By Topic

ITS Telecommunications, 2008. ITST 2008. 8th International Conference on

Date 24-24 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 97
  • [Front cover]

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (230 KB)  
    Freely Available from IEEE
  • 2008 8th international conference on ITS telecommunications

    Publication Year: 2008 , Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (150 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): iii - x
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2008 , Page(s): xi - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (445 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee members

    Publication Year: 2008 , Page(s): xiv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2008 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Communications policy and ITS in Japan

    Publication Year: 2008 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (697 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Latest regulation and R&D for UWB inter-vehicle radar in millimeter wave band

    Publication Year: 2008 , Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • The Modulowatt project

    Publication Year: 2008 , Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1615 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Efficient neighbour discovery algorithm for maritime mesh networks with directional antennas

    Publication Year: 2008 , Page(s): 6 - 11
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3728 KB) |  | HTML iconHTML  

    The proliferation of wireless transceivers and the availability of unlicensed band has given a boost to the deployment of wireless networks, with the IEEE802.11/WiFi being the major driver in this arena. In this paper, we consider a wireless mesh network designed for long distance communication with a typical deployment scenario of a maritime mesh network. This network uses an antenna system made up of six fixed-beamwidth antennas. Directional antennas are used for both transmission and reception as compared to most other directional antenna schemes which use directional antenna for transmission and omni-directional antenna for reception. Through efficient use of directional antennas for both transmission and reception, and spatial reuse in transmission, we are able to realize a high capacity mesh network. We present practical methods and algorithms for the critical phase in the network operation, namely, neighbour discovery. We also show that our proposed scheme is deterministic and able to complete the task in finite time as compared to randomized and probabilistic schemes which have unpredictable execution times. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of vision enhancement system for maritime search and rescue

    Publication Year: 2008 , Page(s): 12 - 17
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (669 KB) |  | HTML iconHTML  

    Because of the limitation of physiological characteristics of human eyes, it is necessary to develop vision enhancement system for maritime search and rescue (SAR-VES), which is intended to improve the poor searching performance of human vision at sea. A system with its framework architecture, which integrate the imaging systems of visible light, infrared, radar and satellite remote sensing, is proposed in this paper to compensate the weakness of the human observation in the maritime search and rescue environment. The system will promote the sensitivity and the detection rate of targets, especially small ones, at sea. It will help improve the safety of life at sea and reduce economical losses in marine accidents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmission evaluation of Ship-borne Automatic Identification System (AIS) in congested waterways

    Publication Year: 2008 , Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (964 KB) |  | HTML iconHTML  

    AIS (ship-borne automatic identification system) is a system that enables a ship to get information about encountered ships, such as their position, course, speed, name etc. automatically by VHF radio transmission. The system is expected to contribute the improvement of marine traffic control and safety. In some congested waterways overloaded/conflicted transmission of AIS is a potential problem in the planning stage. We have developed a simulator that simulates AIS communication for real or simulated marine traffic flow considering the movement of each ship. AIS communication is evaluated under various AIS transmitting conditions and for various aspects using thus developed AIS simulator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The study of meander line for microstrip and planar design

    Publication Year: 2008 , Page(s): 24 - 28
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (850 KB) |  | HTML iconHTML  

    In this paper, the meander line antenna (MLA) have been designed to operate at 2.4-GHz for WLAN application. Two different designs of meander line antenna are investigated, without conductor line and with conductor line. Microwave Office software is used for simulation designed process. The antenna is fabricated on a double-sided FR-4 printed circuit board using an etching technique. Then the design has been tested with the Advantest Network Analyzer. The comparison between simulation and measurement results for the return loss and radiation patterns were presented. A bandwidth of 80 MHz and return loss of -37.7 dB were obtained at frequency 2.4 GHz. The gain is comparable to microstrip yagi antenna. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual polarization inset-fed microstrip patch antenna

    Publication Year: 2008 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (788 KB) |  | HTML iconHTML  

    In this letter, the design of inset fed microstrip antenna is proposed at 45deg and -45deg to achieve the optimum performance of the return loss, antenna gains and polarization loss. A design of the broadband dual-polarized microstrip antennas is proposed by using the simply inset feed technique but slant at desired rotation. In most applications, the requirement of propagation can be met with a single patch structure. However, in some cases, sharp beamwidth was required, as well as maintaining a low profile structure, which arise the development of microstrip patch array antennas. Both design of array antennas in this paper were connected using parallel feed quarter- wave transformer impedance matching technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of transmission channels with various ultra wideband antennas

    Publication Year: 2008 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1885 KB) |  | HTML iconHTML  

