By Topic

Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE

Date 9-12 Jan. 2010

Filter Results

Displaying Results 1 - 25 of 294
  • [Title page]

    Publication Year: 2010 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (24 KB)  
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2010 , Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (995 KB)  
    Freely Available from IEEE
  • Message from TPC

    Publication Year: 2010 , Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (444 KB)  
    Freely Available from IEEE
  • Committees

    Publication Year: 2010 , Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (278 KB)  
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2010 , Page(s): 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (578 KB) |  | HTML iconHTML  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Multimedia Protection Using Artificial Neural Network

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    Watermarking based DRM implementations insert imperceptible information or watermark in digital media to trace owner of the content and deter the illegal distribution of media. In geometry based 3D watermarking algorithms, a watermark is inserted by modifying the coordinates of vertices in the mesh. It is a requirement of watermarking algorithms that this change in vertex coordinates shouldn't cause perceptible distortion. It has always been a challenge to select vertices in the 3D model which would not cause perceptible distortion on addition of watermark. This paper proposes a novel approach to overcome this challenge using Artificial Neural Networks (ANN). Feature vectors representing the geometry of the vertex and its surrounding vertices are extracted and used to train and simulate ANN. ANN is used as a classifier to determine which vertices should be selected for watermarking. Experimental results simulate various attacks to test the robustness of the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 4K Digital Cinema Transmission over 1.2Gbps Wireless LAN System

    Publication Year: 2010 , Page(s): 1 - 2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (131 KB) |  | HTML iconHTML  

    In this paper, we propose a 4K digital cinema wireless transmission over 1.2 Gbps wireless LAN system. The proposed system employs next generation wireless LAN system based on IEEE802.11TGac. It uses 80 MHz of bandwidth on 5 GHz band. In this system, video data is compressed by JPEG 2000 with added error resilience tools to improve error performance against wireless channel. Computer simulations are used to evaluate the bit error performance's influences to the video quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 60-Ghz OFDM Systems for Multi-Gigabit Wireless LAN Applications

    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (429 KB) |  | HTML iconHTML  

    This paper presents the developed 60-GHz OFDM hardware demonstrators and the newly designed 60-GHz system architecture targeting for multi-gigabit wireless LAN applications. The hardware demonstrators developed so far are made up of maximum 1-Gbps OFDM baseband realized on FPGA platform and 60-GHz super-heterodyne transceivers fabricated by SiGe BiCMOS technologies. Wireless transmission in 60-GHz links is successfully demonstrated in indoor office environments. The next generation 60-GHz OFDM systems are designed to provide data rate higher than 3-Gbps utilizing the channel bandwidth of 2.16-GHz. Advanced channel coding schemes including low-density-parity-check (LDPC) coding are applied to have higher coding gain. RF transceivers are based on sliding IF architecture and designed to be compatible to the channel plans defined in the 60-GHz standards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Basic Study of Heterogeneous Flow Admission Control Based on Equality of Flow Classes

    Publication Year: 2010 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    We propose a novel flow admission control that minimizes the total call-blocking rate by treating heterogeneous flows equally. We focused on the static-state bandwidth load, which refers to how much bandwidth is used statically by a smaller class of flow than a newly arriving flow. In this paper, we analyze the characteristics of different types of loads, explain the development of a call-blocking curve to minimize the total call-blocking rate, and demonstrate good performance by this call-blocking curve. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Behavioral Analysis Engine for Network Traffic

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    Network intrusion detection systems continuously monitor the network traffic in order to identify any traces of suspicious activities such as worm, viruses or spam. One attractive technique for identifying potential Internet threats is detecting previously unknown, but common sub-strings that appear very frequently in data packets. In this paper, we propose a novel architectural platform that thoroughly analyzes the network traffic behavior in terms of repetitions to identify potential Internet threats. The main idea is to use a two-phase hashing system and small memory units functioning in parallel to achieve a high-throughput and memory efficient behavioral analysis engine. The system performs behavioral analysis on selected information/user(s) and builds a bell-shaped curve for normal traffic using parallel counters. Our traffic behavioral analysis system has been fully prototyped on Altera Stratix FPGA. Experimental results verify that our system can support line speed of gigabit-rates with very negligible false positive and negative rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component Framework for Telecare and Home Automation

