal and the high harmonic information, all-phase Fourier reconstruction is formed. Theoretical deduction and experimental research show that the waveform reconstructed by all-phase Fourier method has less error than those constructed by conventional continuous Fourier integral approximation and the discrete Fourier approximation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing strategy research based on ISL states and topology snapshot in LEO satellite constellation

    Publication Year: 2008 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    In LEO satellite constellation communication system, the routing strategy becomes a big challenge for the movement between satellites. According to researching on the 24/3/1 walker satellite constellation with inter-orbit ISLs and intra-orbit ISLs, two routing optimization scenarios based on ISL state and topology snapshot are suggested. At the same time, some valuable conclusions are provided according to computer simulation about the routing optimization scenarios and the MDA(Minimum Distance Algorithm). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtered-X Lyapunov algorithm for nonlinear active noise control using second-order Volterra filter

    Publication Year: 2008 , Page(s): 497 - 500
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (179 KB) |  | HTML iconHTML  

    This paper presents a filtered-X Lyapunov algorithm for nonlinear active noise control (ANC) using second-order Volterra filter-based the filter-blank structure. Unlike many adaptive filtering schemes using gradient algorithm, a Lyapunov function of the tracking error is first defined, and second-order Volterra filter coefficients are adjusted using Lyapunov stability theory so that the error converges to zero asymptotically. Moreover, it has fast error convergence property and its stability is guaranteed by Lyapunov stability theory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation and analysis on the performances of IGSO satellite constellation

    Publication Year: 2008 , Page(s): 17 - 20
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (126 KB) |  | HTML iconHTML  

    This paper shows us the coverage performance and Doppler shift of the IGSO constellation with 2, 3 or 4 satellites, and then contrasted with the GEO satellite. The IGSO constellation is better than GEO satellite in average elevation angle and multi-satellite coverage. It is concluded after simulation and analysis that the IGSO constellation with 3 or 4 IGSO satellites can provide higher coverage performance for the Chinese areas and nearby, especially communication elevation in high latitude area, just with a small Doppler shift increase. The IGSO satellite constellation can be used more properly as the regional mobile satellite communication constellation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on rules reduction for real value attribute information system based on fuzzy similarity

    Publication Year: 2008 , Page(s): 501 - 504
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (90 KB) |  | HTML iconHTML  

    To overcome the shortcomings of information loss and reduction mistakes in traditional method of rules reduction, a new algorithm of rules reduction for real value attribute information system was proposed. Fuzzy setspsila similarity was introduced into rules reduction of information system based on rough sets theory. The corresponding condition attribute value of every rule was from 0 to 1 by evaluating every real attribute value as unitary one. Every rule was considered as a fuzzy set to denote rules similarity by fuzzy sets similarity. The rules reduction was accomplished by the improved similarity coefficient of fuzzy sets during the reduction process, and the algorithm was tested by international rice information system (IRIS) database. The experimental results show that the algorithm can correctly reduce rules reduction for real value attribute information system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scale-free topology structure in ad hoc networks

    Publication Year: 2008 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (73 KB) |  | HTML iconHTML  

    Lots of real-world complex networks have recently been discovered scale-free characteristic, which the degree distributions of those networks display power-law distribution. The properties of mobile ad-hoc network and the conception of scale-free network are introduced firstly. Then, we focus on the inherent mechanisms of scale-free characteristic in ad-hoc networks. And the influence of scale-free topology on the structure of ad-hoc networks and the transformation of information between nodes is analyzed. Moreover, using the continuous rate equation approach, we obtain the analytical expressions of power-law degree distributions under the different network evolving modes. The results reported in this paper can be used to the design of network protocol and the management of network security in ad-hoc networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new fast rate fault detection approach for multirate sampled-data systems

    Publication Year: 2008 , Page(s): 505 - 508
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB) |  | HTML iconHTML  