    In this paper, we evaluated of the free space transfer function in ultra wideband impulse radio (UWB-IR) transmission channels with various ultra wideband antennas by using the Friis¿ transmission formula. However, it is not directly applicable to UWB-IR transmission systems. This paper presents the transfer function link evaluation formula in the term of transmission channel for the UWB systems that takes into account the transmitted waveform, its distortion due to the antennas, the channel and the correlation receiver. Since the antennas are significant pulse-shaping filters in UWB impulse radio, the various kinds of the antennas are experimentally examined, especially focused on the effect of the received signal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental study of ultra wideband antenna performance with laptop computers

    Publication Year: 2008 , Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2243 KB) |  | HTML iconHTML  

    The experimental study of the ultra wideband (UWB) antenna performance with laptop computers in an indoor channel are analyzed at 3.1 GHz to 10.6 GHz frequency band. The characteristics of indoor propagation channel are very complicated and difficult to predict. Therefore, the performances of UWB antenna signal shall be considered. This paper present the UWB antenna performance. The rectangular passband waveform, which satisfied the Federal Communication Commission (FCC) definition of UWB signal and FCC spectral masks for the indoor limits, are considered. In addition, we considered the matched filter for the receiver side to maximize the signal to noise ratio (SNR). The UWB antenna transfer function, the UWB signal waveform of the UWB systems are evaluated. The transmission gain, the correlation coefficient are presented and discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wordlength effect on CMA adaptive antenna with digital beam synthesis initialization

    Publication Year: 2008 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1079 KB) |  | HTML iconHTML  

    This paper investigates the wordlength effect on the CMA adaptive antenna with digital beam synthesis initialization. The antenna is a four-element circular array whose main beam can be switched into different directions by using digital beam synthesizer. A beam obtained from digital beam synthesis is exploited as an initial beam for CMA. A weight vector for generating initial beams of CMA is chosen by determining radiation patterns. The SINR of the digital beam synthesis-based CMA adaptive antenna with different wordlengths are shown. Moreover, the step-size constant of CMA is also investigated and properly chosen to avoid underflow and overflow phenomena. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced car positioning method using infrared beacon

    Publication Year: 2008 , Page(s): 45 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1970 KB) |  | HTML iconHTML  

    We developed a novel vehicle positioning method using the existing infrared beacon infrastructure that has been spreading on Japanese roadways. This method can realize measurement accuracy of 50 cm whenever the vehicle passes under an infrared beacon roadside unit. GPS is now a popular means of providing vehicle-positioning systems. When applying GPS to more critical purposes, however, it generally lacks the necessary accuracy and reliability. To solve these problems, we have proposed a new vehicle positioning method using the existing infrared beacon infrastructure. This method is based on the principle of precisely locating optical source of the infrared-rays being received. Moreover, the infrared beacon infrastructure is designed for short-range communication, and thus offers high reliability. It is also easier to estimate the direction of the source of infrared-rays than radio waves since infrared-rays travel in a straight line. Many advanced ITS services and solutions are expected by utilizing this method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Positioning urban buses: GNSS performances

    Publication Year: 2008 , Page(s): 51 - 55
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1299 KB) |  | HTML iconHTML  

    GNSS present an interesting solution for lots of operational urban public transport modes because of their independence of infrastructure and land equipments. However, their performances have to be evaluated and sometimes enhanced. This paper will present the development of the ANGO localization solution devoted to urban guided buses. GNSS accuracy has been estimated along the line from simulations and experimental campaigns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mean travel speed estimation using GPS data without ID number on inner city road

    Publication Year: 2008 , Page(s): 56 - 61
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (744 KB) |  | HTML iconHTML  

    Due to the expansive use of GPS, GPS data can be used to provide valuable travel time and the travel speed data for the traffic information system. However, to access ID number for personal car would have problems with privacy. Thus, mean travel speed (MTS), which requires individual vehicle tracking, cannot be calculated directly. In this research, we try to estimate the MTS of the road by using GPS data without ID number. The estimation is done by considering the relationship between MTS and time mean speed (TMS), and experiment with relation between MTS and estimated space mean speed (eSMS). In addition, vehicle speed has high variance on inner city roads. Therefore, we proposed grouping method of spot speed data on the road segment, which is called segmentation, to reduce the traffic variance and analyze the collected data for MTS estimation. The results show the correlation between TMS and MTS is 0.94 and the relationship graphs between TMS and MTS have a linear trend line. Hence, TMS and MTS are very correlative. In summary, MTS estimation can be improved and developed into the model or equation if TMS is calculated under short segment (50 m), low traffic variance data, and under suitable time period (5 minutes). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Road traffic estimation from multiple GPS data using incremental weighted update