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (223 KB) |  | HTML iconHTML  

    Many sensors, appliances and smart devices for within the home are becoming readily available to the general public. These can not only enhance everyday living but also allow people requiring care to stay in the comfort of their own homes for longer. Users need to be provided with the ability to easily customise their home and the devices within it. A service component architecture is described for representing various services within a home environment. The resulting system has a simple plug-and-play mechanism for easy addition and integration of a range of components. A collection of services is presented using both off-the-shelf and novel components. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Consumer-Device-Supported IPTV Network

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    This paper concentrates on consumer devices and digital content consumption at home. We approach the topic from the perspective of our network operator partner and we ask how this operator can improve its content distribution from the current IPTV service. We propose a consumer device grid that is an integral part of the operator's IP network. Our proposal results in savings in the operator's data centers and in the home whilst offering more business opportunities for the operator and third party content providers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Consumer-Device-Supported Operator Network

    Publication Year: 2010 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    This paper concentrates on consumer devices and digital content consumption at home. We approach the topic from the perspective of our network operator partner and we ask how this operator can improve its content distribution from the current IPTV service. We propose a consumer device grid that is an integral part of the operator's IP network. Our proposal results in savings in the operator's data centers and in the home whilst offering more business opportunities for the operator and third party content providers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cooperative Scanning Mechanism for the Mobile Relay in the Moving Network Environment

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    This paper proposes a cooperative scanning mechanism to overcome the increased service disruption time due to the successive scanning of the mobile relay station(MRS) and its subordinated mobile stations(MSs) in the moving network environment. The proposed mechanism regulates that the scanning duration of the MSs attached to the MRS is overlapped with that of the MRS. It results in the decreased service disruption time of the MS. We also use the similarity of the signal quality of the MRS and the MSs that is caused by the feature of the moving network to reduce the scanning duration of the MRS. Compared with the conventional scanning mechanism, the proposed mechanism reduces the scanning time of the MRS about 33% and 17% at the two-tier cell structure environment(the number of the neighbor BSs is 18) and the one-tier cell structure environment(the number of the neighbor BSs is 6), respectively. The rough calibration mechanism improves the accuracy of the measurement result. Therefore, the proposed mechanism facilitates the deployment of the vehicular network using the MRS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Customized Linux Kernel for Providing Notification of Pending Financial Transaction Information

    Publication Year: 2010 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    Financial transaction systems, such as those utilizing the Financial Information Exchange (FIX) protocol, must make buy/sell decisions based on information received over a network interface. However, at the time that a decision to buy or sell is made, some data on the system may not yet be visible to the financial engine software because it has not yet completed being processing by the network protocol stack. This data is hidden from a FIX engine running in user space until the network protocol processing (in the kernel) is fully completed and the message contents are copied from kernel space to user space. This hidden data may contain information that would lead to a more advantageous transaction if it were available to the financial application at the time that the trade decision is made. We have made several modifications to the TCP/IP protocol stack in the Linux operating system. Our protocol modifications allow a user application to determine if there are pertinent pending messages currently being processed in the kernel. If this is the case, the user application may then choose to delay the buy/sell decision by a short time until these additional messages have completed kernel processing and become available to the user application. We have implemented this mechanism under Linux 2.6.27.24 and are evaluating alternate implementations and the significance of the decision improvements that result from this enhancement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Disruption Tolerant Mobility Architecture Towards Convergent Terminal Mobility