    An observer-based fault detection direct design method for multirate sampled-data systems (MSD) is investigated in this paper. Firstly, by use of the discrete lifting technique, the MSD fault detection problem is transformed into an equivalent slow rate pure discrete time problem based on the Hinfin optimal direct design method of single rate sampled-data systems. An Hinfin performance index is then optimized to make the obtained residuals sensitive to the faults and robust to the unknown inputs. An extend QR decomposition algorithm is put forward to ensure the residual generator satisfying the causality constraints. Finally the residual is inverse lifted to implement fast rate fault detection. Simulation results of a numerical example are provided to illustrate the efficiency of the proposed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System for temperature monitor in substation with ZigBee connectivity

    Publication Year: 2008 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    Monitor substation equipment temperature is one of the most important factors for power systems to ensure safe transmission of electricity. Traditional methods for monitoring the substation temperature shows many disadvantages such as low accuracy, heavy workload, lack of real-time, etc. Therefore, a low cost, high accuracy and automatic method is needed for power system. This paper presents a temperature monitor system for substation with ZigBee connectivity. Node hardware, network protocol and software on PC were presented. Finally, the implementation performance shows the sensor nodes have an automatic, small size, low power consumption, and network stability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast algorithm for multi-level mixed-polarity Reed-Muller functions optimization

    Publication Year: 2008 , Page(s): 509 - 512
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (81 KB) |  | HTML iconHTML  

    In this paper, an effective strategy of extraction of common variables from onset table is proposed. By employing the strategy, a novel algorithm is presented to derive a compact multi-level mixed-polarity Reed-Muller expression. The experiment results show that the proposed algorithm can significantly reduce the literals of the RM functions. Compared with published results, the proposed algorithm works faster and needs less memory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MC CDMA multiuser detection using random set theory and multi-value particle swarm optimization algorithm

    Publication Year: 2008 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (96 KB) |  | HTML iconHTML  

    In real uplink multicarrier CDMA (MC CDMA) communication system, the asynchrony of active userspsila signature is a key factor of multiple access interference(MAI). Considering users access randomly, not only the location of active users, but also their number varies with time. In typical analysis, multi-user detection theory for MC CDMA has been developed under the assumption that the number of active users is constant and known at the receiver, and coincides with the maximum number of users entitled to access the system. Since many users might be inactive at any given time, detection under the assumption of the number of users larger than the real one may impair performance. The main goal of this paper is to introduce a general approach to the problem of identifying active users and estimating their data in a MC CDMA random-access system where users are continuously and independently entering and leaving the system. The tool we advocate is random-set theory (RST) and we propose a new particle swarm optimization (PSO) algorithm for discrete multi-values with the similar properties of BPSO to reduce the computation, the simulation result prove the efficiency of the new algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    The research of improved apriori algorithm for mining association rules

    Publication Year: 2008 , Page(s): 513 - 516
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Association rules are the main technique for data mining. Apriori algorithm is a classical algorithm of association rule mining. Lots of algorithms for mining association rules and their mutations are proposed on basis of apriori algorithm, but traditional algorithms are not efficient. For the two bottlenecks of frequent itemsets mining: the large multitude of candidate 2-itemsets, the poor efficiency of couting their support, this paper proposes a novel algorithm so called reduced apriori algorithm with tag (RAAT), which reduces one redundant pruning operations of C2. If the number of frequent 1-itemsets is n, then the number of connected candidate 2-itemsets is Cn 2, while pruning operations Cn 2. The novel algorithm decreases pruning operations of candidate 2-itemsets, thereby saving time and increasing efficiency.For the bottleneck:poor efficiency of couting support, RAAT optimizes subset operation, through the transaction tag to speed up support calculations. The experimental results obtained from tests show that RAAT outperforms original one efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design concepts for multimedia satellite system

    Publication Year: 2008 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (532 KB) |  | HTML iconHTML  

    Our governmentpsilas whitepaper ldquoChina Spaceflight from 2006rdquopointed out that the large GEO multimedia satellites and broadband multimedia technology should be developed urgently. Satellites system can provide a high quality broadband communication services for subscribers especially in the internet access and disaster recovery. The development of satellite communication is reviewed; some design issues of Satellite system have been discussed. Based on the analysis and discussion a novel design concept for Multimedia Satellite System is proposed from internet point of view. A possible deign scheme has also been proposed which adopt the DVB-S2 and DVB-RCS from ETSI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel cancellation method of powerline interference in ECG signal based on EMD and adaptive filter