    Publication Year: 2008 , Page(s): 62 - 66
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (676 KB) |  | HTML iconHTML  

    In this study, we investigate the method to increase the accuracy of traffic estimation based on multiple GPS data from GPS-equipped vehicles in Bangkok area, Thailand. We propose an algorithm to predict an average speed of a road segment by combining hourly speed profiles of the road with real-time GPS velocity data. The algorithm utilizes incremental weighted update of average travel velocity from both sources. The velocity of data from GPS is used for update every time the data comes in, whereas the speed profiles are used for update when there is no data for a period of five minutes. The outputs are compared with a speed obtained with the position-based method. In this algorithm provides the low average speed error results around 8 km/h approximately. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on an authentication infrastructure between terminal and asp for next generation telematics

    Publication Year: 2008 , Page(s): 67 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2972 KB) |  | HTML iconHTML  

    To receive a telematics service, it must first be authenticated, and each automobile (or car navigation system) has typically been linked to a particular vehicle owner who could authenticate such services. However, an increasing number of drivers use cars that are rented, leased, or obtained through a car-sharing program; in such cases, the present form of car authentication is insufficient. A better system would authenticate the individual who is using a car at a particular time, but is not necessarily the owner. In this paper, we propose a personal authentication infrastructure for next-generation telematics. Specifically, we propose authentication infrastructure between the terminal and the service provider (ASP). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General strategies for context re-establishment in IEEE 802.11 networks

    Publication Year: 2008 , Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1102 KB) |  | HTML iconHTML  

    Despite of the evident success of the IEEE 802.11 standard, mobility support remains an open issue in networks based on this technology. Particularly, the management exchanges performed by the station during the handover (handover execution) affects the communication performance. Several work have been proposed to enhance the handover execution in IEEE 802.11 network. However, the proposed solutions have limited applications and are not able to support all services and functionalities brought by the different evolutions of the IEEE 802.11. In this paper, we present a set of general strategies for layer-2 handover execution optimization based on context re-establishment. Additionally, we detail the application of these general strategies to propose fast re-authentication mechanisms under the IEEE 802.11i. The diversity of authentication information characteristics that have to be established allows demonstrating the generality of the proposed strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EAP-Kerberos II: An adaptation of Kerberos to EAP for mutual authentication

    Publication Year: 2008 , Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1300 KB) |  | HTML iconHTML  

    The phenomenal popularity of the 802.11 network stems from its promise of easy and convenient tetherless connections. The recent identification of security risks in the operation of an 802.11 network led to announcement of the 802.11i protocol to alleviate them. Nevertheless, a number of security issues remain that prevent the 802.11 network from being the best protocol to be chosen for use in a wireless local area network (WLAN). We have dealt with three popular such remaining issues, namely, the potential loss of personal information, the implicit trust relation, and rogue access point attacks. These risks exist for two reasons: (1) unsafe key distribution and (2) imperfect mutual authentication. We propose a new authentication mechanism in extensible authentication protocol (EAP), called EAP-Kerberos II, by adapting a ticket in Kerberos. The proposed mechanism uses mutual authentication to resolve all these security issues. Moreover, the proposed mechanism improves performance of the 802.11i protocol. First, the key is downloaded from the server rather than derived in the client side. As a result, the key is available earlier than it is in the 802.11i protocol; consequently, protection of messages begins earlier. Second, authentication is much more efficient. The number of messages required to complete the entire authentication procedure is decreased by 55 percent compared with the popular authentication mechanism now used in 802.11i. Furthermore, the simulation result indicates that the improvement in efficiency can be as high as 71 percent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient scheme to protect privacy in Probe Vehicle Information system

    Publication Year: 2008 , Page(s): 84 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (920 KB) |  | HTML iconHTML  

    The Probe Vehicle Information system is as system that collects information from cars equipped with sensors. Usually, various information is collected and transferred to a server, at frequent intervals. The information includes when and where the information was collected, which could lead to privacy problems. One way to solve these problems, is to use cryptographic anonymous authentication protocols. However, although the computational and network resource on cars are limited, anonymous authentication protocols tend to consume both heavily. In this article, we propose a new protocol using the combination cryptographic anonymous authentication and symmetric-key cryptographic authentication. This protocol can protect the users¿ privacy, while is efficient enough to be used for probe vehicle information systems. We also have conducted an experiment on a simulator with 5,000 virtual cars, and showed that this protocol is efficient enough for real use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.