    Publication Year: 2010 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    In recent years, a lot of terminal mobility support schemes have been proposed. These schemes mainly focus on providing seamless mobility by reducing the handover delay. They work well when the handover takes place between two overlapping wireless networks. However, in some worst scenario, it is possible that a mobile node (MN) becomes disconnected from the network for some time before it can join another wireless network. In such case, existing mobility protocols will suffer great data loss and the data connection could break. The inability to preserve data connection across long handover delay or connectivity disruption is an unavoidable obstacle before a convergent terminal mobility can be achieved. In this paper, we propose a disruption tolerant mobility architecture (DTMA) to address this issue. In DTMA, terminal mobility is supported via the use of local proxy server. User applications communicate with other hosts via the local proxy on the mobile node itself. To enable disruption tolerance, DTMA adapts delay tolerant network (DTN) architecture as a transport protocol. When the node is disconnected from the network, data sent to it will be cached by the network and delivered to the node later when it reconnects to the network. The traffic overhead of DTMA is analyzed and it is shown that DTMA provides disruption tolerance with acceptable traffic overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As opposed to traditional WLANs, the access points (APs) in these networks are often deployed by network non-specialists in an uncoordinated manner, leading to unplanned topology, interference and unsatisfactory throughput performance. We consider in this paper a distributed channel assignment algorithm for uncoordinated WLANs, where APs can selfconfigure their operating channels to minimize interference. We propose an efficient, simple and distributed algorithm termed CACAO (client-assisted channel assignment optimization). In CACAO, an AP makes use of the traffic information fed back by its clients to make channel assignment decision. This leads to better knowledge on network environment and better channel assignment decision at the APs. We conduct extensive simulation study and comparisons using network simulator 2 (NS2). Our results show that CACAO out-performs other traditional and recent schemes in terms of throughput with similar level of fairness. Furthermore, it converges quite fast to reduce interference to a low level. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Inter-Cell Interference Coordination Scheme in Downlink Multicell OFDMA Systems

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB) |  | HTML iconHTML  

    In this paper, the inter-cell interference coordination (ICIC) is investigated for the downlink transmission in OFDMA-based multi-cellular systems. The utility function is introduced to balance efficiency and fairness. Firstly, the system model is built based on the resource allocation rules of soft frequency reuse (SFR) and the utility-based optimization problem is formulated. Secondly, the problem is simplified and analyzed in the 3-cell layout to obtain a local optimizing allocation rule. Thirdly, a distributed heuristic ICIC scheme is developed in which a part of the spectrum is defined to be the spectrum pool. Cells make occupation decisions of the spectrum pool according to locally available information of traffic load. The proposed scheme has little signaling overhead and low complexity. Simulation results validate it can improve the cell edge throughput performance effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Spectrum Access Scheme for Unlicensed Systems Coexisting with Primary OFDMA Systems

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB) |  | HTML iconHTML  

    In this paper, we consider Mobile WiMAX and LTE as the future technologies for primary OFDMA systems and study dynamic spectrum access (DSA) for unlicensed systems coexisting with primary OFDMA systems. We propose an effective DSA scheme that allows an unlicensed system to statistically and opportunistically access the whole spectrum bandwidth during the last consecutive symbols of each primary OFDMA subframe. There is a tradeoff in gaining high normalized throughput by enlarging the access duration in each subframe and keeping low interference caused to the primary system by shorten the access period. Then, we model that tradeoff by deriving the optimization problem that maximizes the normalized throughput of the unlicensed system while guaranteeing the harmful interference constraints set by the primary system. We develop and conduct our simulations in our simulator modified from the powerful WiMAX simulator developed by the WiMAX Forum in Ns-2. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fixed Complexity Velocity Estimation Method for Mobile MIMO Users