    Publication Year: 2008 , Page(s): 517 - 520
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    ECG recording is often corrupted by power line interference. A novel method is proposed for removal of power line frequency from ECG signals based on Empirical Mode Decomposition (EMD) and adaptive filter. EMD is a relatively new, data-driven adaptive technique used to decompose ECG signal into a series of Intrinsic Mode Functions (IMFs). The adaptive power line cancellation filter is designed to remove the power line interference, the reference signal of which is produced by selectively reconstruction of IMFs. To evaluate the performance of the filter, Clinic ECG signals are used. Results indicate that the power line interference of ECG is removed effectively by this new method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic modeling and simulation for LEO satellite networks

    Publication Year: 2008 , Page(s): 37 - 40
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (114 KB) |  | HTML iconHTML  

    Modeling and simulation is important for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling framework has been developed for LEO satellite networks by layered approach in a top-down manner. The framework is very suitable to describe a complex communication system. By using the framework a dynamic simulation has been made to evaluate the location update efficiency in LEO satellite networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of power line communication to the home network

    Publication Year: 2008 , Page(s): 521 - 524
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    Indoor power line is considered as one of the most attractive transmission media for home network, because it pervasive exists in almost every residential. In this paper, a novel home network integrated with power line and wireless communication is presented. However, the power line has the hostile channel for transmission high frequency signal. To design home networks better, the channel characteristics including attenuation and noise performance are analyzed. According to Shannonpsilas law the theoretical channel capacity is calculated. And the calculation result shows that the power line channel capacity is able to provide the Internet Protocol TV (IPTV) and other home network requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A method to device flow hash algorithm based traffic character

    Publication Year: 2008 , Page(s): 41 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Flow sampling algorithms and data streaming algorithms have widely adopted the hashing algorithms to detect flow information at the high-speed links for the applications of the flow distribution, the number of flow, the heavy-tailed flow, and so on. Hashing algorithms involve transforming a key inside a hash value. But there arenpsilat hash algorithms which are designed for flow measurement. In this paper, we propose a method to design flow hash algorithm based on traffic character. A bit probability distance metric is given to design a flow hash algorithm, and a flow hash algorithm is given using a CERNET trace, and the flow hash algorithm is compared with Bob and CRC hash algorithms by an uniformity test, the number of active flows tests, and a speed test. The experimental result shows that the flow hash algorithm is superior to others hash algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online identifying elephant flows through a scalable non-uniform sampling algorithm

    Publication Year: 2008 , Page(s): 525 - 528
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (131 KB) |  | HTML iconHTML  

    Elephant flows contribute a large portion of the total traffic volume despite being relatively few in the number of flows. Thus, it is very important to identify these elephant flows in traffic engineering, network operation and management. One can easily keep counters for a few elephant flows using a small amount of fast memory (SRAM). Thus a reasonable goal is to devise an algorithm that identifies elephant flows using a limited SRAM memory. In this paper, we propose a novel approach to tackle this issue by using an identifying Elephant flows based on a Scalable Non-uniform Sampling algorithm (ESNS) to make the monitoring system self-adjustable to the varying monitored traffic. The paper use CERNET traces to compare the performance the ESNS algorithm with the sample and hold algorithm, and sampled algorithm. The experiment shows that the ESNS has better precision than PSH and sampled algorithm under the same flow memory size and configures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel QoS scheduling approach for IEEE 802.16 BWA systems

    Publication Year: 2008 , Page(s): 46 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (99 KB) |  | HTML iconHTML  

    In this paper, we propose a novel packet scheduling approach for quality-of-service support in the IEEE 802.16 systems. The proposed approach is a really compromised solution which has good performance on all evaluating aspects of data throughput, packet drop rate, and fairness. We discuss different scheduling strategies for 802.16 systems and propose a new scheduling approach based on both the concepts of weighted fair queuing and earliest deadline first. The simulation results show the superiority of our proposed approach over other ones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.