By Topic

Wireless Networks and Information Systems, 2009. WNIS '09. International Conference on

Date 28-29 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1780 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (942 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (794 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (158 KB)  
    Freely Available from IEEE
  • Message from the WNIS 2009 Chairs

    Publication Year: 2009 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (567 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • WNIS 2009 Organizing Committee

    Publication Year: 2009 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (565 KB)  
    Freely Available from IEEE
  • WNIS 2009 reviewers

    Publication Year: 2009 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (336 KB)  
    Freely Available from IEEE
  • Research on FDM Based DRS Pattern for Dual-layer Beamforming in LTE System

    Publication Year: 2009 , Page(s): 3 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    To enable efficient demodulation for dual-layer beam forming in LTE system, this paper studied the frequency division multiplexing (FDM) based demodulation reference signal (DRS) pattern for normal subframe with normal cyclic prefix (CP). From the view of DRS multiplexing method, DRS overhead and DRS location, the DRS pattern design was analyzed in detail. Based on the analysis, a novel method with overhead of 12 DRS per physical resource block (PRB) and placing the DRS on the edge of each PRB was proposed. The link level simulation results showed that the pattern designed with this method provided the best performance of throughput in most of occasions among the candidate patterns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling a Wireless Sensor Network as a Small World Network

    Publication Year: 2009 , Page(s): 7 - 10
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (688 KB) |  | HTML iconHTML  

    Wireless sensor networks experience a number of problems not found in wired networks, such as limited power resources, location identification and message routing in a wireless medium. Analysis of small world networks have shown that it is possible to transmit information from one node to another node some random distance away within a small number of hops (i.e. small world networks have a small diameter). The objective of this paper is to show that it is possible to model a wireless sensor network as a small world network by using multiple sink nodes to emulate the long edge required in small world networks. The two key areas that would benefit from modelling wireless networks as small world networks are localization and routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Derivation of the Knapsack Problem with PAR Method

    Publication Year: 2009 , Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    Partition-and-recur (PAR) method is a simple and useful formal method used to design and prove algorithmic programs. In this paper, we address that PAR method is really an effective formal method on solving combinatorics problems. We formally derive combinatorics problems by PAR method, which can not only simplify the process of algorithmic program's designing and correctness testifying, but also effectively improve the automatization, standardization and correctness of algorithmic program's designing by changing many creative labors to mechanized labors. Lastly, we develop typical algorithms of combinatorics problem instances, knapsack problem, and get accurate running result by RADL algorithmic program which derived by PAR method and can be transformed to C++ programs by the automatic program transforming system of PAR platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Anti-jamming for Interleave-Division Multiple Access Systems

    Publication Year: 2009 , Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    Interleave-division multiple access systems (IDMA) has been extensively studied. In this paper, we present the performance analysis of anti-jamming for IDMA systems. The theoretic analysis and simulation results show that the performance of anti-jamming for IDMA systems is related to spread gain, code-bit rate, and the number of iterations, respectively. And our research work can provide a reference for the practical system design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cylindrical Conformal Omnidirectional Antenna Design

    Publication Year: 2009 , Page(s): 19 - 22
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    The microstrip antennas have been widely used in omnidirectional antenna design because of their good characteristics, such as electrically thin, conformal and so on. The paper designs a cylindrical conformal omnidirectional microstrip array antenna. We use Quasi-travelling wave line array to achieve excursion of the major lobe. The simulation indicates that the designed arrays have good performance. Based on simulation, we have made the antenna, and have measured the standing-wave ratio and antenna direction pattern. The result indicates more that the antenna design is rationality and practicability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Comparison between Space-time Blocks Codes and Trellis Codes under Maximum Likelihood Sequence Estimator

    Publication Year: 2009 , Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (210 KB) |  | HTML iconHTML  

    In multiple input and multiple output (MIMO) system, the channel code is very important and complex compare single antenna system. Space-time codes (STC) were proposed to solve the problem. In space-time codes family the space-time block code and space-time trellis code are applied in many cases. In this paper we proposed the maximum likelihood detector used in space-time trellis codes system, and compare the difference between these two kinds of codes under maximum likelihood sequence estimator, get which situation is better to these two kinds of STC. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Routing Protocols in Ad Hoc Networks

    Publication Year: 2009 , Page(s): 27 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    Wireless Ad Hoc network is a special structure of the wireless communication network, whose communication relies on their cooperation among the nodes and achieve it in the manner of wireless multi-hop. Therefore, this kind of network does not rely on any fixed infrastructure, and has the properties of self-organizing and self-managing. This special network mode makes ad hoc network not only apply to military communications, but also apply to civilian communication such as environmental monitoring, disaster site temporary communications and so on. At the same time, Ad Hoc network has properties of mobile communications and computer networks so it can be seen as a special type of mobile computer communications networks. In this paper, first, we will introduce some basic knowledge about the Ad Hoc networks, including the concept of Ad Hoc networks, characteristics, and then research a number of classic routing protocols of Ad Hoc Network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Coverage Problems in Wireless Sensor Network

    Publication Year: 2009 , Page(s): 31 - 34
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    Wireless sensor network is composed by wireless sensor nodes, which have capabilities of perception, computing and communication. Network coverage is the main support technology in wireless sensor network application; it can achieve the physical information perception of the target region and the target object through the spatial distribution of sensor nodes in the network. Network coverage fundamentally reflects the network's perception ability for physical world. In addition, it largely affects the cost of the network and the performance of specific application. Network coverage is to be the most important issues in the network design. We first introduce simple coverage model of the wireless sensor network in this paper, and next, we discuss the challenges which belong to the issue of network coverage. In this paper, we describe the classification of coverage issues in detail. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization Technology in Wireless Sensor Networks Based on UWB