    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    To estimate speed of a moving user transmitting data over a single input single output (SISO) Rayleigh fading channels, many autocorrelation function (ACF) based schemes have been presented in literature. It was shown that in a multiple input multiple output (MIMO) channel with N antennas on each side, the velocity of a moving mobile can be obtained by applying the ACF based velocity estimation schemes to each MIMO sub-channel and averaging the resulting N2 velocity estimates. To successfully deliver bandwidth-intensive services to consumers, upcoming 4G consumer devices and base stations will be equipped with a large number of antennas. As the number of antennas (and thus the number of sub-channels) in MIMO systems increase, this scheme will become too complex to implement. In this paper, for correlated MIMO channels with uniform linear arrays on both the transmitted and receiver, we propose a subset of four intelligently selected MIMO sub-channels, over which, if velocity estimates are obtained using ACF based schemes, then the average of these estimates will give an accurate MIMO velocity estimate. The estimates obtained by the proposed scheme are more accurate while at the same time, the computational complexity is reduced from N2 reported in to a constant, irrespective of N. The usage of this scheme leads to improved system performance and increased battery life in consumer devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Harmonization Among Power Saving Class in the IEEE 802.16e Systems

    Publication Year: 2010 , Page(s): 1 - 2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    The power saving mechanisms of the current IEEE 802.16e system are designed to take no consideration of the harmonization between power saving classes (PSCs) I and II. Hence, we propose a harmonized power saving mechanism between PSC I and PSC II to increase unavailability interval when a mobile station (MS) uses PSCs. The proposed mechanism adjusts the timing of the sleep window of PSC I to maximize the unavailability interval of the MSs. As a result, the proposed mechanism achieves power saving of the MSs. Through the simulation, we show that the proposed mechanism can reduce the power consumption of the MSs considerably compared with conventional mechanisms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Improving Data Delivery Efficiency in Delay Tolerant VANET with Scheduled Routes of Cars

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    In vehicular ad hoc networks (VANETs), delivering messages to a specific location is difficult due to the high mobility of vehicles. In this paper, we propose a method for efficient message delivery in VANETs utilizing the route information in car navigation systems. In the proposed method, each car periodically exchanges the information on its current position and scheduled route in the car navigation system with neighboring cars within radio range. By referring to the exchanged information, each car forwards messages to the neighboring car that will most closely approach the destination. Through simulations, we confirm that the proposed method achieves a better delivery rate with low bandwidth usage than a geocast-based method and epidemic routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mobility-Based Prediction Algorithm with Dynamic LGD Triggering for Vertical Handover

    Publication Year: 2010 , Page(s): 1 - 2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    In this paper, we propose a mobility-based prediction algorithm with dynamic LGD (Link Going Down) triggering for vertical handover by applying the IS (information server) of IEEE 802.21 MIH (media independent handover). The proposed algorithm predicts a possible moving area (PMA) of the mobile terminal based on mobility information (the velocity, coordinate values, position, movement detection, etc) in IS. Since the PMA indicates a next target cell for handover, it can advance the LGD trigger point dynamically to prepare for handover beforehand. The analytical results show that our prediction algorithm can reduce handover latency for MIPv6 (mobile IPv6), FMIPv6 (fast handover for mobile IPv6) by advancing the LGD trigger point. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Channel Approach for Video Forwarding in Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    We present a simple but effective scheme that leverages the effective packet rate in multi-hop wireless sensor networks (WSN) to forward constrained video feeds. The maximum packet rate observed in multi-hop WSN is seldom realized due to various factors. One limitation is that the implementing hardware may possess only one half-duplex radio interface. Additionally, most data forwarding schemes found in the WSNs literature employ a single radio frequency channel for their transmissions. Therefore, packet transmissions must be spaced out to avoid collisions in the wireless medium, decreasing the packet rate that can be attained. Our approach multiplexes the transmission of individual data packets through two separate paths, each of which employs a different subset of frequency channels, thus enabling packet rates closer to the maximum value. We demonstrate the practicality of our approach over commercial WSN devices to forward constrained video feeds, and conduct performance evaluations to gauge its efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.