By Topic

Wireless Networks and Information Systems, 2009. WNIS '09. International Conference on

Date 28-29 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1780 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (942 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (794 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Message from the WNIS 2009 Chairs

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (567 KB) | HTML iconHTML
    Freely Available from IEEE
  • WNIS 2009 Organizing Committee

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (565 KB)
    Freely Available from IEEE
  • WNIS 2009 reviewers

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Freely Available from IEEE
  • Research on FDM Based DRS Pattern for Dual-layer Beamforming in LTE System

    Publication Year: 2009, Page(s):3 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    To enable efficient demodulation for dual-layer beam forming in LTE system, this paper studied the frequency division multiplexing (FDM) based demodulation reference signal (DRS) pattern for normal subframe with normal cyclic prefix (CP). From the view of DRS multiplexing method, DRS overhead and DRS location, the DRS pattern design was analyzed in detail. Based on the analysis, a novel method wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling a Wireless Sensor Network as a Small World Network

    Publication Year: 2009, Page(s):7 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Wireless sensor networks experience a number of problems not found in wired networks, such as limited power resources, location identification and message routing in a wireless medium. Analysis of small world networks have shown that it is possible to transmit information from one node to another node some random distance away within a small number of hops (i.e. small world networks have a small d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Derivation of the Knapsack Problem with PAR Method

    Publication Year: 2009, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    Partition-and-recur (PAR) method is a simple and useful formal method used to design and prove algorithmic programs. In this paper, we address that PAR method is really an effective formal method on solving combinatorics problems. We formally derive combinatorics problems by PAR method, which can not only simplify the process of algorithmic program's designing and correctness testifying, but also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Anti-jamming for Interleave-Division Multiple Access Systems

    Publication Year: 2009, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Interleave-division multiple access systems (IDMA) has been extensively studied. In this paper, we present the performance analysis of anti-jamming for IDMA systems. The theoretic analysis and simulation results show that the performance of anti-jamming for IDMA systems is related to spread gain, code-bit rate, and the number of iterations, respectively. And our research work can provide a referen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cylindrical Conformal Omnidirectional Antenna Design

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The microstrip antennas have been widely used in omnidirectional antenna design because of their good characteristics, such as electrically thin, conformal and so on. The paper designs a cylindrical conformal omnidirectional microstrip array antenna. We use Quasi-travelling wave line array to achieve excursion of the major lobe. The simulation indicates that the designed arrays have good performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Comparison between Space-time Blocks Codes and Trellis Codes under Maximum Likelihood Sequence Estimator

    Publication Year: 2009, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    In multiple input and multiple output (MIMO) system, the channel code is very important and complex compare single antenna system. Space-time codes (STC) were proposed to solve the problem. In space-time codes family the space-time block code and space-time trellis code are applied in many cases. In this paper we proposed the maximum likelihood detector used in space-time trellis codes system, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Routing Protocols in Ad Hoc Networks

    Publication Year: 2009, Page(s):27 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Wireless Ad Hoc network is a special structure of the wireless communication network, whose communication relies on their cooperation among the nodes and achieve it in the manner of wireless multi-hop. Therefore, this kind of network does not rely on any fixed infrastructure, and has the properties of self-organizing and self-managing. This special network mode makes ad hoc network not only apply ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Coverage Problems in Wireless Sensor Network

    Publication Year: 2009, Page(s):31 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Wireless sensor network is composed by wireless sensor nodes, which have capabilities of perception, computing and communication. Network coverage is the main support technology in wireless sensor network application; it can achieve the physical information perception of the target region and the target object through the spatial distribution of sensor nodes in the network. Network coverage fundam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization Technology in Wireless Sensor Networks Based on UWB

    Publication Year: 2009, Page(s):35 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    On the basis of ranged-based methods, in this paper, we will raise a ranging method of TOA (Time of Arrival) based on ultra-wideband (UWB) communication technology. UWB signal have many beneficial characteristics such as good confidentiality, strong penetrating ability, high positioning accuracy and low power consumption. However, for the application of the node localization, UWB direct signal is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal Information Detection for Video Quality Evaluation

    Publication Year: 2009, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Temporal parameters are absolutely necessary in models for video quality evaluation. By detecting the temporal information (TI), it is able to design the proper parameters which can be used in the application of video quality evaluation. Nowadays, the conventional method is to calculate the RMS (root mean square) energy of the temporal gradient. Its workload would enhance greatly when the number o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node State and Backup Reverse Path Based LAODV Routing Protocol

    Publication Year: 2009, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    AODV routing protocol is a classical protocol in Ad Hoc network. The scientists have already conducted the extensive research. In order to perfect the protocol, an improved protocol LAODV is proposed in this paper, which has two improvements. One improvement is that LAODV involves a delayed algorithm based on node state. It adopts a novel delayed broadcast scheme which combines the shortest route ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modified Multiple Access Protocol for Underwater Acoustic Networks

    Publication Year: 2009, Page(s):46 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    MAC protocol is one of the key technologies of the underwater acoustic networks. In order to improve the performance, this paper puts forward a modified multiple access protocol UTRAMACA. The protocol adopts parallel transmission mode and handshaking method that are different from tradition's. By this way, it improves channel utilization rate both in space and time, and it is simulated by the Matl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Group Signatures Based on Discrete Logarithm

    Publication Year: 2009, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    A group signature scheme allows a group member to sign a message anonymously on behalf of the group. In case of a dispute, the group manager can reveal the actual identity of signer. To enhance the efficiency of group signature schemes, in this paper, we propose an efficient group signature scheme which adds some redundant bits to each divided message block, to avoid the conspiracy attack. In our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research on the Implementation of the Distributional Memory

    Publication Year: 2009, Page(s):54 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    There is no general agreement as to the best way to resolve distributed-memory. Research in distributed-memory approaches is very active. This paper describes three approaches to implementing distributed memory: remote memory, distributed virtual memory, and distributed objects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    The Research on Mutual Exclusion Algorithm in Distributed System

    Publication Year: 2009, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Research on Mutual Exclusion Algorithm in Distributed System"
    by Wang Chengjun
    in the Proceedings of the 2009 International Conference on Wireless Networks and Information Systems, December 2009

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation of Protection and Safe Mechanisms Base on Internal Access Authorization Policy

    Publication Year: 2009, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Internal authorization is part of the task of managing resource sharing. Here the concern is to protect one process's resources from the actions of other process. Implementing a system that behaves exactly like the theoretical model is very costly, so implementations approximate the behavior specified by the model. In this paper we study implementation strategies, and give policy such as protectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree Topology Based Fault Diagnosis in Wireless Sensor Networks

    Publication Year: 2009, Page(s):65 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    In order to improve the energy efficiency of the fault diagnosis in wireless sensor networks, we propose a tree topology based distributed fault diagnosis algorithm. The algorithm maintains high node fault detection rate and low fault alarm rate in wireless sensor networks under low node distribution density. First, the algorithm finds a good node with a multi-layer detection method, then, detects... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.