    Publication Year: 2009 , Page(s): 35 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    On the basis of ranged-based methods, in this paper, we will raise a ranging method of TOA (Time of Arrival) based on ultra-wideband (UWB) communication technology. UWB signal have many beneficial characteristics such as good confidentiality, strong penetrating ability, high positioning accuracy and low power consumption. However, for the application of the node localization, UWB direct signal is difficult to detect accurately. In this paper, the first signal arrival time and the strongest amplitude signal arrival time are weighted to get the time of direct signal, and we calculate weighting coefficient by the use of fuzzy logic technology. The simulation results show that localization technology based on UWB can greatly improve localization accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal Information Detection for Video Quality Evaluation

    Publication Year: 2009 , Page(s): 38 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    Temporal parameters are absolutely necessary in models for video quality evaluation. By detecting the temporal information (TI), it is able to design the proper parameters which can be used in the application of video quality evaluation. Nowadays, the conventional method is to calculate the RMS (root mean square) energy of the temporal gradient. Its workload would enhance greatly when the number of the pixel in image had increased. The paper proposed a new algorithm by calculating the histogram of the temporal gradient. It would increase the efficiency three times more than the conventional one while have the similar performance. The algorithm was so simple and feasible that it could be used for the application of video quality assessment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node State and Backup Reverse Path Based LAODV Routing Protocol

    Publication Year: 2009 , Page(s): 42 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    AODV routing protocol is a classical protocol in Ad Hoc network. The scientists have already conducted the extensive research. In order to perfect the protocol, an improved protocol LAODV is proposed in this paper, which has two improvements. One improvement is that LAODV involves a delayed algorithm based on node state. It adopts a novel delayed broadcast scheme which combines the shortest route selection criterion with the node states including power and traffic load to select the intermediate nodes during the route discovery phase; The other is that a backup reverse path between the intermediate nodes and the source request nodes is established, when the route breaks down, it makes sure that the intermediate node can still work smoothly. By analysing the simulation results of LAODV, the performance is demonstrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modified Multiple Access Protocol for Underwater Acoustic Networks

    Publication Year: 2009 , Page(s): 46 - 49
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (336 KB) |  | HTML iconHTML  

    MAC protocol is one of the key technologies of the underwater acoustic networks. In order to improve the performance, this paper puts forward a modified multiple access protocol UTRAMACA. The protocol adopts parallel transmission mode and handshaking method that are different from tradition's. By this way, it improves channel utilization rate both in space and time, and it is simulated by the Matlab tool. The simulation results show that the performance of this new protocol is better than the MACA protocol which was used mostly in the current underwater acoustic networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Group Signatures Based on Discrete Logarithm

    Publication Year: 2009 , Page(s): 50 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    A group signature scheme allows a group member to sign a message anonymously on behalf of the group. In case of a dispute, the group manager can reveal the actual identity of signer. To enhance the efficiency of group signature schemes, in this paper, we propose an efficient group signature scheme which adds some redundant bits to each divided message block, to avoid the conspiracy attack. In our scheme, the size of a signature is the same as that of an individual signature and the signature verification process is simplified by a group public key. The security of the proposed scheme is based on the difficulty of computing the discrete logarithm modulo for a composite number. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research on the Implementation of the Distributional Memory

    Publication Year: 2009 , Page(s): 54 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (210 KB) |  | HTML iconHTML  

    There is no general agreement as to the best way to resolve distributed-memory. Research in distributed-memory approaches is very active. This paper describes three approaches to implementing distributed memory: remote memory, distributed virtual memory, and distributed objects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    The Research on Mutual Exclusion Algorithm in Distributed System

    Publication Year: 2009 , Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (466 KB) |  | HTML iconHTML  

    Notice of Violation of IEEE Publication Principles

    "Research on Mutual Exclusion Algorithm in Distributed System"
    by Wang Chengjun
    in the Proceedings of the 2009 International Conference on Wireless Networks and Information Systems, December 2009

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following book:

    Distributed Systems,
    by A. Tanenbaum and M. Van Steen,
    Prentice Hall, pp. 253-260, 2007

    Systems involving multiple processes are often most easily programmed using critical regions. When a process has to read or update certain shared data structures, it first enters a critical region to achieve mutual exclusion and ensure that no other process will use the shared data structures at the same time. In single-processor systems, critical regions are protected using semaphores, monitors, and similar constructs. In this paper, we will research how critical regions and mutual exclusion can be implemented in distributed systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation of Protection and Safe Mechanisms Base on Internal Access Authorization Policy

    Publication Year: 2009 , Page(s): 61 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Internal authorization is part of the task of managing resource sharing. Here the concern is to protect one process's resources from the actions of other process. Implementing a system that behaves exactly like the theoretical model is very costly, so implementations approximate the behavior specified by the model. In this paper we study implementation strategies, and give policy such as protection domains, access matrix to solve these problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree Topology Based Fault Diagnosis in Wireless Sensor Networks

    Publication Year: 2009 , Page(s): 65 - 69
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    In order to improve the energy efficiency of the fault diagnosis in wireless sensor networks, we propose a tree topology based distributed fault diagnosis algorithm. The algorithm maintains high node fault detection rate and low fault alarm rate in wireless sensor networks under low node distribution density. First, the algorithm finds a good node with a multi-layer detection method, then, detects the status of other nodes by means of the status relation with the good node which is inferred by the parent-child relation in the tree topology, and up to achieves fault detection of the whole network. In ZigBee tree network, the simulation results show that the algorithm performs better in energy efficiency, and identify the faulty sensors with high accuracy and robustness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.